Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
r10072024085940.scr.exe

Overview

General Information

Sample name:r10072024085940.scr.exe
Analysis ID:1480135
MD5:618cd424097ed299ff5869779f36054a
SHA1:0b125df7fa521a8000d22481e7fa3384818f43c1
SHA256:89dc59a7a775dfe1f77a49a7e7c964ffc70ae523d209ea78d7854410fe476b90
Tags:exescr
Infos:

Detection

PureLog Stealer, XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Powershell Defender Exclusion
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • r10072024085940.scr.exe (PID: 5040 cmdline: "C:\Users\user\Desktop\r10072024085940.scr.exe" MD5: 618CD424097ED299FF5869779F36054A)
    • r10072024085940.scr.exe (PID: 4364 cmdline: "C:\Users\user\Desktop\r10072024085940.scr.exe" MD5: 618CD424097ED299FF5869779F36054A)
      • powershell.exe (PID: 2496 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 3136 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 6980 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'r10072024085940.scr.exe' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 1224 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 6920 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 4892 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 5392 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 1016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
{"C2 url": ["104.250.180.178"], "Port": "7061", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.2"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.2151669243.0000000009040000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    00000003.00000002.4597735932.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      00000003.00000002.4597735932.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x10068:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x10105:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x1021a:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0xf55a:$cnc4: POST / HTTP/1.1
      00000001.00000002.2148203556.0000000002A89000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        00000001.00000002.2148203556.0000000002A89000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0x13e04:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0x260f4:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0x3898c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0x13ea1:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0x26191:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0x38a29:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0x13fb6:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0x262a6:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0x38b3e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0x132f6:$cnc4: POST / HTTP/1.1
        • 0x255e6:$cnc4: POST / HTTP/1.1
        • 0x37e7e:$cnc4: POST / HTTP/1.1
        Click to see the 4 entries
        SourceRuleDescriptionAuthorStrings
        1.2.r10072024085940.scr.exe.9040000.11.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          1.2.r10072024085940.scr.exe.9040000.11.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            1.2.r10072024085940.scr.exe.2a4f0c4.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              3.2.r10072024085940.scr.exe.400000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
                3.2.r10072024085940.scr.exe.400000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                • 0x10268:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                • 0x10305:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                • 0x1041a:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                • 0xf75a:$cnc4: POST / HTTP/1.1
                Click to see the 9 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\r10072024085940.scr.exe", ParentImage: C:\Users\user\Desktop\r10072024085940.scr.exe, ParentProcessId: 4364, ParentProcessName: r10072024085940.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe', ProcessId: 2496, ProcessName: powershell.exe
                Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\r10072024085940.scr.exe", ParentImage: C:\Users\user\Desktop\r10072024085940.scr.exe, ParentProcessId: 4364, ParentProcessName: r10072024085940.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe', ProcessId: 2496, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\r10072024085940.scr.exe", ParentImage: C:\Users\user\Desktop\r10072024085940.scr.exe, ParentProcessId: 4364, ParentProcessName: r10072024085940.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe', ProcessId: 2496, ProcessName: powershell.exe
                Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\r10072024085940.scr.exe, ProcessId: 4364, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\r10072024085940.scr.exe", ParentImage: C:\Users\user\Desktop\r10072024085940.scr.exe, ParentProcessId: 4364, ParentProcessName: r10072024085940.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe', ProcessId: 2496, ProcessName: powershell.exe
                No Snort rule has matched
                Timestamp:2024-07-24T15:42:54.092872+0200
                SID:2855924
                Source Port:49726
                Destination Port:7061
                Protocol:TCP
                Classtype:Malware Command and Control Activity Detected
                Timestamp:2024-07-24T15:44:41.561420+0200
                SID:2853193
                Source Port:49736
                Destination Port:7061
                Protocol:TCP
                Classtype:Malware Command and Control Activity Detected
                Timestamp:2024-07-24T15:42:28.902236+0200
                SID:2855924
                Source Port:49722
                Destination Port:7061
                Protocol:TCP
                Classtype:Malware Command and Control Activity Detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000001.00000002.2148203556.0000000002A89000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["104.250.180.178"], "Port": "7061", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.2"}
                Source: C:\Users\user\AppData\Roaming\XClient.exeReversingLabs: Detection: 65%
                Source: r10072024085940.scr.exeReversingLabs: Detection: 65%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\XClient.exeJoe Sandbox ML: detected
                Source: r10072024085940.scr.exeJoe Sandbox ML: detected
                Source: 3.2.r10072024085940.scr.exe.400000.0.unpackString decryptor: 104.250.180.178
                Source: 3.2.r10072024085940.scr.exe.400000.0.unpackString decryptor: 7061
                Source: 3.2.r10072024085940.scr.exe.400000.0.unpackString decryptor: <123456789>
                Source: 3.2.r10072024085940.scr.exe.400000.0.unpackString decryptor: <Xwormmm>
                Source: 3.2.r10072024085940.scr.exe.400000.0.unpackString decryptor: XWorm V5.2
                Source: 3.2.r10072024085940.scr.exe.400000.0.unpackString decryptor: USB.exe
                Source: 3.2.r10072024085940.scr.exe.400000.0.unpackString decryptor: %AppData%
                Source: 3.2.r10072024085940.scr.exe.400000.0.unpackString decryptor: XClient.exe
                Source: r10072024085940.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: r10072024085940.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: LnPA.pdb source: r10072024085940.scr.exe, XClient.exe.3.dr
                Source: Binary string: LnPA.pdbSHA256x source: r10072024085940.scr.exe, XClient.exe.3.dr

                Networking

                barindex
                Source: Malware configuration extractorURLs: 104.250.180.178
                Source: global trafficTCP traffic: 192.168.2.6:49722 -> 104.250.180.178:7061
                Source: Joe Sandbox ViewIP Address: 104.250.180.178 104.250.180.178
                Source: Joe Sandbox ViewASN Name: M247GB M247GB
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                Source: powershell.exe, 0000000E.00000002.2325415061.00000000032E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                Source: powershell.exe, 00000004.00000002.2203786870.0000000005538000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2241264306.00000000057A8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2291307877.0000000005FB8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.2353334687.0000000005DE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: powershell.exe, 0000000E.00000002.2329810672.0000000004ED6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: powershell.exe, 00000004.00000002.2198283869.0000000004626000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228813077.0000000004897000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2273572627.00000000050A7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.2329810672.0000000004ED6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                Source: r10072024085940.scr.exe, 00000001.00000002.2148203556.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, r10072024085940.scr.exe, 00000003.00000002.4606757606.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2198283869.00000000044D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228813077.0000000004741000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2273572627.0000000004F51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.2329810672.0000000004D81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 00000004.00000002.2198283869.0000000004626000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228813077.0000000004897000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2273572627.00000000050A7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.2329810672.0000000004ED6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                Source: r10072024085940.scr.exe, XClient.exe.3.drString found in binary or memory: http://tempuri.org/DataSet1.xsd
                Source: powershell.exe, 0000000E.00000002.2329810672.0000000004ED6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: powershell.exe, 00000009.00000002.2304106697.00000000089C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
                Source: powershell.exe, 0000000E.00000002.2370487996.0000000008843000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co0
                Source: powershell.exe, 00000004.00000002.2198283869.00000000044D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228813077.0000000004741000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2273572627.0000000004F51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.2329810672.0000000004D81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                Source: powershell.exe, 0000000E.00000002.2353334687.0000000005DE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 0000000E.00000002.2353334687.0000000005DE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 0000000E.00000002.2353334687.0000000005DE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: powershell.exe, 0000000E.00000002.2329810672.0000000004ED6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: powershell.exe, 00000004.00000002.2203786870.0000000005538000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2241264306.00000000057A8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2291307877.0000000005FB8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.2353334687.0000000005DE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe

                System Summary

                barindex
                Source: 3.2.r10072024085940.scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 00000003.00000002.4597735932.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 00000001.00000002.2148203556.0000000002A89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 1_2_0282DFAC1_2_0282DFAC
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 1_2_073134391_2_07313439
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 1_2_073134481_2_07313448
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 1_2_073154C01_2_073154C0
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 1_2_073130101_2_07313010
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 1_2_073130031_2_07313003
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 1_2_073138701_2_07313870
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 1_2_073150781_2_07315078
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 1_2_073138801_2_07313880
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 1_2_073150881_2_07315088
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 1_2_08E630F81_2_08E630F8
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 1_2_08E6B5081_2_08E6B508
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 1_2_08E6B5181_2_08E6B518
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 1_2_08E62E871_2_08E62E87
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 1_2_08E62E981_2_08E62E98
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 3_2_010A44C73_2_010A44C7
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 3_2_010A4AC03_2_010A4AC0
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 3_2_010A14583_2_010A1458
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 3_2_06A6F9B83_2_06A6F9B8
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 3_2_06A6B9983_2_06A6B998
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 3_2_06A6F6703_2_06A6F670
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 3_2_06A61B4C3_2_06A61B4C
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 3_2_06BA6E903_2_06BA6E90
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 3_2_06BA4FA23_2_06BA4FA2
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 3_2_06BA55C83_2_06BA55C8
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 3_2_06BA00403_2_06BA0040
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 3_2_06BA1F093_2_06BA1F09
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_040BB4904_2_040BB490
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_080B3E984_2_080B3E98
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_02CFB4A07_2_02CFB4A0
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_02CFB4907_2_02CFB490
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_08703A987_2_08703A98
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_04EAB4909_2_04EAB490
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_08E83A989_2_08E83A98
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_04CCB4A014_2_04CCB4A0
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_04CCB49014_2_04CCB490
                Source: r10072024085940.scr.exe, 00000001.00000000.2132023644.000000000060C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameLnPA.exeT vs r10072024085940.scr.exe
                Source: r10072024085940.scr.exe, 00000001.00000002.2148694173.0000000003BFE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs r10072024085940.scr.exe
                Source: r10072024085940.scr.exe, 00000001.00000002.2151038435.00000000072A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs r10072024085940.scr.exe
                Source: r10072024085940.scr.exe, 00000001.00000002.2145073306.0000000000D1E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs r10072024085940.scr.exe
                Source: r10072024085940.scr.exe, 00000001.00000002.2151669243.0000000009040000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCAA.dll4 vs r10072024085940.scr.exe
                Source: r10072024085940.scr.exe, 00000001.00000002.2148203556.0000000002A89000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs r10072024085940.scr.exe
                Source: r10072024085940.scr.exe, 00000001.00000002.2148203556.0000000002A21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCAA.dll4 vs r10072024085940.scr.exe
                Source: r10072024085940.scr.exe, 00000003.00000002.4622241871.0000000005EC9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs r10072024085940.scr.exe
                Source: r10072024085940.scr.exe, 00000003.00000002.4619603404.0000000003E41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLnPA.exeT vs r10072024085940.scr.exe
                Source: r10072024085940.scr.exe, 00000003.00000002.4597735932.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs r10072024085940.scr.exe
                Source: r10072024085940.scr.exeBinary or memory string: OriginalFilenameLnPA.exeT vs r10072024085940.scr.exe
                Source: r10072024085940.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 3.2.r10072024085940.scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 00000003.00000002.4597735932.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 00000001.00000002.2148203556.0000000002A89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: r10072024085940.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 1.2.r10072024085940.scr.exe.9040000.11.raw.unpack, lNjw1JhxSV5n0cCMNW.csCryptographic APIs: 'CreateDecryptor'
                Source: 1.2.r10072024085940.scr.exe.9040000.11.raw.unpack, lNjw1JhxSV5n0cCMNW.csCryptographic APIs: 'CreateDecryptor'
                Source: 1.2.r10072024085940.scr.exe.2a4f0c4.0.raw.unpack, lNjw1JhxSV5n0cCMNW.csCryptographic APIs: 'CreateDecryptor'
                Source: 1.2.r10072024085940.scr.exe.2a4f0c4.0.raw.unpack, lNjw1JhxSV5n0cCMNW.csCryptographic APIs: 'CreateDecryptor'
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, 0jpphwwqZqta9yNAU1rmvPgO8j.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, LQsPA89PDgnCWG85KTzaHUxHxV.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, LQsPA89PDgnCWG85KTzaHUxHxV.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, 0jpphwwqZqta9yNAU1rmvPgO8j.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, LQsPA89PDgnCWG85KTzaHUxHxV.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, LQsPA89PDgnCWG85KTzaHUxHxV.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, N4P4GWcQkqHPddwcWa.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, N4P4GWcQkqHPddwcWa.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, MA7oxPPspVKDSv5kbor4FnogXhSLqN9jk8XGyoEg4DmabG3T3zwnypMQ3ZJUTHsOLdOneQe3sw7pXikdZGn4uDbXtV5HzjkClf7.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, MA7oxPPspVKDSv5kbor4FnogXhSLqN9jk8XGyoEg4DmabG3T3zwnypMQ3ZJUTHsOLdOneQe3sw7pXikdZGn4uDbXtV5HzjkClf7.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, MA7oxPPspVKDSv5kbor4FnogXhSLqN9jk8XGyoEg4DmabG3T3zwnypMQ3ZJUTHsOLdOneQe3sw7pXikdZGn4uDbXtV5HzjkClf7.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, MA7oxPPspVKDSv5kbor4FnogXhSLqN9jk8XGyoEg4DmabG3T3zwnypMQ3ZJUTHsOLdOneQe3sw7pXikdZGn4uDbXtV5HzjkClf7.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, j5bf5aHanl77EJZvqk.csSecurity API names: _0020.SetAccessControl
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, j5bf5aHanl77EJZvqk.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, j5bf5aHanl77EJZvqk.csSecurity API names: _0020.AddAccessRule
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, j5bf5aHanl77EJZvqk.csSecurity API names: _0020.SetAccessControl
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, j5bf5aHanl77EJZvqk.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, j5bf5aHanl77EJZvqk.csSecurity API names: _0020.AddAccessRule
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, N4P4GWcQkqHPddwcWa.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, j5bf5aHanl77EJZvqk.csSecurity API names: _0020.SetAccessControl
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, j5bf5aHanl77EJZvqk.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, j5bf5aHanl77EJZvqk.csSecurity API names: _0020.AddAccessRule
                Source: 1.2.r10072024085940.scr.exe.7060000.9.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                Source: 1.2.r10072024085940.scr.exe.2ad5b4c.4.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                Source: 1.2.r10072024085940.scr.exe.2acd4d0.5.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                Source: classification engineClassification label: mal100.troj.evad.winEXE@15/20@0/1
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeFile created: C:\Users\user\AppData\Roaming\XClient.exeJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1224:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3136:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1016:120:WilError_03
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeMutant created: \Sessions\1\BaseNamedObjects\f8RKHn3SOlVxjC9t
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4892:120:WilError_03
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net data provider for sqlserver
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeFile created: C:\Users\user\AppData\Local\Temp\Log.tmpJump to behavior
                Source: r10072024085940.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: r10072024085940.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: r10072024085940.scr.exeReversingLabs: Detection: 65%
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeFile read: C:\Users\user\Desktop\r10072024085940.scr.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\r10072024085940.scr.exe "C:\Users\user\Desktop\r10072024085940.scr.exe"
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess created: C:\Users\user\Desktop\r10072024085940.scr.exe "C:\Users\user\Desktop\r10072024085940.scr.exe"
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe'
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'r10072024085940.scr.exe'
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess created: C:\Users\user\Desktop\r10072024085940.scr.exe "C:\Users\user\Desktop\r10072024085940.scr.exe"Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe'Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'r10072024085940.scr.exe'Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: linkinfo.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: ntshrui.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: cscapi.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: avicap32.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: msvfw32.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: r10072024085940.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: r10072024085940.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: r10072024085940.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: LnPA.pdb source: r10072024085940.scr.exe, XClient.exe.3.dr
                Source: Binary string: LnPA.pdbSHA256x source: r10072024085940.scr.exe, XClient.exe.3.dr

                Data Obfuscation

                barindex
                Source: 1.2.r10072024085940.scr.exe.9040000.11.raw.unpack, lNjw1JhxSV5n0cCMNW.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 1.2.r10072024085940.scr.exe.2a4f0c4.0.raw.unpack, lNjw1JhxSV5n0cCMNW.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, Q2VLf67ZeHqHFizIAZhVexibwwBCU1qqCtwKctsvWtFDiqJPT9GKM3qd0DpkVXm58k5C2RCzfG05ymKuUh92.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{WDu24wMlQIEWaQwpfHXwdgNG7RJ4K5Y3bc5hVwls9Fj1cTY3HpvtBcqLeH6gaDiVDpDYXKIIuXaOlu2lCAJTOwdsnqwm1PXfsVw.kpaiBhymIJGBuLt851gqZoLAoD2fiZkc0DA3Lc823wxxdIa6PYsvKZlA56OH12YQ41sSLHjT4iWQJiKp8tggB2I54feK1c86Mqm,WDu24wMlQIEWaQwpfHXwdgNG7RJ4K5Y3bc5hVwls9Fj1cTY3HpvtBcqLeH6gaDiVDpDYXKIIuXaOlu2lCAJTOwdsnqwm1PXfsVw.zZbnUIep0vWxKxGVBok7L3PrzjZoEnwL0TSMXbwigCiaVp6nuwuxywUGaEN9dKldJ3TrYBoPGwVErMlqUaYHm6AAkBixXvLS97V,WDu24wMlQIEWaQwpfHXwdgNG7RJ4K5Y3bc5hVwls9Fj1cTY3HpvtBcqLeH6gaDiVDpDYXKIIuXaOlu2lCAJTOwdsnqwm1PXfsVw._1fd035fDiEoy57pBpWpWQTfLABgAwu559F98CfIdCDdRJ74x4qfREzt6LaVDN65xSX6mXNev2t5WO73ujfaH60MUncnZRoGV4vj,WDu24wMlQIEWaQwpfHXwdgNG7RJ4K5Y3bc5hVwls9Fj1cTY3HpvtBcqLeH6gaDiVDpDYXKIIuXaOlu2lCAJTOwdsnqwm1PXfsVw.IW9FNA672lsDi2tCYs0XmXfyWkYhTHM1nl8C6baQ9lTI8YY8Qyto5zkIeoHh2Zcqmqyiuv94riMmQCcGwepP0z2tUnSyyl1yoCb,LQsPA89PDgnCWG85KTzaHUxHxV.WufUBprPTFHXMI553kXybp9FaY()}}, (string[])null, (Type[])null, (bool[])null, true)
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, Q2VLf67ZeHqHFizIAZhVexibwwBCU1qqCtwKctsvWtFDiqJPT9GKM3qd0DpkVXm58k5C2RCzfG05ymKuUh92.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{_9CLWboLL8arHgBpNMCHih5iKc1[2],LQsPA89PDgnCWG85KTzaHUxHxV.WL37fsRxQxlu6tAK1xjQRngPmh(Convert.FromBase64String(_9CLWboLL8arHgBpNMCHih5iKc1[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, Q2VLf67ZeHqHFizIAZhVexibwwBCU1qqCtwKctsvWtFDiqJPT9GKM3qd0DpkVXm58k5C2RCzfG05ymKuUh92.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { _9CLWboLL8arHgBpNMCHih5iKc1[2] }}, (string[])null, (Type[])null, (bool[])null, true)
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, Q2VLf67ZeHqHFizIAZhVexibwwBCU1qqCtwKctsvWtFDiqJPT9GKM3qd0DpkVXm58k5C2RCzfG05ymKuUh92.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{WDu24wMlQIEWaQwpfHXwdgNG7RJ4K5Y3bc5hVwls9Fj1cTY3HpvtBcqLeH6gaDiVDpDYXKIIuXaOlu2lCAJTOwdsnqwm1PXfsVw.kpaiBhymIJGBuLt851gqZoLAoD2fiZkc0DA3Lc823wxxdIa6PYsvKZlA56OH12YQ41sSLHjT4iWQJiKp8tggB2I54feK1c86Mqm,WDu24wMlQIEWaQwpfHXwdgNG7RJ4K5Y3bc5hVwls9Fj1cTY3HpvtBcqLeH6gaDiVDpDYXKIIuXaOlu2lCAJTOwdsnqwm1PXfsVw.zZbnUIep0vWxKxGVBok7L3PrzjZoEnwL0TSMXbwigCiaVp6nuwuxywUGaEN9dKldJ3TrYBoPGwVErMlqUaYHm6AAkBixXvLS97V,WDu24wMlQIEWaQwpfHXwdgNG7RJ4K5Y3bc5hVwls9Fj1cTY3HpvtBcqLeH6gaDiVDpDYXKIIuXaOlu2lCAJTOwdsnqwm1PXfsVw._1fd035fDiEoy57pBpWpWQTfLABgAwu559F98CfIdCDdRJ74x4qfREzt6LaVDN65xSX6mXNev2t5WO73ujfaH60MUncnZRoGV4vj,WDu24wMlQIEWaQwpfHXwdgNG7RJ4K5Y3bc5hVwls9Fj1cTY3HpvtBcqLeH6gaDiVDpDYXKIIuXaOlu2lCAJTOwdsnqwm1PXfsVw.IW9FNA672lsDi2tCYs0XmXfyWkYhTHM1nl8C6baQ9lTI8YY8Qyto5zkIeoHh2Zcqmqyiuv94riMmQCcGwepP0z2tUnSyyl1yoCb,LQsPA89PDgnCWG85KTzaHUxHxV.WufUBprPTFHXMI553kXybp9FaY()}}, (string[])null, (Type[])null, (bool[])null, true)
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, Q2VLf67ZeHqHFizIAZhVexibwwBCU1qqCtwKctsvWtFDiqJPT9GKM3qd0DpkVXm58k5C2RCzfG05ymKuUh92.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{_9CLWboLL8arHgBpNMCHih5iKc1[2],LQsPA89PDgnCWG85KTzaHUxHxV.WL37fsRxQxlu6tAK1xjQRngPmh(Convert.FromBase64String(_9CLWboLL8arHgBpNMCHih5iKc1[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, Q2VLf67ZeHqHFizIAZhVexibwwBCU1qqCtwKctsvWtFDiqJPT9GKM3qd0DpkVXm58k5C2RCzfG05ymKuUh92.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { _9CLWboLL8arHgBpNMCHih5iKc1[2] }}, (string[])null, (Type[])null, (bool[])null, true)
                Source: r10072024085940.scr.exe, FrmLogin.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, j5bf5aHanl77EJZvqk.cs.Net Code: Gw1vaX5SMB System.Reflection.Assembly.Load(byte[])
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, j5bf5aHanl77EJZvqk.cs.Net Code: Gw1vaX5SMB System.Reflection.Assembly.Load(byte[])
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, j5bf5aHanl77EJZvqk.cs.Net Code: Gw1vaX5SMB System.Reflection.Assembly.Load(byte[])
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, Q2VLf67ZeHqHFizIAZhVexibwwBCU1qqCtwKctsvWtFDiqJPT9GKM3qd0DpkVXm58k5C2RCzfG05ymKuUh92.cs.Net Code: HFKY311DFA0CknBmafbCyAhvOzvwUW3ViyV49tKstRpT8xAE2GnNPEVulKkb5ija7d4jHOKsf5tq0JZu3yzP System.AppDomain.Load(byte[])
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, Q2VLf67ZeHqHFizIAZhVexibwwBCU1qqCtwKctsvWtFDiqJPT9GKM3qd0DpkVXm58k5C2RCzfG05ymKuUh92.cs.Net Code: iXIBZqNvKivS6RYy8lRx3sDnEn System.AppDomain.Load(byte[])
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, Q2VLf67ZeHqHFizIAZhVexibwwBCU1qqCtwKctsvWtFDiqJPT9GKM3qd0DpkVXm58k5C2RCzfG05ymKuUh92.cs.Net Code: iXIBZqNvKivS6RYy8lRx3sDnEn
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, Q2VLf67ZeHqHFizIAZhVexibwwBCU1qqCtwKctsvWtFDiqJPT9GKM3qd0DpkVXm58k5C2RCzfG05ymKuUh92.cs.Net Code: HFKY311DFA0CknBmafbCyAhvOzvwUW3ViyV49tKstRpT8xAE2GnNPEVulKkb5ija7d4jHOKsf5tq0JZu3yzP System.AppDomain.Load(byte[])
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, Q2VLf67ZeHqHFizIAZhVexibwwBCU1qqCtwKctsvWtFDiqJPT9GKM3qd0DpkVXm58k5C2RCzfG05ymKuUh92.cs.Net Code: iXIBZqNvKivS6RYy8lRx3sDnEn System.AppDomain.Load(byte[])
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, Q2VLf67ZeHqHFizIAZhVexibwwBCU1qqCtwKctsvWtFDiqJPT9GKM3qd0DpkVXm58k5C2RCzfG05ymKuUh92.cs.Net Code: iXIBZqNvKivS6RYy8lRx3sDnEn
                Source: r10072024085940.scr.exeStatic PE information: 0x81C33332 [Mon Dec 27 09:04:50 2038 UTC]
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 1_2_0731725A push ebx; ret 1_2_0731725B
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 1_2_07A401B0 push eax; iretd 1_2_07A401B1
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 1_2_08E65B48 pushfd ; retf 1_2_08E65B4C
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 1_2_08E6CDBE push esp; iretd 1_2_08E6CDC1
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 3_2_06A66692 push eax; iretd 3_2_06A66699
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 3_2_06A66690 pushad ; iretd 3_2_06A66691
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeCode function: 3_2_06A6349B push ss; retf 3_2_06A634AE
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_040B633D push eax; ret 4_2_040B6351
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_02CF5A2C push edi; iretd 7_2_02CF5A32
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_02CF5A37 push edi; iretd 7_2_02CF5A3E
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_04EA633D push eax; ret 9_2_04EA6351
                Source: r10072024085940.scr.exeStatic PE information: section name: .text entropy: 7.830777991010836
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, FdpYDqOiy2IvChmLkJ.csHigh entropy of concatenated method names: 'fY8hGyMLEX', 'UQ2hnT2FS4', 'zQihvpNlDo', 'vluh4scX5L', 'dg6hE88N2u', 'vYsh3o631b', 'Vt4hZCxaxT', 'faL0L7E78V', 'ay00DpXCed', 'tb40MvANAs'
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, paHssNzsyx7OV5Wnor.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bfnhXZJKvE', 'j7vhmg8uM0', 'NkmhdtTYAm', 'XIGhTHss3E', 'qqrh0OxJvm', 'NAQhhSebWV', 'leNhSxLvqY'
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, rl3bo7GCCHjpa7YPXI8.csHigh entropy of concatenated method names: 'TRMhFjKSvn', 'kauhPurUGn', 'u1SharKI32', 'UnohQXFOCX', 'BEfhVMfVaX', 'zaphrWsjRE', 'HvyhArvuBw', 'q3vhcA2cKN', 'VM4hjfM91T', 'AeNhxyOCd4'
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, oZ0N5nD8lvgOXppBOh.csHigh entropy of concatenated method names: 'aQM04rDK1T', 'MP00EeOCFT', 'mMA01mdgt9', 'wS603pbYPe', 'KgT0Za7Nbd', 'H8o0wRawsg', 'bgL0Hn2in3', 'PTs0BV8Y1k', 'kvR0eE6guV', 'QEL0KanJ3p'
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, Hhw20K1cFSSgBvvOkS.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'uHLRMqtFyx', 'NScROIEw0r', 'IDkRze57Ri', 'F4NnCBkp2J', 'HconGsAv2s', 'z4UnRaTKpY', 'REQnnwUlse', 'p68g7Mj1vADpaIxwjWc'
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, b27GmituljWVrhMVYf.csHigh entropy of concatenated method names: 'YfGw4BQnjW', 'PGXw1DOgUJ', 'nVNwZfuJG7', 'XIGZOAux4h', 'hp2ZznNlQN', 'E8KwCObZbS', 'SMtwGfyafx', 'RCFwRB4Dlp', 'GS3wn44c8s', 'ECfwvnEi9d'
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, kp2r6GGG7y0YEVVNxfq.csHigh entropy of concatenated method names: 'ToString', 'XMvSn7VjSa', 'CdASvQrY02', 'JSTSfZ55ZZ', 'GqbS4Hsy99', 'VqWSEg1mDm', 'vXfS1lOtnK', 'xdUS3JR3mX', 'pMNH7ocdc1a5JB03id6', 'YxXhUwcQC4mlesXgtjL'
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, KksAkZufFMpkv6tC6g.csHigh entropy of concatenated method names: 'AtyTD2tRrQ', 'ktATONBkfR', 'YVO0CjOlV1', 'm6W0GmRegJ', 'nEZTi6ygpW', 'jvITp0iR0E', 'eloTski6FL', 'MADTNaXuEG', 'GO9T5wowdH', 'hvHTJQDXpt'
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, OvZs7NRiZpB5A90qmm.csHigh entropy of concatenated method names: 'yLtaeiGti', 'UP8QCRQpf', 'NKnrUOPIp', 'XlyAuEwJA', 'RK2jatWTB', 'xQXxHtHlc', 'BsxMqD8yLRmfYgle27', 'iIonu3dgoxmj3uowg6', 'JiFxMNQwSplB1bXvDU', 'nhR0qeE0W'
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, N4P4GWcQkqHPddwcWa.csHigh entropy of concatenated method names: 'TDQENassNU', 'uVGE554yUx', 'DnDEJ122hR', 'P3nE789b6v', 'IjAEWx8KpL', 'R9xEuSWBBg', 'CRPELvTSK3', 'tU1EDOUkMm', 'T9qEM79IVf', 'wA4EOnn4Lb'
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, G7Effxjk7aXCFjWdQP.csHigh entropy of concatenated method names: 'CJ01QAv0H8', 'StL1r7nVv0', 'RA31cuG7Xc', 'QUk1j4NxJc', 'chk1m8F5hN', 'gPP1d7jwn0', 'Tj61TTIEkT', 'N1U104xn7k', 'Ajc1h4S0OE', 'CKF1SK1fSo'
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, Dxg7bilcDZidr2uZv7.csHigh entropy of concatenated method names: 'wN4ZffCHCv', 'mpqZEdl4mt', 'VODZ3220dl', 'lxUZwsPRAu', 'v34ZHpnOHK', 'nBG3WA1ZXj', 'v113urETGi', 'p2D3LgWksg', 'pgC3DmTauR', 'Uxb3M4DqbE'
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, VQZFtdM8ACEDTEWPeB.csHigh entropy of concatenated method names: 'QJI0l1qdmB', 'd4n08AFms0', 'FX506CIcqw', 'TSA0ybsYoA', 'lQ20NTbqqZ', 'aFa0olxnnd', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, mnef8vkpabqtGHcdwg.csHigh entropy of concatenated method names: 'bfLwF5Xj5I', 'DqbwPYlmKp', 'OkYwatF8CX', 'O5hwQn25BN', 'tGhwVsB9NW', 'loVwrvobjk', 'ANbwAL0ETX', 'xDhwcOjNnb', 's5iwj99rGx', 'q2Pwx1KxF5'
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, QjQ4YH7Utrfw1y2mIT.csHigh entropy of concatenated method names: 'bavTeUctEf', 'TPgTKyo26a', 'ToString', 'rGdT4lnwxc', 'EKrTEh2Mf7', 'Ll4T1Zq01b', 'EcHT3Y4d0x', 'LQfTZvDUpD', 'ygcTwvXI6F', 'AolTH6Phq7'
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, j5bf5aHanl77EJZvqk.csHigh entropy of concatenated method names: 'LptnfPwmRq', 'D8qn4DhUGR', 'DxinESRYd2', 'UK7n13kKrk', 'BPfn3YY9aK', 'ytvnZJog92', 'DZVnwKy95H', 'PaqnHxRSvT', 'xfpnB4ylME', 'k0nneRr5KO'
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, HpjZYhs8gsBTDbTvIp.csHigh entropy of concatenated method names: 'rl1Xc2h2da', 'hfTXjec844', 'nBIXlkqDJO', 'rqcX85PKNw', 'zCuXyO7bvm', 'li3Xo4rmaF', 'LyaXtXEjGY', 'PlTX2018Yv', 'PGJXgaivbR', 'wLIXixPkgF'
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, hctR6TGnfA5n5CVANP8.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'lMBSN9KZ60', 'BxoS51TLKF', 'na6SJ7QeQ5', 'LxLS7YmxPw', 'zedSWvji4q', 'q4TSuysKjK', 'uZqSLLttCO'
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, vjP4fSv21lfb6YAjlG.csHigh entropy of concatenated method names: 'opgGw4P4GW', 'AkqGHHPddw', 'Fk7GeaXCFj', 'UdQGKP0qTj', 'SdEGmMAcxg', 'TbiGdcDZid', 'KIWsOdaR3XngBjjcoS', 'dnXVW7PlW4og3ZwAtv', 'ug5GG62Nwo', 'JDXGn9cAvg'
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, NyIRJ0EmmImnIn0S0S.csHigh entropy of concatenated method names: 'Dispose', 'WQrGMW2qaZ', 'RVHR8SCIC3', 'cb777O886u', 'YmZGO0N5n8', 'GvgGzOXppB', 'ProcessDialogKey', 'YhuRCQZFtd', 'HACRGEDTEW', 'yeBRRldpYD'
                Source: 1.2.r10072024085940.scr.exe.3c59af0.7.raw.unpack, rqTjWCxO2IvYhJdEMA.csHigh entropy of concatenated method names: 'TbJ3VKh3hX', 'f3V3A6bQ7h', 'NQK16SMRV9', 'x2k1yK333v', 'avZ1oQB0Jt', 'utB19KUXqy', 'Q9e1tvKiOh', 'zU712tGOHh', 'fP71k8uYLh', 'PBD1gAd4Zs'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, FdpYDqOiy2IvChmLkJ.csHigh entropy of concatenated method names: 'fY8hGyMLEX', 'UQ2hnT2FS4', 'zQihvpNlDo', 'vluh4scX5L', 'dg6hE88N2u', 'vYsh3o631b', 'Vt4hZCxaxT', 'faL0L7E78V', 'ay00DpXCed', 'tb40MvANAs'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, paHssNzsyx7OV5Wnor.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bfnhXZJKvE', 'j7vhmg8uM0', 'NkmhdtTYAm', 'XIGhTHss3E', 'qqrh0OxJvm', 'NAQhhSebWV', 'leNhSxLvqY'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, rl3bo7GCCHjpa7YPXI8.csHigh entropy of concatenated method names: 'TRMhFjKSvn', 'kauhPurUGn', 'u1SharKI32', 'UnohQXFOCX', 'BEfhVMfVaX', 'zaphrWsjRE', 'HvyhArvuBw', 'q3vhcA2cKN', 'VM4hjfM91T', 'AeNhxyOCd4'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, oZ0N5nD8lvgOXppBOh.csHigh entropy of concatenated method names: 'aQM04rDK1T', 'MP00EeOCFT', 'mMA01mdgt9', 'wS603pbYPe', 'KgT0Za7Nbd', 'H8o0wRawsg', 'bgL0Hn2in3', 'PTs0BV8Y1k', 'kvR0eE6guV', 'QEL0KanJ3p'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, Hhw20K1cFSSgBvvOkS.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'uHLRMqtFyx', 'NScROIEw0r', 'IDkRze57Ri', 'F4NnCBkp2J', 'HconGsAv2s', 'z4UnRaTKpY', 'REQnnwUlse', 'p68g7Mj1vADpaIxwjWc'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, b27GmituljWVrhMVYf.csHigh entropy of concatenated method names: 'YfGw4BQnjW', 'PGXw1DOgUJ', 'nVNwZfuJG7', 'XIGZOAux4h', 'hp2ZznNlQN', 'E8KwCObZbS', 'SMtwGfyafx', 'RCFwRB4Dlp', 'GS3wn44c8s', 'ECfwvnEi9d'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, kp2r6GGG7y0YEVVNxfq.csHigh entropy of concatenated method names: 'ToString', 'XMvSn7VjSa', 'CdASvQrY02', 'JSTSfZ55ZZ', 'GqbS4Hsy99', 'VqWSEg1mDm', 'vXfS1lOtnK', 'xdUS3JR3mX', 'pMNH7ocdc1a5JB03id6', 'YxXhUwcQC4mlesXgtjL'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, KksAkZufFMpkv6tC6g.csHigh entropy of concatenated method names: 'AtyTD2tRrQ', 'ktATONBkfR', 'YVO0CjOlV1', 'm6W0GmRegJ', 'nEZTi6ygpW', 'jvITp0iR0E', 'eloTski6FL', 'MADTNaXuEG', 'GO9T5wowdH', 'hvHTJQDXpt'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, OvZs7NRiZpB5A90qmm.csHigh entropy of concatenated method names: 'yLtaeiGti', 'UP8QCRQpf', 'NKnrUOPIp', 'XlyAuEwJA', 'RK2jatWTB', 'xQXxHtHlc', 'BsxMqD8yLRmfYgle27', 'iIonu3dgoxmj3uowg6', 'JiFxMNQwSplB1bXvDU', 'nhR0qeE0W'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, N4P4GWcQkqHPddwcWa.csHigh entropy of concatenated method names: 'TDQENassNU', 'uVGE554yUx', 'DnDEJ122hR', 'P3nE789b6v', 'IjAEWx8KpL', 'R9xEuSWBBg', 'CRPELvTSK3', 'tU1EDOUkMm', 'T9qEM79IVf', 'wA4EOnn4Lb'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, G7Effxjk7aXCFjWdQP.csHigh entropy of concatenated method names: 'CJ01QAv0H8', 'StL1r7nVv0', 'RA31cuG7Xc', 'QUk1j4NxJc', 'chk1m8F5hN', 'gPP1d7jwn0', 'Tj61TTIEkT', 'N1U104xn7k', 'Ajc1h4S0OE', 'CKF1SK1fSo'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, Dxg7bilcDZidr2uZv7.csHigh entropy of concatenated method names: 'wN4ZffCHCv', 'mpqZEdl4mt', 'VODZ3220dl', 'lxUZwsPRAu', 'v34ZHpnOHK', 'nBG3WA1ZXj', 'v113urETGi', 'p2D3LgWksg', 'pgC3DmTauR', 'Uxb3M4DqbE'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, VQZFtdM8ACEDTEWPeB.csHigh entropy of concatenated method names: 'QJI0l1qdmB', 'd4n08AFms0', 'FX506CIcqw', 'TSA0ybsYoA', 'lQ20NTbqqZ', 'aFa0olxnnd', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, mnef8vkpabqtGHcdwg.csHigh entropy of concatenated method names: 'bfLwF5Xj5I', 'DqbwPYlmKp', 'OkYwatF8CX', 'O5hwQn25BN', 'tGhwVsB9NW', 'loVwrvobjk', 'ANbwAL0ETX', 'xDhwcOjNnb', 's5iwj99rGx', 'q2Pwx1KxF5'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, QjQ4YH7Utrfw1y2mIT.csHigh entropy of concatenated method names: 'bavTeUctEf', 'TPgTKyo26a', 'ToString', 'rGdT4lnwxc', 'EKrTEh2Mf7', 'Ll4T1Zq01b', 'EcHT3Y4d0x', 'LQfTZvDUpD', 'ygcTwvXI6F', 'AolTH6Phq7'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, j5bf5aHanl77EJZvqk.csHigh entropy of concatenated method names: 'LptnfPwmRq', 'D8qn4DhUGR', 'DxinESRYd2', 'UK7n13kKrk', 'BPfn3YY9aK', 'ytvnZJog92', 'DZVnwKy95H', 'PaqnHxRSvT', 'xfpnB4ylME', 'k0nneRr5KO'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, HpjZYhs8gsBTDbTvIp.csHigh entropy of concatenated method names: 'rl1Xc2h2da', 'hfTXjec844', 'nBIXlkqDJO', 'rqcX85PKNw', 'zCuXyO7bvm', 'li3Xo4rmaF', 'LyaXtXEjGY', 'PlTX2018Yv', 'PGJXgaivbR', 'wLIXixPkgF'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, hctR6TGnfA5n5CVANP8.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'lMBSN9KZ60', 'BxoS51TLKF', 'na6SJ7QeQ5', 'LxLS7YmxPw', 'zedSWvji4q', 'q4TSuysKjK', 'uZqSLLttCO'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, vjP4fSv21lfb6YAjlG.csHigh entropy of concatenated method names: 'opgGw4P4GW', 'AkqGHHPddw', 'Fk7GeaXCFj', 'UdQGKP0qTj', 'SdEGmMAcxg', 'TbiGdcDZid', 'KIWsOdaR3XngBjjcoS', 'dnXVW7PlW4og3ZwAtv', 'ug5GG62Nwo', 'JDXGn9cAvg'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, NyIRJ0EmmImnIn0S0S.csHigh entropy of concatenated method names: 'Dispose', 'WQrGMW2qaZ', 'RVHR8SCIC3', 'cb777O886u', 'YmZGO0N5n8', 'GvgGzOXppB', 'ProcessDialogKey', 'YhuRCQZFtd', 'HACRGEDTEW', 'yeBRRldpYD'
                Source: 1.2.r10072024085940.scr.exe.72a0000.10.raw.unpack, rqTjWCxO2IvYhJdEMA.csHigh entropy of concatenated method names: 'TbJ3VKh3hX', 'f3V3A6bQ7h', 'NQK16SMRV9', 'x2k1yK333v', 'avZ1oQB0Jt', 'utB19KUXqy', 'Q9e1tvKiOh', 'zU712tGOHh', 'fP71k8uYLh', 'PBD1gAd4Zs'
                Source: 1.2.r10072024085940.scr.exe.9040000.11.raw.unpack, lNjw1JhxSV5n0cCMNW.csHigh entropy of concatenated method names: 'Kb0HWSL22O', 'RgtTUJcyZL', 'jHu2HrxObq', 'UAF22bihQq', 'Hla2xZGvyo', 'XAB2tPq0q8', 'aeMUEk3AsB3Pt', 'xw8jvYcwb', 'eSADOWkF2', 'hfhQtMtDc'
                Source: 1.2.r10072024085940.scr.exe.9040000.11.raw.unpack, NkEtj4xdihRGcDPjVY.csHigh entropy of concatenated method names: 'HVYMFtP2f', 'CuEekxjKf', 'WGqJ3oTFt', 'GCn1bRmSG', 'Kbtl1TeP0', 'Fy7hiDf8S', 'e5JqCGSck', 'C2SLkryPZ', 'ksT8NQvKO', 'zvqT1Z212'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, FdpYDqOiy2IvChmLkJ.csHigh entropy of concatenated method names: 'fY8hGyMLEX', 'UQ2hnT2FS4', 'zQihvpNlDo', 'vluh4scX5L', 'dg6hE88N2u', 'vYsh3o631b', 'Vt4hZCxaxT', 'faL0L7E78V', 'ay00DpXCed', 'tb40MvANAs'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, paHssNzsyx7OV5Wnor.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bfnhXZJKvE', 'j7vhmg8uM0', 'NkmhdtTYAm', 'XIGhTHss3E', 'qqrh0OxJvm', 'NAQhhSebWV', 'leNhSxLvqY'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, rl3bo7GCCHjpa7YPXI8.csHigh entropy of concatenated method names: 'TRMhFjKSvn', 'kauhPurUGn', 'u1SharKI32', 'UnohQXFOCX', 'BEfhVMfVaX', 'zaphrWsjRE', 'HvyhArvuBw', 'q3vhcA2cKN', 'VM4hjfM91T', 'AeNhxyOCd4'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, oZ0N5nD8lvgOXppBOh.csHigh entropy of concatenated method names: 'aQM04rDK1T', 'MP00EeOCFT', 'mMA01mdgt9', 'wS603pbYPe', 'KgT0Za7Nbd', 'H8o0wRawsg', 'bgL0Hn2in3', 'PTs0BV8Y1k', 'kvR0eE6guV', 'QEL0KanJ3p'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, Hhw20K1cFSSgBvvOkS.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'uHLRMqtFyx', 'NScROIEw0r', 'IDkRze57Ri', 'F4NnCBkp2J', 'HconGsAv2s', 'z4UnRaTKpY', 'REQnnwUlse', 'p68g7Mj1vADpaIxwjWc'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, b27GmituljWVrhMVYf.csHigh entropy of concatenated method names: 'YfGw4BQnjW', 'PGXw1DOgUJ', 'nVNwZfuJG7', 'XIGZOAux4h', 'hp2ZznNlQN', 'E8KwCObZbS', 'SMtwGfyafx', 'RCFwRB4Dlp', 'GS3wn44c8s', 'ECfwvnEi9d'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, kp2r6GGG7y0YEVVNxfq.csHigh entropy of concatenated method names: 'ToString', 'XMvSn7VjSa', 'CdASvQrY02', 'JSTSfZ55ZZ', 'GqbS4Hsy99', 'VqWSEg1mDm', 'vXfS1lOtnK', 'xdUS3JR3mX', 'pMNH7ocdc1a5JB03id6', 'YxXhUwcQC4mlesXgtjL'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, KksAkZufFMpkv6tC6g.csHigh entropy of concatenated method names: 'AtyTD2tRrQ', 'ktATONBkfR', 'YVO0CjOlV1', 'm6W0GmRegJ', 'nEZTi6ygpW', 'jvITp0iR0E', 'eloTski6FL', 'MADTNaXuEG', 'GO9T5wowdH', 'hvHTJQDXpt'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, OvZs7NRiZpB5A90qmm.csHigh entropy of concatenated method names: 'yLtaeiGti', 'UP8QCRQpf', 'NKnrUOPIp', 'XlyAuEwJA', 'RK2jatWTB', 'xQXxHtHlc', 'BsxMqD8yLRmfYgle27', 'iIonu3dgoxmj3uowg6', 'JiFxMNQwSplB1bXvDU', 'nhR0qeE0W'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, N4P4GWcQkqHPddwcWa.csHigh entropy of concatenated method names: 'TDQENassNU', 'uVGE554yUx', 'DnDEJ122hR', 'P3nE789b6v', 'IjAEWx8KpL', 'R9xEuSWBBg', 'CRPELvTSK3', 'tU1EDOUkMm', 'T9qEM79IVf', 'wA4EOnn4Lb'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, G7Effxjk7aXCFjWdQP.csHigh entropy of concatenated method names: 'CJ01QAv0H8', 'StL1r7nVv0', 'RA31cuG7Xc', 'QUk1j4NxJc', 'chk1m8F5hN', 'gPP1d7jwn0', 'Tj61TTIEkT', 'N1U104xn7k', 'Ajc1h4S0OE', 'CKF1SK1fSo'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, Dxg7bilcDZidr2uZv7.csHigh entropy of concatenated method names: 'wN4ZffCHCv', 'mpqZEdl4mt', 'VODZ3220dl', 'lxUZwsPRAu', 'v34ZHpnOHK', 'nBG3WA1ZXj', 'v113urETGi', 'p2D3LgWksg', 'pgC3DmTauR', 'Uxb3M4DqbE'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, VQZFtdM8ACEDTEWPeB.csHigh entropy of concatenated method names: 'QJI0l1qdmB', 'd4n08AFms0', 'FX506CIcqw', 'TSA0ybsYoA', 'lQ20NTbqqZ', 'aFa0olxnnd', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, mnef8vkpabqtGHcdwg.csHigh entropy of concatenated method names: 'bfLwF5Xj5I', 'DqbwPYlmKp', 'OkYwatF8CX', 'O5hwQn25BN', 'tGhwVsB9NW', 'loVwrvobjk', 'ANbwAL0ETX', 'xDhwcOjNnb', 's5iwj99rGx', 'q2Pwx1KxF5'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, QjQ4YH7Utrfw1y2mIT.csHigh entropy of concatenated method names: 'bavTeUctEf', 'TPgTKyo26a', 'ToString', 'rGdT4lnwxc', 'EKrTEh2Mf7', 'Ll4T1Zq01b', 'EcHT3Y4d0x', 'LQfTZvDUpD', 'ygcTwvXI6F', 'AolTH6Phq7'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, j5bf5aHanl77EJZvqk.csHigh entropy of concatenated method names: 'LptnfPwmRq', 'D8qn4DhUGR', 'DxinESRYd2', 'UK7n13kKrk', 'BPfn3YY9aK', 'ytvnZJog92', 'DZVnwKy95H', 'PaqnHxRSvT', 'xfpnB4ylME', 'k0nneRr5KO'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, HpjZYhs8gsBTDbTvIp.csHigh entropy of concatenated method names: 'rl1Xc2h2da', 'hfTXjec844', 'nBIXlkqDJO', 'rqcX85PKNw', 'zCuXyO7bvm', 'li3Xo4rmaF', 'LyaXtXEjGY', 'PlTX2018Yv', 'PGJXgaivbR', 'wLIXixPkgF'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, hctR6TGnfA5n5CVANP8.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'lMBSN9KZ60', 'BxoS51TLKF', 'na6SJ7QeQ5', 'LxLS7YmxPw', 'zedSWvji4q', 'q4TSuysKjK', 'uZqSLLttCO'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, vjP4fSv21lfb6YAjlG.csHigh entropy of concatenated method names: 'opgGw4P4GW', 'AkqGHHPddw', 'Fk7GeaXCFj', 'UdQGKP0qTj', 'SdEGmMAcxg', 'TbiGdcDZid', 'KIWsOdaR3XngBjjcoS', 'dnXVW7PlW4og3ZwAtv', 'ug5GG62Nwo', 'JDXGn9cAvg'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, NyIRJ0EmmImnIn0S0S.csHigh entropy of concatenated method names: 'Dispose', 'WQrGMW2qaZ', 'RVHR8SCIC3', 'cb777O886u', 'YmZGO0N5n8', 'GvgGzOXppB', 'ProcessDialogKey', 'YhuRCQZFtd', 'HACRGEDTEW', 'yeBRRldpYD'
                Source: 1.2.r10072024085940.scr.exe.3cad510.8.raw.unpack, rqTjWCxO2IvYhJdEMA.csHigh entropy of concatenated method names: 'TbJ3VKh3hX', 'f3V3A6bQ7h', 'NQK16SMRV9', 'x2k1yK333v', 'avZ1oQB0Jt', 'utB19KUXqy', 'Q9e1tvKiOh', 'zU712tGOHh', 'fP71k8uYLh', 'PBD1gAd4Zs'
                Source: 1.2.r10072024085940.scr.exe.2a4f0c4.0.raw.unpack, lNjw1JhxSV5n0cCMNW.csHigh entropy of concatenated method names: 'Kb0HWSL22O', 'RgtTUJcyZL', 'jHu2HrxObq', 'UAF22bihQq', 'Hla2xZGvyo', 'XAB2tPq0q8', 'aeMUEk3AsB3Pt', 'xw8jvYcwb', 'eSADOWkF2', 'hfhQtMtDc'
                Source: 1.2.r10072024085940.scr.exe.2a4f0c4.0.raw.unpack, NkEtj4xdihRGcDPjVY.csHigh entropy of concatenated method names: 'HVYMFtP2f', 'CuEekxjKf', 'WGqJ3oTFt', 'GCn1bRmSG', 'Kbtl1TeP0', 'Fy7hiDf8S', 'e5JqCGSck', 'C2SLkryPZ', 'ksT8NQvKO', 'zvqT1Z212'
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, WDu24wMlQIEWaQwpfHXwdgNG7RJ4K5Y3bc5hVwls9Fj1cTY3HpvtBcqLeH6gaDiVDpDYXKIIuXaOlu2lCAJTOwdsnqwm1PXfsVw.csHigh entropy of concatenated method names: 'nzpq34I2Owdcl9fMv5UC2J5bWAhYRAKaulM2epxdlOUgYAwStJcbsQF2LV7', '_3TV7y1L0UdqugSHqWSFDQgjIB1RLAMta0zbdfnGtgjiEucMaYzlPshW9VtV', 'pjvrCbuiTImLYchYZBIntOVyvPn3ZfSMtWVvNsM0Nvur9iH1fX2B8axAglC', 'jI7KmqV1ayX8qwmay9TzwN1cwR8kqb0h8EMRQLIOnFHgagzy7qGeZFVymwQ'
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, 8vDNxxr6KA56TLeIORtyRLSVXe.csHigh entropy of concatenated method names: '_00wnbuD6N1v3u4tAFw3wul2CM0', 'fbuqWesh3CVNj2RtuGY4FmHJps', 'HFqUUv7DJAEEhvrSsywavqaOIT', 'lO3fdbWbA8cdJSM60XZlTyTo1nRw6RJ0TkcvaWTmeXkk', 'o454lDfZaM893ftJX7v3O4qrjBaqZgXKn8MLidOK6Wep', 'dGQ7XoqybmSzxfRt5TDkZgPg2kC5INkjb6ybBBTnIQBQ', 'qnxpDMttXO5Q6RWMOugTF1OB5xiLTvjjuAAVGH4HMLQO', 'HeZsr9e5BNhQhw2tx7EzDGOu3oFSOtiNHoENJsbWOQXf', 'DJjUyYbm7hNYuN3aTC7191TEVjaM3TCFuJXKVoTOyfXP', 'gZOiEnnJ6n7BiHg1PhnYUfFDonaGra3pPadwz8Md8Lwa'
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, TvXNMPQzFStCY57ElDLFZF5wAWyu0HVKP74m0eYWEhLZU5ek0outej2CSyzPAywwqGzOP32wGaNx3OfXdD6rsa5uWywfJM4PgHN.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'cqdgMqYlqVr2WPbYU5d9YHP80OHFw99M9Y6CT3Cr4bu1pDH343obGJOq7xC', 'g5ZfxcIQ2yYANiEqDIDYC5MiH24kf8WoOop4sg9QRmMmIwIekfETxLRXPUs', '_26HTuFzrNZYByDsAEiZbqNFA59SdHCtVcYm4RrYlYDtfKTpyB7EqJpy61DM', 'Hta5nog2yoVHh9zNcyUS7cXHn92CKJeikSJ96C9reTxLwGxghqe54UiXCun'
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, JJqNIbmAEnE7SiPqGMTQm6czGZ9oDVL8xeYwvixsqiqWp3UZE3bbHqW0DPuSoU7Yz04fIfeMVsV3xLKVxXwRTrLXVvtHRM473Hj.csHigh entropy of concatenated method names: '_0wZ0aYgmMl7kCbvj6Ou4SqrdhKMFXGYofIhw64PZvBBBcVwz8edGsmoVjHZbxfJWPFhXcFK7G5Pkh3B9nMhjygTmnsyHZe5BwKO', 'wKAxAa74PvSccIjVWKrzIU9aAbAaHgp2F7R6H71jGdpLfaJQlfMmCgmIYeOq3bhY2kwGWp326CXODtRaQ1K7UejHfChjJCsd4w6', 'mblvCI5AALNqM17akKxCiwWFqw4LHtX9ugJUzGVJ5hX19rmDg285YT5yERlcJs18nWe8lJA3wuvI431UqKVZVz65vnGkNFR36WN', '_7CaW1EWN4UJVbiroC1AJiLX9lGWRa1euvVKutGGoR8xtke3Xu7QmRXrUL6xaZijXX9TQVdzIzydglyCWCssa48rnFFFPU2xct98', 'GywKF26peTAjyqmA0CwBA9qjJy4zhnHgjQ3LQ24bOXCR5e8HHJQUHzAMBVF6ruq9Qx8IW2od06bo2WNzKmI5vXL99DfhdVs0lR0', 'wJj4dvHtMignilEHYXN1NqGKGCvTZPsAQfYt5ZUtqcHgRruffEstHQHFzzP', 'z8wKUA2RKriNaMffEKpb4ppJCmTntUt8oajciBxfzbgAWeF0darr6JKmGCE', 'gDKN5mrHJddJ7SGyk37vE8BX8FDQO4LE9MUKXE6gr3ZBhTUKPL1dpb7nZJU', 'q59SA0UWlBieLpkTGLZQ2MuXoOR0y6UAwZUuPLi7j5XLYpj5l0PTYnG4bR2', '_5HnHp0XZFWIe58Rxw2X8ec6Ak3NpUsaEP4gwO8SsoiNMr9hESe9256VyQLT'
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, 0jpphwwqZqta9yNAU1rmvPgO8j.csHigh entropy of concatenated method names: '_1Rspokhmbe63QRMYYW7YaeFX0v', 'yq2uAsopTtMnLlhOp3DDOI5x0D3nFRlhWfKcOXT4v4gy', 'P6kUAuGkBsoDc6hkTCoEjAFeZebruUYkj9lWD5A2Wa30', '_5fL5nT5bzWd4k9YU5fI6Mpi6WWp4SBBmZ5CDOZK7cqqb', 'OZMMPGeVcmQdHwJF9epKtonlDSwhlOm5WEq7HAmYKxkl'
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, Q2VLf67ZeHqHFizIAZhVexibwwBCU1qqCtwKctsvWtFDiqJPT9GKM3qd0DpkVXm58k5C2RCzfG05ymKuUh92.csHigh entropy of concatenated method names: 'LdFLkiKlLrIfANYkDqDQXycHmXxIRUaNL4TkP4RHu7gZe8lku41k0ght9Et3VdaNL2d3xxicXkR3nKgFLeTJ', 'HFKY311DFA0CknBmafbCyAhvOzvwUW3ViyV49tKstRpT8xAE2GnNPEVulKkb5ija7d4jHOKsf5tq0JZu3yzP', '_0Sb0jSn74vlKCTBycSpeKCKh8YVnIEDot37X0YY8eiqItyMOkMMnEHcDx87GiyxSyRglhdcD2PfetzhD4OQv', 'oaGsaY395ldYCvAX6WxuCpu4ToG9fV2z5tOYwsJcZ5WUXesjqC4oPF69K1QpSsQ7gFX5LmiVjo2HXeH06dJ3', 'Jvg1iNjm2BnGEK9IIpgoplw6Fr0GV7T4vOumLInDXwY0x4C7t6WTPgLEDEOjf44CUQacC30IEtGAWjL1KcxM', 'erIkWKvNLiY2o8ryEih0Eq4ui5nGIqCHNiSsMAnAy9xaqzkqpDDH8VaOOFprVmT3M2Ikaye65nLjquYxw1E0', 'XZN7O3p3PknQ8oiGMcm2nUKm2u4J2dqNsvpWsGAEBCnitAPO84VpGDc6njiiTqqghHeXC3ltqdDBds0326Am', 'GanNgRzx9YmKSxobPaRmKvYnZEBvFAUCoPdDSV29IjNGNpAsix8wOUqtZnIRoKjLONyRAl2amIDRhhSMEsvR', 'aSPD3e3gL7inuMeKBXU5aaNxfyuloxHqiCgBrqZNzpio6yary8g4U7qoSVAKB9M5aK8JZ4JL7frwEPIWLNii', 'tMNw0i1eU1cZcutvPHlHjmT4OmNObT1BsuhC6uw8Dnbb4boPq9pTjoXX239rQ1OxsNBiYEUDmDjXfN7SxgnS'
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, kaHZoyXSlsqJiGMDmYfIITVF1t.csHigh entropy of concatenated method names: '_6Uc2JxshDBPfgjJCqPzKspkSU6', '_0EOkSBhN5BPczbdrIiryIEVhy9Jcydn0pQbJMd8zvSPb', 'xq6aEromiLWyTaoNny5Z75jxKNwfdMWW98IhSvJ6oZpR', 'U9ZFrYbS9G7idln1Gk7gDwUXZHcoxvNGRUMapKTfcdMn', 'ywQd4pM6VBs57Lkeaqj7cUzstOyB2LDnY1mqhMKk3XiZ'
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, MA7oxPPspVKDSv5kbor4FnogXhSLqN9jk8XGyoEg4DmabG3T3zwnypMQ3ZJUTHsOLdOneQe3sw7pXikdZGn4uDbXtV5HzjkClf7.csHigh entropy of concatenated method names: 'bCUGVYnUqZyhFAZbEOF8KW3BuhcghQFp4XbpthrY6K0XxuF4hMaEIWAIpnB3sTgPgCko4dcZKitOlvJ4V9gmqXXdcZBfSDK9PWi', 'gDbp8urZptnAbj0zWQ7gFA2VSwEQMOJWyzCYgjq8ln8fED06jOLIa7FsNFZl81vOShWbUSbuI29QzqPYJpDv', 'l2qBqfPnflox0oUMwDgwc6T2D0lpuAvDPkD4apKf5Wd14y3XcjfkBS1Ndh3Gc8tw5VLgrW3tjRK8zSoKU0aU', 'hoypSSF61Ev12VdcpSWsuCsz8EiMN0p8VwXX510nTgecdRq3auorXQHedcwtI5XSdv3Jd1tDQQJqUMUluGmb', 'YV1XISLVVJ5Y0mBVcHk1dNPhFHKtppPBBjKUhzkde4VTAu2v4uTmDptxzRPlgs8IOiTvVMXi4VuQJk2v9LPM', 'Uo8HKkXeQThRMnP47TFhsmst4pNfLPDeHcfjtIgOLBoBIOlIOPHVs8TPXtX8A6Po5jCiQgFkesG3YNZjzcF7', 'XbuhqAjsSjImWGTWc0QyDqw4o38ZrGLkTeO7gQZHxpjqTP2daTBnRUPSuLKXqlSvS3PhLJwzRrIQQzIUfZs9', 'HCdwGWSVOU9ZMemoUSROkkB37ldP2pm0vIb58nnbPUZ5niX0gO6PXVkJ3d6wXEGpbO7ygUwE4Y4divvJYUCm', 'UmQJWM9T5XTdAv5EWIqg0EbL73yYEejk7kvUSMPBkUrj5MBOxAgEkqWEnW47gLT9HaKc0isLagCWLN4qPZj6', 'ijmQHVULTzVwclrwpq3xcMYgi1lhxhpu2IixdEaz11jtj8gwM8u23SVGpFCmLZxJ53H9WIkqaguItBf4PvKG'
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, LQsPA89PDgnCWG85KTzaHUxHxV.csHigh entropy of concatenated method names: '_4csOR5COJp8Nw3svOgBiOEei9M', 'oveHTjECO0IF9XGehFIVHW7lat', 'yRio6ujIz4vsYwBFUmeCDplhI8', '_2lHxdw84riTaEpvOtTBEqGkKfx', 'vGXLg0twHPePs16E9gmC5qtgJi', 'amALwgZEgu6vjk9VJ0l2nLE3Ld', 'rSUlQxAaBUIsMYMhkDoSbV6fZj', 'wJ3YLoJiM8fEsrTjaaxtEvrjUC', 'cjkSPRge0PhwjImVXL1VszhHEk', 'caCxIgsVfZKzYuJ3bbMJuPWieY'
                Source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, xtLYoziFoUXIYcdlBH3lx0uJoM.csHigh entropy of concatenated method names: 'DyiS7GCf6yJBfx6mBb9DkUiW0c', 'fiQpyAo0IBbeBuurlZXXD0ovlh', '_8WbDzYCEqnK691DDZQiYMS38tS', 'uxjvrYaAM1okWt3r2WV930uiBi', '_5tnbXy7KCwX4Q0gToPZK5Hx9h9', 'kFc8o3QG5lEqswQDaulholu0z4', 'nDwUZxUoLoII7NnxtAegToyTjy', 'fWo08S8ROrOcbRLfn78U2ZYTED', 'TJbvllUdEJV2xqcRQt0BGAMsWD', 'bjftBidTyaRZhAraXSu114o6Sd'
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, WDu24wMlQIEWaQwpfHXwdgNG7RJ4K5Y3bc5hVwls9Fj1cTY3HpvtBcqLeH6gaDiVDpDYXKIIuXaOlu2lCAJTOwdsnqwm1PXfsVw.csHigh entropy of concatenated method names: 'nzpq34I2Owdcl9fMv5UC2J5bWAhYRAKaulM2epxdlOUgYAwStJcbsQF2LV7', '_3TV7y1L0UdqugSHqWSFDQgjIB1RLAMta0zbdfnGtgjiEucMaYzlPshW9VtV', 'pjvrCbuiTImLYchYZBIntOVyvPn3ZfSMtWVvNsM0Nvur9iH1fX2B8axAglC', 'jI7KmqV1ayX8qwmay9TzwN1cwR8kqb0h8EMRQLIOnFHgagzy7qGeZFVymwQ'
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, 8vDNxxr6KA56TLeIORtyRLSVXe.csHigh entropy of concatenated method names: '_00wnbuD6N1v3u4tAFw3wul2CM0', 'fbuqWesh3CVNj2RtuGY4FmHJps', 'HFqUUv7DJAEEhvrSsywavqaOIT', 'lO3fdbWbA8cdJSM60XZlTyTo1nRw6RJ0TkcvaWTmeXkk', 'o454lDfZaM893ftJX7v3O4qrjBaqZgXKn8MLidOK6Wep', 'dGQ7XoqybmSzxfRt5TDkZgPg2kC5INkjb6ybBBTnIQBQ', 'qnxpDMttXO5Q6RWMOugTF1OB5xiLTvjjuAAVGH4HMLQO', 'HeZsr9e5BNhQhw2tx7EzDGOu3oFSOtiNHoENJsbWOQXf', 'DJjUyYbm7hNYuN3aTC7191TEVjaM3TCFuJXKVoTOyfXP', 'gZOiEnnJ6n7BiHg1PhnYUfFDonaGra3pPadwz8Md8Lwa'
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, TvXNMPQzFStCY57ElDLFZF5wAWyu0HVKP74m0eYWEhLZU5ek0outej2CSyzPAywwqGzOP32wGaNx3OfXdD6rsa5uWywfJM4PgHN.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'cqdgMqYlqVr2WPbYU5d9YHP80OHFw99M9Y6CT3Cr4bu1pDH343obGJOq7xC', 'g5ZfxcIQ2yYANiEqDIDYC5MiH24kf8WoOop4sg9QRmMmIwIekfETxLRXPUs', '_26HTuFzrNZYByDsAEiZbqNFA59SdHCtVcYm4RrYlYDtfKTpyB7EqJpy61DM', 'Hta5nog2yoVHh9zNcyUS7cXHn92CKJeikSJ96C9reTxLwGxghqe54UiXCun'
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, JJqNIbmAEnE7SiPqGMTQm6czGZ9oDVL8xeYwvixsqiqWp3UZE3bbHqW0DPuSoU7Yz04fIfeMVsV3xLKVxXwRTrLXVvtHRM473Hj.csHigh entropy of concatenated method names: '_0wZ0aYgmMl7kCbvj6Ou4SqrdhKMFXGYofIhw64PZvBBBcVwz8edGsmoVjHZbxfJWPFhXcFK7G5Pkh3B9nMhjygTmnsyHZe5BwKO', 'wKAxAa74PvSccIjVWKrzIU9aAbAaHgp2F7R6H71jGdpLfaJQlfMmCgmIYeOq3bhY2kwGWp326CXODtRaQ1K7UejHfChjJCsd4w6', 'mblvCI5AALNqM17akKxCiwWFqw4LHtX9ugJUzGVJ5hX19rmDg285YT5yERlcJs18nWe8lJA3wuvI431UqKVZVz65vnGkNFR36WN', '_7CaW1EWN4UJVbiroC1AJiLX9lGWRa1euvVKutGGoR8xtke3Xu7QmRXrUL6xaZijXX9TQVdzIzydglyCWCssa48rnFFFPU2xct98', 'GywKF26peTAjyqmA0CwBA9qjJy4zhnHgjQ3LQ24bOXCR5e8HHJQUHzAMBVF6ruq9Qx8IW2od06bo2WNzKmI5vXL99DfhdVs0lR0', 'wJj4dvHtMignilEHYXN1NqGKGCvTZPsAQfYt5ZUtqcHgRruffEstHQHFzzP', 'z8wKUA2RKriNaMffEKpb4ppJCmTntUt8oajciBxfzbgAWeF0darr6JKmGCE', 'gDKN5mrHJddJ7SGyk37vE8BX8FDQO4LE9MUKXE6gr3ZBhTUKPL1dpb7nZJU', 'q59SA0UWlBieLpkTGLZQ2MuXoOR0y6UAwZUuPLi7j5XLYpj5l0PTYnG4bR2', '_5HnHp0XZFWIe58Rxw2X8ec6Ak3NpUsaEP4gwO8SsoiNMr9hESe9256VyQLT'
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, 0jpphwwqZqta9yNAU1rmvPgO8j.csHigh entropy of concatenated method names: '_1Rspokhmbe63QRMYYW7YaeFX0v', 'yq2uAsopTtMnLlhOp3DDOI5x0D3nFRlhWfKcOXT4v4gy', 'P6kUAuGkBsoDc6hkTCoEjAFeZebruUYkj9lWD5A2Wa30', '_5fL5nT5bzWd4k9YU5fI6Mpi6WWp4SBBmZ5CDOZK7cqqb', 'OZMMPGeVcmQdHwJF9epKtonlDSwhlOm5WEq7HAmYKxkl'
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, Q2VLf67ZeHqHFizIAZhVexibwwBCU1qqCtwKctsvWtFDiqJPT9GKM3qd0DpkVXm58k5C2RCzfG05ymKuUh92.csHigh entropy of concatenated method names: 'LdFLkiKlLrIfANYkDqDQXycHmXxIRUaNL4TkP4RHu7gZe8lku41k0ght9Et3VdaNL2d3xxicXkR3nKgFLeTJ', 'HFKY311DFA0CknBmafbCyAhvOzvwUW3ViyV49tKstRpT8xAE2GnNPEVulKkb5ija7d4jHOKsf5tq0JZu3yzP', '_0Sb0jSn74vlKCTBycSpeKCKh8YVnIEDot37X0YY8eiqItyMOkMMnEHcDx87GiyxSyRglhdcD2PfetzhD4OQv', 'oaGsaY395ldYCvAX6WxuCpu4ToG9fV2z5tOYwsJcZ5WUXesjqC4oPF69K1QpSsQ7gFX5LmiVjo2HXeH06dJ3', 'Jvg1iNjm2BnGEK9IIpgoplw6Fr0GV7T4vOumLInDXwY0x4C7t6WTPgLEDEOjf44CUQacC30IEtGAWjL1KcxM', 'erIkWKvNLiY2o8ryEih0Eq4ui5nGIqCHNiSsMAnAy9xaqzkqpDDH8VaOOFprVmT3M2Ikaye65nLjquYxw1E0', 'XZN7O3p3PknQ8oiGMcm2nUKm2u4J2dqNsvpWsGAEBCnitAPO84VpGDc6njiiTqqghHeXC3ltqdDBds0326Am', 'GanNgRzx9YmKSxobPaRmKvYnZEBvFAUCoPdDSV29IjNGNpAsix8wOUqtZnIRoKjLONyRAl2amIDRhhSMEsvR', 'aSPD3e3gL7inuMeKBXU5aaNxfyuloxHqiCgBrqZNzpio6yary8g4U7qoSVAKB9M5aK8JZ4JL7frwEPIWLNii', 'tMNw0i1eU1cZcutvPHlHjmT4OmNObT1BsuhC6uw8Dnbb4boPq9pTjoXX239rQ1OxsNBiYEUDmDjXfN7SxgnS'
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, kaHZoyXSlsqJiGMDmYfIITVF1t.csHigh entropy of concatenated method names: '_6Uc2JxshDBPfgjJCqPzKspkSU6', '_0EOkSBhN5BPczbdrIiryIEVhy9Jcydn0pQbJMd8zvSPb', 'xq6aEromiLWyTaoNny5Z75jxKNwfdMWW98IhSvJ6oZpR', 'U9ZFrYbS9G7idln1Gk7gDwUXZHcoxvNGRUMapKTfcdMn', 'ywQd4pM6VBs57Lkeaqj7cUzstOyB2LDnY1mqhMKk3XiZ'
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, MA7oxPPspVKDSv5kbor4FnogXhSLqN9jk8XGyoEg4DmabG3T3zwnypMQ3ZJUTHsOLdOneQe3sw7pXikdZGn4uDbXtV5HzjkClf7.csHigh entropy of concatenated method names: 'bCUGVYnUqZyhFAZbEOF8KW3BuhcghQFp4XbpthrY6K0XxuF4hMaEIWAIpnB3sTgPgCko4dcZKitOlvJ4V9gmqXXdcZBfSDK9PWi', 'gDbp8urZptnAbj0zWQ7gFA2VSwEQMOJWyzCYgjq8ln8fED06jOLIa7FsNFZl81vOShWbUSbuI29QzqPYJpDv', 'l2qBqfPnflox0oUMwDgwc6T2D0lpuAvDPkD4apKf5Wd14y3XcjfkBS1Ndh3Gc8tw5VLgrW3tjRK8zSoKU0aU', 'hoypSSF61Ev12VdcpSWsuCsz8EiMN0p8VwXX510nTgecdRq3auorXQHedcwtI5XSdv3Jd1tDQQJqUMUluGmb', 'YV1XISLVVJ5Y0mBVcHk1dNPhFHKtppPBBjKUhzkde4VTAu2v4uTmDptxzRPlgs8IOiTvVMXi4VuQJk2v9LPM', 'Uo8HKkXeQThRMnP47TFhsmst4pNfLPDeHcfjtIgOLBoBIOlIOPHVs8TPXtX8A6Po5jCiQgFkesG3YNZjzcF7', 'XbuhqAjsSjImWGTWc0QyDqw4o38ZrGLkTeO7gQZHxpjqTP2daTBnRUPSuLKXqlSvS3PhLJwzRrIQQzIUfZs9', 'HCdwGWSVOU9ZMemoUSROkkB37ldP2pm0vIb58nnbPUZ5niX0gO6PXVkJ3d6wXEGpbO7ygUwE4Y4divvJYUCm', 'UmQJWM9T5XTdAv5EWIqg0EbL73yYEejk7kvUSMPBkUrj5MBOxAgEkqWEnW47gLT9HaKc0isLagCWLN4qPZj6', 'ijmQHVULTzVwclrwpq3xcMYgi1lhxhpu2IixdEaz11jtj8gwM8u23SVGpFCmLZxJ53H9WIkqaguItBf4PvKG'
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, LQsPA89PDgnCWG85KTzaHUxHxV.csHigh entropy of concatenated method names: '_4csOR5COJp8Nw3svOgBiOEei9M', 'oveHTjECO0IF9XGehFIVHW7lat', 'yRio6ujIz4vsYwBFUmeCDplhI8', '_2lHxdw84riTaEpvOtTBEqGkKfx', 'vGXLg0twHPePs16E9gmC5qtgJi', 'amALwgZEgu6vjk9VJ0l2nLE3Ld', 'rSUlQxAaBUIsMYMhkDoSbV6fZj', 'wJ3YLoJiM8fEsrTjaaxtEvrjUC', 'cjkSPRge0PhwjImVXL1VszhHEk', 'caCxIgsVfZKzYuJ3bbMJuPWieY'
                Source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, xtLYoziFoUXIYcdlBH3lx0uJoM.csHigh entropy of concatenated method names: 'DyiS7GCf6yJBfx6mBb9DkUiW0c', 'fiQpyAo0IBbeBuurlZXXD0ovlh', '_8WbDzYCEqnK691DDZQiYMS38tS', 'uxjvrYaAM1okWt3r2WV930uiBi', '_5tnbXy7KCwX4Q0gToPZK5Hx9h9', 'kFc8o3QG5lEqswQDaulholu0z4', 'nDwUZxUoLoII7NnxtAegToyTjy', 'fWo08S8ROrOcbRLfn78U2ZYTED', 'TJbvllUdEJV2xqcRQt0BGAMsWD', 'bjftBidTyaRZhAraXSu114o6Sd'
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeFile created: C:\Users\user\AppData\Roaming\XClient.exeJump to dropped file
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnkJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnkJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: r10072024085940.scr.exe PID: 5040, type: MEMORYSTR
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeMemory allocated: 2820000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeMemory allocated: 2A20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeMemory allocated: 2840000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeMemory allocated: 9070000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeMemory allocated: 7320000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeMemory allocated: A170000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeMemory allocated: B170000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeMemory allocated: 10A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeMemory allocated: 2E40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeMemory allocated: 2C70000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeThread delayed: delay time: 240000Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeThread delayed: delay time: 239875Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeThread delayed: delay time: 239750Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeThread delayed: delay time: 239641Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeThread delayed: delay time: 239531Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeThread delayed: delay time: 239422Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeThread delayed: delay time: 239312Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeThread delayed: delay time: 239167Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWindow / User API: threadDelayed 783Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWindow / User API: threadDelayed 396Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWindow / User API: threadDelayed 9257Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWindow / User API: threadDelayed 593Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6974Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2725Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6640Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2988Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7806Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1984Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8059Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1650Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exe TID: 1472Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exe TID: 1472Thread sleep time: -240000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exe TID: 1472Thread sleep time: -239875s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exe TID: 1472Thread sleep time: -239750s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exe TID: 1472Thread sleep time: -239641s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exe TID: 1472Thread sleep time: -239531s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exe TID: 1472Thread sleep time: -239422s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exe TID: 1472Thread sleep time: -239312s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exe TID: 1472Thread sleep time: -239167s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exe TID: 7116Thread sleep time: -12912720851596678s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exe TID: 6708Thread sleep count: 9257 > 30Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exe TID: 6708Thread sleep count: 593 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1176Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 876Thread sleep count: 6640 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6596Thread sleep count: 2988 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3084Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6996Thread sleep count: 7806 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6996Thread sleep count: 1984 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2132Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5532Thread sleep count: 8059 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5532Thread sleep count: 1650 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5688Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeThread delayed: delay time: 240000Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeThread delayed: delay time: 239875Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeThread delayed: delay time: 239750Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeThread delayed: delay time: 239641Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeThread delayed: delay time: 239531Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeThread delayed: delay time: 239422Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeThread delayed: delay time: 239312Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeThread delayed: delay time: 239167Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: r10072024085940.scr.exe, 00000003.00000002.4600814597.0000000001179000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll$
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe'
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe'Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe'
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeMemory written: C:\Users\user\Desktop\r10072024085940.scr.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess created: C:\Users\user\Desktop\r10072024085940.scr.exe "C:\Users\user\Desktop\r10072024085940.scr.exe"Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe'Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'r10072024085940.scr.exe'Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'Jump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeQueries volume information: C:\Users\user\Desktop\r10072024085940.scr.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeQueries volume information: C:\Users\user\Desktop\r10072024085940.scr.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: r10072024085940.scr.exe, 00000003.00000002.4624257728.0000000006390000.00000004.00000020.00020000.00000000.sdmp, r10072024085940.scr.exe, 00000003.00000002.4600814597.00000000010E7000.00000004.00000020.00020000.00000000.sdmp, r10072024085940.scr.exe, 00000003.00000002.4600814597.0000000001141000.00000004.00000020.00020000.00000000.sdmp, r10072024085940.scr.exe, 00000003.00000002.4624257728.00000000063A9000.00000004.00000020.00020000.00000000.sdmp, r10072024085940.scr.exe, 00000003.00000002.4600814597.0000000001128000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                Source: C:\Users\user\Desktop\r10072024085940.scr.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.2.r10072024085940.scr.exe.9040000.11.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.r10072024085940.scr.exe.9040000.11.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.r10072024085940.scr.exe.2a4f0c4.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.r10072024085940.scr.exe.2a4f0c4.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2151669243.0000000009040000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2148203556.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 3.2.r10072024085940.scr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4597735932.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2148203556.0000000002A89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: r10072024085940.scr.exe PID: 5040, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: r10072024085940.scr.exe PID: 4364, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.2.r10072024085940.scr.exe.9040000.11.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.r10072024085940.scr.exe.9040000.11.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.r10072024085940.scr.exe.2a4f0c4.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.r10072024085940.scr.exe.2a4f0c4.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2151669243.0000000009040000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2148203556.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 3.2.r10072024085940.scr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.r10072024085940.scr.exe.2a8cb9c.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.r10072024085940.scr.exe.2a9ee8c.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4597735932.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2148203556.0000000002A89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: r10072024085940.scr.exe PID: 5040, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: r10072024085940.scr.exe PID: 4364, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                Windows Management Instrumentation
                2
                Registry Run Keys / Startup Folder
                111
                Process Injection
                1
                Masquerading
                OS Credential Dumping221
                Security Software Discovery
                Remote Services11
                Archive Collected Data
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                PowerShell
                1
                DLL Side-Loading
                2
                Registry Run Keys / Startup Folder
                11
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop ProtocolData from Removable Media1
                Non-Standard Port
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                131
                Virtualization/Sandbox Evasion
                Security Account Manager131
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive1
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                Obfuscated Files or Information
                Cached Domain Credentials13
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                Software Packing
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Timestomp
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                DLL Side-Loading
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 1480135 Sample: r10072024085940.scr.exe Startdate: 24/07/2024 Architecture: WINDOWS Score: 100 39 Found malware configuration 2->39 41 Malicious sample detected (through community Yara rule) 2->41 43 Multi AV Scanner detection for dropped file 2->43 45 12 other signatures 2->45 8 r10072024085940.scr.exe 2 2->8         started        process3 signatures4 47 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 8->47 49 Bypasses PowerShell execution policy 8->49 51 Adds a directory exclusion to Windows Defender 8->51 53 Injects a PE file into a foreign processes 8->53 11 r10072024085940.scr.exe 6 8->11         started        process5 dnsIp6 35 104.250.180.178, 49722, 49726, 49729 M247GB United States 11->35 33 C:\Users\user\AppData\Roaming\XClient.exe, PE32 11->33 dropped 55 Adds a directory exclusion to Windows Defender 11->55 16 powershell.exe 23 11->16         started        19 powershell.exe 23 11->19         started        21 powershell.exe 23 11->21         started        23 powershell.exe 23 11->23         started        file7 signatures8 process9 signatures10 37 Loading BitLocker PowerShell Module 16->37 25 conhost.exe 16->25         started        27 conhost.exe 19->27         started        29 conhost.exe 21->29         started        31 conhost.exe 23->31         started        process11

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                r10072024085940.scr.exe66%ReversingLabsByteCode-MSIL.Trojan.DarkStealerLoader
                r10072024085940.scr.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\XClient.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\XClient.exe66%ReversingLabsByteCode-MSIL.Trojan.DarkStealerLoader
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://nuget.org/NuGet.exe0%URL Reputationsafe
                http://crl.micro0%URL Reputationsafe
                http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
                https://aka.ms/pscore6lB0%URL Reputationsafe
                http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
                http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
                https://contoso.com/0%URL Reputationsafe
                https://nuget.org/nuget.exe0%URL Reputationsafe
                https://contoso.com/License0%URL Reputationsafe
                https://contoso.com/Icon0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                http://www.microsoft.co0%Avira URL Cloudsafe
                http://tempuri.org/DataSet1.xsd0%Avira URL Cloudsafe
                https://github.com/Pester/Pester0%Avira URL Cloudsafe
                http://www.microsoft.co00%Avira URL Cloudsafe
                104.250.180.1780%Avira URL Cloudsafe
                No contacted domains info
                NameMaliciousAntivirus DetectionReputation
                104.250.180.178true
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://nuget.org/NuGet.exepowershell.exe, 00000004.00000002.2203786870.0000000005538000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2241264306.00000000057A8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2291307877.0000000005FB8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.2353334687.0000000005DE9000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://crl.micropowershell.exe, 0000000E.00000002.2325415061.00000000032E9000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://pesterbdd.com/images/Pester.pngpowershell.exe, 0000000E.00000002.2329810672.0000000004ED6000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000004.00000002.2198283869.0000000004626000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228813077.0000000004897000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2273572627.00000000050A7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.2329810672.0000000004ED6000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://aka.ms/pscore6lBpowershell.exe, 00000004.00000002.2198283869.00000000044D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228813077.0000000004741000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2273572627.0000000004F51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.2329810672.0000000004D81000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 0000000E.00000002.2329810672.0000000004ED6000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.microsoft.co0powershell.exe, 0000000E.00000002.2370487996.0000000008843000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000004.00000002.2198283869.0000000004626000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228813077.0000000004897000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2273572627.00000000050A7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.2329810672.0000000004ED6000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://tempuri.org/DataSet1.xsdr10072024085940.scr.exe, XClient.exe.3.drfalse
                • Avira URL Cloud: safe
                unknown
                https://contoso.com/powershell.exe, 0000000E.00000002.2353334687.0000000005DE9000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://nuget.org/nuget.exepowershell.exe, 00000004.00000002.2203786870.0000000005538000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2241264306.00000000057A8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2291307877.0000000005FB8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.2353334687.0000000005DE9000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.microsoft.copowershell.exe, 00000009.00000002.2304106697.00000000089C2000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://contoso.com/Licensepowershell.exe, 0000000E.00000002.2353334687.0000000005DE9000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://contoso.com/Iconpowershell.exe, 0000000E.00000002.2353334687.0000000005DE9000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namer10072024085940.scr.exe, 00000001.00000002.2148203556.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, r10072024085940.scr.exe, 00000003.00000002.4606757606.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2198283869.00000000044D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228813077.0000000004741000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2273572627.0000000004F51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.2329810672.0000000004D81000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://github.com/Pester/Pesterpowershell.exe, 0000000E.00000002.2329810672.0000000004ED6000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                104.250.180.178
                unknownUnited States
                9009M247GBtrue
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1480135
                Start date and time:2024-07-24 15:40:59 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 10m 12s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:18
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:r10072024085940.scr.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@15/20@0/1
                EGA Information:
                • Successful, ratio: 83.3%
                HCA Information:
                • Successful, ratio: 99%
                • Number of executed functions: 350
                • Number of non-executed functions: 17
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Override analysis time to 240000 for current running targets taking high CPU consumption
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, WmiPrvSE.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target powershell.exe, PID 5392 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size getting too big, too many NtCreateKey calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: r10072024085940.scr.exe
                TimeTypeDescription
                09:41:50API Interceptor7944836x Sleep call for process: r10072024085940.scr.exe modified
                09:41:55API Interceptor42x Sleep call for process: powershell.exe modified
                15:42:20AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                104.250.180.178OCEBL_INV_594040769403_59403014770400_19072024_144337.pdf.scr.exeGet hashmaliciousRemcosBrowse
                  719#U665a) HBL# LMSIN2407028 (by SEA) PO# 4500577338, by 1x40' HQ.pdf.scr.exeGet hashmaliciousDarkTortilla, XWormBrowse
                    719#U665a) HBL# LMSIN2407028 (by SEA) PO# 4500577338, by 1x40' HQ.pdf.scr.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                      LMSIN2407028 - PO# 4500577338, by 1x40' HQ .pdf.scr.exeGet hashmaliciousPureLog Stealer, RemcosBrowse
                        rSO0105-PI-514124SO0105,702(CFS-CY)FIRSYD.scr.exeGet hashmaliciousXWormBrowse
                          DELAY NOTICE - ONE_FORTUNE - 001W (MD22425W).scr.exeGet hashmaliciousXWormBrowse
                            ISF 10+2 Form+VGM - MX-M354N_20240709_134303.scr.exeGet hashmaliciousRemcosBrowse
                              .pdf.scr.exeGet hashmaliciousRemcosBrowse
                                .pdf.scr.exeGet hashmaliciousXWormBrowse
                                  ISF - SO.4985 KEL-RIO GRANPE HBL#KELRIG2406221.scr.exeGet hashmaliciousDarkTortilla, XWormBrowse
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    M247GBu26bBpzXS5.exeGet hashmaliciousDanaBotBrowse
                                    • 172.86.76.246
                                    u26bBpzXS5.exeGet hashmaliciousDanaBotBrowse
                                    • 172.86.76.246
                                    M7RrbN4DTk.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                    • 194.187.251.115
                                    S004232824113048.xlsGet hashmaliciousRemcos, DBatLoaderBrowse
                                    • 194.187.251.115
                                    83M0VAEEuh.exeGet hashmaliciousWhiteSnake StealerBrowse
                                    • 195.206.105.227
                                    L Catterton Open Benefits Enrollment.pdfGet hashmaliciousHTMLPhisherBrowse
                                    • 91.202.233.193
                                    94.156.8.9-skid.arm7-2024-07-23T17_40_10.elfGet hashmaliciousMirai, MoobotBrowse
                                    • 198.100.166.140
                                    BJu5gH74uD.elfGet hashmaliciousUnknownBrowse
                                    • 45.86.28.68
                                    OCcyyxs6dW.elfGet hashmaliciousUnknownBrowse
                                    • 38.203.241.126
                                    0003945 RFQ Cylinder Block PO list and detailed Drawing gpj.exeGet hashmaliciousRemcosBrowse
                                    • 194.187.251.115
                                    No context
                                    No context
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:modified
                                    Size (bytes):2232
                                    Entropy (8bit):5.379607286348624
                                    Encrypted:false
                                    SSDEEP:48:+WSU4xympgv4RIoUP7gZ9tK8NPZHUx7u1iMuge//MvUyus:+LHxv2IfLZ2KRH6Oug8s
                                    MD5:1C26CDD17E89F1E8300E89EEE8EEFC2D
                                    SHA1:03A2E216CE9941AD56032B7E1883EA3D3BCA63AF
                                    SHA-256:DCD9F3E47B73F46A53F447008A4D6076AB8ABB0CA3E1B77B6DAB0CCCAA2A7B60
                                    SHA-512:2B3C58443A237C61330EB334004DBDE1ED291CE575548BDDCEA9199D8BCD6BB03530CB1A7CD21986F3C74E569107EBEFFBE348C7659D3EDD8D4241A25485B43F
                                    Malicious:false
                                    Reputation:low
                                    Preview:@...e.................................*..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                    Process:C:\Users\user\Desktop\r10072024085940.scr.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):29
                                    Entropy (8bit):3.598349098128234
                                    Encrypted:false
                                    SSDEEP:3:rRSFYJKXzovNsra:EFYJKDoWra
                                    MD5:2C11513C4FAB02AEDEE23EC05A2EB3CC
                                    SHA1:59177C177B2546FBD8EC7688BAD19D08D32640DE
                                    SHA-256:BCF3676333E528171EEE1055302F3863A0C89D9FFE7017EA31CF264E13C8A699
                                    SHA-512:08196AFA62650F1808704DCAD9918DA11175CD8792878F63E35F517B4D6CF407AC9E281D9B71A76E4CC1486CAD7079C56B74ECBEDB0A0F0DD4170FB0D30D2BAD
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:....### explorer ###..[WIN]r
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Users\user\Desktop\r10072024085940.scr.exe
                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Jul 24 12:42:15 2024, mtime=Wed Jul 24 12:42:15 2024, atime=Wed Jul 24 12:42:15 2024, length=626688, window=hide
                                    Category:dropped
                                    Size (bytes):767
                                    Entropy (8bit):5.070618270484669
                                    Encrypted:false
                                    SSDEEP:12:85r24uxypnu8ChMlrAlXIsY//PMIQJLhpjAs+HkBCgymV:85XugDvl8lXU8I2hNAsFAFm
                                    MD5:86548E13621D96FD6AB7317999A51D65
                                    SHA1:8B0060D4725DBEBAAD3E6502F9115780C50DD597
                                    SHA-256:0A5B714B1FDA6510188FFD9531673D339AE1BC8F931B27A9EA513519B83876BF
                                    SHA-512:6DD779B5926BF1DAFF2C67FCA6FAAED0B4176D1254B5385984C1498CA2C1D42056C704B8A6D03352206071AFC8B29DBEFC15800388E375A537509979A3743589
                                    Malicious:false
                                    Preview:L..................F.... .../..K..../..K..../..K............................v.:..DG..Yr?.D..U..k0.&...&.......$..S......7....@.K........t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2.X7m...........................^.A.p.p.D.a.t.a...B.V.1......X5m..Roaming.@......EW<2.X5m..../.......................v.R.o.a.m.i.n.g.....b.2......XHm .XClient.exe.H.......XHm.XHm............................?.X.C.l.i.e.n.t...e.x.e.......\...............-.......[..................C:\Users\user\AppData\Roaming\XClient.exe........\.....\.....\.....\.....\.X.C.l.i.e.n.t...e.x.e.`.......X.......745773...........hT..CrF.f4... .'...I...-...-$..hT..CrF.f4... .'...I...-...-$.E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                    Process:C:\Users\user\Desktop\r10072024085940.scr.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):626688
                                    Entropy (8bit):7.819321960581988
                                    Encrypted:false
                                    SSDEEP:12288:Yu+2iNxAypLcLJ1Peq5gQLnmLmOdfOsojj9fw4OEB:Yu+1bAypcVxROdfyjNwE
                                    MD5:618CD424097ED299FF5869779F36054A
                                    SHA1:0B125DF7FA521A8000D22481E7FA3384818F43C1
                                    SHA-256:89DC59A7A775DFE1F77A49A7E7C964FFC70AE523D209EA78D7854410FE476B90
                                    SHA-512:E1C36CCA36235F2047DEE03711BAD742AF086602A765D04B0AF61CC673EF21AF185A502BB198CEE6A8D7D7834D34E2CB3A1B4A88AB0C184FFF878393577B06E5
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 66%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...23...............0.............B.... ........@.. ....................................@....................................O....................................x..p............................................ ............... ..H............text...x.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................$.......H............u......0...,5..`C...........................................0..L.........}.....(.......(......(............s......(.....o......( ....o!.....("....*.0..K.........}........(#........($.....,5...(............s......(.....o......(.....o!....8.....r...p.X...(%...o&...tX.......('..........9.....s.........s(...s)...o*.......o+...(,.......o-...(........o/...(0.......o1...(2.......o3...(4.......o5...(6.........(7.....(......+....s(...s)...(*........(8...........s......(..
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.819321960581988
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    • DOS Executable Generic (2002/1) 0.01%
                                    File name:r10072024085940.scr.exe
                                    File size:626'688 bytes
                                    MD5:618cd424097ed299ff5869779f36054a
                                    SHA1:0b125df7fa521a8000d22481e7fa3384818f43c1
                                    SHA256:89dc59a7a775dfe1f77a49a7e7c964ffc70ae523d209ea78d7854410fe476b90
                                    SHA512:e1c36cca36235f2047dee03711bad742af086602a765d04b0af61cc673ef21af185a502bb198cee6a8d7d7834d34e2cb3a1b4a88ab0c184fff878393577b06e5
                                    SSDEEP:12288:Yu+2iNxAypLcLJ1Peq5gQLnmLmOdfOsojj9fw4OEB:Yu+1bAypcVxROdfyjNwE
                                    TLSH:32D4F18273F99F41E1BE5BF56831545417B1BD1AA9A0DA2C8ED170FF4872B408F227A3
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...23................0.............B.... ........@.. ....................................@................................
                                    Icon Hash:00928e8e8686b000
                                    Entrypoint:0x49a342
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x81C33332 [Mon Dec 27 09:04:50 2038 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    inc edi
                                    add byte ptr [edi+00h], al
                                    inc edx
                                    add byte ptr [eax+eax], dh
                                    inc ecx
                                    add byte ptr [eax], bh
                                    add byte ptr [eax+eax], dh
                                    inc esi
                                    add byte ptr [edi], dh
                                    add byte ptr [5A003300h], dh
                                    add byte ptr [ecx], bh
                                    add byte ptr [eax], bh
                                    add byte ptr [eax+eax], dh
                                    aaa
                                    add byte ptr [34005A00h], dh
                                    add byte ptr [ecx+00h], bl
                                    push esp
                                    add byte ptr [eax+eax+00h], dl
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x9a2f00x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x9c0000x6b8.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x9e0000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x9788c0x70.text
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x983780x9840015c319e1b8890c4fd28277dd72c10b06False0.8862601344417077data7.830777991010836IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0x9c0000x6b80x800023018055695271b9ee091c9b50e4c8cFalse0.365234375data3.646057913830941IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x9e0000xc0x200173be35c3065f2e91f0ce47df8def41fFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_VERSION0x9c0900x428data0.412593984962406
                                    RT_MANIFEST0x9c4c80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                    2024-07-24T15:42:54.092872+0200TCP2855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound497267061192.168.2.6104.250.180.178
                                    2024-07-24T15:44:41.561420+0200TCP2853193ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound497367061192.168.2.6104.250.180.178
                                    2024-07-24T15:42:28.902236+0200TCP2855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound497227061192.168.2.6104.250.180.178
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jul 24, 2024 15:42:17.231678009 CEST497227061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:42:17.272099972 CEST706149722104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:42:17.274108887 CEST497227061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:42:17.402048111 CEST497227061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:42:17.407285929 CEST706149722104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:42:28.902235985 CEST497227061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:42:28.908160925 CEST706149722104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:42:38.723896980 CEST706149722104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:42:38.724026918 CEST497227061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:42:39.233200073 CEST497227061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:42:39.234891891 CEST497267061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:42:39.240556955 CEST706149722104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:42:39.243539095 CEST706149726104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:42:39.243686914 CEST497267061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:42:39.292650938 CEST497267061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:42:39.307796955 CEST706149726104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:42:54.092871904 CEST497267061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:42:54.326565981 CEST497267061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:42:54.638999939 CEST497267061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:42:55.209506989 CEST706149726104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:42:55.209517956 CEST706149726104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:42:55.209528923 CEST706149726104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:00.653326988 CEST706149726104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:00.653531075 CEST497267061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:03.326685905 CEST497267061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:03.328526020 CEST497297061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:03.350771904 CEST706149726104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:03.350800991 CEST706149729104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:03.350981951 CEST497297061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:03.392111063 CEST497297061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:03.397001982 CEST706149729104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:16.608140945 CEST497297061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:16.613337994 CEST706149729104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:24.374886036 CEST497297061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:24.381047010 CEST706149729104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:24.390678883 CEST497297061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:24.396378040 CEST706149729104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:24.405395031 CEST497297061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:24.414001942 CEST706149729104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:24.421456099 CEST497297061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:24.426377058 CEST706149729104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:24.577259064 CEST497297061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:24.582200050 CEST706149729104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:24.593027115 CEST497297061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:24.599244118 CEST706149729104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:24.777863026 CEST706149729104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:24.778014898 CEST497297061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:29.593794107 CEST497297061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:29.596301079 CEST497317061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:29.598784924 CEST706149729104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:29.601227045 CEST706149731104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:29.601656914 CEST497317061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:29.748029947 CEST497317061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:29.753106117 CEST706149731104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:33.984868050 CEST497317061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:33.990863085 CEST706149731104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:40.983155966 CEST497317061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:40.988296032 CEST706149731104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:41.077027082 CEST497317061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:41.132416010 CEST706149731104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:46.155052900 CEST497317061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:46.161423922 CEST706149731104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:46.174232006 CEST497317061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:46.179768085 CEST706149731104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:46.233151913 CEST497317061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:46.238919020 CEST706149731104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:50.311640978 CEST497317061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:50.623445988 CEST497317061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:50.699179888 CEST706149731104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:50.699204922 CEST706149731104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:50.987639904 CEST706149731104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:50.987719059 CEST497317061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:51.264499903 CEST497317061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:51.269470930 CEST706149731104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:51.269560099 CEST497337061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:51.274493933 CEST706149733104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:51.274895906 CEST497337061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:51.381007910 CEST497337061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:51.387542963 CEST706149733104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:56.576833010 CEST497337061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:56.889102936 CEST497337061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:43:56.937645912 CEST706149733104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:43:56.937746048 CEST706149733104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:02.155107975 CEST497337061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:02.159960032 CEST706149733104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:07.280512094 CEST497337061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:07.285506010 CEST706149733104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:07.311355114 CEST497337061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:07.323340893 CEST706149733104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:07.327174902 CEST497337061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:07.332036018 CEST706149733104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:07.467854023 CEST497337061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:07.473283052 CEST706149733104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:07.639524937 CEST497337061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:07.644541979 CEST706149733104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:12.665096045 CEST706149733104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:12.665780067 CEST497337061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:12.665848970 CEST497337061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:12.667694092 CEST497357061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:12.671813011 CEST706149733104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:12.672689915 CEST706149735104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:12.672820091 CEST497357061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:12.772542000 CEST497357061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:12.777596951 CEST706149735104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:16.327575922 CEST497357061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:16.629061937 CEST706149735104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:22.280498981 CEST497357061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:22.285717010 CEST706149735104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:28.014513016 CEST497357061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:28.019381046 CEST706149735104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:34.161458015 CEST706149735104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:34.161576986 CEST497357061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:38.172430992 CEST497357061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:38.174165010 CEST497367061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:38.177426100 CEST706149735104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:38.180166006 CEST706149736104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:38.180304050 CEST497367061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:38.224411964 CEST497367061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:38.229589939 CEST706149736104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:38.233124971 CEST497367061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:38.238811970 CEST706149736104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:38.437782049 CEST497367061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:38.445209026 CEST706149736104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:41.561419964 CEST497367061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:41.566503048 CEST706149736104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:43.780227900 CEST497367061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:43.785387993 CEST706149736104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:48.608577013 CEST497367061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:48.613676071 CEST706149736104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:48.670926094 CEST497367061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:48.675934076 CEST706149736104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:48.686492920 CEST497367061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:48.691737890 CEST706149736104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:57.092828035 CEST497367061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:57.097795010 CEST706149736104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:59.030210018 CEST497367061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:59.039546013 CEST706149736104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:59.045839071 CEST497367061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:59.054208040 CEST706149736104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:59.155200005 CEST497367061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:44:59.161108971 CEST706149736104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:59.565824032 CEST706149736104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:44:59.570261955 CEST497367061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:04.264318943 CEST497367061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:04.269526958 CEST706149736104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:04.269581079 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:04.274679899 CEST706149737104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:04.274945021 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:04.378007889 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:04.382957935 CEST706149737104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:04.405071974 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:04.410847902 CEST706149737104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:04.421082020 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:04.426007986 CEST706149737104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:04.545979023 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:04.551182032 CEST706149737104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:04.623946905 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:04.628907919 CEST706149737104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:04.905425072 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:04.951857090 CEST706149737104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:05.123897076 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:05.131357908 CEST706149737104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:09.123979092 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:09.129327059 CEST706149737104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:10.389754057 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:10.395382881 CEST706149737104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:15.516287088 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:15.522716999 CEST706149737104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:19.720432997 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:19.931659937 CEST706149737104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:20.452188969 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:20.458617926 CEST706149737104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:20.858700037 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:20.863776922 CEST706149737104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:20.905443907 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:20.914717913 CEST706149737104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:20.983320951 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:20.994229078 CEST706149737104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:20.999025106 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:21.005738974 CEST706149737104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:21.061559916 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:21.071840048 CEST706149737104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:25.656516075 CEST706149737104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:25.658471107 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:26.094286919 CEST497397061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:26.094288111 CEST497377061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:26.103117943 CEST706149737104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:26.103135109 CEST706149739104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:26.106434107 CEST497397061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:26.210345984 CEST497397061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:26.217601061 CEST706149739104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:26.436467886 CEST497397061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:26.441375017 CEST706149739104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:26.452729940 CEST497397061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:26.482435942 CEST706149739104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:26.499371052 CEST497397061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:26.505404949 CEST706149739104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:26.514996052 CEST497397061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:26.535402060 CEST706149739104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:26.655402899 CEST497397061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:26.675827980 CEST706149739104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:30.967956066 CEST497397061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:30.972918987 CEST706149739104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:35.530303955 CEST497397061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:35.541513920 CEST706149739104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:45.045872927 CEST497397061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:45.057756901 CEST706149739104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:45.561438084 CEST497397061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:45.567290068 CEST706149739104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:47.389637947 CEST497397061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:47.394902945 CEST706149739104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:47.709268093 CEST706149739104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:47.709363937 CEST497397061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:52.468843937 CEST497397061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:52.470875025 CEST497407061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:52.473668098 CEST706149739104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:52.475951910 CEST706149740104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:52.476016045 CEST497407061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:52.521419048 CEST497407061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:52.527628899 CEST706149740104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:52.545809984 CEST497407061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:52.550992966 CEST706149740104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:52.639627934 CEST497407061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:52.644413948 CEST706149740104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:45:53.889602900 CEST497407061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:45:54.098211050 CEST706149740104.250.180.178192.168.2.6
                                    Jul 24, 2024 15:46:01.436497927 CEST497407061192.168.2.6104.250.180.178
                                    Jul 24, 2024 15:46:01.441845894 CEST706149740104.250.180.178192.168.2.6

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:1
                                    Start time:09:41:50
                                    Start date:24/07/2024
                                    Path:C:\Users\user\Desktop\r10072024085940.scr.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\r10072024085940.scr.exe"
                                    Imagebase:0x570000
                                    File size:626'688 bytes
                                    MD5 hash:618CD424097ED299FF5869779F36054A
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.2151669243.0000000009040000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000001.00000002.2148203556.0000000002A89000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000001.00000002.2148203556.0000000002A89000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.2148203556.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:true

                                    Target ID:3
                                    Start time:09:41:51
                                    Start date:24/07/2024
                                    Path:C:\Users\user\Desktop\r10072024085940.scr.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\r10072024085940.scr.exe"
                                    Imagebase:0xa30000
                                    File size:626'688 bytes
                                    MD5 hash:618CD424097ED299FF5869779F36054A
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000003.00000002.4597735932.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000003.00000002.4597735932.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                    Reputation:low
                                    Has exited:false

                                    Target ID:4
                                    Start time:09:41:54
                                    Start date:24/07/2024
                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe'
                                    Imagebase:0x480000
                                    File size:433'152 bytes
                                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:5
                                    Start time:09:41:54
                                    Start date:24/07/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff66e660000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:7
                                    Start time:09:41:58
                                    Start date:24/07/2024
                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'r10072024085940.scr.exe'
                                    Imagebase:0x480000
                                    File size:433'152 bytes
                                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:8
                                    Start time:09:41:58
                                    Start date:24/07/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff66e660000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:9
                                    Start time:09:42:02
                                    Start date:24/07/2024
                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
                                    Imagebase:0x480000
                                    File size:433'152 bytes
                                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:10
                                    Start time:09:42:02
                                    Start date:24/07/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff66e660000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:14
                                    Start time:09:42:08
                                    Start date:24/07/2024
                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
                                    Imagebase:0x480000
                                    File size:433'152 bytes
                                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:15
                                    Start time:09:42:08
                                    Start date:24/07/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff66e660000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:10.7%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:178
                                      Total number of Limit Nodes:18
                                      execution_graph 35654 73183c0 35655 731854b 35654->35655 35657 73183e6 35654->35657 35657->35655 35658 731476c 35657->35658 35659 7318640 PostMessageW 35658->35659 35660 73186ac 35659->35660 35660->35657 35436 282d420 35437 282d466 GetCurrentProcess 35436->35437 35439 282d4b1 35437->35439 35440 282d4b8 GetCurrentThread 35437->35440 35439->35440 35441 282d4f5 GetCurrentProcess 35440->35441 35442 282d4ee 35440->35442 35443 282d52b 35441->35443 35442->35441 35444 282d553 GetCurrentThreadId 35443->35444 35445 282d584 35444->35445 35618 7a45040 35619 7a4508e DrawTextExW 35618->35619 35621 7a450e6 35619->35621 35661 7a462d0 35662 7a462f4 35661->35662 35663 7a462fb 35661->35663 35667 7a46322 35663->35667 35668 7a4429c 35663->35668 35666 7a4429c GetCurrentThreadId 35666->35667 35669 7a442a7 35668->35669 35670 7a4663f GetCurrentThreadId 35669->35670 35671 7a46318 35669->35671 35670->35671 35671->35666 35446 731679b 35449 73165d4 35446->35449 35447 73167eb 35448 73168c5 35449->35447 35452 73170e1 35449->35452 35467 73170f0 35449->35467 35453 73170f0 35452->35453 35482 7317752 35453->35482 35487 73176b0 35453->35487 35492 7317a4e 35453->35492 35497 73174ee 35453->35497 35502 7317c2c 35453->35502 35506 7317d6d 35453->35506 35510 7317b4b 35453->35510 35514 73176d4 35453->35514 35518 7317ba5 35453->35518 35524 7317905 35453->35524 35529 7317602 35453->35529 35534 7317612 35453->35534 35454 731712e 35454->35448 35468 731710a 35467->35468 35470 73176b0 2 API calls 35468->35470 35471 7317752 2 API calls 35468->35471 35472 7317612 2 API calls 35468->35472 35473 7317602 2 API calls 35468->35473 35474 7317905 2 API calls 35468->35474 35475 7317ba5 2 API calls 35468->35475 35476 73176d4 2 API calls 35468->35476 35477 7317b4b 2 API calls 35468->35477 35478 7317d6d 2 API calls 35468->35478 35479 7317c2c 2 API calls 35468->35479 35480 73174ee 2 API calls 35468->35480 35481 7317a4e 2 API calls 35468->35481 35469 731712e 35469->35448 35470->35469 35471->35469 35472->35469 35473->35469 35474->35469 35475->35469 35476->35469 35477->35469 35478->35469 35479->35469 35480->35469 35481->35469 35483 7317775 35482->35483 35538 7315f30 35483->35538 35542 7315f28 35483->35542 35484 7317d10 35488 73176b5 35487->35488 35489 7317a20 35488->35489 35546 7315ce3 35488->35546 35550 7315ce8 35488->35550 35489->35454 35493 7317a68 35492->35493 35495 7315f30 WriteProcessMemory 35493->35495 35496 7315f28 WriteProcessMemory 35493->35496 35494 73175ee 35494->35454 35495->35494 35496->35494 35498 73174fe 35497->35498 35554 73161b8 35498->35554 35558 73161ad 35498->35558 35503 7317b4a 35502->35503 35503->35502 35562 7315d90 35503->35562 35566 7315d98 35503->35566 35508 7315f30 WriteProcessMemory 35506->35508 35509 7315f28 WriteProcessMemory 35506->35509 35507 7317d91 35508->35507 35509->35507 35512 7315d90 Wow64SetThreadContext 35510->35512 35513 7315d98 Wow64SetThreadContext 35510->35513 35511 7317b4a 35511->35510 35512->35511 35513->35511 35570 7316020 35514->35570 35574 7316019 35514->35574 35515 73176f9 35515->35454 35519 7317bb2 35518->35519 35520 7317a68 35518->35520 35522 7315f30 WriteProcessMemory 35520->35522 35523 7315f28 WriteProcessMemory 35520->35523 35521 73175ee 35521->35454 35522->35521 35523->35521 35525 731790b 35524->35525 35526 7317e58 35525->35526 35527 7315ce3 ResumeThread 35525->35527 35528 7315ce8 ResumeThread 35525->35528 35526->35454 35527->35525 35528->35525 35530 7317db0 35529->35530 35578 7315e70 35530->35578 35582 7315e68 35530->35582 35531 7317dce 35531->35454 35536 7315d90 Wow64SetThreadContext 35534->35536 35537 7315d98 Wow64SetThreadContext 35534->35537 35535 73175e5 35535->35454 35536->35535 35537->35535 35539 7315f78 WriteProcessMemory 35538->35539 35541 7315fcf 35539->35541 35541->35484 35543 7315f30 WriteProcessMemory 35542->35543 35545 7315fcf 35543->35545 35545->35484 35547 7315ce8 ResumeThread 35546->35547 35549 7315d59 35547->35549 35549->35488 35551 7315d28 ResumeThread 35550->35551 35553 7315d59 35551->35553 35553->35488 35555 7316241 CreateProcessA 35554->35555 35557 7316403 35555->35557 35557->35557 35559 73161b8 CreateProcessA 35558->35559 35561 7316403 35559->35561 35561->35561 35563 7315ddd Wow64SetThreadContext 35562->35563 35565 7315e25 35563->35565 35565->35503 35567 7315ddd Wow64SetThreadContext 35566->35567 35569 7315e25 35567->35569 35569->35503 35571 731606b ReadProcessMemory 35570->35571 35573 73160af 35571->35573 35573->35515 35575 731606b ReadProcessMemory 35574->35575 35577 73160af 35575->35577 35577->35515 35579 7315eb0 VirtualAllocEx 35578->35579 35581 7315eed 35579->35581 35581->35531 35583 7315e70 VirtualAllocEx 35582->35583 35585 7315eed 35583->35585 35585->35531 35586 282b0b8 35587 282b0c7 35586->35587 35590 282b1b0 35586->35590 35598 282b19f 35586->35598 35591 282b1c1 35590->35591 35592 282b1e4 35590->35592 35591->35592 35606 282b43a 35591->35606 35610 282b448 35591->35610 35592->35587 35593 282b1dc 35593->35592 35594 282b3e8 GetModuleHandleW 35593->35594 35595 282b415 35594->35595 35595->35587 35599 282b1c1 35598->35599 35601 282b1e4 35598->35601 35599->35601 35604 282b43a LoadLibraryExW 35599->35604 35605 282b448 LoadLibraryExW 35599->35605 35600 282b1dc 35600->35601 35602 282b3e8 GetModuleHandleW 35600->35602 35601->35587 35603 282b415 35602->35603 35603->35587 35604->35600 35605->35600 35607 282b45c 35606->35607 35608 282b481 35607->35608 35614 282abb8 35607->35614 35608->35593 35611 282b45c 35610->35611 35612 282b481 35611->35612 35613 282abb8 LoadLibraryExW 35611->35613 35612->35593 35613->35612 35615 282b608 LoadLibraryExW 35614->35615 35617 282b681 35615->35617 35617->35608 35622 2824668 35623 282467a 35622->35623 35624 2824686 35623->35624 35626 2824778 35623->35626 35627 282479d 35626->35627 35631 2824888 35627->35631 35635 2824878 35627->35635 35633 28248af 35631->35633 35632 282498c 35632->35632 35633->35632 35639 28244b0 35633->35639 35637 28248af 35635->35637 35636 282498c 35636->35636 35637->35636 35638 28244b0 CreateActCtxA 35637->35638 35638->35636 35640 2825918 CreateActCtxA 35639->35640 35642 28259db 35640->35642 35643 282d668 DuplicateHandle 35644 282d6fe 35643->35644 35645 7a421c8 35646 7a421f0 35645->35646 35648 7a422a1 35645->35648 35652 7a41320 GetSystemMetrics GetSystemMetrics 35646->35652 35651 7a42372 35648->35651 35653 7a41320 GetSystemMetrics GetSystemMetrics 35648->35653 35649 7a42240 35652->35649 35653->35651
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151550561.0000000008E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8e60000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 214d94522bdf87bbe7275e39b07f159bb2648edc2bb72b0a3545aa2f1789e92e
                                      • Instruction ID: 6552cb0166e41fe17938a027a0e9db8932cca5b1f0dc437dea19cdc1618dad7e
                                      • Opcode Fuzzy Hash: 214d94522bdf87bbe7275e39b07f159bb2648edc2bb72b0a3545aa2f1789e92e
                                      • Instruction Fuzzy Hash: 23623776A40118DFDB15DF68C984EA9BBB2FF48315F1581A8E509AB366CB31EC52CF40

                                      Control-flow Graph

                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 0282D49E
                                      • GetCurrentThread.KERNEL32 ref: 0282D4DB
                                      • GetCurrentProcess.KERNEL32 ref: 0282D518
                                      • GetCurrentThreadId.KERNEL32 ref: 0282D571
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2146641149.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2820000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: 12696b827a5b5efb6a3b2a69e0b81e694367b1ac0c66fe51374717e412726438
                                      • Instruction ID: e777d1881c043cb7f97f9724edb0e6ba95287c2418ec0701a3c8b07529ae9393
                                      • Opcode Fuzzy Hash: 12696b827a5b5efb6a3b2a69e0b81e694367b1ac0c66fe51374717e412726438
                                      • Instruction Fuzzy Hash: 575177B4D00749CFDB54CFA9D648BAEBBF1FF88314F208459D009A7250DB74A988CB61

                                      Control-flow Graph

                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 0282D49E
                                      • GetCurrentThread.KERNEL32 ref: 0282D4DB
                                      • GetCurrentProcess.KERNEL32 ref: 0282D518
                                      • GetCurrentThreadId.KERNEL32 ref: 0282D571
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2146641149.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2820000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: 3bb36bafbf23baf1f8465d58e6476814cfcd3f647f8ccafca3d2c3184246cb19
                                      • Instruction ID: 9d6a9421e7681a9321b4d79d5a081cde27e2eb38ecea4e88c5e7f77271023943
                                      • Opcode Fuzzy Hash: 3bb36bafbf23baf1f8465d58e6476814cfcd3f647f8ccafca3d2c3184246cb19
                                      • Instruction Fuzzy Hash: AB5177B49007498FDB54DFA9D648BAEBFF1FF88314F208459E009A7250DB74A984CB65

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 44 73161ad-731624d 47 7316286-73162a6 44->47 48 731624f-7316259 44->48 55 73162a8-73162b2 47->55 56 73162df-731630e 47->56 48->47 49 731625b-731625d 48->49 50 7316280-7316283 49->50 51 731625f-7316269 49->51 50->47 53 731626b 51->53 54 731626d-731627c 51->54 53->54 54->54 58 731627e 54->58 55->56 57 73162b4-73162b6 55->57 64 7316310-731631a 56->64 65 7316347-7316401 CreateProcessA 56->65 59 73162d9-73162dc 57->59 60 73162b8-73162c2 57->60 58->50 59->56 62 73162c4 60->62 63 73162c6-73162d5 60->63 62->63 63->63 66 73162d7 63->66 64->65 67 731631c-731631e 64->67 76 7316403-7316409 65->76 77 731640a-7316490 65->77 66->59 69 7316341-7316344 67->69 70 7316320-731632a 67->70 69->65 71 731632c 70->71 72 731632e-731633d 70->72 71->72 72->72 74 731633f 72->74 74->69 76->77 87 73164a0-73164a4 77->87 88 7316492-7316496 77->88 90 73164b4-73164b8 87->90 91 73164a6-73164aa 87->91 88->87 89 7316498 88->89 89->87 93 73164c8-73164cc 90->93 94 73164ba-73164be 90->94 91->90 92 73164ac 91->92 92->90 96 73164de-73164e5 93->96 97 73164ce-73164d4 93->97 94->93 95 73164c0 94->95 95->93 98 73164e7-73164f6 96->98 99 73164fc 96->99 97->96 98->99 101 73164fd 99->101 101->101
                                      APIs
                                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 073163EE
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: 00bdadcee60537644b36fd519673d740402f1ba5ebf8840dca29f3acb1b61ecf
                                      • Instruction ID: c086835edb5974796ea2c0375dd85dbbc1b0fa6af46d502ec43611a15a8c8ebc
                                      • Opcode Fuzzy Hash: 00bdadcee60537644b36fd519673d740402f1ba5ebf8840dca29f3acb1b61ecf
                                      • Instruction Fuzzy Hash: A1A14FB1D00229DFEF14CFA8C8427DDBBB2BF48314F1485A9E809A7250DB759985CF92

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 102 73161b8-731624d 104 7316286-73162a6 102->104 105 731624f-7316259 102->105 112 73162a8-73162b2 104->112 113 73162df-731630e 104->113 105->104 106 731625b-731625d 105->106 107 7316280-7316283 106->107 108 731625f-7316269 106->108 107->104 110 731626b 108->110 111 731626d-731627c 108->111 110->111 111->111 115 731627e 111->115 112->113 114 73162b4-73162b6 112->114 121 7316310-731631a 113->121 122 7316347-7316401 CreateProcessA 113->122 116 73162d9-73162dc 114->116 117 73162b8-73162c2 114->117 115->107 116->113 119 73162c4 117->119 120 73162c6-73162d5 117->120 119->120 120->120 123 73162d7 120->123 121->122 124 731631c-731631e 121->124 133 7316403-7316409 122->133 134 731640a-7316490 122->134 123->116 126 7316341-7316344 124->126 127 7316320-731632a 124->127 126->122 128 731632c 127->128 129 731632e-731633d 127->129 128->129 129->129 131 731633f 129->131 131->126 133->134 144 73164a0-73164a4 134->144 145 7316492-7316496 134->145 147 73164b4-73164b8 144->147 148 73164a6-73164aa 144->148 145->144 146 7316498 145->146 146->144 150 73164c8-73164cc 147->150 151 73164ba-73164be 147->151 148->147 149 73164ac 148->149 149->147 153 73164de-73164e5 150->153 154 73164ce-73164d4 150->154 151->150 152 73164c0 151->152 152->150 155 73164e7-73164f6 153->155 156 73164fc 153->156 154->153 155->156 158 73164fd 156->158 158->158
                                      APIs
                                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 073163EE
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: 8395d6b8f81aa9af202575b509495053171cf95accdfcd07042a6b3ee0ccbab0
                                      • Instruction ID: 0a9b3c793e67895bedd21db2794f85e9aff5b48d77f0c39f07e44ca6e5cc800b
                                      • Opcode Fuzzy Hash: 8395d6b8f81aa9af202575b509495053171cf95accdfcd07042a6b3ee0ccbab0
                                      • Instruction Fuzzy Hash: 7B914EB1D00229DFEF24CFA8C8417DDBBB2BF48314F1485A9E809A7250DB759985CF92

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 159 282b1b0-282b1bf 160 282b1c1-282b1ce call 282ab54 159->160 161 282b1eb-282b1ef 159->161 167 282b1d0 160->167 168 282b1e4 160->168 163 282b203-282b244 161->163 164 282b1f1-282b1fb 161->164 170 282b251-282b25f 163->170 171 282b246-282b24e 163->171 164->163 214 282b1d6 call 282b43a 167->214 215 282b1d6 call 282b448 167->215 168->161 172 282b283-282b285 170->172 173 282b261-282b266 170->173 171->170 175 282b288-282b28f 172->175 176 282b271 173->176 177 282b268-282b26f call 282ab60 173->177 174 282b1dc-282b1de 174->168 178 282b320-282b3e0 174->178 181 282b291-282b299 175->181 182 282b29c-282b2a3 175->182 179 282b273-282b281 176->179 177->179 209 282b3e2-282b3e5 178->209 210 282b3e8-282b413 GetModuleHandleW 178->210 179->175 181->182 185 282b2b0-282b2b9 call 282ab70 182->185 186 282b2a5-282b2ad 182->186 190 282b2c6-282b2cb 185->190 191 282b2bb-282b2c3 185->191 186->185 192 282b2e9-282b2f6 190->192 193 282b2cd-282b2d4 190->193 191->190 200 282b2f8-282b316 192->200 201 282b319-282b31f 192->201 193->192 195 282b2d6-282b2e6 call 282ab80 call 282ab90 193->195 195->192 200->201 209->210 211 282b415-282b41b 210->211 212 282b41c-282b430 210->212 211->212 214->174 215->174
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0282B406
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2146641149.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2820000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 8c3496bf4f13a09499f02629e554cbe641aea79019101498e1f0074c945057f2
                                      • Instruction ID: a6b7c78bf5179d0ada71f4dda2677955bbf401a86760fb657d583658de0e187d
                                      • Opcode Fuzzy Hash: 8c3496bf4f13a09499f02629e554cbe641aea79019101498e1f0074c945057f2
                                      • Instruction Fuzzy Hash: 47715878A01B158FD724DF69C54475ABBF2FF88308F00892ED54AD7A40DB74E989CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 216 28244b0-28259d9 CreateActCtxA 219 28259e2-2825a3c 216->219 220 28259db-28259e1 216->220 227 2825a4b-2825a4f 219->227 228 2825a3e-2825a41 219->228 220->219 229 2825a60-2825a90 227->229 230 2825a51-2825a5d 227->230 228->227 234 2825a42-2825a47 229->234 235 2825a92-2825b14 229->235 230->229 234->227
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 028259C9
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2146641149.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2820000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 03bae645ecaa58079efec9ebc2a88022c4c08f23b1ba480c20c72691a708e39d
                                      • Instruction ID: d808ab59aa9350f2bff6c50a7ebb171cd7ae0609d12cc387aeaa05fd8bcb8ab0
                                      • Opcode Fuzzy Hash: 03bae645ecaa58079efec9ebc2a88022c4c08f23b1ba480c20c72691a708e39d
                                      • Instruction Fuzzy Hash: 2D41E374C0072DCBEB24CFA9C94479EBBF5BF88304F60805AD409AB251DB756949CF90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 238 282590c-2825913 239 282591d-28259d9 CreateActCtxA 238->239 241 28259e2-2825a3c 239->241 242 28259db-28259e1 239->242 249 2825a4b-2825a4f 241->249 250 2825a3e-2825a41 241->250 242->241 251 2825a60-2825a90 249->251 252 2825a51-2825a5d 249->252 250->249 256 2825a42-2825a47 251->256 257 2825a92-2825b14 251->257 252->251 256->249
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 028259C9
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2146641149.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2820000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 7d0c0c2679e220f2c65693377ff471670e058d4c5d21cfbc30076b082ec23e0f
                                      • Instruction ID: df66bce016d9c48794dd5391e78874de6bbecd7c6408684889bfdd43f29087d5
                                      • Opcode Fuzzy Hash: 7d0c0c2679e220f2c65693377ff471670e058d4c5d21cfbc30076b082ec23e0f
                                      • Instruction Fuzzy Hash: 6641E0B4C00719CBEF14CFA9C98578DBBB1BF88304F64805AD409AB255DB75698ACF90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 260 7315f28-7315f7e 263 7315f80-7315f8c 260->263 264 7315f8e-7315fcd WriteProcessMemory 260->264 263->264 266 7315fd6-7316006 264->266 267 7315fcf-7315fd5 264->267 267->266
                                      APIs
                                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07315FC0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: d6877142c245ac95d063d1e1bf25f5ffebf399a6d6142bb7b0747cd5525bb45b
                                      • Instruction ID: 234f79d7087d9c1d76dc77531a9d8e11e9a5aa306c47104630d218b74444c308
                                      • Opcode Fuzzy Hash: d6877142c245ac95d063d1e1bf25f5ffebf399a6d6142bb7b0747cd5525bb45b
                                      • Instruction Fuzzy Hash: 992137B190134ADFDB10CFA9C881BDEBBF5FF88310F10842AE958A7241D7789554CBA5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 271 7a45038-7a4508c 273 7a45097-7a450a6 271->273 274 7a4508e-7a45094 271->274 275 7a450a8 273->275 276 7a450ab-7a450e4 DrawTextExW 273->276 274->273 275->276 277 7a450e6-7a450ec 276->277 278 7a450ed-7a4510a 276->278 277->278
                                      APIs
                                      • DrawTextExW.USER32(?,?,?,?,?,?), ref: 07A450D7
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151274709.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7a40000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: DrawText
                                      • String ID:
                                      • API String ID: 2175133113-0
                                      • Opcode ID: eb55382e91ab6c9ca8357d29b7e887f7ee9211d5f2841dd8ef7d268fde53719d
                                      • Instruction ID: 5eb1e7173384f7af9e42a7292d555e742b4fa838a897fc01ad323386dd6f0c80
                                      • Opcode Fuzzy Hash: eb55382e91ab6c9ca8357d29b7e887f7ee9211d5f2841dd8ef7d268fde53719d
                                      • Instruction Fuzzy Hash: 0931C4B5D002499FDB10CFAAD884ADEFBF4FF88324F14841AE515A7610D775A954CFA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 291 7a45040-7a4508c 292 7a45097-7a450a6 291->292 293 7a4508e-7a45094 291->293 294 7a450a8 292->294 295 7a450ab-7a450e4 DrawTextExW 292->295 293->292 294->295 296 7a450e6-7a450ec 295->296 297 7a450ed-7a4510a 295->297 296->297
                                      APIs
                                      • DrawTextExW.USER32(?,?,?,?,?,?), ref: 07A450D7
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151274709.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7a40000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: DrawText
                                      • String ID:
                                      • API String ID: 2175133113-0
                                      • Opcode ID: 09e1578fe20e4835e5dbe5ee73684e0fe5a562db43dc1cbf57cba65ec0dfc9b1
                                      • Instruction ID: 528ddee127c0062d5493df524e82edc7da0521a970cbdb6fc15afaec88aa2280
                                      • Opcode Fuzzy Hash: 09e1578fe20e4835e5dbe5ee73684e0fe5a562db43dc1cbf57cba65ec0dfc9b1
                                      • Instruction Fuzzy Hash: 8021A3B5D003499FDB10CF9AD884A9EFBF5FB88324F24842AE519A7210D775A954CFA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 281 7315f30-7315f7e 283 7315f80-7315f8c 281->283 284 7315f8e-7315fcd WriteProcessMemory 281->284 283->284 286 7315fd6-7316006 284->286 287 7315fcf-7315fd5 284->287 287->286
                                      APIs
                                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07315FC0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: 6e05338a15c24fa09d52a9a79ef1fc81615053e6ce9783f0ef03f057898c11dd
                                      • Instruction ID: 2553205d8cfecefba318fd677f3ac64bd12a0dd38dbe699463ba0479d8b2b077
                                      • Opcode Fuzzy Hash: 6e05338a15c24fa09d52a9a79ef1fc81615053e6ce9783f0ef03f057898c11dd
                                      • Instruction Fuzzy Hash: 2C2126B5900349DFDB14CFA9C881BDEBBF5FF88310F108429E918A7240D7789950CBA4

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 300 7315d90-7315de3 302 7315df3-7315e23 Wow64SetThreadContext 300->302 303 7315de5-7315df1 300->303 305 7315e25-7315e2b 302->305 306 7315e2c-7315e5c 302->306 303->302 305->306
                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07315E16
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: 6850557bdefd915379a000a84d871b82c2c3bb3022c3504a46218e19d0dc9545
                                      • Instruction ID: 26ddfb71aeab70c42ba954303a263e02339eecd89267eb0cf993ee1d9544811b
                                      • Opcode Fuzzy Hash: 6850557bdefd915379a000a84d871b82c2c3bb3022c3504a46218e19d0dc9545
                                      • Instruction Fuzzy Hash: C62159B1D003498FEB14CFA9C4847EEBFF0AF88310F14842ED458A7240CB789545CBA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 310 7316019-73160ad ReadProcessMemory 313 73160b6-73160e6 310->313 314 73160af-73160b5 310->314 314->313
                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073160A0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: 634017a658c252504831637b4aed64f2952c0e4a466ceb7c2f0efc2c6a2d530a
                                      • Instruction ID: bb3a8304d7b6da7f74ea24d21b5296d61ade9ccc86b455e4e793600498af122a
                                      • Opcode Fuzzy Hash: 634017a658c252504831637b4aed64f2952c0e4a466ceb7c2f0efc2c6a2d530a
                                      • Instruction Fuzzy Hash: 722136B18003599FDF10CFAAC881BEEBBF1FF48310F14842AE958A7240D7799500CBA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 318 7315d98-7315de3 320 7315df3-7315e23 Wow64SetThreadContext 318->320 321 7315de5-7315df1 318->321 323 7315e25-7315e2b 320->323 324 7315e2c-7315e5c 320->324 321->320 323->324
                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07315E16
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: 74c057c6edacfceaf7267eeaa0bfe87b7d2f670f7c707c68600f76febe8b382a
                                      • Instruction ID: 7f96b860ce9e76b98f3a08263cf6046357858b18c4f19d4b3f4cbd35b54eb569
                                      • Opcode Fuzzy Hash: 74c057c6edacfceaf7267eeaa0bfe87b7d2f670f7c707c68600f76febe8b382a
                                      • Instruction Fuzzy Hash: 4B214CB1D003099FEB14DFAAC4857EEBBF4EF88314F148429D519A7240DB789554CFA5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 328 7316020-73160ad ReadProcessMemory 331 73160b6-73160e6 328->331 332 73160af-73160b5 328->332 332->331
                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073160A0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: 7cfc9c3e2cb8e31941421e25a52d3a148818e0fb192b4b7ee5862fe7178230ab
                                      • Instruction ID: 10aa2a982a7c266ef0bfd81510380b8534462115ef2ae75fbbf4bba7b51e9bfd
                                      • Opcode Fuzzy Hash: 7cfc9c3e2cb8e31941421e25a52d3a148818e0fb192b4b7ee5862fe7178230ab
                                      • Instruction Fuzzy Hash: D12116B18003599FDB10DFAAC881ADEBBF5FF48310F108429E518A7240D7799510CBA5
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0282D6EF
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2146641149.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2820000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: d91b1fdcdca5f004c17f10b44371ed720eb571c41026a96aaf54846a70beccb1
                                      • Instruction ID: 6f92737cbed025ef6a79f1304110268c1faed6d7b4bc834aa998cb9f2eb26a89
                                      • Opcode Fuzzy Hash: d91b1fdcdca5f004c17f10b44371ed720eb571c41026a96aaf54846a70beccb1
                                      • Instruction Fuzzy Hash: D321E4B59002499FDB10CFAAD984ADEBFF4FB48320F14801AE918A3350D378A954CFA0
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0282D6EF
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2146641149.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2820000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: a4928ae95934e0fb10bdb1556321f904900903773405fcf7c7ca51e2b1db44df
                                      • Instruction ID: a23e83ea5efe181b660c6241235dcfe639886266eb7efb1b072cd0bc1027b54e
                                      • Opcode Fuzzy Hash: a4928ae95934e0fb10bdb1556321f904900903773405fcf7c7ca51e2b1db44df
                                      • Instruction Fuzzy Hash: C021E3B5900219DFDB10CFA9D984ADEBFF4FF48314F24841AE918A3250D378A954CFA0
                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07315EDE
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 7385003f0f85c2f0e90bbcedd16caaa2c00d3c9e5a082c0047f2347a78f5e56b
                                      • Instruction ID: 1bd7ab25a88883119962fe37ba2223b19f4fe63b99496970903174796fd149f1
                                      • Opcode Fuzzy Hash: 7385003f0f85c2f0e90bbcedd16caaa2c00d3c9e5a082c0047f2347a78f5e56b
                                      • Instruction Fuzzy Hash: 73214A7190034A9FDB10DFA9C8447DFBFF5EF88320F14841AE519A7250CB75A550CBA1
                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0282B481,00000800,00000000,00000000), ref: 0282B672
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2146641149.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2820000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: 31c8988c84c065bdc826262e697b44e3bd164da22c54df5284d53456d43879a6
                                      • Instruction ID: 4fbae9da8ac2bcd607fec7b45259cf6d4ccb67338b5263dcb27efc75e2b2a2ce
                                      • Opcode Fuzzy Hash: 31c8988c84c065bdc826262e697b44e3bd164da22c54df5284d53456d43879a6
                                      • Instruction Fuzzy Hash: 6D1114BAD013099FDB10CF9AD444B9EFBF4EF88314F10852AE519A7200C3B5A549CFA4
                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07315EDE
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: ac69ce1a9a7e5b5d0983b96c035642380a221a29e2cdf791ce705150f1a299ba
                                      • Instruction ID: 99a81df94c567563013daa3f10fac39d3c64f25bca25baa7acd01eaf82d5fe1e
                                      • Opcode Fuzzy Hash: ac69ce1a9a7e5b5d0983b96c035642380a221a29e2cdf791ce705150f1a299ba
                                      • Instruction Fuzzy Hash: 541156728003499FDB10CFAAC844BDFBFF5EF88320F208419E519A7250CB75A910CBA0
                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0282B481,00000800,00000000,00000000), ref: 0282B672
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2146641149.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2820000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: 10b75806ee1a86e0d122ad73d807f6a6fcd9d7b5018b460c3aa2e3ff69e9519e
                                      • Instruction ID: 9b07d001ca80210d26298771a73d4f5bacbe4316f734729347ae7c064bc81362
                                      • Opcode Fuzzy Hash: 10b75806ee1a86e0d122ad73d807f6a6fcd9d7b5018b460c3aa2e3ff69e9519e
                                      • Instruction Fuzzy Hash: 0F1112BAC00249CFDB10CFAAD584BDEFBF4AF48324F14852AD519A7601C375A549CFA4
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: 3b1769df9f73d628ffdfed0bef01f1329eee85622717b7cb6ac4d988881d031e
                                      • Instruction ID: a1c522506f98e5fe2facb563483d385f5c81fc0a8d9048a2631b66557276f7d5
                                      • Opcode Fuzzy Hash: 3b1769df9f73d628ffdfed0bef01f1329eee85622717b7cb6ac4d988881d031e
                                      • Instruction Fuzzy Hash: 561158B19003498FEB24DFAAC84579EFBF4EF88624F24841AD519A7240CB79A900CB95
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: 5fa02201031773758ea2af5a416702ffd261bc0d7503983675c4a3ca90313291
                                      • Instruction ID: 7825931506daf2b1867906a87df6147bfc2df2e153399be63487e52e46c30bb5
                                      • Opcode Fuzzy Hash: 5fa02201031773758ea2af5a416702ffd261bc0d7503983675c4a3ca90313291
                                      • Instruction Fuzzy Hash: 3A1136B19003498FEB24DFAAC84579EFBF4EF88724F248419D519A7240CB79A940CBA5
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0282B406
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2146641149.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2820000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 8ddf1dcfb416d85a1a3adb73d6b18826bb35e43eec8c5ac30b1025a46f972c6d
                                      • Instruction ID: 88275aa6fa3697006c10191172703efbe74c7966a00e3c7eaa26dba45436ee82
                                      • Opcode Fuzzy Hash: 8ddf1dcfb416d85a1a3adb73d6b18826bb35e43eec8c5ac30b1025a46f972c6d
                                      • Instruction Fuzzy Hash: 741102B9C003498FDB10CF9AD544B9EFBF4AF88224F10841AD418B7200D375A545CFA1
                                      APIs
                                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 0731869D
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: f64878b44f03c3e575b4d6efd78024f1f85f99b77cc6f292af8b960e2b8e5946
                                      • Instruction ID: 77eb9743268665702be948c1f7fc216e0935c530c517665b288240640ebe15a4
                                      • Opcode Fuzzy Hash: f64878b44f03c3e575b4d6efd78024f1f85f99b77cc6f292af8b960e2b8e5946
                                      • Instruction Fuzzy Hash: 7111F5B5800349DFDB10DF9AD544BDEBFF8EB48324F108459E918A7240D3B5A954CFA5
                                      APIs
                                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 0731869D
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: 0102a36e7a02f4da5f5b1f42addf643439808597661a729bde9d2903fa8e8ea8
                                      • Instruction ID: a46fe62f2afb0c7ecb12947e82e65956296e7d445176518635d2fcaa4b0c82b9
                                      • Opcode Fuzzy Hash: 0102a36e7a02f4da5f5b1f42addf643439808597661a729bde9d2903fa8e8ea8
                                      • Instruction Fuzzy Hash: 9011F2B58003499FDB10DF9AD985BDEBFF8EB48324F20845AE918A7640C375A944CFA5
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2144297983.0000000000CED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CED000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_ced000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 12aa5f1b3820d02b82527a3c7284237ad59f2ef9e45bc9785c9098037b92e2a2
                                      • Instruction ID: 47d927db3abb8a7c743f8a1b90e0580a9be3918380a6c76924d93c4524af6fc1
                                      • Opcode Fuzzy Hash: 12aa5f1b3820d02b82527a3c7284237ad59f2ef9e45bc9785c9098037b92e2a2
                                      • Instruction Fuzzy Hash: E4214675504384EFCB04DF15D5C0B26BBB1FB84314F20C56DE90B4B2A2C37AD846CA62
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2144297983.0000000000CED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CED000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_ced000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ac721c1f9a01e72b3a4e08cd1e013b77c592e5189e505cf44041981380c4b6b6
                                      • Instruction ID: d572f1fdb364fb649e6deee580468bc4feacd9a463c26592538390a2ef5b040f
                                      • Opcode Fuzzy Hash: ac721c1f9a01e72b3a4e08cd1e013b77c592e5189e505cf44041981380c4b6b6
                                      • Instruction Fuzzy Hash: 32212675604384EFDB04DF15D5C0B2ABB65FB84324F20C56DEA0A4B292C77ADC46CA61
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2144297983.0000000000CED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CED000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_ced000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                      • Instruction ID: b4cf42d51d4783b4102920dddcaa3c39bff96456eec45952668a38085290f50a
                                      • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                      • Instruction Fuzzy Hash: C1119D79504284DFCB05CF10D5C4B15BBA1FB84318F24C6A9D95A4B696C33AD94ACBA2
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2144297983.0000000000CED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CED000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_ced000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                      • Instruction ID: 7f440081659acf91df082a4e77cf333b2b2f36d27796c26ae3836988d8a2425e
                                      • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                      • Instruction Fuzzy Hash: 66119D76504284DFCB05CF14D5C4B15BBB1FB94318F24C6ADD84A4B696C33AE94ACF62
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2144209275.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_cdd000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 131e16e85da2d69e8af7a3d93206aec2709ac9d680ecc900e030c6f2c6ba08c6
                                      • Instruction ID: bae4bc3e2d432f428a6c7db5f17a6423cbac6198246c1e405b45dfdb9228e347
                                      • Opcode Fuzzy Hash: 131e16e85da2d69e8af7a3d93206aec2709ac9d680ecc900e030c6f2c6ba08c6
                                      • Instruction Fuzzy Hash: D201F771808344DAF7104E26CDC0766BFD8EF41324F29849BEE0A4A38AC6789940C6B1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2144209275.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_cdd000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d1c8e34249d7118b661b28efb034b948ed28829a3bf8401301ca1a46e817e360
                                      • Instruction ID: 77f52205053ffcb7d4c1db44f22a9d92206008f0928ca6563a35b63b64569e39
                                      • Opcode Fuzzy Hash: d1c8e34249d7118b661b28efb034b948ed28829a3bf8401301ca1a46e817e360
                                      • Instruction Fuzzy Hash: 9FF0C2724083449AE7108A15D9C4B62FFD8EB40734F18C45AEE090A286C279AD44CAB1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 870dff81514f9d22202e69bc84be1113dae3b2e9beccef7b87fe9cf964d6990e
                                      • Instruction ID: 54c207542cb473db3c43e36f26449642b4d4461e7b6420fd535bf2344109cdc6
                                      • Opcode Fuzzy Hash: 870dff81514f9d22202e69bc84be1113dae3b2e9beccef7b87fe9cf964d6990e
                                      • Instruction Fuzzy Hash: 9AE11BB4E00259CFDB14DF99C580AAEFBB2FF89304F248269D409AB355D735A942CF61
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a314922caf058955a22eff672c7fa0b5979cebc5558316a4d6abdd488c044407
                                      • Instruction ID: 36740c976526c6fbcda24a15fcd1b8bf9765729c8fa651f92dac9656b4701713
                                      • Opcode Fuzzy Hash: a314922caf058955a22eff672c7fa0b5979cebc5558316a4d6abdd488c044407
                                      • Instruction Fuzzy Hash: 1EE12CB4E00259CFDB14DFA9C590AAEFBB2FF49304F248269D409A7355C734A942CF61
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a65c8bf08ee26d481e5d2bb157c8a6f03d2d55049c506638e55d1808825c3794
                                      • Instruction ID: 87b8e526b8117fb8ab13d30924d05366ff7ae9a7cc7f187d67d63823c3755501
                                      • Opcode Fuzzy Hash: a65c8bf08ee26d481e5d2bb157c8a6f03d2d55049c506638e55d1808825c3794
                                      • Instruction Fuzzy Hash: 75E10BB4E00259CFDB14DF99C580AAEFBB2FF89304F248269D419AB355D734A942CF61
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5ed8eb7c7bc2a973a7ea71eee9e19c47c25a844b9d88f8fb63b4b2b3169ea8e0
                                      • Instruction ID: 1fedcdfef5e5e43338eeecae274f4e5cb9f2129040996658566303d1c971efc3
                                      • Opcode Fuzzy Hash: 5ed8eb7c7bc2a973a7ea71eee9e19c47c25a844b9d88f8fb63b4b2b3169ea8e0
                                      • Instruction Fuzzy Hash: 56E12CB4E10259CFDB14DFA9C580AAEFBB2FF89304F248169D409AB355D734A942CF61
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 23bfc74604a017a3216b3cb913dc9b8d543a5e4892bcdfc59c061cd6c24ec6b3
                                      • Instruction ID: 9a21b64b90fa4d1f02ddf0584d320eb785f958c7eb49329226e0c297e1348980
                                      • Opcode Fuzzy Hash: 23bfc74604a017a3216b3cb913dc9b8d543a5e4892bcdfc59c061cd6c24ec6b3
                                      • Instruction Fuzzy Hash: EDE11AB4E00259CFDB14DF99C580AAEFBB2FF89304F248169D419AB355D734A942CF61
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151550561.0000000008E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8e60000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 12f708fa5d87ec1ab5f9505aa6b0ae328d155bfe236787092240186a2534cd4c
                                      • Instruction ID: ebae48878751c0558242e24b0d247c6c148901bf4b025a707d6304b1ebe7617f
                                      • Opcode Fuzzy Hash: 12f708fa5d87ec1ab5f9505aa6b0ae328d155bfe236787092240186a2534cd4c
                                      • Instruction Fuzzy Hash: E1D11831E1065ACADB10EB68D9506E9B7B1FFD5300F10D79AE10A37624EFB06AC5CB91
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151550561.0000000008E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8e60000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1ef15ea72a355863108740c2555d47438d0f0151b7e012e1a8af92307e949b1d
                                      • Instruction ID: 0af70687396399c49853e663967b2581eb7c09be6e2a1b17ed6af8f8eda2aeaa
                                      • Opcode Fuzzy Hash: 1ef15ea72a355863108740c2555d47438d0f0151b7e012e1a8af92307e949b1d
                                      • Instruction Fuzzy Hash: A9D12831E1065ACADB10EB68D9506ADB7B1FFD5300F10D79AE10A37614EFB06AC5CB91
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2146641149.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2820000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6dc1598c41523d6f7e7ddf0fdb19b87e890af3fc0d5e6edbb04b8aa0a5cf0c9c
                                      • Instruction ID: 5d8f4d1203d3b57e178f61331622c6267d3558a67bedb5fe2119638142379c47
                                      • Opcode Fuzzy Hash: 6dc1598c41523d6f7e7ddf0fdb19b87e890af3fc0d5e6edbb04b8aa0a5cf0c9c
                                      • Instruction Fuzzy Hash: 67A15D3AE00229CFCF15DFA4C9405AEB7B2FF84304B15856AE905EB265DB31E95ACF40
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151550561.0000000008E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8e60000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f46ac2ad0280052d293eb498e0c05f90bb0cd5aae90485a398774973634f7130
                                      • Instruction ID: f7f65ae152923c5718387272a8a7a49bce52872ca4aed4beb84f7f065fde2b01
                                      • Opcode Fuzzy Hash: f46ac2ad0280052d293eb498e0c05f90bb0cd5aae90485a398774973634f7130
                                      • Instruction Fuzzy Hash: 24515271A101458BE748EF3EE8496AA7FE7FBC8304F04C62DD108AB269DF785906CB51
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151550561.0000000008E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8e60000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0ee422172465eb28df8e799f78f5dba4aec3897b473c47d7e38ce883b8dbbd4e
                                      • Instruction ID: f4b17ef31cc2f8ddff17c8aeb96b0d6710b642e042f93a9d6c2cb315f5dd2671
                                      • Opcode Fuzzy Hash: 0ee422172465eb28df8e799f78f5dba4aec3897b473c47d7e38ce883b8dbbd4e
                                      • Instruction Fuzzy Hash: 05515170A102458BE748EF7EE849AAA7FE7FBC8304F04C52DD10897269DF7819068B51
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 77e5004c18077483e034542ccac625f7f19ac8717d653969f461ad236ed3e434
                                      • Instruction ID: 81ad2ce235bc2748c1eb67eec62fb696d439895603fcf7346b5f59e9a1646472
                                      • Opcode Fuzzy Hash: 77e5004c18077483e034542ccac625f7f19ac8717d653969f461ad236ed3e434
                                      • Instruction Fuzzy Hash: CC5120B0E042598FDB18DFA9C5806AEFBF6FF89304F248169D418AB356D7349942CF61
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 00da2998ffa75d75e0c658ba25105fadf41bfc30fe28c9dfa49e899651f72547
                                      • Instruction ID: 4c55de3e05c17078482ffd09342c20f46684cb367848422b71f3ceea206ee857
                                      • Opcode Fuzzy Hash: 00da2998ffa75d75e0c658ba25105fadf41bfc30fe28c9dfa49e899651f72547
                                      • Instruction Fuzzy Hash: D45140B4E042598FDB18CFA9C9505AEFBF2FF89300F248169D408AB356D7349942CFA1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 509c0d0c6234418f6398aa474736ab8ebfd6221167791803a38691c7b5d12989
                                      • Instruction ID: 00d86e65231897fd48df9faf567c6ef57e76e72eee806209fd9ce1c9fef0abd3
                                      • Opcode Fuzzy Hash: 509c0d0c6234418f6398aa474736ab8ebfd6221167791803a38691c7b5d12989
                                      • Instruction Fuzzy Hash: E5512EB4E102598FDB18CFA9C5805AEFBF6FF89304F248269D418A7356D7349942CFA1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2151167827.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7310000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: aaaa6fcda663fd1cff49e67df80f8b747a87e7e3cb3893d244cbe1bbe0047313
                                      • Instruction ID: 9ab11dabb50b79e9bbd5fe0bc9c3a23b660bca2a28e62b4ed8a32ddeabb31fdd
                                      • Opcode Fuzzy Hash: aaaa6fcda663fd1cff49e67df80f8b747a87e7e3cb3893d244cbe1bbe0047313
                                      • Instruction Fuzzy Hash: 66513DB4E042598FDB18DFA9C9805AEFBF6FF89300F248169D409A7356D7349942CF61

                                      Execution Graph

                                      Execution Coverage:13.3%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:147
                                      Total number of Limit Nodes:12
                                      execution_graph 29387 10ab318 29388 10ab35e 29387->29388 29392 10ab4f8 29388->29392 29395 10ab4e9 29388->29395 29389 10ab44b 29393 10ab526 29392->29393 29400 10aaef4 29392->29400 29393->29389 29396 10ab4c1 29395->29396 29397 10ab4f6 29395->29397 29396->29389 29398 10aaef4 DuplicateHandle 29397->29398 29399 10ab526 29398->29399 29399->29389 29401 10ab560 DuplicateHandle 29400->29401 29402 10ab5f6 29401->29402 29402->29393 29483 105d0fc 29484 105d114 29483->29484 29485 105d16e 29484->29485 29491 6a63b10 29484->29491 29500 6a668a2 29484->29500 29504 6a63a94 29484->29504 29513 6a668a8 29484->29513 29517 6a67a08 29484->29517 29494 6a63a9b 29491->29494 29492 6a67a79 29542 6a63bbc 29492->29542 29494->29485 29494->29492 29495 6a67a69 29494->29495 29526 6a67b92 29495->29526 29531 6a67c6c 29495->29531 29537 6a67ba0 29495->29537 29496 6a67a77 29496->29496 29501 6a668a7 29500->29501 29502 6a63a94 CallWindowProcW 29501->29502 29503 6a668ef 29502->29503 29503->29485 29505 6a63a9f 29504->29505 29506 6a67a79 29505->29506 29508 6a67a69 29505->29508 29507 6a63bbc CallWindowProcW 29506->29507 29509 6a67a77 29507->29509 29510 6a67b92 CallWindowProcW 29508->29510 29511 6a67ba0 CallWindowProcW 29508->29511 29512 6a67c6c CallWindowProcW 29508->29512 29509->29509 29510->29509 29511->29509 29512->29509 29514 6a668b4 29513->29514 29515 6a63a94 CallWindowProcW 29514->29515 29516 6a668ef 29515->29516 29516->29485 29520 6a67a45 29517->29520 29518 6a67a79 29519 6a63bbc CallWindowProcW 29518->29519 29522 6a67a77 29519->29522 29520->29518 29521 6a67a69 29520->29521 29523 6a67b92 CallWindowProcW 29521->29523 29524 6a67ba0 CallWindowProcW 29521->29524 29525 6a67c6c CallWindowProcW 29521->29525 29522->29522 29523->29522 29524->29522 29525->29522 29528 6a67b9e 29526->29528 29527 6a67c40 29527->29496 29546 6a67c48 29528->29546 29551 6a67c58 29528->29551 29532 6a67c2a 29531->29532 29533 6a67c7a 29531->29533 29535 6a67c48 CallWindowProcW 29532->29535 29536 6a67c58 CallWindowProcW 29532->29536 29534 6a67c40 29534->29496 29535->29534 29536->29534 29539 6a67bb4 29537->29539 29538 6a67c40 29538->29496 29540 6a67c48 CallWindowProcW 29539->29540 29541 6a67c58 CallWindowProcW 29539->29541 29540->29538 29541->29538 29543 6a63bc7 29542->29543 29544 6a68eda CallWindowProcW 29543->29544 29545 6a68e89 29543->29545 29544->29545 29545->29496 29547 6a67c69 29546->29547 29556 6a68e13 29546->29556 29560 6a68e1b 29546->29560 29563 6a68e11 29546->29563 29547->29527 29552 6a67c69 29551->29552 29553 6a68e13 CallWindowProcW 29551->29553 29554 6a68e11 CallWindowProcW 29551->29554 29555 6a68e1b CallWindowProcW 29551->29555 29552->29527 29553->29552 29554->29552 29555->29552 29557 6a68e1f 29556->29557 29558 6a63bbc CallWindowProcW 29557->29558 29559 6a68e2a 29558->29559 29559->29547 29561 6a68e2a 29560->29561 29562 6a63bbc CallWindowProcW 29560->29562 29561->29547 29562->29561 29564 6a68e17 29563->29564 29565 6a63bbc CallWindowProcW 29564->29565 29566 6a68e2a 29565->29566 29566->29547 29403 10a61e0 29404 10a6224 SetWindowsHookExW 29403->29404 29406 10a626a 29404->29406 29407 10ae460 29408 10ae464 29407->29408 29413 6a6c2e0 29408->29413 29417 6a6c3e8 29408->29417 29421 6a6c2cf 29408->29421 29425 6a6c451 29408->29425 29414 6a6c30c 29413->29414 29415 6a6c411 29414->29415 29416 6a6c451 3 API calls 29414->29416 29415->29408 29416->29414 29418 6a6c3bf 29417->29418 29419 6a6c411 29418->29419 29420 6a6c451 3 API calls 29418->29420 29419->29408 29420->29418 29422 6a6c30c 29421->29422 29423 6a6c411 29422->29423 29424 6a6c451 3 API calls 29422->29424 29423->29408 29424->29422 29426 6a6c45a 29425->29426 29429 6a6c467 29425->29429 29427 6a6c3bf 29426->29427 29426->29429 29428 6a6c411 29427->29428 29433 6a6c451 3 API calls 29427->29433 29428->29408 29434 6a6cce0 29429->29434 29439 6a6ccf0 29429->29439 29430 6a6c586 29430->29430 29433->29427 29435 6a6cd05 29434->29435 29444 6ba1850 29435->29444 29449 6ba1840 29435->29449 29436 6a6cfa2 29436->29430 29440 6a6cd05 29439->29440 29442 6ba1850 3 API calls 29440->29442 29443 6ba1840 3 API calls 29440->29443 29441 6a6cfa2 29441->29430 29442->29441 29443->29441 29445 6ba1875 29444->29445 29454 6ba1af0 29445->29454 29458 6ba1ae1 29445->29458 29446 6ba18d7 29446->29436 29450 6ba1875 29449->29450 29452 6ba1af0 3 API calls 29450->29452 29453 6ba1ae1 3 API calls 29450->29453 29451 6ba18d7 29451->29436 29452->29451 29453->29451 29462 6ba1b28 29454->29462 29470 6ba1b18 29454->29470 29455 6ba1afe 29455->29446 29459 6ba1afe 29458->29459 29460 6ba1b28 2 API calls 29458->29460 29461 6ba1b18 2 API calls 29458->29461 29459->29446 29460->29459 29461->29459 29463 6ba1b5d 29462->29463 29464 6ba1b35 29462->29464 29479 6ba10d8 29463->29479 29464->29455 29467 6ba1b7e 29467->29455 29468 6ba1c46 GlobalMemoryStatusEx 29469 6ba1c76 29468->29469 29469->29455 29471 6ba1b5d 29470->29471 29472 6ba1b35 29470->29472 29473 6ba10d8 GlobalMemoryStatusEx 29471->29473 29472->29455 29476 6ba1b7a 29473->29476 29474 6ba1b7e 29474->29455 29475 6ba1be3 29475->29455 29476->29474 29476->29475 29477 6ba1c46 GlobalMemoryStatusEx 29476->29477 29478 6ba1c76 29477->29478 29478->29455 29480 6ba1c00 GlobalMemoryStatusEx 29479->29480 29482 6ba1b7a 29480->29482 29482->29467 29482->29468

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 279 6a644f0-6a644ff 280 6a64501-6a6450e call 6a638b0 279->280 281 6a6452b-6a6452f 279->281 288 6a64524 280->288 289 6a64510 280->289 282 6a64543-6a64584 281->282 283 6a64531-6a6453b 281->283 290 6a64586-6a6458e 282->290 291 6a64591-6a6459f 282->291 283->282 288->281 333 6a64516 call 6a64788 289->333 334 6a64516 call 6a64778 289->334 290->291 293 6a645c3-6a645c5 291->293 294 6a645a1-6a645a6 291->294 292 6a6451c-6a6451e 292->288 295 6a64660-6a64720 292->295 296 6a645c8-6a645cf 293->296 297 6a645b1 294->297 298 6a645a8-6a645af call 6a638bc 294->298 328 6a64722-6a64725 295->328 329 6a64728-6a64753 GetModuleHandleW 295->329 300 6a645d1-6a645d9 296->300 301 6a645dc-6a645e3 296->301 299 6a645b3-6a645c1 297->299 298->299 299->296 300->301 304 6a645e5-6a645ed 301->304 305 6a645f0-6a645f9 301->305 304->305 309 6a64606-6a6460b 305->309 310 6a645fb-6a64603 305->310 311 6a6460d-6a64614 309->311 312 6a64629-6a64636 309->312 310->309 311->312 314 6a64616-6a64626 call 6a61adc call 6a638cc 311->314 318 6a64638-6a64656 312->318 319 6a64659-6a6465f 312->319 314->312 318->319 328->329 330 6a64755-6a6475b 329->330 331 6a6475c-6a64770 329->331 330->331 333->292 334->292
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4625106985.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_6a60000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 29e71a65bdcaecbd47b5aab397ae52ce8d1c2505b071c916915cdcc018b6bfb1
                                      • Instruction ID: 6fb54638d4526bad12c55dc53f453f04ec4e0a5d485b386fdb42cea993843466
                                      • Opcode Fuzzy Hash: 29e71a65bdcaecbd47b5aab397ae52ce8d1c2505b071c916915cdcc018b6bfb1
                                      • Instruction Fuzzy Hash: 00713B70A00B058FD7A4DF6AD54075ABBF1FF88304F00892DE486DBA50DB75E845CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 472 6a66672-6a6667c 473 6a6667e-6a66683 472->473 474 6a666c9 472->474 475 6a666cf-6a666d2 call 6a63a6c 474->475 476 6a666cb-6a666cd 474->476 479 6a666d5-6a666d6 475->479 480 6a666d4 call 6a63a6c 475->480 476->475 480->479
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4625106985.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_6a60000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9e18fa179b0344a1be8a9cadcf0848b89b8b2c9a30ee5920061a3e85eb770266
                                      • Instruction ID: 93af29b8e2e95edbb195982bf2929b967de1617acb466ec2662d7b6e08a1efb6
                                      • Opcode Fuzzy Hash: 9e18fa179b0344a1be8a9cadcf0848b89b8b2c9a30ee5920061a3e85eb770266
                                      • Instruction Fuzzy Hash: D75110B1C00349AFDB55DFAAC980ACEBFB1BF89300F25911AE418AB220D7709845CF91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 481 6ba1b28-6ba1b33 482 6ba1b5d-6ba1b7c call 6ba10d8 481->482 483 6ba1b35-6ba1b5c call 6ba10cc 481->483 489 6ba1b7e-6ba1b81 482->489 490 6ba1b82-6ba1be1 482->490 497 6ba1be3-6ba1be6 490->497 498 6ba1be7-6ba1c74 GlobalMemoryStatusEx 490->498 502 6ba1c7d-6ba1ca5 498->502 503 6ba1c76-6ba1c7c 498->503 503->502
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4625506390.0000000006BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_6ba0000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 77d2f5f4584d7ec39b3af8257aa710c32a529c2f1594a255f602d939547c8968
                                      • Instruction ID: d3c081d40707874ffbcd9bc5035f11015675af7c0ddb813f289aed03e633f1d9
                                      • Opcode Fuzzy Hash: 77d2f5f4584d7ec39b3af8257aa710c32a529c2f1594a255f602d939547c8968
                                      • Instruction Fuzzy Hash: BF412472D0435A8FCB54DFB9D8007AEBBF4EF89210F1486AAD904E7250EB749845CBE0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 506 6a63a6c-6a66756 508 6a66761-6a66768 506->508 509 6a66758-6a6675e 506->509 510 6a66773-6a66812 CreateWindowExW 508->510 511 6a6676a-6a66770 508->511 509->508 514 6a66814-6a6681a 510->514 515 6a6681b-6a66853 510->515 511->510 514->515 519 6a66855-6a66858 515->519 520 6a66860 515->520 519->520 521 6a66861 520->521 521->521
                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06A66802
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4625106985.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_6a60000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: 33e977b8bd5019a8cec1d500a50cdf4914b2a5d6eeb78b6edf60ba29c1f9915e
                                      • Instruction ID: 81e7b46da3412e1ed87129f3ded46faf8f546f3db541b4563f6e29f91f969701
                                      • Opcode Fuzzy Hash: 33e977b8bd5019a8cec1d500a50cdf4914b2a5d6eeb78b6edf60ba29c1f9915e
                                      • Instruction Fuzzy Hash: 2451D3B1D00349DFDB14DFAAC984ADEBFB5BF48310F24912AE819AB210D7749845CF91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 522 6a63bbc-6a68e7c 525 6a68e82-6a68e87 522->525 526 6a68f2c-6a68f4c call 6a63a94 522->526 527 6a68eda-6a68f12 CallWindowProcW 525->527 528 6a68e89-6a68ec0 525->528 533 6a68f4f-6a68f5c 526->533 531 6a68f14-6a68f1a 527->531 532 6a68f1b-6a68f2a 527->532 535 6a68ec2-6a68ec8 528->535 536 6a68ec9-6a68ed8 528->536 531->532 532->533 535->536 536->533
                                      APIs
                                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 06A68F01
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4625106985.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_6a60000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: CallProcWindow
                                      • String ID:
                                      • API String ID: 2714655100-0
                                      • Opcode ID: 6a3aab2d13d7773c94a4a3201edfd44ca1ca08350b74b71aed031eb9c91078ee
                                      • Instruction ID: df7380b824fa31e411e0833c2ab4b874d701239992927c0af4aa0e6f6f46e97d
                                      • Opcode Fuzzy Hash: 6a3aab2d13d7773c94a4a3201edfd44ca1ca08350b74b71aed031eb9c91078ee
                                      • Instruction Fuzzy Hash: 45414EB4900309CFDB54DF5AC448A9ABBF9FF88314F14C459E519AB321D774A841CFA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 539 10ab558-10ab55f 541 10ab560-10ab5f4 DuplicateHandle 539->541 542 10ab5fd-10ab61a 541->542 543 10ab5f6-10ab5fc 541->543 543->542
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,010AB526,?,?,?,?,?), ref: 010AB5E7
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4600579700.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_10a0000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 866aa27a4b11b37656171577327ac56815b758273cbb62a440980a5359aafb9f
                                      • Instruction ID: f74ea1a734e0165a3b3e36bd76f36a076fea1a0b09155d2dd88ba018be2c6a9e
                                      • Opcode Fuzzy Hash: 866aa27a4b11b37656171577327ac56815b758273cbb62a440980a5359aafb9f
                                      • Instruction Fuzzy Hash: DE21D4B5900209DFDB10CFAAD984AEEBFF4EB48314F54841AE954A3350D374AA55CFA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 546 10aaef4-10ab5f4 DuplicateHandle 548 10ab5fd-10ab61a 546->548 549 10ab5f6-10ab5fc 546->549 549->548
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,010AB526,?,?,?,?,?), ref: 010AB5E7
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4600579700.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_10a0000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 990b4277503f8da3ec2405b9604c0b0203029d79246a3a050167c74e6f82aeeb
                                      • Instruction ID: 122fb41eb406004eeb051cb8380658a3f7da4ec7c0fa9e113e8efadb6f2a6339
                                      • Opcode Fuzzy Hash: 990b4277503f8da3ec2405b9604c0b0203029d79246a3a050167c74e6f82aeeb
                                      • Instruction Fuzzy Hash: 3421D2B59002099FDB10CFAAD984AEEBBF4EB48320F54841AE954A3250D378A950CFA4

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 552 10a61d8-10a622a 554 10a622c 552->554 555 10a6236-10a6268 SetWindowsHookExW 552->555 558 10a6234 554->558 556 10a626a-10a6270 555->556 557 10a6271-10a6296 555->557 556->557 558->555
                                      APIs
                                      • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 010A625B
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4600579700.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_10a0000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: HookWindows
                                      • String ID:
                                      • API String ID: 2559412058-0
                                      • Opcode ID: 70cce8548788d86fd69681a13688fd71089f6545961c24f7441cb597bdb5db85
                                      • Instruction ID: 9b6702282012177470f0b279fdbceccd2f2a91fbac1d5367e31224f4e85c1b2a
                                      • Opcode Fuzzy Hash: 70cce8548788d86fd69681a13688fd71089f6545961c24f7441cb597bdb5db85
                                      • Instruction Fuzzy Hash: FA2134B5D002098FDB14CFA9C944BEEBBF4BF88320F14842AD559A7250D779A945CFA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 562 10a61e0-10a622a 564 10a622c 562->564 565 10a6236-10a6268 SetWindowsHookExW 562->565 568 10a6234 564->568 566 10a626a-10a6270 565->566 567 10a6271-10a6296 565->567 566->567 568->565
                                      APIs
                                      • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 010A625B
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4600579700.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_10a0000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: HookWindows
                                      • String ID:
                                      • API String ID: 2559412058-0
                                      • Opcode ID: 6d49d9ad4e760c5a80709ed50271f136bc2cc7648e54ab102d39573de81f507c
                                      • Instruction ID: a74a59cea3605eb37356560f6f097afef31bbae86df7acf4cceff95843c68068
                                      • Opcode Fuzzy Hash: 6d49d9ad4e760c5a80709ed50271f136bc2cc7648e54ab102d39573de81f507c
                                      • Instruction Fuzzy Hash: 0F212771D002098FDB14CFAAC944BDEFBF5BF88320F148429E559A7250D779A940CFA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 580 6a6a5b0-6a6bfd5 PeekMessageW 582 6a6bfd7-6a6bfdd 580->582 583 6a6bfde-6a6bfff 580->583 582->583
                                      APIs
                                      • PeekMessageW.USER32(?,?,00000000,00000000,00000000,?,?,?,?,06A6BB7A,00000000,00000000,03EDF0F8,02E675A0), ref: 06A6BFC8
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4625106985.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_6a60000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: MessagePeek
                                      • String ID:
                                      • API String ID: 2222842502-0
                                      • Opcode ID: 5090167f72cb5550e462025eb11e71514c55a9db82534cca03b146e29e94a652
                                      • Instruction ID: 54ee0de89decdd8944e5d15cba754b61496d36f6925722d225cf22b0058480f8
                                      • Opcode Fuzzy Hash: 5090167f72cb5550e462025eb11e71514c55a9db82534cca03b146e29e94a652
                                      • Instruction Fuzzy Hash: 5C1117B580424D9FDB10DF9AC944BDEBBF8EF48320F108429E914A3250D378A954CFA5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 572 6a638f8-6a649a8 574 6a649b0-6a649df LoadLibraryExW 572->574 575 6a649aa-6a649ad 572->575 576 6a649e1-6a649e7 574->576 577 6a649e8-6a64a05 574->577 575->574 576->577
                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,06A647C1,00000800,00000000,00000000), ref: 06A649D2
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4625106985.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_6a60000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: 0d895c14703b4cafd8624cfcf533f667eb15970dcec7d295a88f3d5c7c212445
                                      • Instruction ID: fe07525e1a672125f08b5cc4f2561cd6e6a092c739135bbc3a5648fc8998c3b0
                                      • Opcode Fuzzy Hash: 0d895c14703b4cafd8624cfcf533f667eb15970dcec7d295a88f3d5c7c212445
                                      • Instruction Fuzzy Hash: E01129B6C043098FDB10DF9AD544BDEFBF4EB88314F10841AE515A7200C375A545CFA4

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 585 6ba10d8-6ba1c74 GlobalMemoryStatusEx 588 6ba1c7d-6ba1ca5 585->588 589 6ba1c76-6ba1c7c 585->589 589->588
                                      APIs
                                      • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,06BA1B7A), ref: 06BA1C67
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4625506390.0000000006BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_6ba0000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: GlobalMemoryStatus
                                      • String ID:
                                      • API String ID: 1890195054-0
                                      • Opcode ID: 32167802d9967b456662a3a3523c3b629791dfce1e8f75d04e4754e904d37e1b
                                      • Instruction ID: 2eb2247176ecc6dc9298fbfe733ef0436871ddbc7ea365eb7c96d359502f9b41
                                      • Opcode Fuzzy Hash: 32167802d9967b456662a3a3523c3b629791dfce1e8f75d04e4754e904d37e1b
                                      • Instruction Fuzzy Hash: 821136B1C046599FCB50CF9AC544B9EFBF4EF48620F10816AE518A7240E3B8A950CFA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 592 6a6bf5a-6a6bfd5 PeekMessageW 593 6a6bfd7-6a6bfdd 592->593 594 6a6bfde-6a6bfff 592->594 593->594
                                      APIs
                                      • PeekMessageW.USER32(?,?,00000000,00000000,00000000,?,?,?,?,06A6BB7A,00000000,00000000,03EDF0F8,02E675A0), ref: 06A6BFC8
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4625106985.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_6a60000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: MessagePeek
                                      • String ID:
                                      • API String ID: 2222842502-0
                                      • Opcode ID: 880967342f551f308f921bf74bb18563cf7342fe58d08ef828dde69cf32b4508
                                      • Instruction ID: 6a6a01faf3965887a44e026575b97b7a821658a2a700553f208cc7012d52942e
                                      • Opcode Fuzzy Hash: 880967342f551f308f921bf74bb18563cf7342fe58d08ef828dde69cf32b4508
                                      • Instruction Fuzzy Hash: 441112B6C00209DFDB10CF9AC944BDEBBF4EB48320F10842AE958A3250C378A654CFA5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 596 6a64961-6a649a8 597 6a649b0-6a649df LoadLibraryExW 596->597 598 6a649aa-6a649ad 596->598 599 6a649e1-6a649e7 597->599 600 6a649e8-6a64a05 597->600 598->597 599->600
                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,06A647C1,00000800,00000000,00000000), ref: 06A649D2
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4625106985.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_6a60000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: a05c6e122bc0bf263febaa0fe9e5e2a5d2b8a12d2fb84692b47b05ddabc4b6a0
                                      • Instruction ID: 72ccb4ed2b669df872588bf931efb58cac0e812bcda0ea7ee44af2b60259c489
                                      • Opcode Fuzzy Hash: a05c6e122bc0bf263febaa0fe9e5e2a5d2b8a12d2fb84692b47b05ddabc4b6a0
                                      • Instruction Fuzzy Hash: AE11F3B6D002498FDB20CF9AD644ADFFBF5EB88324F14841AE559A7200C7B9A545CFA0
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,06A6450C), ref: 06A64746
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4625106985.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_6a60000_r10072024085940.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 71534e5cacb82cac18fe033ee6d06ff8934888ef58afdf83e3998a5a533e9b3f
                                      • Instruction ID: ff462a51f5e9a01f25961b1ab25f62e77a9b3f95e2a10aff49c875bf275bf105
                                      • Opcode Fuzzy Hash: 71534e5cacb82cac18fe033ee6d06ff8934888ef58afdf83e3998a5a533e9b3f
                                      • Instruction Fuzzy Hash: E41134B5C003498FCB10DF9AC444B9EFBF4EB89320F11841AE918B7200D379A545CFA5
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4599266056.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_105d000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8384450ae69271b279395fd1c62bd982c4fb7dafe6b2b1b468efd95485f6ab6b
                                      • Instruction ID: 2f2c671beef80502fe1064302ef0f2fb2739e736d58a6c75e3b2632f15cd255e
                                      • Opcode Fuzzy Hash: 8384450ae69271b279395fd1c62bd982c4fb7dafe6b2b1b468efd95485f6ab6b
                                      • Instruction Fuzzy Hash: CD212275504204EFDB85DF94D9C0B2BBBA1FB88314F20C5AEDD4A4B252C77AD846CB61
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4599266056.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_105d000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a707b937700c2b64273addff48503fa418eef1eb2c2ccd12293a3fe437292c6b
                                      • Instruction ID: e0cd17766305a17d51e3c87e6617a4e6cbe36e4ff01cd522fbc90456e82156d4
                                      • Opcode Fuzzy Hash: a707b937700c2b64273addff48503fa418eef1eb2c2ccd12293a3fe437292c6b
                                      • Instruction Fuzzy Hash: 37210071604300DFDB54DF64C580B2ABBA5EB84354F20C6AEED894B252C376C846CB62
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4599266056.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_105d000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dfbb8fc0d18f7425a81a52b837011f0f30b83f8d8aa86df4d86338406fddaddf
                                      • Instruction ID: 542aac6a7b98935646c80b316a2146657ae47d0b7a1f71c21e9ad8d133dc05e8
                                      • Opcode Fuzzy Hash: dfbb8fc0d18f7425a81a52b837011f0f30b83f8d8aa86df4d86338406fddaddf
                                      • Instruction Fuzzy Hash: 002193755093808FDB57CF24C990715BFB1EB45214F28C5EBD8898B6A3C33AD84ACB62
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4599266056.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_105d000_r10072024085940.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                      • Instruction ID: f7d8685e71a352b99f0417209db2de5fe59ae9fb7353ce1d98a5865c96bf9d0d
                                      • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                      • Instruction Fuzzy Hash: 9511DD75504284DFDB46CF54D9C4B16BFB2FB84314F24C6AADC494B266C33AD44ACBA1

                                      Execution Graph

                                      Execution Coverage:6%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:0%
                                      Total number of Nodes:3
                                      Total number of Limit Nodes:0
                                      execution_graph 24321 80b6828 24322 80b686b SetThreadToken 24321->24322 24323 80b6899 24322->24323

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 467 40bb490-40bb4a9 468 40bb4ab 467->468 469 40bb4ae-40bb7f5 call 40bacbc 467->469 468->469
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: {Yn^$Yn^
                                      • API String ID: 0-3084620983
                                      • Opcode ID: fb7fb471f890cfa73ff83121947808003ebe3c63081e94756154313b7a444282
                                      • Instruction ID: c61a3ce7608465b1638b8b4c6088e8042eeb2813c7e1a4b4c3311c53e7f459ed
                                      • Opcode Fuzzy Hash: fb7fb471f890cfa73ff83121947808003ebe3c63081e94756154313b7a444282
                                      • Instruction Fuzzy Hash: 2E915071F117599BEB19DBB58810AAE7BB3EFC4700B40C91DD506AB380DF74AA058BC9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2207498234.0000000006F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_6f40000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: p5{k$piSk$piSk$piSk$piSk$piSk$|,Uk$#{k$${k
                                      • API String ID: 0-2230282645
                                      • Opcode ID: c8dbe74d3694ace821de81e5f3d644417a76c8d96a9d2601dba050b9c4ff6461
                                      • Instruction ID: 3b18f6cd614db9a441c94e53061cbac09ac8ada94b34de541a071ae33d04eadd
                                      • Opcode Fuzzy Hash: c8dbe74d3694ace821de81e5f3d644417a76c8d96a9d2601dba050b9c4ff6461
                                      • Instruction Fuzzy Hash: C0B25832F04205DFDB65AB7988017AABFE1AFC5210F1484BAE505DBB52DF31CA45C7A2

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 531 80b6820-80b6863 533 80b686b-80b6897 SetThreadToken 531->533 534 80b6899-80b689f 533->534 535 80b68a0-80b68bd 533->535 534->535
                                      APIs
                                      • SetThreadToken.KERNELBASE(?,00000007), ref: 080B688A
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2210058139.00000000080B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_80b0000_powershell.jbxd
                                      Similarity
                                      • API ID: ThreadToken
                                      • String ID:
                                      • API String ID: 3254676861-0
                                      • Opcode ID: 4e781fa179dd538a71c0f309302248d7833b175421a24d0fdf784c986fcb0d57
                                      • Instruction ID: 89c8948d9545af62c0aa554585ebbe7124ff0bd5f5877e12176d5d7d61479e06
                                      • Opcode Fuzzy Hash: 4e781fa179dd538a71c0f309302248d7833b175421a24d0fdf784c986fcb0d57
                                      • Instruction Fuzzy Hash: B51134B59006098FCB20CF9AD884BDEFBF4AB48224F14851AD518A7750D7B5A944CFA5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 538 80b6828-80b6897 SetThreadToken 540 80b6899-80b689f 538->540 541 80b68a0-80b68bd 538->541 540->541
                                      APIs
                                      • SetThreadToken.KERNELBASE(?,00000007), ref: 080B688A
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2210058139.00000000080B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_80b0000_powershell.jbxd
                                      Similarity
                                      • API ID: ThreadToken
                                      • String ID:
                                      • API String ID: 3254676861-0
                                      • Opcode ID: a20f89619c49dccfd1cb82a3970617110e0b8f0fc1156fd70918d14e16188e65
                                      • Instruction ID: 015b3ff9f6d2a2eac9406d529725c160751ca847fd8dd0f17db4b66526739226
                                      • Opcode Fuzzy Hash: a20f89619c49dccfd1cb82a3970617110e0b8f0fc1156fd70918d14e16188e65
                                      • Instruction Fuzzy Hash: 661125B19002098FCB10CF9AC884BDEFBF8AF48324F24841AD518A3310D7B5A944CFA5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 544 40be5b9-40be5c0 545 40be622-40be630 544->545 546 40be5c2-40be602 544->546 547 40be693-40be6b6 545->547 548 40be632-40be689 545->548 558 40be73a-40be753 547->558 559 40be6bc-40be6d3 547->559 548->547 563 40be75e 558->563 564 40be755 558->564 574 40be6d5 call 40be7b8 559->574 575 40be6d5 call 40beb06 559->575 576 40be6d5 call 40be774 559->576 566 40be75f 563->566 564->563 565 40be6db-40be738 565->558 565->559 566->566 574->565 575->565 576->565
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: piSk
                                      • API String ID: 0-1183529320
                                      • Opcode ID: 5b8602147c9a5a248d20f29da8d08d662a4eabaae7311b0938c566f565464efd
                                      • Instruction ID: d04ba1c2742a8b20a63e59f8522dc175fe5a43b1f33482f15f3850eb7ed723dd
                                      • Opcode Fuzzy Hash: 5b8602147c9a5a248d20f29da8d08d662a4eabaae7311b0938c566f565464efd
                                      • Instruction Fuzzy Hash: 95416671E0020AAFCB15EF78D894ADDBBF2EF89304F1485ADD445AB390DB34A905CB95

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 577 40be610-40be630 579 40be693-40be6b6 577->579 580 40be632-40be689 577->580 587 40be73a-40be753 579->587 588 40be6bc-40be6d3 579->588 580->579 591 40be75e 587->591 592 40be755 587->592 602 40be6d5 call 40be7b8 588->602 603 40be6d5 call 40beb06 588->603 604 40be6d5 call 40be774 588->604 594 40be75f 591->594 592->591 593 40be6db-40be738 593->587 593->588 594->594 602->593 603->593 604->593
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: piSk
                                      • API String ID: 0-1183529320
                                      • Opcode ID: 2c9b5eb8f514e2624ea21b4bff14b1621c818392e37788c02570a1f93cece079
                                      • Instruction ID: 39b3747a9d63b0dfbaf9bcf63d725e2957aca8dae8a9fc6640ea49038ecc4574
                                      • Opcode Fuzzy Hash: 2c9b5eb8f514e2624ea21b4bff14b1621c818392e37788c02570a1f93cece079
                                      • Instruction Fuzzy Hash: 6D418871A0020AAFCB15DF68D494ADEBBF2AF89304F148568D446AB391DB34AD05CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 626 40be640-40be6b6 633 40be73a-40be753 626->633 634 40be6bc-40be6d3 626->634 637 40be75e 633->637 638 40be755 633->638 648 40be6d5 call 40be7b8 634->648 649 40be6d5 call 40beb06 634->649 650 40be6d5 call 40be774 634->650 640 40be75f 637->640 638->637 639 40be6db-40be738 639->633 639->634 640->640 648->639 649->639 650->639
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: piSk
                                      • API String ID: 0-1183529320
                                      • Opcode ID: d3fb013a8cddae4426f062f20dee544777541bbe95e2e98bb44161e3e13284f0
                                      • Instruction ID: 5a279e7b07dc87f026b17cdedf006afb5002f908386e7f55644c58f2ba328f17
                                      • Opcode Fuzzy Hash: d3fb013a8cddae4426f062f20dee544777541bbe95e2e98bb44161e3e13284f0
                                      • Instruction Fuzzy Hash: C3314631A0020ADFCB14EF69D594A9EBBF2FF88304F108528D416AB390DB34AD05CBD4

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 651 40bdcd9-40bdcdc 652 40bdcde-40bdce0 651->652 653 40bdd34-40bdd37 651->653 654 40bdd39-40bdd6c 652->654 655 40bdce2-40bdce5 652->655 656 40bde30-40bde36 653->656 654->656 666 40bddfe 654->666 657 40bdc9c-40bdcad 655->657 658 40bdce7-40bdd08 655->658 664 40bdcaf 657->664 665 40bdcb6-40bdcc8 657->665 662 40bdd0d 658->662 673 40bdd0b call 40bde38 658->673 674 40bdd0b call 40bde48 658->674 675 40bdd0b call 80b6a7f 658->675 676 40bdd0b call 80b6a90 658->676 662->666 664->665 670 40bdcca call 40bdcd9 665->670 671 40bdcca call 40bdc88 665->671 672 40bdcca call 40bdce8 665->672 666->656 669 40bdcd0-40bdcd3 670->669 671->669 672->669 673->662 674->662 675->662 676->662
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: +/n^
                                      • API String ID: 0-2444456302
                                      • Opcode ID: 05ffac7f5a9a04a4350dba075da163c0844bf8b6cac7adc5d0400cff2d4d2b62
                                      • Instruction ID: 3516fce3c564438b0732a20df4623d527a9d361c5fa49f18cbe27bdcfa6bb73f
                                      • Opcode Fuzzy Hash: 05ffac7f5a9a04a4350dba075da163c0844bf8b6cac7adc5d0400cff2d4d2b62
                                      • Instruction Fuzzy Hash: 0111D635B001049BCB16DB68E8145EDFBE6DFC8221B14846ED496E7351DE75AC028BE9

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 677 40bdc88-40bdc94 678 40bdd0d-40bde36 677->678 679 40bdc96-40bdcad 677->679 685 40bdcaf 679->685 686 40bdcb6-40bdcc8 679->686 685->686 689 40bdcca call 40bdcd9 686->689 690 40bdcca call 40bdc88 686->690 691 40bdcca call 40bdce8 686->691 688 40bdcd0-40bdcd3 689->688 690->688 691->688
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: +/n^
                                      • API String ID: 0-2444456302
                                      • Opcode ID: 82ffb303696b51f17cb02923a2ab3851a3a0349f71a1bda8abc5b0b3f916618b
                                      • Instruction ID: 40e390441b4fb95226e1ab36ae5c76623410f7ca91ba7a76ae0c5f9043bc3d34
                                      • Opcode Fuzzy Hash: 82ffb303696b51f17cb02923a2ab3851a3a0349f71a1bda8abc5b0b3f916618b
                                      • Instruction Fuzzy Hash: B1F027717152146B87166B5DE8108EFBBEEDEC6271300406BE1C9DB300EE69A90447FA

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 692 40bdc98-40bdcad 695 40bdcaf 692->695 696 40bdcb6 692->696 695->696 697 40bdcbe-40bdcc8 696->697 699 40bdcca call 40bdcd9 697->699 700 40bdcca call 40bdc88 697->700 701 40bdcca call 40bdce8 697->701 698 40bdcd0-40bdcd3 699->698 700->698 701->698
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: +/n^
                                      • API String ID: 0-2444456302
                                      • Opcode ID: 2dcd08363f88b7d61b59cc869c2449630b597a4cd18fdcd07957fa8b9746ffe3
                                      • Instruction ID: 11efd41df4185c18a4c8a38d6867106c2e4407a78ba07244558167622e1d2027
                                      • Opcode Fuzzy Hash: 2dcd08363f88b7d61b59cc869c2449630b597a4cd18fdcd07957fa8b9746ffe3
                                      • Instruction Fuzzy Hash: 75E0C231700615578216A72EE8108DFBBEBDFC4671310802EE149D7340EEA8EC0147E9

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 702 6f43ce8-6f43d0d 703 6f43f00-6f43f09 702->703 704 6f43d13-6f43d18 702->704 712 6f43f73-6f43f79 703->712 713 6f43f0b-6f43f1d 703->713 705 6f43d30-6f43d34 704->705 706 6f43d1a-6f43d20 704->706 710 6f43eb0-6f43eba 705->710 711 6f43d3a-6f43d3c 705->711 708 6f43d24-6f43d2e 706->708 709 6f43d22 706->709 708->705 709->705 714 6f43ebc-6f43ec5 710->714 715 6f43ec8-6f43ece 710->715 716 6f43d4c 711->716 717 6f43d3e-6f43d4a 711->717 724 6f43f89 712->724 725 6f43f7b-6f43f87 712->725 718 6f43ee0 713->718 719 6f43f1f-6f43f4a 713->719 720 6f43ed4-6f43ed6 715->720 721 6f43ed0-6f43ed2 715->721 723 6f43d4e-6f43d50 716->723 717->723 728 6f43ee2-6f43efd 718->728 726 6f43f50-6f43f55 719->726 727 6f440ce-6f440d5 719->727 720->718 721->728 723->710 729 6f43d56-6f43d75 723->729 730 6f43f8b-6f43f8d 724->730 725->730 731 6f43f57-6f43f5d 726->731 732 6f43f6d-6f43f71 726->732 743 6f440d7-6f44112 727->743 744 6f4413f-6f44141 727->744 756 6f43d85 729->756 757 6f43d77-6f43d83 729->757 733 6f44080-6f4408a 730->733 734 6f43f93-6f43fb2 730->734 735 6f43f61-6f43f6b 731->735 736 6f43f5f 731->736 732->712 732->733 739 6f44097-6f4409d 733->739 740 6f4408c-6f44094 733->740 763 6f43fb4-6f43fc0 734->763 764 6f43fc2 734->764 735->732 736->732 745 6f440a3-6f440af 739->745 746 6f4409f-6f440a1 739->746 749 6f44228-6f44231 743->749 750 6f44118-6f4411d 743->750 751 6f44151 744->751 752 6f44143-6f4414f 744->752 754 6f440b1-6f440cb 745->754 746->754 777 6f44233-6f4425d 749->777 778 6f4429b-6f4429c 749->778 760 6f44135-6f44139 750->760 761 6f4411f-6f44125 750->761 759 6f44153-6f44155 751->759 752->759 762 6f43d87-6f43d89 756->762 757->762 768 6f441da-6f441e4 759->768 770 6f4415b-6f4415d 759->770 760->744 760->768 766 6f44127 761->766 767 6f44129-6f44133 761->767 762->710 775 6f43d8f-6f43d96 762->775 776 6f43fc4-6f43fc6 763->776 764->776 766->760 767->760 773 6f441e6-6f441ee 768->773 774 6f441f1-6f441f7 768->774 771 6f44177-6f4417e 770->771 772 6f4415f-6f44165 770->772 783 6f44196-6f441d7 771->783 784 6f44180-6f44186 771->784 781 6f44167 772->781 782 6f44169-6f44175 772->782 785 6f441fd-6f44209 774->785 786 6f441f9-6f441fb 774->786 775->703 787 6f43d9c-6f43da1 775->787 776->733 789 6f43fcc-6f44003 776->789 779 6f4425f-6f44281 777->779 780 6f4428b-6f44295 777->780 817 6f442d5-6f442fe 779->817 818 6f44283-6f44288 779->818 797 6f44297-6f4429a 780->797 798 6f4429f-6f442a5 780->798 781->771 782->771 791 6f44188 784->791 792 6f4418a-6f44194 784->792 793 6f4420b-6f44225 785->793 786->793 795 6f43da3-6f43da9 787->795 796 6f43db9-6f43dc8 787->796 824 6f44005-6f4400b 789->824 825 6f4401d-6f44024 789->825 791->783 792->783 801 6f43dad-6f43db7 795->801 802 6f43dab 795->802 796->710 815 6f43dce-6f43dec 796->815 797->778 805 6f442a7-6f442a9 798->805 806 6f442ab-6f442b7 798->806 801->796 802->796 808 6f442b9-6f442d2 805->808 806->808 815->710 831 6f43df2-6f43e17 815->831 837 6f44300-6f44326 817->837 838 6f4432d-6f4435c 817->838 829 6f4400d 824->829 830 6f4400f-6f4401b 824->830 827 6f44026-6f4402c 825->827 828 6f4403c-6f4407d 825->828 832 6f44030-6f4403a 827->832 833 6f4402e 827->833 829->825 830->825 831->710 848 6f43e1d-6f43e24 831->848 832->828 833->828 837->838 843 6f44395-6f4439f 838->843 844 6f4435e-6f4437b 838->844 846 6f443a1-6f443a5 843->846 847 6f443a8-6f443ae 843->847 855 6f443e5-6f443ea 844->855 856 6f4437d-6f4438f 844->856 851 6f443b4-6f443c0 847->851 852 6f443b0-6f443b2 847->852 853 6f43e26-6f43e41 848->853 854 6f43e6a-6f43e9d 848->854 857 6f443c2-6f443e2 851->857 852->857 862 6f43e43-6f43e49 853->862 863 6f43e5b-6f43e5f 853->863 871 6f43ea4-6f43ead 854->871 855->856 856->843 866 6f43e4d-6f43e59 862->866 867 6f43e4b 862->867 869 6f43e66-6f43e68 863->869 866->863 867->863 869->871
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2207498234.0000000006F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_6f40000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ca626d88bd95f5eebc9addc862ca73930def1c37b1f3e7e2ada7735e0a88a4e4
                                      • Instruction ID: a45162d9ae22b2ad752ab2fe50873a74d0a92a474a004d2e63639a15222a0379
                                      • Opcode Fuzzy Hash: ca626d88bd95f5eebc9addc862ca73930def1c37b1f3e7e2ada7735e0a88a4e4
                                      • Instruction Fuzzy Hash: 8E125832F00215CFDB65AB69891076ABFE2DFC1610F14846BD505EBB92DB32CC45C7A2

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 876 40be7b8-40be7d8 877 40be7da-40be7dc 876->877 878 40be7e1-40be7ee 876->878 879 40beb41-40beb48 877->879 881 40be7f0-40be801 878->881 883 40be803-40be825 call 40b014c 881->883 888 40be82b 883->888 889 40be988-40be99f 883->889 890 40be82d-40be83e 888->890 897 40bea7b-40bea87 889->897 898 40be9a5 889->898 893 40be840-40be842 890->893 895 40be85c-40be8e5 893->895 896 40be844-40be84a 893->896 924 40be8ec-40be921 895->924 925 40be8e7 895->925 899 40be84e-40be85a 896->899 900 40be84c 896->900 904 40beb39 897->904 905 40bea8d-40beaa4 897->905 901 40be9a7-40be9b8 898->901 899->895 900->895 908 40be9ba-40be9bc 901->908 904->879 905->904 918 40beaaa 905->918 911 40be9be-40be9c4 908->911 912 40be9d6-40bea0e 908->912 913 40be9c8-40be9d4 911->913 914 40be9c6 911->914 928 40bea10 912->928 929 40bea15-40bea4a 912->929 913->912 914->912 922 40beaac-40beabd 918->922 930 40beabf-40beac1 922->930 943 40be92b 924->943 944 40be923 924->944 925->924 928->929 946 40bea4c 929->946 947 40bea54 929->947 932 40beadb-40beb09 930->932 933 40beac3-40beac9 930->933 950 40beb0b-40beb16 932->950 951 40beb35-40beb37 932->951 935 40beacb 933->935 936 40beacd-40bead9 933->936 935->932 936->932 943->889 944->943 946->947 947->897 956 40beb19 call 40be7b8 950->956 957 40beb19 call 40be92e 950->957 958 40beb19 call 40bea57 950->958 959 40beb19 call 40beb06 950->959 960 40beb19 call 40be774 950->960 951->879 953 40beb1f-40beb33 953->950 953->951 956->953 957->953 958->953 959->953 960->953
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 750b403832dc36b669980005e4574c9a5ffc2a5d84c0b10dd1a9db976445000a
                                      • Instruction ID: 159bf1c6c3d8909be9cee8da39d7ca2847eee572517d0e2cf62799f7951d8567
                                      • Opcode Fuzzy Hash: 750b403832dc36b669980005e4574c9a5ffc2a5d84c0b10dd1a9db976445000a
                                      • Instruction Fuzzy Hash: 67915870B10214CFCB54DF78C594AAEBBE6AF88710B14806AE946EB351EF74AC01CBD5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 961 40b29f0-40b2a1e 962 40b2af5-40b2b37 961->962 963 40b2a24-40b2a3a 961->963 968 40b2b3d-40b2b56 962->968 969 40b2c51-40b2c61 962->969 964 40b2a3f-40b2a52 963->964 965 40b2a3c 963->965 964->962 970 40b2a58-40b2a65 964->970 965->964 971 40b2b5b-40b2b69 968->971 972 40b2b58 968->972 974 40b2a6a-40b2a7c 970->974 975 40b2a67 970->975 971->969 978 40b2b6f-40b2b79 971->978 972->971 974->962 981 40b2a7e-40b2a88 974->981 975->974 979 40b2b7b-40b2b7d 978->979 980 40b2b87-40b2b94 978->980 979->980 980->969 984 40b2b9a-40b2baa 980->984 982 40b2a8a-40b2a8c 981->982 983 40b2a96-40b2aa6 981->983 982->983 983->962 985 40b2aa8-40b2ab2 983->985 986 40b2baf-40b2bbd 984->986 987 40b2bac 984->987 988 40b2ac0-40b2af4 985->988 989 40b2ab4-40b2ab6 985->989 986->969 992 40b2bc3-40b2bd3 986->992 987->986 989->988 993 40b2bd8-40b2be5 992->993 994 40b2bd5 992->994 993->969 997 40b2be7-40b2bf1 993->997 994->993 998 40b2bf7 997->998 999 40b2bf9 998->999 1000 40b2bfc-40b2c08 998->1000 999->1000 1000->969 1002 40b2c0a-40b2c18 1000->1002 1004 40b2c1a-40b2c24 1002->1004 1005 40b2bf2-40b2bf5 1002->1005 1006 40b2c29 1004->1006 1007 40b2c26 1004->1007 1005->998 1008 40b2c2e-40b2c38 1006->1008 1007->1006 1009 40b2c3d-40b2c50 1008->1009
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8f042046f1ddfe9b8366b0b15bb20c222b171c80ec597848b756d988156edc5a
                                      • Instruction ID: 1908b9526f199459c7fc9890f41046e79c0451a6d125e8d13fefdda8e2f0d4fe
                                      • Opcode Fuzzy Hash: 8f042046f1ddfe9b8366b0b15bb20c222b171c80ec597848b756d988156edc5a
                                      • Instruction Fuzzy Hash: C591AA74A00209CFCB05CF58C498AAEFBB1FF89310B2486A9D955AB364C735FC41CBA4
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fea1ff62158359058e919e95833537dae8e5737eff1a0510f6c655e301049528
                                      • Instruction ID: f060617e7193b1da0b69cd326c477e85eb829f6d2e36b95342a38d224e6a6e9b
                                      • Opcode Fuzzy Hash: fea1ff62158359058e919e95833537dae8e5737eff1a0510f6c655e301049528
                                      • Instruction Fuzzy Hash: 6951D1303042059FD705DBB9D854AAE77E6FFC8314B1584AAD989DB392EB31EC01CBA0
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f725c133fc41125d41582514db49e543caf34da36b3629486d7e4c98ab809135
                                      • Instruction ID: 00051bd5df13ebf462f259569959a56a709b38fa4026088d94214dc3e66ef9e1
                                      • Opcode Fuzzy Hash: f725c133fc41125d41582514db49e543caf34da36b3629486d7e4c98ab809135
                                      • Instruction Fuzzy Hash: EB612271E00248DFDB55DFA9C584BCDBBF1EF88310F24816AE818AB254EB70AD41CB94
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b96e516922823da3409e5a1c508017f0a63e0a8d61cd6be8762acb5b9af35359
                                      • Instruction ID: 9571a3fec071f0fef8ac77d972e3cc450d2e2c4362a6d4a748be6d6bb7df0ccc
                                      • Opcode Fuzzy Hash: b96e516922823da3409e5a1c508017f0a63e0a8d61cd6be8762acb5b9af35359
                                      • Instruction Fuzzy Hash: B8514371E00248DFDB55CFA9C484BCDBBF2EF88310F14806AE819AB354EB70A941CB95
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e8c87f0995aaa5db45d2f052976fcb4203ed0824b7c4b596e110bdf4d42d1a3c
                                      • Instruction ID: 64f515ee48b19a7ea60b9d3414cf03fc6b649ea51f0c7286352990da90280764
                                      • Opcode Fuzzy Hash: e8c87f0995aaa5db45d2f052976fcb4203ed0824b7c4b596e110bdf4d42d1a3c
                                      • Instruction Fuzzy Hash: C4515EB4700205CFDB14EF6CC4849AABBE6EF99310B5484A9E649DF391EB34EC018BD1
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2207498234.0000000006F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_6f40000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cb50bf4dde87dd38e34b746f237cee36fff75470457a5efcb23f5a7c37579203
                                      • Instruction ID: 978e1a5a4e4ffac92c399f1ebec5f5b535d4a11886233cec930683e2f1f90b90
                                      • Opcode Fuzzy Hash: cb50bf4dde87dd38e34b746f237cee36fff75470457a5efcb23f5a7c37579203
                                      • Instruction Fuzzy Hash: C3414B32E01302CFDB65AB2A8641766BFB39FC1650B1448A5E8009FB92C731DC49C7A2
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a96b4db2d46794dd071ccb7df8807d9e8db6b6381dfd0d611c66868378beefba
                                      • Instruction ID: 6882d0e9e49c1400787e66531d4c8a84e86e682734502650bd44a1296861114f
                                      • Opcode Fuzzy Hash: a96b4db2d46794dd071ccb7df8807d9e8db6b6381dfd0d611c66868378beefba
                                      • Instruction Fuzzy Hash: B8413CB4B00205CFDB14EF6CC5949AABBE6EFC8304B5484A9E649DB355EB34ED018BD1
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3dc2ee27f12e071a771214363ace8b13e43cc3d64d04bc6d4552dcb9f95f9530
                                      • Instruction ID: 1c8159d72aebd1fd6600d3951331feba388bf6960af5972cd32085c82fad85af
                                      • Opcode Fuzzy Hash: 3dc2ee27f12e071a771214363ace8b13e43cc3d64d04bc6d4552dcb9f95f9530
                                      • Instruction Fuzzy Hash: 72412B34B14605CFDB159FA8C4A8AAEBBF1AF89314F144099E542AB391DB31ED01CB65
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: aba8f36078cd26cb57fb38b5033184bed2888a0486d0c9ebe88dbf0997891ac1
                                      • Instruction ID: 2460094e3915ca50280f5663e879ab789e838c6283897f6dd1827336d84389ce
                                      • Opcode Fuzzy Hash: aba8f36078cd26cb57fb38b5033184bed2888a0486d0c9ebe88dbf0997891ac1
                                      • Instruction Fuzzy Hash: 64411474A00609CFCB06CF59C5989AEFBB1FF48310B2186A9D955AB364C736FC51CBA4
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b2ea2ef5d72de886c38878932fa6d2888d6fd37b45d998168d1c969fc762290a
                                      • Instruction ID: ef253ca6c84b7a0f09cd5868610414b10d73337c244874bb8959f224c8731ef5
                                      • Opcode Fuzzy Hash: b2ea2ef5d72de886c38878932fa6d2888d6fd37b45d998168d1c969fc762290a
                                      • Instruction Fuzzy Hash: A5316D313006019FE709DB78D854B9ABBA2EBC4714F048669D60ADB390DFB5A905CBD5
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2a525a09a03d31e0f6d16cc15a9a9a9638897d9c4adebbd1c0529c3bdee41a40
                                      • Instruction ID: 26df1bd333b3da294d62aaea042acf1176f0d3fd56921a649fe2660cbbfc30c3
                                      • Opcode Fuzzy Hash: 2a525a09a03d31e0f6d16cc15a9a9a9638897d9c4adebbd1c0529c3bdee41a40
                                      • Instruction Fuzzy Hash: 62310734A10605CFCB14DFA9C4A8AAABBF1EF89314F154069E842BB351DB31ED01DBA5
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 67f83f2b34d20c396b19c75e8f5ca0f0200760a73a64d365e694105a42f22f97
                                      • Instruction ID: 32097cad973e717a441eb6e187e77feb89758652b45d09b1d29858e37c143092
                                      • Opcode Fuzzy Hash: 67f83f2b34d20c396b19c75e8f5ca0f0200760a73a64d365e694105a42f22f97
                                      • Instruction Fuzzy Hash: 4C3146B0B002099BDB44DFA9D494BEEBBF6EF88314F108029E545FB350EA749C418FA5
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 61327cd03b1d32d9bdaf147a0076457b049cbd11e31f68404020f335e02c0c17
                                      • Instruction ID: 483d9cb161bc3125d1549b17d27535fd2e81fb603db207e6f8a3b671c57ce17d
                                      • Opcode Fuzzy Hash: 61327cd03b1d32d9bdaf147a0076457b049cbd11e31f68404020f335e02c0c17
                                      • Instruction Fuzzy Hash: 51315670A002099FCB04DF69D4A8A9EBBF2FF88314F148169D446EB390DB75A881CB94
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: aa8e493a98d1bc6f2a59127afd8d27068aae41ad938a875996350673f92741cc
                                      • Instruction ID: 97ddbbd2deeeb6a019950af54a549022b12e8c7092b3edfa74ff886a448742ae
                                      • Opcode Fuzzy Hash: aa8e493a98d1bc6f2a59127afd8d27068aae41ad938a875996350673f92741cc
                                      • Instruction Fuzzy Hash: 49313670B002099BDB44DFA9C494BEEBAF6AF88314F108029E405EB350EA74AC419FA5
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d28fb9bcaebfe244a20625c5ee45db2bc3ea8b38cd3d86ddad475b5be3f42bd1
                                      • Instruction ID: 24a7064402b56b7363c3e8b9dd86538a42d55d04cb71a5414159cb2b17a0fc2b
                                      • Opcode Fuzzy Hash: d28fb9bcaebfe244a20625c5ee45db2bc3ea8b38cd3d86ddad475b5be3f42bd1
                                      • Instruction Fuzzy Hash: 053184B4F002499FDB04DBB4D854AEE7BB3EFC4300F1084A9D115AB394DA74AD418FA4
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d6b4c3ae1bf15fd6ac3ce41acaeebfb33d20cb4d5ba4544b41c527be7a7c1973
                                      • Instruction ID: e19a1d55abd77b576a503222ef51cc0ab32c4e3e92ca5ac71d34fe9c30e3cb60
                                      • Opcode Fuzzy Hash: d6b4c3ae1bf15fd6ac3ce41acaeebfb33d20cb4d5ba4544b41c527be7a7c1973
                                      • Instruction Fuzzy Hash: 5321AE71A042598FCB14DFAED4407DEBBF5EB89320F14846AD148E7340CA75A905CBE5
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c3c5feaac4d16f93e7ce5f527b417dd85852c0ce66b0cff2926a5a29803e8bd2
                                      • Instruction ID: 3ed9c8b19c98c73c95b612551840f6138ee642c00c9e70c5d13a59b52bd2df37
                                      • Opcode Fuzzy Hash: c3c5feaac4d16f93e7ce5f527b417dd85852c0ce66b0cff2926a5a29803e8bd2
                                      • Instruction Fuzzy Hash: 353150B4E002099FEB04EBA4D894AEE77B3EFC4300F108469D615AB394DB75AD018FA4
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 127f1da034f77b6fa744b0cb9d61afd73473016ff1d2a11b712e04d61e72eed0
                                      • Instruction ID: 5efab6cb1516ff8c5b16d3bdd5630aed9079eb18fe332f4be565affbf0d625ea
                                      • Opcode Fuzzy Hash: 127f1da034f77b6fa744b0cb9d61afd73473016ff1d2a11b712e04d61e72eed0
                                      • Instruction Fuzzy Hash: E1312770A102099FCB14DF69D4A8A9EBBF2BF88314F148569D406EB390DF75AC81CB94
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2196661513.000000000290D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0290D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_290d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a8df42e086639213983e6c8e07fca8b4522c33e8d37e6c839915e0992d5500e2
                                      • Instruction ID: 58d78bb544c61f807aac6942f4cf212690071574290114138014a70793970919
                                      • Opcode Fuzzy Hash: a8df42e086639213983e6c8e07fca8b4522c33e8d37e6c839915e0992d5500e2
                                      • Instruction Fuzzy Hash: 43210276504304EFDB15CF10D9C4B26BBA6FB88314F24C5ADED0D0A696CB3AC556CBA1
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2196661513.000000000290D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0290D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_290d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 88a31d4cd86ba75d438940cd73531e3a3c8c51ce4a9bf2c97a50d4c2d8af7468
                                      • Instruction ID: 22bad8698df79178a64ba168a2e80060fe00af31f4d48a1fb3dfb543bccc38d7
                                      • Opcode Fuzzy Hash: 88a31d4cd86ba75d438940cd73531e3a3c8c51ce4a9bf2c97a50d4c2d8af7468
                                      • Instruction Fuzzy Hash: E6216775504208DFDB24CF10C9C0F26BB75FB84314F20C96DD90A4B682CB7AD446CA61
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 45d96dfbbf531abee405acb2b8973187eb29919c70b66922052aedbd0fa58846
                                      • Instruction ID: 0d5d1201a3b8dc50f656df8ef4fa44cafab79aa46d154c79a1f5f6db6a934c80
                                      • Opcode Fuzzy Hash: 45d96dfbbf531abee405acb2b8973187eb29919c70b66922052aedbd0fa58846
                                      • Instruction Fuzzy Hash: 3A21D1B1A057808EEB60CF79C4483D9BFE2FF8A314F28809EC59D5B245C7706046CB56
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f62672e8d263fd105e6995602e8967c2b072eb6927b4018975156e2154895678
                                      • Instruction ID: 051b3674c4ac2abce562f095e59d8f8ec26af79d9eab467b9fada5cd71bfabba
                                      • Opcode Fuzzy Hash: f62672e8d263fd105e6995602e8967c2b072eb6927b4018975156e2154895678
                                      • Instruction Fuzzy Hash: D92141B4E012499FDB04EFA4D894AEE7BB2EFC4300F1184A9D515AB395DB34AD018F54
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 76501a9f8bd488288ae1f0fe7a8a37d41c569d1beec46fba9e91bacff229830b
                                      • Instruction ID: 4286924ed2da291ed9ce6d0765d9a857024518ed747f74cb277514bc252a1b83
                                      • Opcode Fuzzy Hash: 76501a9f8bd488288ae1f0fe7a8a37d41c569d1beec46fba9e91bacff229830b
                                      • Instruction Fuzzy Hash: A0212FB4E012499FDB44DFA4C894AAEBBB2EFC8300F1184A9D515AB391DB34AD408F54
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bc3a0dcacefb6fd6bb13d053ece8a49c9e202f67f82c98c772cc61b782799986
                                      • Instruction ID: 352f388c0bf328e2a4c48075f32755ed8a80a5586612e6ec551e9e7ea8c9b375
                                      • Opcode Fuzzy Hash: bc3a0dcacefb6fd6bb13d053ece8a49c9e202f67f82c98c772cc61b782799986
                                      • Instruction Fuzzy Hash: 4A112B79B001188FCB44DBA8E850ADEB7F6EBCC321B1440A5EA09EB351DB30EC018B90
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f07411661f5d7839bea235d910f1e474b58c86d36fe5edb956f7254069157817
                                      • Instruction ID: 8357e8d6eff480079ef9a3713aff4c9e12838850523526ce68feb1c81ebf694a
                                      • Opcode Fuzzy Hash: f07411661f5d7839bea235d910f1e474b58c86d36fe5edb956f7254069157817
                                      • Instruction Fuzzy Hash: FF119AB18053499FDB10CF59C508BDEBFF4AF49710F14806AD498A7241D739A540CBA6
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4cfec1a97cf5d7435ae4d68463673b3147bde4db203d6c361f29c2e1a2644644
                                      • Instruction ID: 2cc8e4ce8bc79e8b8dce726f069f1053cb0d5a41b6dcef75dd269debbac3b361
                                      • Opcode Fuzzy Hash: 4cfec1a97cf5d7435ae4d68463673b3147bde4db203d6c361f29c2e1a2644644
                                      • Instruction Fuzzy Hash: FD11B4309093909FC703CF68C8649E9BFB0EF06314F1541CAC091AB1A2C636AC45CBA8
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2196661513.000000000290D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0290D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_290d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 226763f8ebee4a326c53d81c1b8fbc9c4432138e5169b0b621e51b23af87bf07
                                      • Instruction ID: 3cdac2b7d8cb89114ff6541602f0f77754b1dc9c665f86f9c623d3475eaccdc9
                                      • Opcode Fuzzy Hash: 226763f8ebee4a326c53d81c1b8fbc9c4432138e5169b0b621e51b23af87bf07
                                      • Instruction Fuzzy Hash: AA21AC76504244DFCB16CF10D9C4B16BF72FB88314F28C5A9DC094A6A6C33AD56ACB91
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 936c1f528d306c6dbc93f4c9c6f4a6292fb9d9a023a94fdd49c3734022d6e155
                                      • Instruction ID: 0d008b2e6cfc503f2ded9c16116f73accb1824cd4331d51df30945f5888c546f
                                      • Opcode Fuzzy Hash: 936c1f528d306c6dbc93f4c9c6f4a6292fb9d9a023a94fdd49c3734022d6e155
                                      • Instruction Fuzzy Hash: B9213BB1A057448EEBA0CF6AC0883DABBE2FB88314F28C45EC59DA7245D77464858B55
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 03b00fadbf9b7984233d1448b304b725b12d1427182a25afbd10dd0bf997c633
                                      • Instruction ID: 56cdb0c25f6420dd1fbb471a42ed49431e279365727efe6e5567693e6b807c4c
                                      • Opcode Fuzzy Hash: 03b00fadbf9b7984233d1448b304b725b12d1427182a25afbd10dd0bf997c633
                                      • Instruction Fuzzy Hash: 5001D4327043089FD751CB79E850AAFBBE9EB89225700056EE549D7740DA31AD0087E5
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2196661513.000000000290D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0290D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_290d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1baa4135a3ffa84b7eafa0616a1ffb5636ea4d9d3a95b2124a7f7c9932413226
                                      • Instruction ID: fb46f38d31f310b6574ae7d64817a54b77d6103ab7c57faf7bdd079809efac40
                                      • Opcode Fuzzy Hash: 1baa4135a3ffa84b7eafa0616a1ffb5636ea4d9d3a95b2124a7f7c9932413226
                                      • Instruction Fuzzy Hash: 8B11D076504284CFCB11CF10D5C0B15BF71FB44318F28C6A9D8094BA96C33AD54ACF51
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b1b0673c9c556b96c34ed5643a833be3ba9ddfaf867d65edc71718ac934a6f55
                                      • Instruction ID: 1537cbf56a6d981c7cc6a029b16b406d1f95f66779079b83637cf5cd9bf24cae
                                      • Opcode Fuzzy Hash: b1b0673c9c556b96c34ed5643a833be3ba9ddfaf867d65edc71718ac934a6f55
                                      • Instruction Fuzzy Hash: 3C012BA290D3C56FDB124638CC627C5BFB5DF57524F0902DBD5C0EB293D2095506C391
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b433a458367d8a4f3b556bdd7bec47efe2f4ff35979c640fe3c91f2b28d31441
                                      • Instruction ID: 7f72a3dea7406ef41420302179c95bff6a8afa69a7e35a8b00bbd21f8159e70f
                                      • Opcode Fuzzy Hash: b433a458367d8a4f3b556bdd7bec47efe2f4ff35979c640fe3c91f2b28d31441
                                      • Instruction Fuzzy Hash: 62116AB1900349CFDB20CF9AC508BDEBBF4EB48720F24806DD588A7241D779A580CBA5
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fbc314b277e80840b315b496ebc11c6eea465f9959e9ed72f86aee177470d7ae
                                      • Instruction ID: 1a5c3309462cb789c306eec02154d2673236d7d225f7b7ba8fbacb11cc578957
                                      • Opcode Fuzzy Hash: fbc314b277e80840b315b496ebc11c6eea465f9959e9ed72f86aee177470d7ae
                                      • Instruction Fuzzy Hash: 0A01D2306083449FD714DB79C494BAA7FF5AF45610F1484EED08AC76A2DB34F845C740
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f6a4459472a98984348cd2894d3d56aef779cf8325795c584f4e665e31f50932
                                      • Instruction ID: a07e75502a8e7c97d1ce10895f2e9b435d1f30a966bfc6c35f6671cb2fe7b091
                                      • Opcode Fuzzy Hash: f6a4459472a98984348cd2894d3d56aef779cf8325795c584f4e665e31f50932
                                      • Instruction Fuzzy Hash: 0B111B34204754CFC768DF75D09089AB7F6EF8931536089ADD48A87BA1CB32F845CB90
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 28b6e3f3de5ac1424ab4c9ca9a50e2ff9d8bef71810b8e4ea4021d866bd14af5
                                      • Instruction ID: ab92fc8d22a386a68e24f19fa919b4da805e6ad7692dd2e716e4bedeb217398f
                                      • Opcode Fuzzy Hash: 28b6e3f3de5ac1424ab4c9ca9a50e2ff9d8bef71810b8e4ea4021d866bd14af5
                                      • Instruction Fuzzy Hash: C91118B8E002499FDB44DFA4C8949AEBBB2FF88200B1584A9D515BB351DB34AD00CF95
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dbde361f10910ad100bbe6816e04295a706a59a38322796196c60c77e6c11007
                                      • Instruction ID: eebd8e9182742456329d6908677e1c576547f486e6e45e42cc421b401e40522b
                                      • Opcode Fuzzy Hash: dbde361f10910ad100bbe6816e04295a706a59a38322796196c60c77e6c11007
                                      • Instruction Fuzzy Hash: 2E014C36B002149FCB119B75E858AAEBBF5FB88215B14406AE51A93341DB36A911CB91
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c52da3ae08b8f1d291e014c4eefdb6220fe3e20e7480ac864adf7ebf4b7ee2ae
                                      • Instruction ID: 4ee85981eee1a2933f02343c4ea7e761caa38d3f325746f6ac656fb61781a1a9
                                      • Opcode Fuzzy Hash: c52da3ae08b8f1d291e014c4eefdb6220fe3e20e7480ac864adf7ebf4b7ee2ae
                                      • Instruction Fuzzy Hash: EBF0A4713093556FD7018B6A9C54AA7BFEDEF8A620715407BFC84C7362DA75CD0487A0
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2196661513.000000000290D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0290D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_290d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a28443c73eeade1a0885738ebf8e741e28ebfa2d9021e9808cbba1b6b8b5c98f
                                      • Instruction ID: b05180f3d374f479522715e354f27e8ab39ff21dc5d017e5d17a2d25be3a8b2d
                                      • Opcode Fuzzy Hash: a28443c73eeade1a0885738ebf8e741e28ebfa2d9021e9808cbba1b6b8b5c98f
                                      • Instruction Fuzzy Hash: 8601F2724053489EE7204EA5C9C0F66BFACDF81724F08C41AEE4C4A2C2CBB89941C6B1
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2196661513.000000000290D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0290D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_290d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a8f6a5bafa01cc3b4276234eef2ab331cfa028e33f4c8768eeb81a01bebeeda8
                                      • Instruction ID: 472548cc2829b1f3835c3efccc4b2bdfaa3f79fff769cadcc48aa3e8e90a5946
                                      • Opcode Fuzzy Hash: a8f6a5bafa01cc3b4276234eef2ab331cfa028e33f4c8768eeb81a01bebeeda8
                                      • Instruction Fuzzy Hash: 67015E7240E3C49FE7128B258894B52BFB8DF43224F1D80CBD9888F1E3C2695849C772
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 99163e66e23ed7e674a5732caf83bb4abfb3408bdd6647463b127f6e070b8e21
                                      • Instruction ID: ae6a2901a9f0486a60ed799e2a682eb6a3bbcb86c6227b836a3366cf4eb29801
                                      • Opcode Fuzzy Hash: 99163e66e23ed7e674a5732caf83bb4abfb3408bdd6647463b127f6e070b8e21
                                      • Instruction Fuzzy Hash: 39F022B1305304AFD3114B6AE8809AFBBE9EF88230700056AE649C3740EF346C8187B0
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f69b5d05c9663ce487a6e469137b012008e328e36d2652e8d51e7275d7b358f6
                                      • Instruction ID: 3f6a6b37e2f7d8c405a0d0d5bd26dcdbfcd45c9c86006ecc33f9974560a38327
                                      • Opcode Fuzzy Hash: f69b5d05c9663ce487a6e469137b012008e328e36d2652e8d51e7275d7b358f6
                                      • Instruction Fuzzy Hash: C3F0F6B66052486FE3016F38C0147EB7BAAEFC1718F14809EC5995B391CE3A2805CBE1
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2196661513.000000000290D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0290D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_290d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b754f87f01a314a7a94308bbe550144880ed58aff42279a123f7141b468eed82
                                      • Instruction ID: 7f1859878954fffc4e3ab1de3f1da1fd6aaca8b86bc5b9fa5593d70292b5759c
                                      • Opcode Fuzzy Hash: b754f87f01a314a7a94308bbe550144880ed58aff42279a123f7141b468eed82
                                      • Instruction Fuzzy Hash: 18F0F976600604AF97208F0AD985C23FBADEBD4670719C55AE94A8BA55C771EC41CAB0
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a89381055fd83ca91063edb68c4e9218489f335e55e9cd37afb1d143b6bd4112
                                      • Instruction ID: 121dcea9f6ce5f9fdfc2e7cf2685b0407a2c6d418e105145e3260e4822724b55
                                      • Opcode Fuzzy Hash: a89381055fd83ca91063edb68c4e9218489f335e55e9cd37afb1d143b6bd4112
                                      • Instruction Fuzzy Hash: EAF082357042408FC3109F2DD894CB6BBF99FCA71431900DAE284DB772DA65EC11CB95
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2196661513.000000000290D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0290D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_290d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 255ba489fd7b4d89be6b4dea4cf5a833a22f6e722f139b18a9116f17eeeffb4b
                                      • Instruction ID: 7b0deb971ae09833779549fbb6b0de19bb6d298a53159d67086e413373db6852
                                      • Opcode Fuzzy Hash: 255ba489fd7b4d89be6b4dea4cf5a833a22f6e722f139b18a9116f17eeeffb4b
                                      • Instruction Fuzzy Hash: F4F04975100A80AFD321CF06C984D23BBB9EB89620B298489A85A8B752C730FC42CB60
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6cb9130fe990b81b01a8788a7a9fe27b11234e8bb947f7afb09e06092f052776
                                      • Instruction ID: 3d175171c063f9636488b06240adc144c09eb951aa782ea29293f8dbaf86a239
                                      • Opcode Fuzzy Hash: 6cb9130fe990b81b01a8788a7a9fe27b11234e8bb947f7afb09e06092f052776
                                      • Instruction Fuzzy Hash: 50F0A7717003189FD7549B79E8849AFBBE9EBC8275B00052DE24AD3740DF71AC0187E4
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8ece5b0e17fcb825011311da44fd8187687cb1e473571afac17d62e7d70c91e9
                                      • Instruction ID: d3bd72f98808b8088e2e035b17339dd74fca0f290abfc97d2bdbc3f288e71adb
                                      • Opcode Fuzzy Hash: 8ece5b0e17fcb825011311da44fd8187687cb1e473571afac17d62e7d70c91e9
                                      • Instruction Fuzzy Hash: F6F0A0797001188FCB40EBBCD840ADABBE2EBCC3517154195E649DB311DB30EC018BD1
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c5fa8318ca0f04c68fa4551541a493ce74a1ca2b93c57316419d2ba5eeb18042
                                      • Instruction ID: 7ff6d67f93551aac81cb586881433ff4bf909c6cf232b678a355de2959c40f19
                                      • Opcode Fuzzy Hash: c5fa8318ca0f04c68fa4551541a493ce74a1ca2b93c57316419d2ba5eeb18042
                                      • Instruction Fuzzy Hash: 85F027B26041085BF304AB78C0587EB7796DBC0728F10C16AC91A5B384CE392C01CBE1
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e16018519b7bdb0c172668411561eb3e72717225f63bc3944bd0605feb8196d1
                                      • Instruction ID: 617baa48a20fe5514dbbd0c25a46332af4da5c7dffd3e8c30e03e05bd314f14b
                                      • Opcode Fuzzy Hash: e16018519b7bdb0c172668411561eb3e72717225f63bc3944bd0605feb8196d1
                                      • Instruction Fuzzy Hash: 65F049B19003048EDB50DFA9D4883CDFBE1AF98324F28C04AD54CA7241C7796084CB65
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 49ea04b433d260c1fe23cad1b03025d6e1cb3e13a8665a93e24f670554097dd2
                                      • Instruction ID: 5dcd40c36ae645abf644bb9ed39386fdc96a8e6aff00042a24600bc6f42c9b2d
                                      • Opcode Fuzzy Hash: 49ea04b433d260c1fe23cad1b03025d6e1cb3e13a8665a93e24f670554097dd2
                                      • Instruction Fuzzy Hash: B6E0E5353001108F8310AB5DD898CA6B7FAEFCEB6571900AAE689DB721DA61EC01DB94
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e32ef2d50cbd5cc1d8af8b67a3fb8a6d18d51ea0aedafc4af4bb22cd0a8cf029
                                      • Instruction ID: 1d332c390918e5f95fa4d13a6174f18051cbe7b5f06087a084061c2700cabe9a
                                      • Opcode Fuzzy Hash: e32ef2d50cbd5cc1d8af8b67a3fb8a6d18d51ea0aedafc4af4bb22cd0a8cf029
                                      • Instruction Fuzzy Hash: F7F06D39A02114EFCB04CB98E586D9EFBB2FB88311B158155F905A7351CB31AD01CB94
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1bc48665fb623e42b6b4c9892b6172ae15a7da429cf51f1c8c90b788df2c458c
                                      • Instruction ID: f2c0bc9eaab0a79fc5bc5040a8a4dd90025bb45c1f7900a11477639d7b21fae9
                                      • Opcode Fuzzy Hash: 1bc48665fb623e42b6b4c9892b6172ae15a7da429cf51f1c8c90b788df2c458c
                                      • Instruction Fuzzy Hash: 7DF08C7670A3915BCB0A2B70D8183EE3F62AFC6629B05009AD5498B281CE69080583A9
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 348b2977f7f12885b9bacfc6314e190e9f9423ede52f93e79fb4627e11395fdc
                                      • Instruction ID: 8ae9bc4059d9779291afb51476ef286c07a26469a178c13d560d58e930f5ea64
                                      • Opcode Fuzzy Hash: 348b2977f7f12885b9bacfc6314e190e9f9423ede52f93e79fb4627e11395fdc
                                      • Instruction Fuzzy Hash: 04F05EB09063404FD7609B78C4A83DA7BE2EB45300F04449DD589DB281CB7828818B90
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b20d1d4721171048a5689d4cc57d0b39498ce9b72d818b4e3638781d313b3169
                                      • Instruction ID: 1f32c39b0c6fdaa75cf3e734c2376ae70d9ea49c0a708f70654b215e51db02f6
                                      • Opcode Fuzzy Hash: b20d1d4721171048a5689d4cc57d0b39498ce9b72d818b4e3638781d313b3169
                                      • Instruction Fuzzy Hash: 6CE026623083D2278B16906DE8200E6AFBB8AC762430980BBF0C4DF342DC0A980643E4
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c7687eae8f19060dee5eed7a3289198ecf78092515e8134d9a63888d337af565
                                      • Instruction ID: b658d8b1445a7aec73032eb3a8c6f223f7f752021b66bfb60e8d51ffe9a82782
                                      • Opcode Fuzzy Hash: c7687eae8f19060dee5eed7a3289198ecf78092515e8134d9a63888d337af565
                                      • Instruction Fuzzy Hash: 32E08C22B011148B9B105ABDAA955EEA3EBABC86507281026E547D3340DE30A80383C9
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 622f10f7348ec4200ec1fd97e230d12890304b3012c5624b3819aa3d39965e2f
                                      • Instruction ID: 75d30fa69b84dcf58a7ecd150ae3f1b1465ef46777785eccb072690a998db6b9
                                      • Opcode Fuzzy Hash: 622f10f7348ec4200ec1fd97e230d12890304b3012c5624b3819aa3d39965e2f
                                      • Instruction Fuzzy Hash: 1AD017A3B41129276A94B1BE58906FB9ACF8AC54AC70580769B89E7351EC54EC0283F9
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c801ec3c9689df5d19e7a7866d81e13da62920d50c6082a1f529e02c75c1a1a0
                                      • Instruction ID: 331265049783684186053f5ab8bf41bdf8a06dbabfda3b17d78d2c6781d2e31c
                                      • Opcode Fuzzy Hash: c801ec3c9689df5d19e7a7866d81e13da62920d50c6082a1f529e02c75c1a1a0
                                      • Instruction Fuzzy Hash: FDE0DF313052144BCB092774E81C3EF7A56ABC8728F00002AD60A83380CF78180183E9
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 299b7b23b9f5880dfc899a0f3f6ddedae196177e1536419f014b0b439d8a7d9f
                                      • Instruction ID: d51cd5b5a259035c17c8fb2817779510b2e099d42eab2ee660d633ce2cbd21f6
                                      • Opcode Fuzzy Hash: 299b7b23b9f5880dfc899a0f3f6ddedae196177e1536419f014b0b439d8a7d9f
                                      • Instruction Fuzzy Hash: FCD05EB3741129276A9471FE18406FB96CF8BC54AC70580769A89E3251EC40EC0383F9
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fd4c8d452a5771c60ee91f320fcc0371df8875e812d4233fbae53c791bb77087
                                      • Instruction ID: a785d87e081e8490c9f2106888adb60ecf56dca8255895ca79f402ff1834cb2f
                                      • Opcode Fuzzy Hash: fd4c8d452a5771c60ee91f320fcc0371df8875e812d4233fbae53c791bb77087
                                      • Instruction Fuzzy Hash: 4FE08631B10014978B089A59D8104EDF7AADFCC220F04807ED95AA7340DA32691586E5
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d9611c63fb2582be4e114cf2b48e4a112ea57893134fd783779e1bbce2ebbf1c
                                      • Instruction ID: 32e91f078475fd56d93d9ce3f5f06129644941f9a9de6a127403ab9a5eaca552
                                      • Opcode Fuzzy Hash: d9611c63fb2582be4e114cf2b48e4a112ea57893134fd783779e1bbce2ebbf1c
                                      • Instruction Fuzzy Hash: 29E08679C052099BCB09FFB4E41A5FE7F74FA14305F4041ADDA8693290EA3A194ACFC1
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6a9098a0aec855fb54a412d40283f7686f28c03aaa7e8cbda81ab6ee7d1b482e
                                      • Instruction ID: 27a0de64d1bad08b4de0c7fd1f65d8d29733b8b992dc16d7d333ce80d8c1e777
                                      • Opcode Fuzzy Hash: 6a9098a0aec855fb54a412d40283f7686f28c03aaa7e8cbda81ab6ee7d1b482e
                                      • Instruction Fuzzy Hash: 3FE0E5B09023049BD7A4AF79D89C79A7AE6FB84310F004869E65ED7380DB3868808B90
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2b0a1b9c83a5a07ff97db2d77c3cf9d79a7dd13c9927cdea9d28bd18a66341b1
                                      • Instruction ID: 50b23a2b3f32267658f1a7cfded5384ec59125cf1f9684b733639053706cd282
                                      • Opcode Fuzzy Hash: 2b0a1b9c83a5a07ff97db2d77c3cf9d79a7dd13c9927cdea9d28bd18a66341b1
                                      • Instruction Fuzzy Hash: 39E01270D4014B9E8784DF78894029DFBF0AF44254B10869AD819E7251E7729552CB94
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 26d215cde4fe040088c68843124f3d611d97af09e8b6853d6f46b7681e7d9f50
                                      • Instruction ID: 852b0348c6b0b4a30ae1961726c5b5a26ea1e5050719e7fff7f19425c6d0d974
                                      • Opcode Fuzzy Hash: 26d215cde4fe040088c68843124f3d611d97af09e8b6853d6f46b7681e7d9f50
                                      • Instruction Fuzzy Hash: 27E08671E0928B9BCB08EFB4D5866EEBFF1AB45209F004059DD45A7740DA355841DB81
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                      • Instruction ID: 4546eca4b76f37f3161a133424cb7f37a0c123ebc30c3250328076b19b5c4c47
                                      • Opcode Fuzzy Hash: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                      • Instruction Fuzzy Hash: 6AD06270D042099F8784DFADC94156DFBF4EB48200F5085AA8919E7301F7315612CBD5
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 15f6a4570966fc62e6be5313dc8883688c44e1e57a382d0cdaf5ada59fae7736
                                      • Instruction ID: c82bc9168fd03f6f69c554c968ce27f4222028f06f18a21b9b95742bc78ed612
                                      • Opcode Fuzzy Hash: 15f6a4570966fc62e6be5313dc8883688c44e1e57a382d0cdaf5ada59fae7736
                                      • Instruction Fuzzy Hash: 00D0223004E3C88FC3020B30A8300E07F38EF8231434200CBF4898B6A3CE2AAA84C7A5
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0ca82b5ad02590091cbf06dc4574eded0f10b9743f73b41284ee321044f8a91e
                                      • Instruction ID: 7706164c8cbebf81f300717e342929a3f7dbd27b789e91f58b3d04fcbb12f3b9
                                      • Opcode Fuzzy Hash: 0ca82b5ad02590091cbf06dc4574eded0f10b9743f73b41284ee321044f8a91e
                                      • Instruction Fuzzy Hash: F0D01779C052098BCB08BBA4E81B9FDBB34FA40301F4041A9D90753190EA362A4ACEC6
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f918852ed70dc2e11ff67eb1cf395bd6de6301322c6a356f8a86c7b963bed291
                                      • Instruction ID: fa24ed25491d5614883ad1e8172c8d9c330a57bb34850855456b241db146b612
                                      • Opcode Fuzzy Hash: f918852ed70dc2e11ff67eb1cf395bd6de6301322c6a356f8a86c7b963bed291
                                      • Instruction Fuzzy Hash: E3D01275A0920A9BCB08EF64D4465AEBBB4A744200F004155DD4593350EA306C01CBD1
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8f719c6915bb5d2998f617e752e4ab49719f067f9b14d1c4219132d70e418ee3
                                      • Instruction ID: cc1e1f5a485321b825e5c86531380bfef8ea06e44082968f617f9dd16014e4f5
                                      • Opcode Fuzzy Hash: 8f719c6915bb5d2998f617e752e4ab49719f067f9b14d1c4219132d70e418ee3
                                      • Instruction Fuzzy Hash: 19D09239B40218CFDB04CB98E896ADDF371FF84325F1080A5E519A7351CB32A912CB80
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9de99235f656c3f90fd1d4519d34ba4a9cb74978aa94c7ab3cd6ac2f08f7b892
                                      • Instruction ID: 4e2869ebb017eb5131a18afa56004987b14127ecbfd7cfffd13c429cad84b658
                                      • Opcode Fuzzy Hash: 9de99235f656c3f90fd1d4519d34ba4a9cb74978aa94c7ab3cd6ac2f08f7b892
                                      • Instruction Fuzzy Hash: 1CC08C2060D2808EEF025B338C7A002BFB0BE4331431602C3CE50C3032EE248925C341
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1b6e2091db18d9284eb907091ddeb368febd8bd13c74d7fd737f2cb8a0a8ecf7
                                      • Instruction ID: 3c8eafb43492f81b9d7eabe96f7ba4cd85415c06eb57f8ab882aebcdd429947b
                                      • Opcode Fuzzy Hash: 1b6e2091db18d9284eb907091ddeb368febd8bd13c74d7fd737f2cb8a0a8ecf7
                                      • Instruction Fuzzy Hash: BFD092B16057008FD720DF68E4983D6BBE0FB48310F00056EE59EC7252D7796980CB50
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2197483706.00000000040B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 040B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_40b0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 44be9449d198ca871a262c32778ae9e500f8d7cd1ce394bd6eed3aa4c6dd1905
                                      • Instruction ID: d0b92b07923ce2f5bdc1c2fb27ffd34dc754f826d44e4bdc35987fb3127eb0be
                                      • Opcode Fuzzy Hash: 44be9449d198ca871a262c32778ae9e500f8d7cd1ce394bd6eed3aa4c6dd1905
                                      • Instruction Fuzzy Hash: 2BB0923018534C8FC2486F75E805814732DAB8021538004A8E90E0A3A28E7AE884CB44

                                      Execution Graph

                                      Execution Coverage:7.5%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:0%
                                      Total number of Nodes:3
                                      Total number of Limit Nodes:0
                                      execution_graph 20997 8707160 20998 87071a3 SetThreadToken 20997->20998 20999 87071d1 20998->20999

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 203 2cfb490-2cfb4b9 204 2cfb4be-2cfb7f9 call 2cfaab4 203->204 205 2cfb4bb 203->205 266 2cfb7fe-2cfb805 204->266 205->204
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: kU$p^${U$p^$[$p^
                                      • API String ID: 0-773913269
                                      • Opcode ID: 2769764a34de33d8e93be94290596a77cd9662191f728eac775cc9e76e79ef04
                                      • Instruction ID: c1ab55a44e5a7a3791de955e0778cdb1b227e6b1437c2b2f3959ae455c473f99
                                      • Opcode Fuzzy Hash: 2769764a34de33d8e93be94290596a77cd9662191f728eac775cc9e76e79ef04
                                      • Instruction Fuzzy Hash: 88917A70F016A69BDB59EBB589106AFBBB3EFC4700B40891DD606AB340DF346E058BD5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 267 2cfb4a0-2cfb4b9 268 2cfb4be-2cfb7f9 call 2cfaab4 267->268 269 2cfb4bb 267->269 330 2cfb7fe-2cfb805 268->330 269->268
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: kU$p^${U$p^$[$p^
                                      • API String ID: 0-773913269
                                      • Opcode ID: 3ecbef8e3ef33e4a0e6aca0edfc228144023ede071025dbcee8539d025c2eb42
                                      • Instruction ID: 8350d196de6dbaa282ff945a1b0ac87196e6d47b3184acdb6ecaa9cc59625fbf
                                      • Opcode Fuzzy Hash: 3ecbef8e3ef33e4a0e6aca0edfc228144023ede071025dbcee8539d025c2eb42
                                      • Instruction Fuzzy Hash: 73918C70F0166A9BDB59EBB589006AFBBB3EFC4700B40891DD606AB340DF346E058BD5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2248492755.0000000007510000.00000040.00000800.00020000.00000000.sdmp, Offset: 07510000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7510000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: piSk$piSk$piSk$piSk$piSk$|,Uk
                                      • API String ID: 0-4001022099
                                      • Opcode ID: 72034e2e0df4484ec47bbb74d3c8e38492f8fd672545ec3917f8307d67dba626
                                      • Instruction ID: 70f6e150cf0e18566b8a195cae372781dd5c55fe746da62e323cc923fb322884
                                      • Opcode Fuzzy Hash: 72034e2e0df4484ec47bbb74d3c8e38492f8fd672545ec3917f8307d67dba626
                                      • Instruction Fuzzy Hash: 8C2226B1B0024ADFEB248BA8C4507EABBE1BFC5212F14847BD504DB651DB71CC45CBA2

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 495 870715a-870719b 496 87071a3-87071cf SetThreadToken 495->496 497 87071d1-87071d7 496->497 498 87071d8-87071f5 496->498 497->498
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2252620618.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_8700000_powershell.jbxd
                                      Similarity
                                      • API ID: ThreadToken
                                      • String ID:
                                      • API String ID: 3254676861-0
                                      • Opcode ID: f99783799112b0c8868e4526052ebaa115675e2d9f59789dc3afda8689eef8b8
                                      • Instruction ID: 86b538a5aaec8204f78371f0ae6af29b9d59ea64ccb5401ae7fdb5a8061427ca
                                      • Opcode Fuzzy Hash: f99783799112b0c8868e4526052ebaa115675e2d9f59789dc3afda8689eef8b8
                                      • Instruction Fuzzy Hash: D31132B5900249CFCB10CFAED884B9EBFF4AF88320F24845AD419A7250C7B4A844CFA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 501 8707160-87071cf SetThreadToken 503 87071d1-87071d7 501->503 504 87071d8-87071f5 501->504 503->504
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2252620618.0000000008700000.00000040.00000800.00020000.00000000.sdmp, Offset: 08700000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_8700000_powershell.jbxd
                                      Similarity
                                      • API ID: ThreadToken
                                      • String ID:
                                      • API String ID: 3254676861-0
                                      • Opcode ID: 71499ab296d4d3b56cce7fb7ff96462e096a14e42260265952fe835e7d1aca21
                                      • Instruction ID: c3235fa84e996c0f9603f4ca418151bb0f9f08d2e64ac5e8971a2564bf8b0a01
                                      • Opcode Fuzzy Hash: 71499ab296d4d3b56cce7fb7ff96462e096a14e42260265952fe835e7d1aca21
                                      • Instruction Fuzzy Hash: C21122B1900249CFCB10CF9EC984B9EFBF8EB88320F24841AD518A7350C7B4A944CFA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 507 2cfdc90-2cfdc9c 508 2cfdc9e-2cfdcb5 507->508 509 2cfdd15-2cfde3e 507->509 514 2cfdcbe-2cfdcd0 508->514 515 2cfdcb7 508->515 518 2cfdcd2 call 2cfdce1 514->518 519 2cfdcd2 call 2cfdcf0 514->519 520 2cfdcd2 call 2cfdc90 514->520 521 2cfdcd2 call 2cfdca0 514->521 515->514 517 2cfdcd8-2cfdcdb 517->509 518->517 519->517 520->517 521->517
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: .$p^
                                      • API String ID: 0-3576396415
                                      • Opcode ID: 630bfa8f4a73f7070507d1418c19dc57340c64bcb887362a179dfa24ee388d70
                                      • Instruction ID: 072548946df598d72f2d8c40e9fc93e13262c1b3cf160f4720e04828ad093133
                                      • Opcode Fuzzy Hash: 630bfa8f4a73f7070507d1418c19dc57340c64bcb887362a179dfa24ee388d70
                                      • Instruction Fuzzy Hash: E3F05932704684AFC796D35DA8208EB7FAADEC727130400EBD24BCB301EA206801C7F1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 522 2cfdca0-2cfdcb5 524 2cfdcbe-2cfdcd0 522->524 525 2cfdcb7 522->525 531 2cfdcd2 call 2cfdce1 524->531 532 2cfdcd2 call 2cfdcf0 524->532 533 2cfdcd2 call 2cfdc90 524->533 534 2cfdcd2 call 2cfdca0 524->534 525->524 527 2cfdcd8-2cfdcdb 528 2cfdd15-2cfde3e 527->528 531->527 532->527 533->527 534->527
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: .$p^
                                      • API String ID: 0-3576396415
                                      • Opcode ID: f900a99cef463bea58a05da7de08357ca09b6f0e089c8b474814bbecb8d15715
                                      • Instruction ID: 4c9a32f9ecd1fcd58b06f81c481adb32762f81824989b2123ad4958b588ab5e8
                                      • Opcode Fuzzy Hash: f900a99cef463bea58a05da7de08357ca09b6f0e089c8b474814bbecb8d15715
                                      • Instruction Fuzzy Hash: 94E0C231700B10578666A71EA80085F7BDFDEC5671310442EE11AC7304DFA4ED0187D5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 769 7513d9d-7513da1 770 7513da3-7513da8 769->770 771 7513db9-7513dc8 769->771 772 7513da9 770->772 773 7513e1f-7513e21 770->773 783 7513eb0-7513eba 771->783 784 7513dce-7513dec 771->784 777 7513daa-7513dab 772->777 778 7513dad-7513db1 772->778 774 7513e23-7513e24 773->774 775 7513e27 773->775 779 7513e26 774->779 780 7513e6a-7513e9d 774->780 781 7513e39-7513e41 775->781 782 7513e29-7513e35 775->782 777->771 785 7513db2-7513db4 778->785 786 7513d9b-7513d9c 778->786 779->775 809 7513ea4-7513ead 780->809 798 7513e42-7513e49 781->798 799 7513e5b-7513e5f 781->799 782->781 787 7513ec8-7513ece 783->787 788 7513ebc-7513ec5 783->788 784->783 808 7513df2-7513e17 784->808 795 7513db6-7513db7 785->795 796 7513d59-7513d75 785->796 786->769 790 7513ed0-7513ed2 787->790 791 7513ed4-7513ee0 787->791 797 7513ee2-7513efd 790->797 791->797 795->771 815 7513d85 796->815 816 7513d77-7513d83 796->816 802 7513e4b 798->802 803 7513e4d-7513e59 798->803 805 7513e66-7513e68 799->805 802->799 803->799 805->809 808->783 820 7513e1d 808->820 818 7513d87-7513d89 815->818 816->818 818->783 821 7513d8f-7513d96 818->821 820->773 821->786 823 7513f00-7513f4a 821->823 827 7513f50-7513f55 823->827 828 75140ce-75140e9 823->828 829 7513f57-7513f5d 827->829 830 7513f6d-7513f71 827->830 836 75140eb-751410b 828->836 837 751410d-751410f 828->837 831 7513f61-7513f6b 829->831 832 7513f5f 829->832 834 7514080-751408a 830->834 835 7513f77-7513f79 830->835 831->830 832->830 838 7514097-751409d 834->838 839 751408c-7514094 834->839 840 7513f89 835->840 841 7513f7b-7513f87 835->841 836->837 846 7514111-7514112 837->846 847 7514115-751411d 837->847 842 75140a3-75140af 838->842 843 751409f-75140a1 838->843 844 7513f8b-7513f8d 840->844 841->844 848 75140b1-75140cb 842->848 843->848 844->834 849 7513f93-7513fb2 844->849 852 7514113 846->852 853 7514228-751425d 846->853 850 7514135-7514139 847->850 851 751411f-7514125 847->851 878 7513fc2 849->878 879 7513fb4-7513fc0 849->879 857 75141da-75141e4 850->857 858 751413f-7514141 850->858 855 7514127 851->855 856 7514129-7514133 851->856 852->847 866 751428b-7514295 853->866 867 751425f-7514281 853->867 855->850 856->850 862 75141f1-75141f7 857->862 863 75141e6-75141ee 857->863 864 7514151 858->864 865 7514143-751414f 858->865 869 75141f9-75141fb 862->869 870 75141fd-7514209 862->870 871 7514153-7514155 864->871 865->871 875 7514297-751429c 866->875 876 751429f-75142a5 866->876 901 7514283-7514288 867->901 902 75142d5-75142fe 867->902 874 751420b-7514225 869->874 870->874 871->857 877 751415b-751415d 871->877 882 75142a7-75142a9 876->882 883 75142ab-75142b7 876->883 884 7514177-751417e 877->884 885 751415f-7514165 877->885 888 7513fc4-7513fc6 878->888 879->888 890 75142b9-75142d2 882->890 883->890 886 7514180-7514186 884->886 887 7514196-75141d7 884->887 891 7514167 885->891 892 7514169-7514175 885->892 894 7514188 886->894 895 751418a-7514194 886->895 888->834 898 7513fcc-7514003 888->898 891->884 892->884 894->887 895->887 913 7514005-751400b 898->913 914 751401d-7514024 898->914 910 7514300-7514326 902->910 911 751432d-751435c 902->911 910->911 921 7514395-751439f 911->921 922 751435e-751437b 911->922 915 751400d 913->915 916 751400f-751401b 913->916 918 7514026-751402c 914->918 919 751403c-751407d 914->919 915->914 916->914 923 7514030-751403a 918->923 924 751402e 918->924 927 75143a1-75143a5 921->927 928 75143a8-75143ae 921->928 934 75143e5-75143ea 922->934 935 751437d-751438f 922->935 923->919 924->919 932 75143b0-75143b2 928->932 933 75143b4-75143c0 928->933 936 75143c2-75143e2 932->936 933->936 934->935 935->921
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2248492755.0000000007510000.00000040.00000800.00020000.00000000.sdmp, Offset: 07510000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7510000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cec030973866b25a4ad6b458cd7e559aa45433037d3ede9be91b160440d685ff
                                      • Instruction ID: d7654a081e07b21e2c5eb6a1f12f9626afc1fc5e40b251ac657f196446912dd2
                                      • Opcode Fuzzy Hash: cec030973866b25a4ad6b458cd7e559aa45433037d3ede9be91b160440d685ff
                                      • Instruction Fuzzy Hash: CC815BF1700342DFEB258B7485217EABBA2BFC1651B0489ABD9009F792DB71DC45C7A2

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 941 2cf29f0-2cf2a1e 943 2cf2af5-2cf2b37 941->943 944 2cf2a24-2cf2a3a 941->944 948 2cf2b3d-2cf2b56 943->948 949 2cf2c51-2cf2c61 943->949 945 2cf2a3f-2cf2a52 944->945 946 2cf2a3c 944->946 945->943 953 2cf2a58-2cf2a65 945->953 946->945 951 2cf2b5b-2cf2b69 948->951 952 2cf2b58 948->952 951->949 959 2cf2b6f-2cf2b79 951->959 952->951 955 2cf2a6a-2cf2a7c 953->955 956 2cf2a67 953->956 955->943 962 2cf2a7e-2cf2a88 955->962 956->955 960 2cf2b7b-2cf2b7d 959->960 961 2cf2b87-2cf2b94 959->961 960->961 961->949 965 2cf2b9a-2cf2baa 961->965 963 2cf2a8a-2cf2a8c 962->963 964 2cf2a96-2cf2aa6 962->964 963->964 964->943 968 2cf2aa8-2cf2ab2 964->968 966 2cf2baf-2cf2bbd 965->966 967 2cf2bac 965->967 966->949 972 2cf2bc3-2cf2bd3 966->972 967->966 969 2cf2ab4-2cf2ab6 968->969 970 2cf2ac0-2cf2af4 968->970 969->970 974 2cf2bd8-2cf2be5 972->974 975 2cf2bd5 972->975 974->949 978 2cf2be7-2cf2bf7 974->978 975->974 979 2cf2bfc-2cf2c08 978->979 980 2cf2bf9 978->980 979->949 982 2cf2c0a-2cf2c24 979->982 980->979 983 2cf2c29 982->983 984 2cf2c26 982->984 985 2cf2c2e-2cf2c38 983->985 984->983 986 2cf2c3d-2cf2c50 985->986
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 46d7da0f1c3e7cc89335d10bc1dd4042ffed022495d654fc157a0a1d86ba5e6f
                                      • Instruction ID: 87e41cf10f60c97e17a2051879fc3527a7794d243a5425450722614fd41293a1
                                      • Opcode Fuzzy Hash: 46d7da0f1c3e7cc89335d10bc1dd4042ffed022495d654fc157a0a1d86ba5e6f
                                      • Instruction Fuzzy Hash: 3C919B74A00609CFCB55CF59C494AAEFBB1FF88310B248669DA15AB365C735FC42CBA0
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c2251f018b9e7f8ed19f3f6b0afd13bc75130ecf1cf0fe3a43c9354023802089
                                      • Instruction ID: 9edfe9d353e1d18ab7e615880bc68fe5ceea03e2e0c2f1eb989e22965d0b660f
                                      • Opcode Fuzzy Hash: c2251f018b9e7f8ed19f3f6b0afd13bc75130ecf1cf0fe3a43c9354023802089
                                      • Instruction Fuzzy Hash: DF51D0347042048FD785DB69D844A7ABBE6FFC9314F1584AAD609DB352EB31DC06CBA0
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f48b6f3d11b0230a98f12763042dc789e4867076c34603c0c30708a1e34b6740
                                      • Instruction ID: c86f9f1748fccfd2da3dfd555ff3d2a7f4ff79b5b7b0c228c56e0daf83314ace
                                      • Opcode Fuzzy Hash: f48b6f3d11b0230a98f12763042dc789e4867076c34603c0c30708a1e34b6740
                                      • Instruction Fuzzy Hash: C7610771E00248DFCB94DFA9D584A9DBBF2FF88314F24816AE909AB250DB709D41CB50
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 30cbfdead6a015d36c1e60d6ff3cad9d25d74b5d0b11db41a7b554889174acf7
                                      • Instruction ID: ce02d14095928425b438fa83d724f05e171f0e43602e9def41960cdd5e7e0dd8
                                      • Opcode Fuzzy Hash: 30cbfdead6a015d36c1e60d6ff3cad9d25d74b5d0b11db41a7b554889174acf7
                                      • Instruction Fuzzy Hash: 5F512571E00248DFCB94CFA9D584A9EBBF2FF88314F14816AE909AB351EB709D45CB50
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 499031dad3ce716b7d7204cb9a854b95131e9e6b6dde6315a48a46f7e41ba898
                                      • Instruction ID: b325e8ce232eb525de8f9fec890aecab1c57b05fbfaa2105521df4a71d5f8ff4
                                      • Opcode Fuzzy Hash: 499031dad3ce716b7d7204cb9a854b95131e9e6b6dde6315a48a46f7e41ba898
                                      • Instruction Fuzzy Hash: C7413A34B042048FDB58DF64C554AAEBBF2EF8E315F1444A9E502AB391DB35DD05CBA0
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b78fc0dd86164121f976accb3165e3587c26e6bcd5c6d61fb7432a321fd8375d
                                      • Instruction ID: aacb992e4b336a52b2d0c2741f348fafe45f428c0a76ab66dfdbbc2374adf502
                                      • Opcode Fuzzy Hash: b78fc0dd86164121f976accb3165e3587c26e6bcd5c6d61fb7432a321fd8375d
                                      • Instruction Fuzzy Hash: 97415974A00605DFCB45CF59C598AAEFBB1FF48310B118169DA15AB364C732FD51CBA1
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9937f5b10b6d8cd7dea7c1763d25c0e638a0e8e32668447cc5713cbcf9790b63
                                      • Instruction ID: 7313200aeed9476e255534e8058221039742016c99a337151063aaa266eb49bb
                                      • Opcode Fuzzy Hash: 9937f5b10b6d8cd7dea7c1763d25c0e638a0e8e32668447cc5713cbcf9790b63
                                      • Instruction Fuzzy Hash: 6A419034A042448FDB45CF68C558AAEBFF1EF8E211F2840A9D942EB752DB31DD45CB61
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d46525b4400afa07de315b02c05efa80afc29b8c93878d1eaa9dc1b3651ad7e1
                                      • Instruction ID: 550136409c1b63dad6770e108e25235e22fb804ee65cee891dded20f7f9c9d1c
                                      • Opcode Fuzzy Hash: d46525b4400afa07de315b02c05efa80afc29b8c93878d1eaa9dc1b3651ad7e1
                                      • Instruction Fuzzy Hash: 0F31A031300601DFD759DB78E854BAABBA6EFC4311F00866DD60ACB3A1DFB1A955CB90
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fd251ed2af46908059dd244ae265cabbcb9c8234b1d483135696ab07151fa90e
                                      • Instruction ID: 9191a2070d0c2d78fba2925fdfe2e03ab145c90390f322e2d026e9a61e337b5e
                                      • Opcode Fuzzy Hash: fd251ed2af46908059dd244ae265cabbcb9c8234b1d483135696ab07151fa90e
                                      • Instruction Fuzzy Hash: FA318D70E002099FDB85DBA9D490BAEBBF6EFC9310F148069E606EB351EB749C418B51
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7ccf15feb418aa3e08f35ff84933e42b2287a0f013cbe3ccb3179c8f77dfbd48
                                      • Instruction ID: 061cf90c2a3b82df3b530bc55e9e332e6324168ec1c097db41396500e2c50143
                                      • Opcode Fuzzy Hash: 7ccf15feb418aa3e08f35ff84933e42b2287a0f013cbe3ccb3179c8f77dfbd48
                                      • Instruction Fuzzy Hash: 02314C30A002048FDB58DF69D498AAEBBF2FF89714F14456DD406EB361DB74AC45CB90
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d7edc37f1f71b2f512c52f61fc05984e8c5f964f146650226e4cf52b1611662f
                                      • Instruction ID: f00a07dc831cecd9b8e26f89395a0983ea0452dfecce42c56bfa12b3e4dfa46a
                                      • Opcode Fuzzy Hash: d7edc37f1f71b2f512c52f61fc05984e8c5f964f146650226e4cf52b1611662f
                                      • Instruction Fuzzy Hash: CD315070E002099FDB94DFA9D4947AEBBF6EFC9300F118029E606EB350EB749C418B54
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3baccd0649a8429f8c675f23b245ca4a92b9428fa9c94bbe6591f7722f6f0d39
                                      • Instruction ID: dc92ccbf95e45eba566977ea0e628d98719b4897861c05080b1bfed3ba532e42
                                      • Opcode Fuzzy Hash: 3baccd0649a8429f8c675f23b245ca4a92b9428fa9c94bbe6591f7722f6f0d39
                                      • Instruction Fuzzy Hash: 1A318CB4A002859FDB45EBA4D854AAEBFB3EFC5300F2084A9D105AB395CE789D01CF61
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 712c3db6295ec739b97ba19341b3d3f61895e581e73c698e741ea69d18445ed1
                                      • Instruction ID: 1cd735109397457ed90c1d79b93d1897ba95adf804a3485299fe99a6b575a0d0
                                      • Opcode Fuzzy Hash: 712c3db6295ec739b97ba19341b3d3f61895e581e73c698e741ea69d18445ed1
                                      • Instruction Fuzzy Hash: B8219C75A042498FCB54DFAED440B9EBBF6EBC8320F14846AD119E7340CB74A9058BA5
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b94422509b6e427bb01938992a322a3b55e0a4a5771e917977f7d139c2c60bf9
                                      • Instruction ID: 816a0d5aba122298c5851c5b590a64e9d03dbf0fef6d629d1f6abcd89b4d56f7
                                      • Opcode Fuzzy Hash: b94422509b6e427bb01938992a322a3b55e0a4a5771e917977f7d139c2c60bf9
                                      • Instruction Fuzzy Hash: C3313870A002048FCB58DF69D498A9EBBF2FF88714F14856DD406EB3A1DB70AC45CB90
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0793a9e3fad14ba2e79be766fe07c737f656bcd4faf46fb83d463ce4ffca71ec
                                      • Instruction ID: 5946f2dcecd29b2bf40f3a979f8fa7ad4380c5e63e883e4a35522bcea56d9c92
                                      • Opcode Fuzzy Hash: 0793a9e3fad14ba2e79be766fe07c737f656bcd4faf46fb83d463ce4ffca71ec
                                      • Instruction Fuzzy Hash: F53121B4A002459FDB44EB64D854AAFBBB7EFC4300F109469D615AB394DF359D01CF90
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 649aad84acf92124b8c2c4489d91741f40e5c01d2642217066d6cc90157abb9b
                                      • Instruction ID: 61120559819db39db95ee34e2e8e6170d93ce8237af0af0400cc2fb6cdd8ac7e
                                      • Opcode Fuzzy Hash: 649aad84acf92124b8c2c4489d91741f40e5c01d2642217066d6cc90157abb9b
                                      • Instruction Fuzzy Hash: 4E3189B49057448FDBA0CF6AC18878AFFF2EF88320F28C05ED9499B216D7746481CB65
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2226774418.0000000002C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C4D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2c4d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7b864804ec953d7697478cf9cca35b7c6670c7c9ee8cd096a399e3f34ed784de
                                      • Instruction ID: 1734e1c6c32dec72bc3d7a2dbb5d60eb48fed46a0af2094f01066d5f5e62919c
                                      • Opcode Fuzzy Hash: 7b864804ec953d7697478cf9cca35b7c6670c7c9ee8cd096a399e3f34ed784de
                                      • Instruction Fuzzy Hash: 2621E076604200EFDB05DF10D9C0B27BFA5FB88314F64C5ADE9090A656CB3AD456CBA1
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2226774418.0000000002C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C4D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2c4d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5b482023e28ddde32f21c91fe7ac9fbda8cf9499469990a288321e4fdcb493ce
                                      • Instruction ID: 549961c35240f437d3ee5b51da72e32191e6ef2fdf6e148f476935a9818162fb
                                      • Opcode Fuzzy Hash: 5b482023e28ddde32f21c91fe7ac9fbda8cf9499469990a288321e4fdcb493ce
                                      • Instruction Fuzzy Hash: 3C213475504240EFDB14DF24D9C0B27BFA5FBD4324F20C56DD90A4B652CB7AE446CAA1
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8cb0415bcec1ff24c139a3e9a56ed1cd87c1d5924dbb6c1092126ee3f82e9e70
                                      • Instruction ID: 0bcf2456d1798552c6fbfd5121a3cb23b46f981188083934bf49979e35703301
                                      • Opcode Fuzzy Hash: 8cb0415bcec1ff24c139a3e9a56ed1cd87c1d5924dbb6c1092126ee3f82e9e70
                                      • Instruction Fuzzy Hash: 7A2188B09017448EEBA0CF6AC08878AFFF2EF88324F28C01ED90D97205DB746480CB61
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2226774418.0000000002C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C4D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2c4d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 384a7f9de9845f44d81f157188d08ce66234f9fe5d38891e1e9143e6f5175e0f
                                      • Instruction ID: 753287a8ddc237672529ebb0db87103bf71a56dc75875d0b7f480f603f723136
                                      • Opcode Fuzzy Hash: 384a7f9de9845f44d81f157188d08ce66234f9fe5d38891e1e9143e6f5175e0f
                                      • Instruction Fuzzy Hash: 112127B1604244DFDB24DF14D5C0B27BBA5FB84718F20C56DD9094B641CB7AD546CA61
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 38d2b4e816dfcd02ff5663f50dddf541ebe74623726da141f17fefd90464a0b3
                                      • Instruction ID: cd69c5ffd27e711c9398ea92de718ace8180a1ca80883b898ff7961754b18463
                                      • Opcode Fuzzy Hash: 38d2b4e816dfcd02ff5663f50dddf541ebe74623726da141f17fefd90464a0b3
                                      • Instruction Fuzzy Hash: 5E111935B00118CFDB44DBA8D840ADEBBF6EBCC315B1440A5EA09DB321DB30DD169B90
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2248492755.0000000007510000.00000040.00000800.00020000.00000000.sdmp, Offset: 07510000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7510000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9172ebc629194746f26239c2c776c2ad2bd936e99dc2e997861db0cabd2b7fe0
                                      • Instruction ID: da7aa1acdb492c5ebdb19c02234f153f8647e18b4e9f0a10aa95eafdc9e3fdde
                                      • Opcode Fuzzy Hash: 9172ebc629194746f26239c2c776c2ad2bd936e99dc2e997861db0cabd2b7fe0
                                      • Instruction Fuzzy Hash: 5111C4B1B1020ADFEB20CF5DC981BEAB7F5FB85222F048067D9088B211D771D880CBA1
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2226774418.0000000002C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C4D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2c4d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 226763f8ebee4a326c53d81c1b8fbc9c4432138e5169b0b621e51b23af87bf07
                                      • Instruction ID: 9f29ef2dc6755d44c3e2d75de6ecffc4b4482020f09a9788aa86e0c286677472
                                      • Opcode Fuzzy Hash: 226763f8ebee4a326c53d81c1b8fbc9c4432138e5169b0b621e51b23af87bf07
                                      • Instruction Fuzzy Hash: A8218C76504240DFCB06CF10D9C4B16BF72FB88314F24C5ADE9494A666C73AD56ACB91
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f76299de4a2ed084e31354b2a3b096c0bd1eae542be524646aff36cbc09fb7e4
                                      • Instruction ID: ed9fe9a6d69da2a22206bb3254a8250404921462c3d84a25e3be298d308e2113
                                      • Opcode Fuzzy Hash: f76299de4a2ed084e31354b2a3b096c0bd1eae542be524646aff36cbc09fb7e4
                                      • Instruction Fuzzy Hash: 081151302097408FC765CF34C49089ABBF2EF8631532485ADD08A8BB61C732E845CF40
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2226774418.0000000002C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C4D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2c4d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1baa4135a3ffa84b7eafa0616a1ffb5636ea4d9d3a95b2124a7f7c9932413226
                                      • Instruction ID: 4a37e42b0770e8c497b178a4c62bb4af2a8acb4cabcb0cf968ef4535eac723bc
                                      • Opcode Fuzzy Hash: 1baa4135a3ffa84b7eafa0616a1ffb5636ea4d9d3a95b2124a7f7c9932413226
                                      • Instruction Fuzzy Hash: DD11D075504280CFCB15CF10D5C0B16BF71FB84318F24C6ADD8094BA56C33AE54ACBA1
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bbaff9bb81cad37651280eff676ce1bb82ef4df66a5663d85869799864a0e68e
                                      • Instruction ID: 5c2c9485f52155217beba25f46c1f8505c5f2b370c31654a76e757bb19075de9
                                      • Opcode Fuzzy Hash: bbaff9bb81cad37651280eff676ce1bb82ef4df66a5663d85869799864a0e68e
                                      • Instruction Fuzzy Hash: 2111D6316083409FD768CB75D494AAA7FF5EF8A210F1484EDD18AC76A2DB30EC41C701
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2226774418.0000000002C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C4D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2c4d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 54e937d2f642825418ee9ae18dedb5dcdd39905f3497500ca018ffbd85fd39bc
                                      • Instruction ID: 3abd57455d1bd4931a8c5a0eef33c6d56db1764ff7d260a66e2b95075609ae89
                                      • Opcode Fuzzy Hash: 54e937d2f642825418ee9ae18dedb5dcdd39905f3497500ca018ffbd85fd39bc
                                      • Instruction Fuzzy Hash: B011E0B5504284CFDB25DF14D5C4B2ABBB1FB84318F24C6ADC8494BA52C33AD54ACB92
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 45849916bf483aaf570a957b24a3d4b178bac4b8d1302b70a17e4f68e39456cd
                                      • Instruction ID: 31380b0dc73cf3f7357f63d120d4106aa0000137f00d761e59c744b23f246561
                                      • Opcode Fuzzy Hash: 45849916bf483aaf570a957b24a3d4b178bac4b8d1302b70a17e4f68e39456cd
                                      • Instruction Fuzzy Hash: DC110872A041849FCB95D778D8548BD7FB1AFDA210B1844EED5439B352DA315811CBA1
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 12f81c4f644444e9ef678d6013b7975180a2cdd1dd86cd009e803702cb24740f
                                      • Instruction ID: a52d1d4add0c9a29ab32fd8e3f311504b8fc867876930ce106ecc2439990f1e5
                                      • Opcode Fuzzy Hash: 12f81c4f644444e9ef678d6013b7975180a2cdd1dd86cd009e803702cb24740f
                                      • Instruction Fuzzy Hash: 3B018036B002149FCB219B74E808AAEBBF5FF88215F04446DE90A93242DB319951CB90
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b8f5485cfc4637eeba772eb0845c8bb0b0b9ebd20a01500aa8e8a0cf0248e047
                                      • Instruction ID: 70129e21804200ca1242990f7767dd3a0a1975208397f3f0aa9e4eb276ce76aa
                                      • Opcode Fuzzy Hash: b8f5485cfc4637eeba772eb0845c8bb0b0b9ebd20a01500aa8e8a0cf0248e047
                                      • Instruction Fuzzy Hash: EC111B35204754CFC768DF35D08089AB7F6EF8931932089ADD48A87BA0CB32F845CB50
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2226774418.0000000002C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C4D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2c4d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 318a61124a5ac175a7e62e2224b93bc7e1f6d7106bdae9788c5b6291d8767345
                                      • Instruction ID: c290e9f46bacda09791794b6a244a9829cb8bc6e7e8045fcc596bb9d1d0f8ec3
                                      • Opcode Fuzzy Hash: 318a61124a5ac175a7e62e2224b93bc7e1f6d7106bdae9788c5b6291d8767345
                                      • Instruction Fuzzy Hash: DD01126140E3C09FE7128B258994752BFB4DF43224F1DC1DBD9898F1A3C6695949C7B2
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2226774418.0000000002C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C4D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2c4d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 86e2f46e81fb50a22816b51a0b98fd379d991b82121ca6afdbbb28c524e79021
                                      • Instruction ID: 5314b25abd06415340e664a61f4c3adfb79bc3a7d932140f4d42e67497ff0fc6
                                      • Opcode Fuzzy Hash: 86e2f46e81fb50a22816b51a0b98fd379d991b82121ca6afdbbb28c524e79021
                                      • Instruction Fuzzy Hash: 0201F271405340DAE720AA26C980B67BF98DF81324F08C01AED0A4B242CFB8A941CAF1
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7124b8dabfda13b361c9d91582dfc9028f0cc4c0e81e837cbaa57c6b4f101226
                                      • Instruction ID: 1a4442770154781ba2d99ea7368858209cbf071dd0938877456e4d18b611550c
                                      • Opcode Fuzzy Hash: 7124b8dabfda13b361c9d91582dfc9028f0cc4c0e81e837cbaa57c6b4f101226
                                      • Instruction Fuzzy Hash: 2EF0F4313083A05FD7008BA99C50D7B7FE9EF8A22170440ABF840C7362CA70CD04C760
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0826d117e82a9211f69ca011dd3582d36ccf66bc18e083f7380fd597849d1eeb
                                      • Instruction ID: 2a7209187a73276a42127da0e7a1fc0839fdfd2a03b19bd822af90e069e50b11
                                      • Opcode Fuzzy Hash: 0826d117e82a9211f69ca011dd3582d36ccf66bc18e083f7380fd597849d1eeb
                                      • Instruction Fuzzy Hash: BAF046357093809FC7118769E88096FBFF5EFCA26171006AED14AD7652CF245C4AC7B1
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ac5569e6dca10118f5cfa687563eb285ccd88dab437b2da7824b7bfce60666ba
                                      • Instruction ID: 5cde299b98cc1acdee5de7858d810ecf82696001e5d4ea311f84d55725823aed
                                      • Opcode Fuzzy Hash: ac5569e6dca10118f5cfa687563eb285ccd88dab437b2da7824b7bfce60666ba
                                      • Instruction Fuzzy Hash: F90122316042809FD3559B78D4247EB7FA2EFC6314F64809EC4464B392CF396806DBA0
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2226774418.0000000002C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C4D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2c4d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c90d8cd6f3b716c180d807505d01b3a4846dd59d088d016b3338af4d36854048
                                      • Instruction ID: 961832b859f440345ca9ef3718cb451fb61b3dbd81d15e0c4ad1b573949ff376
                                      • Opcode Fuzzy Hash: c90d8cd6f3b716c180d807505d01b3a4846dd59d088d016b3338af4d36854048
                                      • Instruction Fuzzy Hash: 83F0F976200604AF9720DF0AD985C23FBADEBD4770719C55AE84A8B611CA71EC41CEA0
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 02297f82c61623ea2be2177e860f74cdd246ab6f2ed1a796ce00d94e83cdb396
                                      • Instruction ID: 4d25dcb728d7ae1cdb33fa19d9164b1649d6c26c8fae19d8ab7f7d000e85d5df
                                      • Opcode Fuzzy Hash: 02297f82c61623ea2be2177e860f74cdd246ab6f2ed1a796ce00d94e83cdb396
                                      • Instruction Fuzzy Hash: ACF082353042808FC3118B2DD4A49A6BBFA9FCF61531900EAE585CB332DA61DC02CB90
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9d8af4578e7ccae2e15ed3e2c165cd77fc099b053cdea4adb745d96561a7a59f
                                      • Instruction ID: 9b73006f6543dd76450c8f6515365a49251285648c2ab8f8994e0b4b723cf7f2
                                      • Opcode Fuzzy Hash: 9d8af4578e7ccae2e15ed3e2c165cd77fc099b053cdea4adb745d96561a7a59f
                                      • Instruction Fuzzy Hash: 98F030319093409FD765DB78D8A87AABFE1EF45310F0444ADD14AC7252DB342985CB50
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 746037ba635b1ea35b3e17e383ab6ef0ecbe57ed376894d29d6636612d8f849a
                                      • Instruction ID: 248c167eeebc4e5e263ed51e500dad83f37c4e3206d5744ff3192c462943e49b
                                      • Opcode Fuzzy Hash: 746037ba635b1ea35b3e17e383ab6ef0ecbe57ed376894d29d6636612d8f849a
                                      • Instruction Fuzzy Hash: E5F0A7317006149FD7549759D884A6FB7EAFBC8365B40052DE20AD3340DF71AD0587A0
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2226774418.0000000002C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C4D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2c4d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6707807eb5c1e10824aff69105311a9a7f90e2b24161b28eab4055df153a9fc7
                                      • Instruction ID: f5dc060de9b7a4a9cf809228cdec5985c854f54606d3a01737978393911625d2
                                      • Opcode Fuzzy Hash: 6707807eb5c1e10824aff69105311a9a7f90e2b24161b28eab4055df153a9fc7
                                      • Instruction Fuzzy Hash: 0FF04975100A40AFD321CF06C984D23BBB9EBC5620B198489E84A8B712CA70FC02CF60
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f635d2b04b3820d7cac1449ebae1f5db843f7195d1cc25ab19e74dc1b728c27d
                                      • Instruction ID: 2b02761571e68599b0dd35fafb53d56193ae57f97df686fad9db94b06bc05fd6
                                      • Opcode Fuzzy Hash: f635d2b04b3820d7cac1449ebae1f5db843f7195d1cc25ab19e74dc1b728c27d
                                      • Instruction Fuzzy Hash: 8BF027757002045BE354AB64D0087EF7BA6DFC0314F60816EC50A57385CF392C42CBE0
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ede6e30bd9047c47041159fbf458a93e8c99fc5caec2a32fb774a9db5e11da42
                                      • Instruction ID: 1fa5b3bb81a04e5e4382cc397b8e43853d5a0b87c3462c71c2921c9382999806
                                      • Opcode Fuzzy Hash: ede6e30bd9047c47041159fbf458a93e8c99fc5caec2a32fb774a9db5e11da42
                                      • Instruction Fuzzy Hash: 78F0A0357005188FDB40DBACD840A9ABBA2EBCC395B15419AEA09CB321DF30CC0A4B90
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 623b423195440d24eb0a3cfc0d06faf2b4fa9efbb1c2a00f0808cf308216e4c3
                                      • Instruction ID: 648f66847adb1cd8a14f86147068e8dc5b980f0b014cf60f420c180b0027c9b7
                                      • Opcode Fuzzy Hash: 623b423195440d24eb0a3cfc0d06faf2b4fa9efbb1c2a00f0808cf308216e4c3
                                      • Instruction Fuzzy Hash: 62F082353092815FCB0BAB74A458AAD7FA2EFC6721B09009ED5068B253CF780855DB95
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0c111c37dcb4cf76a2b6ddd359069f1284f5f65caaed380062998c3541d0e2e7
                                      • Instruction ID: ec09d4f114651fadd743c3b18b226678a5588da4f5ff4248bb1f74119d7645cc
                                      • Opcode Fuzzy Hash: 0c111c37dcb4cf76a2b6ddd359069f1284f5f65caaed380062998c3541d0e2e7
                                      • Instruction Fuzzy Hash: 06E0D8227051145F8ED452B988203B77A9F8FCB5707094376DB15DB2C1ED10CC0653A1
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7ce02050893d2ec5707dffe83c54c5f0e83d80a372c9ed96abdcc730d4150a6d
                                      • Instruction ID: 52be5587bda36b2763698ea2fc775d68224bebf7fe3519e969d5c4e4c28b7b69
                                      • Opcode Fuzzy Hash: 7ce02050893d2ec5707dffe83c54c5f0e83d80a372c9ed96abdcc730d4150a6d
                                      • Instruction Fuzzy Hash: A2E012353001108FC3509B1DD494D66B7FAEFDE75575500A9E645DB331DB61DC01CB90
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c1e82a29ec8f17bbfb8f49f9f24c16a3dc25bb641f662f9f6b6c0f79262b2b52
                                      • Instruction ID: 16cac33d1f12f33dc4c0839ba51f6dafa88d571fa53a0b750dd1648f6df43fe4
                                      • Opcode Fuzzy Hash: c1e82a29ec8f17bbfb8f49f9f24c16a3dc25bb641f662f9f6b6c0f79262b2b52
                                      • Instruction Fuzzy Hash: 96E092227083951BC7568269A860462BFB79BC756030D44FBE145CF252E91199028360
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 101c9737a112e5164cf095753b910aaa9af20a3bc56d3e8c911fb58bc500e7bf
                                      • Instruction ID: 42804f50ef3f8adf036cd0aaacb31e4d73c9022da516bb5f749340d7f0ff0124
                                      • Opcode Fuzzy Hash: 101c9737a112e5164cf095753b910aaa9af20a3bc56d3e8c911fb58bc500e7bf
                                      • Instruction Fuzzy Hash: BEF0ED70A013045BD7A4DBB9D89C79FBBE5EB44320F50446DE65ED7240DB396980CB90
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2aeb62e28440d4488c2d76f2e951f427fe11ae92652116cd57bf7a481142e226
                                      • Instruction ID: c2c6ddb4945f362b6358dc636ad088e3a3d256595770e2e601727d88aa825699
                                      • Opcode Fuzzy Hash: 2aeb62e28440d4488c2d76f2e951f427fe11ae92652116cd57bf7a481142e226
                                      • Instruction Fuzzy Hash: 18E0263130425467CB097774A40CAAEBA57EFC8B20F04002ED60783342CF780C6197D9
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 94cd89d3a8a3c069cd764237ad59d076cf467fcc9f9c0b0b2c3f00ee51fabfa9
                                      • Instruction ID: de674ce2cadce0fdd95537713557c2b630620c18059be7109b4c6ebd222c35d3
                                      • Opcode Fuzzy Hash: 94cd89d3a8a3c069cd764237ad59d076cf467fcc9f9c0b0b2c3f00ee51fabfa9
                                      • Instruction Fuzzy Hash: 0FD05E527021251B4DD860AA99007BBA5CFCEC55A1705133ADB09EB281EE50CC0613F1
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fd4c8d452a5771c60ee91f320fcc0371df8875e812d4233fbae53c791bb77087
                                      • Instruction ID: 033925b9f6298af499c2d5eda073e2865f5eb9f6c52b70d41c511643c3d1e762
                                      • Opcode Fuzzy Hash: fd4c8d452a5771c60ee91f320fcc0371df8875e812d4233fbae53c791bb77087
                                      • Instruction Fuzzy Hash: C3E08631B0005497CB48969AD4544E9FBA5DBCC220F14847EDA0AA7340EA325916C6E1
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8e97cc7863938749eeeed4eaea580a1e32c979a805b380d7f0c76cfa0eae6932
                                      • Instruction ID: b8233fe34adc899fc06488e25b63702dd40d60e8bba2130281645346b68afb66
                                      • Opcode Fuzzy Hash: 8e97cc7863938749eeeed4eaea580a1e32c979a805b380d7f0c76cfa0eae6932
                                      • Instruction Fuzzy Hash: 97E01A31804149DFCB19EBA4D86A8BEBF30FF06301B0402ADD95787292EB311A96CBC0
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 955de0b2ae5c5a1f8181f450b0909d9a189db1fd6bdbf5fac431c68327627b5d
                                      • Instruction ID: c4b353c01b2ad53b1cb88ee06361e50d2e4245a398dea8d7af6b6320f6934de8
                                      • Opcode Fuzzy Hash: 955de0b2ae5c5a1f8181f450b0909d9a189db1fd6bdbf5fac431c68327627b5d
                                      • Instruction Fuzzy Hash: EEE01270D442499F8B80EFBCD4415AAFFF09F49210F2485AED948EB202E6318551CFD1
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d0404f1582b3713c7331f678c6e27ce47182a5d1854b224259a773f8d2e7aebb
                                      • Instruction ID: 3f45ec595015f73ea6e09c95823e528279da702621a226db99bf9bc1e41bb6d1
                                      • Opcode Fuzzy Hash: d0404f1582b3713c7331f678c6e27ce47182a5d1854b224259a773f8d2e7aebb
                                      • Instruction Fuzzy Hash: 02E09A3490824A9FCB58CF64D4858ADBFB0EF0A201B0842ACDD869B312E7311854DF80
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                      • Instruction ID: 70b83b4b5f4748d778ff960498a7c7dd5f63ba0b0465d2e1a82dc9131533793b
                                      • Opcode Fuzzy Hash: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                      • Instruction Fuzzy Hash: DBD067B0D042099F8780EFADC9415AEFBF4EF49200F6085AEC919E7341E7329A12CBD1
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 506d6dab0f1082d21310511ac63e2642da182e64b7dbee54c3d8c50e0efb4e8f
                                      • Instruction ID: 82302c6f07fe3ef0003a139cfe282455f94b6e416582568e3fd86e97064496a7
                                      • Opcode Fuzzy Hash: 506d6dab0f1082d21310511ac63e2642da182e64b7dbee54c3d8c50e0efb4e8f
                                      • Instruction Fuzzy Hash: FCD067319041099BCB58ABA5E85A4BDFB74FE14301F40426DEA1B52191EB321AAACAC5
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f6794d00fe68330f3473a0d10de4f2f5e99f1f722dbecf7ab8a220f714b51fe5
                                      • Instruction ID: cf2e0d2a71cf557a7a63b4e070b964ba82ef8a1b015aa4adbbace236e72b6c9d
                                      • Opcode Fuzzy Hash: f6794d00fe68330f3473a0d10de4f2f5e99f1f722dbecf7ab8a220f714b51fe5
                                      • Instruction Fuzzy Hash: F5D0123490420A9F8754DF64D44686DBBB4EB44300F004159DD0A93345EA305951CFC1
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 43fd382215b761511f6fd72defc88e7cef99bf4a1661f3f3d5a34f9e17de3508
                                      • Instruction ID: 4a624faa712b970f31bc45da9a420472b139ef658025e23a249ea498affa25b0
                                      • Opcode Fuzzy Hash: 43fd382215b761511f6fd72defc88e7cef99bf4a1661f3f3d5a34f9e17de3508
                                      • Instruction Fuzzy Hash: D2D0C93814E3C49FC7278F78A4958183F34AE0326576904DED8C69F5B3C9668489CB07
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 41210310d03d3be8e3cb22f15987faf9790e790cfe01aac5037e89c9ff11ed75
                                      • Instruction ID: 1edccb81922c9a5dd943f8a57f18951f972d510bacd1516e70ad06be0a21a8ed
                                      • Opcode Fuzzy Hash: 41210310d03d3be8e3cb22f15987faf9790e790cfe01aac5037e89c9ff11ed75
                                      • Instruction Fuzzy Hash: A6C08C2401E3C01EEF03933A889E1027FB10E8302930A41CAC4C2DE867C818880BC703
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2227137576.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2cf0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 15d3d164ec21fc27093364611dd207d0fb384dc9779b9bcfcce4e51863300f7d
                                      • Instruction ID: 61464e5456659d55089e485fd684c4df0f81114fb5517947b7c6640806d3d527
                                      • Opcode Fuzzy Hash: 15d3d164ec21fc27093364611dd207d0fb384dc9779b9bcfcce4e51863300f7d
                                      • Instruction Fuzzy Hash: 98B09230185748CFC2486F75A884815732DBB402197C004A8E80E0A2A28E76E888CA44

                                      Execution Graph

                                      Execution Coverage:6.8%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:0%
                                      Total number of Nodes:3
                                      Total number of Limit Nodes:0
                                      execution_graph 19378 8e86428 19379 8e8646b SetThreadToken 19378->19379 19380 8e86499 19379->19380

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 202 4eab490-4eab4a9 203 4eab4ab 202->203 204 4eab4ae-4eab7f5 call 4eaacbc 202->204 203->204
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: {Yn^$Yn^
                                      • API String ID: 0-851193633
                                      • Opcode ID: 42b91d16c9ac9da681a7c22959f9ba160ae86ef0568c8be06ec1351f25711606
                                      • Instruction ID: c1442159f5ca02a1088b3c63fe5523e43760e7622a98b9781325e1f049b29913
                                      • Opcode Fuzzy Hash: 42b91d16c9ac9da681a7c22959f9ba160ae86ef0568c8be06ec1351f25711606
                                      • Instruction Fuzzy Hash: 03917F74E017559FEB19EFB588016AEBBE2EFC4B00B40892ED106AF384DF7469118BD5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2300106352.0000000007B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7b80000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: piSk$piSk$piSk$piSk$piSk$|,Uk
                                      • API String ID: 0-4001022099
                                      • Opcode ID: fc0d4f2492959feca80b8c37c18fedf286b133e6a677275f3543560a07846e04
                                      • Instruction ID: 0cfe12285fb90416f4a2e8f1501a3c5503d46562fa5ce4612d3aad111b37a98d
                                      • Opcode Fuzzy Hash: fc0d4f2492959feca80b8c37c18fedf286b133e6a677275f3543560a07846e04
                                      • Instruction Fuzzy Hash: DB2214B1B00206DFEB64ABA8C4547EABBE1FFC5210F0485BAD905DB351DB31C945CBA2

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 266 8e86421-8e86463 267 8e8646b-8e86497 SetThreadToken 266->267 268 8e86499-8e8649f 267->268 269 8e864a0-8e864bd 267->269 268->269
                                      APIs
                                      • SetThreadToken.KERNELBASE(EFD80893), ref: 08E8648A
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2306401066.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_8e80000_powershell.jbxd
                                      Similarity
                                      • API ID: ThreadToken
                                      • String ID:
                                      • API String ID: 3254676861-0
                                      • Opcode ID: 52cd66789a190669ab6c7f75cd15e088c18f1fefad13288933ca31d6a96a0158
                                      • Instruction ID: 7a718917cac574d62ae1617fc3535dbad0d5a02abf202eb159101e2427978a22
                                      • Opcode Fuzzy Hash: 52cd66789a190669ab6c7f75cd15e088c18f1fefad13288933ca31d6a96a0158
                                      • Instruction Fuzzy Hash: 961113B59002498FDB10DFAAD884B9EFFF4AF88324F24841AD519A7350C7B4A944CFA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 272 8e86428-8e86497 SetThreadToken 274 8e86499-8e8649f 272->274 275 8e864a0-8e864bd 272->275 274->275
                                      APIs
                                      • SetThreadToken.KERNELBASE(EFD80893), ref: 08E8648A
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2306401066.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_8e80000_powershell.jbxd
                                      Similarity
                                      • API ID: ThreadToken
                                      • String ID:
                                      • API String ID: 3254676861-0
                                      • Opcode ID: ea54eb2a584fd1e0e7e80b3a890f1f638e7b7ac0813619899114412a171b00d1
                                      • Instruction ID: 4463145d732144c0b676a68f40c9fc36bcd862b7a8015954bd8f8346cc604cbe
                                      • Opcode Fuzzy Hash: ea54eb2a584fd1e0e7e80b3a890f1f638e7b7ac0813619899114412a171b00d1
                                      • Instruction Fuzzy Hash: B511F2B5900609CFDB10DF9AD984B9EFBF8AB88324F24841AD519A7310D7B4A944CFA5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 278 4eae610-4eae63d 279 4eae63f-4eae6b6 278->279 280 4eae5d1-4eae602 278->280 291 4eae73a-4eae753 279->291 292 4eae6bc-4eae6d3 279->292 295 4eae75e 291->295 296 4eae755 291->296 306 4eae6d5 call 4eae7a8 292->306 307 4eae6d5 call 4eae7b8 292->307 298 4eae75f 295->298 296->295 297 4eae6db-4eae738 297->291 297->292 298->298 306->297 307->297
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: piSk
                                      • API String ID: 0-1183529320
                                      • Opcode ID: fd76f85416cc9a651b66375328c0a2f5a4b8193260e15654a140f25d980c2189
                                      • Instruction ID: fcb87701e707472a83418fd6a3f1641fc9dee628564785aace82a001db739ebf
                                      • Opcode Fuzzy Hash: fd76f85416cc9a651b66375328c0a2f5a4b8193260e15654a140f25d980c2189
                                      • Instruction Fuzzy Hash: F7417B34A052499FDB19DF78D894A9EBFF2EF89304F1485ADD406AB391CB30AD05CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 308 4eae640-4eae6b6 315 4eae73a-4eae753 308->315 316 4eae6bc-4eae6d3 308->316 319 4eae75e 315->319 320 4eae755 315->320 330 4eae6d5 call 4eae7a8 316->330 331 4eae6d5 call 4eae7b8 316->331 322 4eae75f 319->322 320->319 321 4eae6db-4eae738 321->315 321->316 322->322 330->321 331->321
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: piSk
                                      • API String ID: 0-1183529320
                                      • Opcode ID: 3815f7dca05b4ddc46e5f668b03956c3dc0928417ed57b165e190397c1c9fd7f
                                      • Instruction ID: 380f65d05c3cc931c64825af18c591b1de959cdd983dd86a81cb74fdd36d54b0
                                      • Opcode Fuzzy Hash: 3815f7dca05b4ddc46e5f668b03956c3dc0928417ed57b165e190397c1c9fd7f
                                      • Instruction Fuzzy Hash: 81315A34A01205CFDB18EF69D994A9EBBF2FF88300F10852CD416AB384DB34AD05CB90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 332 4eadc88-4eadcad 334 4eadcaf 332->334 335 4eadcb6 332->335 334->335 336 4eadcbe-4eadcc8 335->336 338 4eadcca call 4eadce8 336->338 339 4eadcca call 4eadcd9 336->339 337 4eadcd0-4eadcd3 338->337 339->337
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: +/n^
                                      • API String ID: 0-2038921070
                                      • Opcode ID: ce09d07aaf18d085d44edd6a8f278fba6a3f6b8f4b9ced9790eaab3d16bd3010
                                      • Instruction ID: 684c84aa3a08be7f097c9112e4b49e957019328a62f4e8e2c3791de33d20dab8
                                      • Opcode Fuzzy Hash: ce09d07aaf18d085d44edd6a8f278fba6a3f6b8f4b9ced9790eaab3d16bd3010
                                      • Instruction Fuzzy Hash: 1EF0A0352097916FC31B972DA810C9F7FE69EC216031501AEE046CF653CA54D80A87E6

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 340 4eadc98-4eadcad 342 4eadcaf 340->342 343 4eadcb6-4eadcc8 340->343 342->343 346 4eadcca call 4eadce8 343->346 347 4eadcca call 4eadcd9 343->347 345 4eadcd0-4eadcd3 346->345 347->345
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: +/n^
                                      • API String ID: 0-2038921070
                                      • Opcode ID: b499499342a99c799105bdf460a335ac443a4405baed90c0e03030e5d1bb6607
                                      • Instruction ID: c0ebf3d83f94eacae91649e652557ef23864ca370d4434c8f8002156c9d4a547
                                      • Opcode Fuzzy Hash: b499499342a99c799105bdf460a335ac443a4405baed90c0e03030e5d1bb6607
                                      • Instruction Fuzzy Hash: 9AE08C35700614579229AA5EA80085F7A9BDFC4A71350402EE11A8B704DEA4E80147D5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 348 7b83ce8-7b83d0d 349 7b83f00-7b83f4a 348->349 350 7b83d13-7b83d18 348->350 358 7b840ce-7b84112 349->358 359 7b83f50-7b83f55 349->359 351 7b83d1a-7b83d20 350->351 352 7b83d30-7b83d34 350->352 354 7b83d22 351->354 355 7b83d24-7b83d2e 351->355 356 7b83d3a-7b83d3c 352->356 357 7b83eb0-7b83eba 352->357 354->352 355->352 362 7b83d4c 356->362 363 7b83d3e-7b83d4a 356->363 360 7b83ec8-7b83ece 357->360 361 7b83ebc-7b83ec5 357->361 377 7b84228-7b84248 358->377 378 7b84118-7b8411d 358->378 364 7b83f6d-7b83f71 359->364 365 7b83f57-7b83f5d 359->365 366 7b83ed0-7b83ed2 360->366 367 7b83ed4-7b83ee0 360->367 369 7b83d4e-7b83d50 362->369 363->369 374 7b84080-7b8408a 364->374 375 7b83f77-7b83f79 364->375 370 7b83f5f 365->370 371 7b83f61-7b83f6b 365->371 373 7b83ee2-7b83efd 366->373 367->373 369->357 376 7b83d56-7b83d75 369->376 370->364 371->364 380 7b8408c-7b84094 374->380 381 7b84097-7b8409d 374->381 382 7b83f89 375->382 383 7b83f7b-7b83f87 375->383 409 7b83d85 376->409 410 7b83d77-7b83d83 376->410 401 7b8424a-7b8425d 377->401 402 7b841d4-7b841d7 377->402 384 7b8411f-7b84125 378->384 385 7b84135-7b84139 378->385 388 7b8409f-7b840a1 381->388 389 7b840a3-7b840af 381->389 387 7b83f8b-7b83f8d 382->387 383->387 392 7b84129-7b84133 384->392 393 7b84127 384->393 394 7b841da-7b841e4 385->394 395 7b8413f-7b84141 385->395 387->374 397 7b83f93-7b83fb2 387->397 398 7b840b1-7b840cb 388->398 389->398 392->385 393->385 403 7b841f1-7b841f7 394->403 404 7b841e6-7b841ee 394->404 399 7b84151 395->399 400 7b84143-7b8414f 395->400 432 7b83fc2 397->432 433 7b83fb4-7b83fc0 397->433 408 7b84153-7b84155 399->408 400->408 413 7b8428b-7b84295 401->413 414 7b8425f-7b84281 401->414 416 7b841f9-7b841fb 403->416 417 7b841fd-7b84209 403->417 408->394 422 7b8415b-7b8415d 408->422 419 7b83d87-7b83d89 409->419 410->419 420 7b8429f-7b842a5 413->420 421 7b84297-7b8429c 413->421 449 7b84283-7b84288 414->449 450 7b842d5-7b842fe 414->450 418 7b8420b-7b84225 416->418 417->418 419->357 425 7b83d8f-7b83d96 419->425 427 7b842ab-7b842b7 420->427 428 7b842a7-7b842a9 420->428 429 7b8415f-7b84165 422->429 430 7b84177-7b8417e 422->430 425->349 434 7b83d9c-7b83da1 425->434 436 7b842b9-7b842d2 427->436 428->436 437 7b84169-7b84175 429->437 438 7b84167 429->438 439 7b84180-7b84186 430->439 440 7b84196-7b841d1 430->440 442 7b83fc4-7b83fc6 432->442 433->442 443 7b83db9-7b83dc8 434->443 444 7b83da3-7b83da9 434->444 437->430 438->430 446 7b84188 439->446 447 7b8418a-7b84194 439->447 440->402 442->374 451 7b83fcc-7b84003 442->451 443->357 462 7b83dce-7b83dec 443->462 453 7b83dab 444->453 454 7b83dad-7b83db7 444->454 446->440 447->440 467 7b8432d-7b8435c 450->467 468 7b84300-7b84326 450->468 474 7b8401d-7b84024 451->474 475 7b84005-7b8400b 451->475 453->443 454->443 462->357 471 7b83df2-7b83e17 462->471 478 7b8435e-7b8437b 467->478 479 7b84395-7b8439f 467->479 468->467 471->357 499 7b83e1d-7b83e24 471->499 476 7b8403c-7b8407d 474->476 477 7b84026-7b8402c 474->477 480 7b8400d 475->480 481 7b8400f-7b8401b 475->481 482 7b8402e 477->482 483 7b84030-7b8403a 477->483 494 7b8437d-7b8438f 478->494 495 7b843e5-7b843ea 478->495 487 7b843a8-7b843ae 479->487 488 7b843a1-7b843a5 479->488 480->474 481->474 482->476 483->476 490 7b843b0-7b843b2 487->490 491 7b843b4-7b843c0 487->491 496 7b843c2-7b843e2 490->496 491->496 494->479 495->494 500 7b83e6a-7b83e9d 499->500 501 7b83e26-7b83e41 499->501 513 7b83ea4-7b83ead 500->513 507 7b83e5b-7b83e5f 501->507 508 7b83e43-7b83e49 501->508 512 7b83e66-7b83e68 507->512 510 7b83e4b 508->510 511 7b83e4d-7b83e59 508->511 510->507 511->507 512->513
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2300106352.0000000007B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7b80000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 07854cc54fdf0d39ab5b857ba898d0c22c0e019260e94cf9681fc7f710a21782
                                      • Instruction ID: 5b049f9c5313db2dbb03dc5ce359fa4d2f435253b10efedbeae8001f63b7710a
                                      • Opcode Fuzzy Hash: 07854cc54fdf0d39ab5b857ba898d0c22c0e019260e94cf9681fc7f710a21782
                                      • Instruction Fuzzy Hash: 701225F1B00256CFEB65AF68C81076ABBE2DFC1610F1484ABD505DB791DB32D845C7A2

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 621 4eae7b8-4eae7d8 622 4eae7da-4eae7dc 621->622 623 4eae7e1-4eae7ee 621->623 624 4eaeb41-4eaeb48 622->624 626 4eae7f0-4eae801 623->626 628 4eae803-4eae825 call 4ea014c 626->628 633 4eae82b 628->633 634 4eae988-4eae99f 628->634 635 4eae82d-4eae83e 633->635 642 4eaea7b-4eaea87 634->642 643 4eae9a5 634->643 638 4eae840-4eae842 635->638 640 4eae85c-4eae8e5 638->640 641 4eae844-4eae84a 638->641 669 4eae8ec-4eae921 640->669 670 4eae8e7 640->670 644 4eae84e-4eae85a 641->644 645 4eae84c 641->645 649 4eaeb39 642->649 650 4eaea8d-4eaeaa4 642->650 646 4eae9a7-4eae9b8 643->646 644->640 645->640 653 4eae9ba-4eae9bc 646->653 649->624 650->649 664 4eaeaaa 650->664 656 4eae9be-4eae9c4 653->656 657 4eae9d6-4eaea0e 653->657 658 4eae9c8-4eae9d4 656->658 659 4eae9c6 656->659 673 4eaea10 657->673 674 4eaea15-4eaea4a 657->674 658->657 659->657 667 4eaeaac-4eaeabd 664->667 675 4eaeabf-4eaeac1 667->675 688 4eae92b 669->688 689 4eae923 669->689 670->669 673->674 691 4eaea4c 674->691 692 4eaea54 674->692 677 4eaeadb-4eaeb09 675->677 678 4eaeac3-4eaeac9 675->678 695 4eaeb0b-4eaeb16 677->695 696 4eaeb35-4eaeb37 677->696 679 4eaeacb 678->679 680 4eaeacd-4eaead9 678->680 679->677 680->677 688->634 689->688 691->692 692->642 701 4eaeb19 call 4eae7a8 695->701 702 4eaeb19 call 4eae7b8 695->702 703 4eaeb19 call 4eae92e 695->703 704 4eaeb19 call 4eaea57 695->704 696->624 698 4eaeb1f-4eaeb33 698->695 698->696 701->698 702->698 703->698 704->698
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e11cd99701207e50c949e12f68e11113ba53fcba28083f6d352349e16e13a7ce
                                      • Instruction ID: 575685543edb645b2cde6d595aab1bb454bac016f52350198a3d3835564d8a55
                                      • Opcode Fuzzy Hash: e11cd99701207e50c949e12f68e11113ba53fcba28083f6d352349e16e13a7ce
                                      • Instruction Fuzzy Hash: 5D914A30B50218CFCB24DF6CD59456EBBE6AF88714B18946AE906EB355EF70EC01CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 705 4ea29f0-4ea2a1e 708 4ea2a24-4ea2a3a 705->708 709 4ea2af5-4ea2b37 705->709 710 4ea2a3f-4ea2a52 708->710 711 4ea2a3c 708->711 713 4ea2b3d-4ea2b56 709->713 714 4ea2c51-4ea2c61 709->714 710->709 718 4ea2a58-4ea2a65 710->718 711->710 716 4ea2b5b-4ea2b69 713->716 717 4ea2b58 713->717 716->714 723 4ea2b6f-4ea2b79 716->723 717->716 720 4ea2a6a-4ea2a7c 718->720 721 4ea2a67 718->721 720->709 727 4ea2a7e-4ea2a88 720->727 721->720 725 4ea2b7b-4ea2b7d 723->725 726 4ea2b87-4ea2b94 723->726 725->726 726->714 728 4ea2b9a-4ea2baa 726->728 729 4ea2a8a-4ea2a8c 727->729 730 4ea2a96-4ea2aa6 727->730 732 4ea2baf-4ea2bbd 728->732 733 4ea2bac 728->733 729->730 730->709 731 4ea2aa8-4ea2ab2 730->731 734 4ea2ac0-4ea2af4 731->734 735 4ea2ab4-4ea2ab6 731->735 732->714 737 4ea2bc3-4ea2bd3 732->737 733->732 735->734 739 4ea2bd8-4ea2be5 737->739 740 4ea2bd5 737->740 739->714 743 4ea2be7-4ea2bf7 739->743 740->739 744 4ea2bf9 743->744 745 4ea2bfc-4ea2c08 743->745 744->745 745->714 747 4ea2c0a-4ea2c24 745->747 748 4ea2c29 747->748 749 4ea2c26 747->749 750 4ea2c2e-4ea2c38 748->750 749->748 751 4ea2c3d-4ea2c50 750->751
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 68562e5e4256d72d0f3a191753d252ac14187c37bd9e9318fcc81ae90af2ba1a
                                      • Instruction ID: 66e8ce85b598eb929a0800463e1bf9549a62748977dd4043ffb471df4aeec05f
                                      • Opcode Fuzzy Hash: 68562e5e4256d72d0f3a191753d252ac14187c37bd9e9318fcc81ae90af2ba1a
                                      • Instruction Fuzzy Hash: F591BC74A00205CFCB15CF58C494AAEFBB1FF88310B2486A9DA55AB365C735FC91CBA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 886 4eabac0-4eabb50 890 4eabb52 886->890 891 4eabb56-4eabb61 886->891 890->891 892 4eabb63 891->892 893 4eabb66-4eabbc0 call 4eaaf98 891->893 892->893 900 4eabbc2-4eabbc7 893->900 901 4eabc11-4eabc15 893->901 900->901 902 4eabbc9-4eabbec 900->902 903 4eabc26 901->903 904 4eabc17-4eabc21 901->904 906 4eabbf2-4eabbfd 902->906 905 4eabc2b-4eabc2d 903->905 904->903 907 4eabc2f-4eabc50 905->907 908 4eabc52-4eabc55 call 4eaa978 905->908 909 4eabbff-4eabc05 906->909 910 4eabc06-4eabc0f 906->910 912 4eabc5a-4eabc5e 907->912 908->912 909->910 910->905 915 4eabc60-4eabc89 912->915 916 4eabc97-4eabcc6 912->916 915->916
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 126994998033e4a24473cdb16220dd37953cd27b722afcd4cf2cfb2ebd9b1271
                                      • Instruction ID: e85589a54cc927c002eb31e8065f7a9cd65d54f18429fa90c793804e822a2c31
                                      • Opcode Fuzzy Hash: 126994998033e4a24473cdb16220dd37953cd27b722afcd4cf2cfb2ebd9b1271
                                      • Instruction Fuzzy Hash: 61612371E00248CFDB14DFA9D584A9DBBF1EF88314F24816AE919AB254EB70AC55CB60
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f0a3481df484ac7751c3deaadeea802032b2b9a25ed91c1b5a9bab065d322ce6
                                      • Instruction ID: d2f29bde29d58d415fa9219459621390b6a7f6d6db381702003c77505fcc311b
                                      • Opcode Fuzzy Hash: f0a3481df484ac7751c3deaadeea802032b2b9a25ed91c1b5a9bab065d322ce6
                                      • Instruction Fuzzy Hash: DF51CE353002159FD704DBA9D844A6ABBE6EFC8215F14946AE509CF351EB31FC12CBA1
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 36d1d2c41c2d2c34886b01ee1ff1066b242fc6e8ae34b488cbf36b423a1a0ef4
                                      • Instruction ID: d9c7b8c0b2fa2f592471dfe7ff49e9cdd0b75868b786cfa2d012a744bb03e750
                                      • Opcode Fuzzy Hash: 36d1d2c41c2d2c34886b01ee1ff1066b242fc6e8ae34b488cbf36b423a1a0ef4
                                      • Instruction Fuzzy Hash: A4514571E00248CFDB14DFA9D484A8DBFF2FF88310F14816AE919AB365EB70A855CB50
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1f37e660dc121351503f7ab4efb8f23ec4c97eee5c8d553751427f657d9773f0
                                      • Instruction ID: 9187b587df9cc74430842aba3bf5e40f81a3b24eea8c335aa342c1ca9093cbd6
                                      • Opcode Fuzzy Hash: 1f37e660dc121351503f7ab4efb8f23ec4c97eee5c8d553751427f657d9773f0
                                      • Instruction Fuzzy Hash: BF517C34B00205CFDB14EF6CD484A6ABBE6EFC8314B458169E509CF356EB34EC118B91
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7df315d3ae2b349f8a103e8f88842e474050081c085d1171fcfaf1b98f300eb4
                                      • Instruction ID: ac9f951b2039eb195445dcc96c362991198082cd258a45a28c40c4a38660224e
                                      • Opcode Fuzzy Hash: 7df315d3ae2b349f8a103e8f88842e474050081c085d1171fcfaf1b98f300eb4
                                      • Instruction Fuzzy Hash: EB414638B00205CFDB14EF6CC594A6ABBE6EFC8314B558569E609DF355EB34EC018BA1
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2300106352.0000000007B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7b80000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 39dfdf3540fd5d0f250fe3ab12178d4515e98c53a1acf64ba2462dce607b12c4
                                      • Instruction ID: 378466c8af54234c16acaa0967dab7fe9eee52055fca08b18dda31b37e842166
                                      • Opcode Fuzzy Hash: 39dfdf3540fd5d0f250fe3ab12178d4515e98c53a1acf64ba2462dce607b12c4
                                      • Instruction Fuzzy Hash: 064115F1A00202DFEBA5AF58C65076E7BE2DFC4A00B1844D6D900AF351D735ED44CBA1
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6e340a02f3a9cc954138ad6043dc106c19339141030672dc6e793ac93ab0d46b
                                      • Instruction ID: d6eac59df2c5ba914aabb8f418e5aab30ee47d0291f341b156c47405e2b70cf5
                                      • Opcode Fuzzy Hash: 6e340a02f3a9cc954138ad6043dc106c19339141030672dc6e793ac93ab0d46b
                                      • Instruction Fuzzy Hash: 65416C34B042048FDB18DFA4C4A8AAEBBF1EF8D715F1450A9E402AB391CB71ED01CB61
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0c0e5feffc55117f5be940a9494ec6b26e022f80568d490e2c464bc2a50980e4
                                      • Instruction ID: ef2a3ef8dca978d0e1169286abd4870c73cfdbea9402639c7fc16442e80268f9
                                      • Opcode Fuzzy Hash: 0c0e5feffc55117f5be940a9494ec6b26e022f80568d490e2c464bc2a50980e4
                                      • Instruction Fuzzy Hash: 8D416C74A00205DFCB05CF59C5989AEFBB1FF48310B118599DA16AB364C732FC91CBA0
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: da428eeb1373da985c5db27a2b1450016d917beb005476b1b2f5d05c82f75c6a
                                      • Instruction ID: 94e9f183c566556054506c69093291eddd13c617b4142f1386d6057ae6335117
                                      • Opcode Fuzzy Hash: da428eeb1373da985c5db27a2b1450016d917beb005476b1b2f5d05c82f75c6a
                                      • Instruction Fuzzy Hash: A131AD353002019FE719EB68D840BAABBA2EFC4214F00867DD20ACB365DFB1A805CB91
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f69a9335ee3384adbebac7a79ad0b84ee5c77718685051d4c62e57840effbec4
                                      • Instruction ID: 5519def2ebbd6a13f0f9f67d2d761d982da15571e6b88af1c63ceb8342faf20a
                                      • Opcode Fuzzy Hash: f69a9335ee3384adbebac7a79ad0b84ee5c77718685051d4c62e57840effbec4
                                      • Instruction Fuzzy Hash: 31311835A002058FDB14CFA9C498AAEBBF1AF8D315F1490A8E846EF351DB71ED11DB61
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b35339e45678007ebc70684507d5abe32f3a5e4a544974e702fbee67c31030e3
                                      • Instruction ID: 2654593c0c064e0c5b17e5f2f71e2a3ec4a124d02360b1357145e7dca6c9fd06
                                      • Opcode Fuzzy Hash: b35339e45678007ebc70684507d5abe32f3a5e4a544974e702fbee67c31030e3
                                      • Instruction Fuzzy Hash: AC316B74E002099FDB19DFB9D494BAEBBF6AF88304F149079E501EB355EA74AC41CB50
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f657909d789dcd94dd3d7d2d2e614676d7a7c7e009d7e58bf9e8566daf611813
                                      • Instruction ID: 8c2c77d8f872d558e13df0fd34fb33d07628b1368754917d2697c1d5c0ac5193
                                      • Opcode Fuzzy Hash: f657909d789dcd94dd3d7d2d2e614676d7a7c7e009d7e58bf9e8566daf611813
                                      • Instruction Fuzzy Hash: 4E314F74E002099FDB18DFA9D4947AEBAF6EF88304F109079E505EB354EA74AC41CB91
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f1582034badf99aecfab92450da9a77e1dcb53b02bde5fecdc1e65d2dc148a33
                                      • Instruction ID: 7937d3d7bff0064be8f63cace986da92656b3f77e4e0c84b8d738fbc6a90a50f
                                      • Opcode Fuzzy Hash: f1582034badf99aecfab92450da9a77e1dcb53b02bde5fecdc1e65d2dc148a33
                                      • Instruction Fuzzy Hash: 5C314D74A002049FCB18EFA9D498A9EBBF2BF88614F04456DD406EF395DB71AD45CB90
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 74b17ee6deb424afa3a0e4c3c3bf9b066701092f62c533e7b1d5842a6374994b
                                      • Instruction ID: 1c7cb4ee1081abd889bb5b6a326b7538b4464e53c37113282097a1a129cca24d
                                      • Opcode Fuzzy Hash: 74b17ee6deb424afa3a0e4c3c3bf9b066701092f62c533e7b1d5842a6374994b
                                      • Instruction Fuzzy Hash: 433161B8A002499FEB44EFA4D894AEEBBB2EF84700F15847DD615AF395CA749D01CF50
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0c878cf46309b7829c49efe172de09fdc059fcb05f79a71327d9b2408c518bdb
                                      • Instruction ID: 28da2415e36789c8c36bef26f0fbe195cd11c1e13ed08896eccd005b7d619a42
                                      • Opcode Fuzzy Hash: 0c878cf46309b7829c49efe172de09fdc059fcb05f79a71327d9b2408c518bdb
                                      • Instruction Fuzzy Hash: 8C219C75A043588FDB14DFAED440B9FBBF5EB88220F14846AD118AB340CB75A905CBA5
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 79a730f865907ba0d7246a43046374ee53751caeec3cb7183f23f2f82adf1d83
                                      • Instruction ID: c90b71026f6b4d9e503baca7bf607a5f15b30a40facb029d0f9952dc44703124
                                      • Opcode Fuzzy Hash: 79a730f865907ba0d7246a43046374ee53751caeec3cb7183f23f2f82adf1d83
                                      • Instruction Fuzzy Hash: 793164B8A002099FEB44EFA5D854AEEB7B2EF84700F118479D215AF394DF75AD018F94
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 45e895e3c852b1eaf41d3bdb1ef012f7c18915654f416984acb23eab9d02a724
                                      • Instruction ID: ecef3a3dd00b3fe814941884524343433a7d423ca384e19d0838bf9f963ffefe
                                      • Opcode Fuzzy Hash: 45e895e3c852b1eaf41d3bdb1ef012f7c18915654f416984acb23eab9d02a724
                                      • Instruction Fuzzy Hash: E3314874A002088FCB18EFA9D498A9EBBF2FF88714F04456DD406EB394DB75AC41CB90
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2300106352.0000000007B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7b80000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2da1ab743588af0facfc2b33ba8c0ec862b558baebdb92e411b17fde23721a26
                                      • Instruction ID: 283f49f6f2fe4dc8ca3e5165fa554847afef3654600e6d7b5e4b7269b63ca201
                                      • Opcode Fuzzy Hash: 2da1ab743588af0facfc2b33ba8c0ec862b558baebdb92e411b17fde23721a26
                                      • Instruction Fuzzy Hash: 25217AF9A00206DFFFA0AE5AC548BA577E0FF85661F0481A6E9088B250C334DD84CBA1
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2271057784.000000000344D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0344D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_344d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9d98202f254e2550bbdd0589445a2e95b3db1d24967d41d8850b0ca8c6dd3495
                                      • Instruction ID: c5c0531ca5c16e2928893d0623fb930314dd06a1eedc371f0365d86509ce3821
                                      • Opcode Fuzzy Hash: 9d98202f254e2550bbdd0589445a2e95b3db1d24967d41d8850b0ca8c6dd3495
                                      • Instruction Fuzzy Hash: 3121F776508300EFEB05DF50E9C0B26BB65FB98314F24C5AEE9090E356CB36D45ACBA1
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0a9a588a3240cadcf80440a4570f48dc6e5b16af22d844faa10146cf5eac9648
                                      • Instruction ID: ab8ea04fc633a9183ba5bc9ed1c7ad37f4a1b31b0ab034886c2ba990dd5d6924
                                      • Opcode Fuzzy Hash: 0a9a588a3240cadcf80440a4570f48dc6e5b16af22d844faa10146cf5eac9648
                                      • Instruction Fuzzy Hash: 08318BB4A057448EDB60CF6AD0887CAFFE2EF88324F28D42EC44D9B246D674A455CB61
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2271057784.000000000344D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0344D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_344d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 149b5ad59a848786905391ab315d81b4f52c157e8a0809ebe5b9b9a8bc364a60
                                      • Instruction ID: 481e8d123169821cf7ce6ad2c402c6d09f98a30b496269248cb77016144931ef
                                      • Opcode Fuzzy Hash: 149b5ad59a848786905391ab315d81b4f52c157e8a0809ebe5b9b9a8bc364a60
                                      • Instruction Fuzzy Hash: 0C21F275504244EFEB14DF24D9C0B26BBA5EBC4324F24C5BED90A4F352C77AD84ACA61
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1482fdefe4d71205cb18b94563ba4a1cb3245e0450b5045ccd217f119a8911f9
                                      • Instruction ID: 5e6c60b709044e0dad8f77d54440b302024e7a20b32c9fab1506aae63a2f0a06
                                      • Opcode Fuzzy Hash: 1482fdefe4d71205cb18b94563ba4a1cb3245e0450b5045ccd217f119a8911f9
                                      • Instruction Fuzzy Hash: 0C2159B4A057448EEB60CF6AD08878AFFE6EB88314F28D41ED41D9B246D67464918B61
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9fd2005edc964753e1282f7786f11ec113bea60fb11a9a528102dc13901c1329
                                      • Instruction ID: e449b6633ca05d0f4f51cc18966a80c2666847c8bf4620ac580117c1a8c1ab6c
                                      • Opcode Fuzzy Hash: 9fd2005edc964753e1282f7786f11ec113bea60fb11a9a528102dc13901c1329
                                      • Instruction Fuzzy Hash: 2011FE3A7001188FDB04DFA9D840AED7BF6EBC8365B0440A9E509DB315DB31ED118BA1
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a95b7001c3ec9c99635c9c32607df5530db62b7fc5e467fc4029dead35b6ae4b
                                      • Instruction ID: cd73c61a5eea70425b996a1f0ead5024117b6b8c8f34824a5eb17b140ceb1712
                                      • Opcode Fuzzy Hash: a95b7001c3ec9c99635c9c32607df5530db62b7fc5e467fc4029dead35b6ae4b
                                      • Instruction Fuzzy Hash: 9C11AC718053858FDB11CF6AC504BEEBFF0AF49314F2880AEC008EB252D379A548CBA1
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f4826e48261aadc1c764b2f7c8106f52091ea17c4ab2cb66236429194849b4e2
                                      • Instruction ID: 873328a717e5d1ee7d8785adaabec415fe60c5c67416a8ff6b8ed314b325603e
                                      • Opcode Fuzzy Hash: f4826e48261aadc1c764b2f7c8106f52091ea17c4ab2cb66236429194849b4e2
                                      • Instruction Fuzzy Hash: D4115E357052549FC716DF68D858AAABBF1FB89315B0444AEE40ADB352C731A806CB50
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2271057784.000000000344D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0344D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_344d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 226763f8ebee4a326c53d81c1b8fbc9c4432138e5169b0b621e51b23af87bf07
                                      • Instruction ID: 21382e3cc564d55a4c9347af0c18a7990adab58b06dc328768c582d2b2565f21
                                      • Opcode Fuzzy Hash: 226763f8ebee4a326c53d81c1b8fbc9c4432138e5169b0b621e51b23af87bf07
                                      • Instruction Fuzzy Hash: 35218C76504240DFDB06CF10D9C4B16BF72FB88314F28C5AAD9494E766C73AD46ACB91
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2271057784.000000000344D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0344D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_344d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1baa4135a3ffa84b7eafa0616a1ffb5636ea4d9d3a95b2124a7f7c9932413226
                                      • Instruction ID: 79a11e9601921cc799f7094e518af52f8cc4b21a134531b4944ab9a9f95752cb
                                      • Opcode Fuzzy Hash: 1baa4135a3ffa84b7eafa0616a1ffb5636ea4d9d3a95b2124a7f7c9932413226
                                      • Instruction Fuzzy Hash: D0118B7A504284DFDB15CF14D5C4B16BFA1FB84228F28C6AAD8494F756C33AD44ACB62
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a7e7336d47cf15a73c4a87a247ee4c87139ab4d86e0b920ec6597c1e5aaddc2a
                                      • Instruction ID: ec4b6bde73242327158979d91aefcbc24bbafbbbf9ee35c3dc57615aad61fe22
                                      • Opcode Fuzzy Hash: a7e7336d47cf15a73c4a87a247ee4c87139ab4d86e0b920ec6597c1e5aaddc2a
                                      • Instruction Fuzzy Hash: 4C11D2312087849FD729DB79D894A5A7FE0AF45210F1888FED18ACB6A2DB20F845C741
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a4b93fdf285c2957c48a95a3950a5e651d1f219bbbe80885596ad6289cd2a800
                                      • Instruction ID: 2f0c482597d56133cc5a4a8edf0bbc8753f70caa2ff691712df5c47a8541abc8
                                      • Opcode Fuzzy Hash: a4b93fdf285c2957c48a95a3950a5e651d1f219bbbe80885596ad6289cd2a800
                                      • Instruction Fuzzy Hash: B7116AB1900309CFDB10CF9AC504BAEBBF4EB48324F24806DD508AB240D779A544CBA5
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0580a1a3dd486b05dc5a357fb031529bff7e522096f2f0bca873df68d3fe3f91
                                      • Instruction ID: 75696b70c74a98dde9ab0efbff07645c53c1eb7d3df6145be3f9dca65b68a9b9
                                      • Opcode Fuzzy Hash: 0580a1a3dd486b05dc5a357fb031529bff7e522096f2f0bca873df68d3fe3f91
                                      • Instruction Fuzzy Hash: 90111B34204754CFC728DF79D09089AB7F6EF8931936089ADD48A8BBA1CB32F845CB50
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f300ed52d173eb793a98352c5e2b690ffd205047b6fc5b251c84b53d4400a709
                                      • Instruction ID: 2b51c3d9f4a28f0a32bc6ace4e4701b1bc605cc9443fecfd8e093ba652f30158
                                      • Opcode Fuzzy Hash: f300ed52d173eb793a98352c5e2b690ffd205047b6fc5b251c84b53d4400a709
                                      • Instruction Fuzzy Hash: C8015236B05214DFCB25AFB5E808AAEBBF5FB88315F14406DE51AD3342DB31A911CB91
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1797a939c807f984a41269cc45ed8157aded9aa6de3034e58f5bd0a45d2303aa
                                      • Instruction ID: a3e819aaf18928ae8c246106ee8a0dd5db852725f44c924ea25be98c2da05694
                                      • Opcode Fuzzy Hash: 1797a939c807f984a41269cc45ed8157aded9aa6de3034e58f5bd0a45d2303aa
                                      • Instruction Fuzzy Hash: CCF0A4353093A15FD7028A799C9096B7FE9DF9651170944BBF584CB3A3C670CD04C760
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2271057784.000000000344D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0344D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_344d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c8213955c190c2c339398bf79f9d0425f37632edfabee1112051ede73d43a55c
                                      • Instruction ID: fd86af056ccd1d0548e0c9fd515de5706b72129c63d8a75722585ee309ea9741
                                      • Opcode Fuzzy Hash: c8213955c190c2c339398bf79f9d0425f37632edfabee1112051ede73d43a55c
                                      • Instruction Fuzzy Hash: 6201047140E3C05FE7128B25C994756BFB4DF43224F1D81DBD9848F2A3C2695845C772
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2271057784.000000000344D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0344D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_344d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 07d022e304d60b023c09db720c5b64fb277120c4536ef6f6c45f85cc49dc2d45
                                      • Instruction ID: fed247e99de0dabc5163c8de1cd0e172b4748969bd763266460026911efed41d
                                      • Opcode Fuzzy Hash: 07d022e304d60b023c09db720c5b64fb277120c4536ef6f6c45f85cc49dc2d45
                                      • Instruction Fuzzy Hash: F401DF718043409AF7108A25CD80B67BF98EB82228F08C06BED181F243CAB89842C6B5
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3ac714926f9dd0fb4fe792a9d6482f0d4773a59e978525ac605c9b79ceb01bc2
                                      • Instruction ID: 478ad5603ba9107abe17c5062d733b2cea5e85a3a5a601b3c32015ad21d13c6b
                                      • Opcode Fuzzy Hash: 3ac714926f9dd0fb4fe792a9d6482f0d4773a59e978525ac605c9b79ceb01bc2
                                      • Instruction Fuzzy Hash: 99F02B717012109FE724CB69D844E6F7FE5EBC8621F00062DE44AC7340DE306C0587A1
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2271057784.000000000344D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0344D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_344d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9e53e347bbfc8a7b499ec296cf81f9fd4a054a7fda2fc0b3401548062886c73b
                                      • Instruction ID: e20a854fa8deff0e8114576c68f731f99e430e85acee6ea8a32afc76304857b2
                                      • Opcode Fuzzy Hash: 9e53e347bbfc8a7b499ec296cf81f9fd4a054a7fda2fc0b3401548062886c73b
                                      • Instruction Fuzzy Hash: BDF0F976600604AFD720CF0AD985C27FBEDEBD5670719C56AE84A8B712C671EC42CEA0
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8de08df67e09fcc26c5ac7bdf45fbe301617acc57fb3ec1ee9679ab1f7602c5a
                                      • Instruction ID: 93352bcce5ee9f2229f754cafb645fba6502dba2feb4cce5651a5162938bfa3c
                                      • Opcode Fuzzy Hash: 8de08df67e09fcc26c5ac7bdf45fbe301617acc57fb3ec1ee9679ab1f7602c5a
                                      • Instruction Fuzzy Hash: BCF0C235B082404FE355AF2490587ABBBA1EFC5319F1081AFC5568F292CE396846CBA1
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c90da082b596c2141bb8131c6ab77a9e7a0b61d8d2cb4bf1f4774bfd13ef1290
                                      • Instruction ID: 0386e24162aa661ee7aeaae644ea3e549afc78ab70e5bb51098488d53eba160c
                                      • Opcode Fuzzy Hash: c90da082b596c2141bb8131c6ab77a9e7a0b61d8d2cb4bf1f4774bfd13ef1290
                                      • Instruction Fuzzy Hash: 49F05E387042508FC3119B2CD894CBABBF69FCA31931950AAE185CF772CA61DC12CB91
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0ac74ef878532383d334ca68bd3899c83b1f18ccc6457dd7414a20f39672a695
                                      • Instruction ID: 9169b13a3e056c93bc0fa60b2cafa2dbd0a05c102dfd1cf232d59e72a93e1da3
                                      • Opcode Fuzzy Hash: 0ac74ef878532383d334ca68bd3899c83b1f18ccc6457dd7414a20f39672a695
                                      • Instruction Fuzzy Hash: 9BF0A035700714AFE724DB6AE844A6FBBE9EBC8675B000A2DE10AC7340DF71BC0187A4
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2271057784.000000000344D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0344D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_344d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 36656b980d165bf1b9ee809b1aad376458c49c1bffbb87491901682f1b41eca3
                                      • Instruction ID: 99d6906d11fae632ea89fca9076d1a105273b6d8432ccf1f249ff7f763799d95
                                      • Opcode Fuzzy Hash: 36656b980d165bf1b9ee809b1aad376458c49c1bffbb87491901682f1b41eca3
                                      • Instruction Fuzzy Hash: 37F04979100A40AFE321CF06C984D23BBB9EB85620B198499A85A8B312C670FC02CF60
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ec93631f7f8571d637cd468f304637c6af9d8d963b4385820ebd56f9ece45116
                                      • Instruction ID: eaa20c8a5a3a7313d27dda874362272a287f1d833d1e6f9eaf11d74c1dcfac73
                                      • Opcode Fuzzy Hash: ec93631f7f8571d637cd468f304637c6af9d8d963b4385820ebd56f9ece45116
                                      • Instruction Fuzzy Hash: A3F0E531B882A56DCB26997C98848DE7F948F96120F0400BDE541AF253C651941AC391
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dcb864306b65d90341a1776d5caa788fd4a9dd4a81cbbddff9d9b35b5d797407
                                      • Instruction ID: 8b276c93f9d34e5098ba3290a57c1f021351115a59141f06024916838cc7846d
                                      • Opcode Fuzzy Hash: dcb864306b65d90341a1776d5caa788fd4a9dd4a81cbbddff9d9b35b5d797407
                                      • Instruction Fuzzy Hash: 27F0E5397001048FDB00DBBDD800AEA7BE2EBC875570945A9E509CF311DF70EC128BA1
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f17a37c42b9c12d466317106374e438e59c6504556fc6ec1adcb372e02faa39c
                                      • Instruction ID: 671727d8a81fd3ccaace10a40b2ce77138b14adcb801051a6a04cf5671318840
                                      • Opcode Fuzzy Hash: f17a37c42b9c12d466317106374e438e59c6504556fc6ec1adcb372e02faa39c
                                      • Instruction Fuzzy Hash: A3F0E2396042044BE314BF65D0187ABB796EBC0718F10812EC50A4B385CE396842CBE0
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2ebe057b7336d74c4f6f4630c89d0856d93c1ca109d5b22f45210d8216e95677
                                      • Instruction ID: 98c195b4e8da84b60200792ee9d1ffef947d41e9f10695f57b4d16346f63c5bf
                                      • Opcode Fuzzy Hash: 2ebe057b7336d74c4f6f4630c89d0856d93c1ca109d5b22f45210d8216e95677
                                      • Instruction Fuzzy Hash: AEF09070A093915FD765EFB894DC38ABFE0EF02210F0404AED44ACB282CB346885C750
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 114e6e4a7bf7069b57435f891c1f93af05fec8947604488dd024864d0fc5b9e4
                                      • Instruction ID: b78b62145d074b1897b8cdb4b7af825e075a868dcd2099d234959cfe0a17122d
                                      • Opcode Fuzzy Hash: 114e6e4a7bf7069b57435f891c1f93af05fec8947604488dd024864d0fc5b9e4
                                      • Instruction Fuzzy Hash: 93E01A397002108F83109F1DD898C6AB7FAEFCE76971950AAE549CF731DA61EC11CB90
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c122f6d1eac6cd3f03c8050b84309ed24e5ad0af01c75be175bb85481185ec78
                                      • Instruction ID: 368bc829e6f86bfcc92b80197c5c076af1b78984fe7fa49b28dba5e97bfef0ff
                                      • Opcode Fuzzy Hash: c122f6d1eac6cd3f03c8050b84309ed24e5ad0af01c75be175bb85481185ec78
                                      • Instruction Fuzzy Hash: B3E09A2174A2E21A8756A2BC68105BA6EDA5FC206830910FEC945CF293D844AC1683B2
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 82ae1911a94086d8ade93f5004ccce56fe46761b0056eda1ea524fd639d98ac1
                                      • Instruction ID: 58a38487204ec9b1ec9c06c7a77e7c844f896fd5b1a92bf35263bc043ecc9e32
                                      • Opcode Fuzzy Hash: 82ae1911a94086d8ade93f5004ccce56fe46761b0056eda1ea524fd639d98ac1
                                      • Instruction Fuzzy Hash: 9EE0E531B100506BCB098A6CD8408EDFBE6AFC9210F04807EE4069B641CA216416D6E0
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5eb4c5bde0db9acc39e49c4c864d01ff5556f9bbe740eb093dadb1f9b5bccbaa
                                      • Instruction ID: d1c56294f84bd967750cef1a2ad1d1c1c3ca563c6e588a75c7b59fa3f4a3d0fa
                                      • Opcode Fuzzy Hash: 5eb4c5bde0db9acc39e49c4c864d01ff5556f9bbe740eb093dadb1f9b5bccbaa
                                      • Instruction Fuzzy Hash: DEF0823530D2915BCB1A6BB4A4185AE6FA19BC6614B05007FD106CB283CE6848058795
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 89d8fc67eb71597b73f4251b55da4b7ae44cd560c11b6a0a32c6b659861aea1d
                                      • Instruction ID: be6cfc38585f00302c342d62f8711ff9957e23618d00f64819f9fd778b00a0a3
                                      • Opcode Fuzzy Hash: 89d8fc67eb71597b73f4251b55da4b7ae44cd560c11b6a0a32c6b659861aea1d
                                      • Instruction Fuzzy Hash: 8DF0BD39A55108DFCB00DF98E989D9CFBF2FF48220B158544E90AA7322CB31AD01CB80
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9323158dd5e90d4bc86f177d5aba6da2cf9926f147c606b1317d7458aaaa891d
                                      • Instruction ID: 4c0371db9a156ffacc5f6a7042e5f523a0396c1d8ce7d58e7a327d71268ef8ff
                                      • Opcode Fuzzy Hash: 9323158dd5e90d4bc86f177d5aba6da2cf9926f147c606b1317d7458aaaa891d
                                      • Instruction Fuzzy Hash: 46F06D70A043044FD360EFB9E49C79ABBE5EB44320F40442DE50ECB341DB396880CB90
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5823ca735089911f7396a12bcc90095d4bc99f4e55f9dbb22848926ed890ce3e
                                      • Instruction ID: 1f28882af76f48400e29a93b6e111f56f893e84dee9c6410b1e5c01b40fcab8a
                                      • Opcode Fuzzy Hash: 5823ca735089911f7396a12bcc90095d4bc99f4e55f9dbb22848926ed890ce3e
                                      • Instruction Fuzzy Hash: F9E0862674D3D11E5B5B913D64A04AA5FB38AD752130A80FAD084CF242C8518C0B8391
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b6b612dafd42a5c2cd6a2f6aa5988d78cd45fa4cc9b7fdb37a17baf09877b524
                                      • Instruction ID: bf8743d5e5e2e55ccfa0e3f97724e49c6e393513d6d09c18623135b2fe765b4c
                                      • Opcode Fuzzy Hash: b6b612dafd42a5c2cd6a2f6aa5988d78cd45fa4cc9b7fdb37a17baf09877b524
                                      • Instruction Fuzzy Hash: AEE01270E04249AFC780DFF8C49116AFFF4AF09200B2080BECA49EB312E6715612DBD1
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 03131b03775e5491d958408f20d3f134b488cc1484821f1f9949cfd1d4811345
                                      • Instruction ID: aa86ec405c5938978238447ba15376abf8880a7f0ab01da9a3b1569371405d0a
                                      • Opcode Fuzzy Hash: 03131b03775e5491d958408f20d3f134b488cc1484821f1f9949cfd1d4811345
                                      • Instruction Fuzzy Hash: 45E0263530831047CB097BB5A40C6AEBA56EBC9B24F00002ED6078B342CF78691183D9
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 20477b45c72e1d72ce89a485c1baf5a99ff82700a610264f0946298b359f0966
                                      • Instruction ID: 8310470d448d220a8f3a753925f4a87d4397f087b14e43bb9323b7405c6a68de
                                      • Opcode Fuzzy Hash: 20477b45c72e1d72ce89a485c1baf5a99ff82700a610264f0946298b359f0966
                                      • Instruction Fuzzy Hash: 1DD0A722B0122117165472FE6801ABBA5CEAFC45AD7052036DA09CF342EC44FC2243F1
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fd4c8d452a5771c60ee91f320fcc0371df8875e812d4233fbae53c791bb77087
                                      • Instruction ID: e018d0222ef56fb1f16c50254547270be4f88be640b64512e4d6df131a348dfd
                                      • Opcode Fuzzy Hash: fd4c8d452a5771c60ee91f320fcc0371df8875e812d4233fbae53c791bb77087
                                      • Instruction Fuzzy Hash: E6E08635B1001497CB08995DD8108EDF7AADBCC220F04C07AD90AAB740DA32791586E1
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 23cc96b137676b3d017eb458f96f7c0e6501053330aacd63bbdc2db47bca48ba
                                      • Instruction ID: e6b73c859f8d9e0405b27ed2e09fe8f7633db88b882558fd661f5d3d3717f13c
                                      • Opcode Fuzzy Hash: 23cc96b137676b3d017eb458f96f7c0e6501053330aacd63bbdc2db47bca48ba
                                      • Instruction Fuzzy Hash: C0E09230A4C3865FCB59EFB8D44686FBFF0AB45200B0041BDD90ACB243D6215406DBC1
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: feb5e3de944101e1cd2cbca3980cdb8f4af553154d1e2bf374e04ea4daeaa6bc
                                      • Instruction ID: b888625bff45558cabbd1da6183ecb83b5d26ca6c6234db8f7c412d971cf9ab1
                                      • Opcode Fuzzy Hash: feb5e3de944101e1cd2cbca3980cdb8f4af553154d1e2bf374e04ea4daeaa6bc
                                      • Instruction Fuzzy Hash: D3E04F31E080468BCB0DBBF4D8994FDBF70EE15301B4001ADD45397492EA22199ACBC0
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                      • Instruction ID: d287ac535db8a8380b3d76df407d87eccd15eaf2e9db4b0477c3e4b2ab733b1a
                                      • Opcode Fuzzy Hash: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                      • Instruction Fuzzy Hash: 96D06270D042099F8780EFADC94156DFBF4EF48200F5085AA8919E7301F7319612DBD1
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 30453a5342bad4b1f2d6f3307f9485c440a7a456d9a68eb4f2b0181a018084a4
                                      • Instruction ID: a46d4444bec4ffa1dbc401dfc68b808bbbaa80cd2c38a3b38e6e3625a998aff3
                                      • Opcode Fuzzy Hash: 30453a5342bad4b1f2d6f3307f9485c440a7a456d9a68eb4f2b0181a018084a4
                                      • Instruction Fuzzy Hash: EFD067319081098BCB1CBBA5E85A4BDBB74FB14301F40416DE91792191EA322A5ACBC5
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d083c9ef76e03a7eacf72583885376cc70b37b535c1e791f7130a30091bc3875
                                      • Instruction ID: 47a4f174e48028be67f7f0a4df3ba89634beea65005c518c153814c613d0112b
                                      • Opcode Fuzzy Hash: d083c9ef76e03a7eacf72583885376cc70b37b535c1e791f7130a30091bc3875
                                      • Instruction Fuzzy Hash: 8BD01734A0820A8BCB58EFA4E44686EFBB4EB44300F004169DA0A93355EA316811CBC1
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 698ad6d28139cbcfec37fdc74e8f17ffe0a6d8abb31a2f7fb7a668bc3fa18307
                                      • Instruction ID: d840ea770d825653df14c923c25b39ea287ca8e983de14a1939cba3e60246941
                                      • Opcode Fuzzy Hash: 698ad6d28139cbcfec37fdc74e8f17ffe0a6d8abb31a2f7fb7a668bc3fa18307
                                      • Instruction Fuzzy Hash: 3FD09239B84218CFCB14DB98E895ADCF3B1FF84325F1480A5E9169B251CB32A916CB40
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: eb2e8dfc7453366d63f88b0895e33b7b5689fbc3b16952ba87219088e80a44e4
                                      • Instruction ID: 64f09f4ca2ecc783bba0062eeef71170b59b81578782b4161e568ef78b2d992c
                                      • Opcode Fuzzy Hash: eb2e8dfc7453366d63f88b0895e33b7b5689fbc3b16952ba87219088e80a44e4
                                      • Instruction Fuzzy Hash: 0DD012748493849BEB254F74A4D59143F546B12211F0405DDDC860E6A3D9768898CF45
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 081e925bb83c0ab27766caef415bcdf4da2ecaa22bd140f0dcc8666fcd6854e9
                                      • Instruction ID: 7a0686a08b55ad82ea776c7c3be89ca5bca5e1589fe98d86f388e3918dfcecab
                                      • Opcode Fuzzy Hash: 081e925bb83c0ab27766caef415bcdf4da2ecaa22bd140f0dcc8666fcd6854e9
                                      • Instruction Fuzzy Hash: 72C08C628091810BFF09A236441A6226E222782100F0781E9849586480C820400ECA03
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.2273253656.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_4ea0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f1946c1cd0287a74f650ba1ba183ed8a947a2b017151a7581ffe2e0fc8238b58
                                      • Instruction ID: 30eced8b445f7726dfd637ca47caf60ec297993258ce4be529c70b362aa9d140
                                      • Opcode Fuzzy Hash: f1946c1cd0287a74f650ba1ba183ed8a947a2b017151a7581ffe2e0fc8238b58
                                      • Instruction Fuzzy Hash: D0B092301857488FC2586F75A804814772DBB4022538004A8E80E0A7A28E76E884CA48
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: kU'n^${U'n^$['n^
                                      • API String ID: 0-3725065086
                                      • Opcode ID: 88e78c201c822671e8091a7aa3ab56afaf193bd547b8352a2c80f9afbde36800
                                      • Instruction ID: d0ca47d4d8bc288bf9606b0fb451bcf2e94624e34dcf3b201431ddb94763e34c
                                      • Opcode Fuzzy Hash: 88e78c201c822671e8091a7aa3ab56afaf193bd547b8352a2c80f9afbde36800
                                      • Instruction Fuzzy Hash: FE9183B4F017559BDB19EFB488506AE7BB3EFC4610B40892DD106AB344DF386D068BD5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: kU'n^${U'n^$['n^
                                      • API String ID: 0-3725065086
                                      • Opcode ID: 9ff30bf80a1678ed6f474e213ff450d73d1c9e8e82a4c9c1c8be908d3387d1f4
                                      • Instruction ID: 5b51ec95248f3c9f76ad243eaed10858335649294db9570d5def3bdd6a12f359
                                      • Opcode Fuzzy Hash: 9ff30bf80a1678ed6f474e213ff450d73d1c9e8e82a4c9c1c8be908d3387d1f4
                                      • Instruction Fuzzy Hash: B49181B4F017559BDB19EFB488506AE7BB7EFC4A00B40892DD106AB344DF38AD068BD5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: B'n^
                                      • API String ID: 0-1927066434
                                      • Opcode ID: 85b58eaa1f64360be44d63a0e6d4593efc6f31e2c563a6b1f52a59473015e57a
                                      • Instruction ID: 6416d16fe60c9a84facc97517bbbb74893370e2ba1f3d727d5a5ab57cc2d2ad1
                                      • Opcode Fuzzy Hash: 85b58eaa1f64360be44d63a0e6d4593efc6f31e2c563a6b1f52a59473015e57a
                                      • Instruction Fuzzy Hash: C5F0A4755043445FD315EB28D48096ABBA6EFC22247158A7EC14A8F725DA79AC0AC7A0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: B'n^
                                      • API String ID: 0-1927066434
                                      • Opcode ID: 8f1ffc9450d95f814e8fef816c13977a33a2874eeaf505f06ecccc84d256b0eb
                                      • Instruction ID: b1b3151364c7712e00cd1b9a8e40946422088ef98d1d020dbbddd5f492e6f1bb
                                      • Opcode Fuzzy Hash: 8f1ffc9450d95f814e8fef816c13977a33a2874eeaf505f06ecccc84d256b0eb
                                      • Instruction Fuzzy Hash: 48F0A7792003045BD314EB29D88095BBB96EFC56257009A3DD20E8F714DF7AEC0687E0
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2366442352.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7b40000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0dd808774ce347688a507f900a6318f1c1ee4b7ad8e0b1ac89b4b272a8e48ff6
                                      • Instruction ID: f4e54b9f045254746fca975553f64c4fc7b0be22161c2b09b20779f9dbde0800
                                      • Opcode Fuzzy Hash: 0dd808774ce347688a507f900a6318f1c1ee4b7ad8e0b1ac89b4b272a8e48ff6
                                      • Instruction Fuzzy Hash: E0B1F6B2B00206DFEB249BA888447AE7BE1FFC5210F1484FAE505DB251DB71CC45E762
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2a2b8a8d71c9b5123052a2b96bd2fa7585e228db3eaa0bc68ef556c73052b30b
                                      • Instruction ID: 523f13ff76b4ec122913fef7c675f2714e5b011d01f94b1fab3b514597f55a92
                                      • Opcode Fuzzy Hash: 2a2b8a8d71c9b5123052a2b96bd2fa7585e228db3eaa0bc68ef556c73052b30b
                                      • Instruction Fuzzy Hash: 6D915974A00605CFCB15CF59C494AAEFBB2FF88310B2486A9D915AB365C735FD52CBA0
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2366442352.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7b40000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 40afc05de2df729d97589d5702bcab4fcf86447f0f5917d5475938ccfabad51d
                                      • Instruction ID: dde75cb45fcb2b9ee0b451b1aa54bc2649cd6c76114564df8984272178815154
                                      • Opcode Fuzzy Hash: 40afc05de2df729d97589d5702bcab4fcf86447f0f5917d5475938ccfabad51d
                                      • Instruction Fuzzy Hash: 74514BF2B0435E9FE7209BADC80066ABBE5DFC5210F1480BBD515DB252EA31CC81C761
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7cd11e1d39c61ddca3b73a205135d3d591019dc67ded5fd0a1d718cbbbd60efd
                                      • Instruction ID: a532c90f66819065afcdfdc7dd3bff72d01583e797ca615c8e7630c606449beb
                                      • Opcode Fuzzy Hash: 7cd11e1d39c61ddca3b73a205135d3d591019dc67ded5fd0a1d718cbbbd60efd
                                      • Instruction Fuzzy Hash: 0151BB347052069FD705DBA9C854A6A7BE6FFC8254B18846AD609DB352EB31EC02CBA0
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7bb2c674f78affae02e7db52588f9fb06b544ec1d11ad2d8f57cf1bfbfb49edc
                                      • Instruction ID: 90e77dd7fe391303e09c6d657c67e3e0fb06f8c5e045e4116e2c00b8c3144b10
                                      • Opcode Fuzzy Hash: 7bb2c674f78affae02e7db52588f9fb06b544ec1d11ad2d8f57cf1bfbfb49edc
                                      • Instruction Fuzzy Hash: BF611375E00248CFDB14DFA9D584A9DBBF2FF88310F14812AE819AB355EB74AD41CB60
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bb62c200ce23e4555ed8091aa3371e9a1a8bff48d051b2ca020ee57ec023505d
                                      • Instruction ID: faad464183cfd122ea724ef3a17af7f86450798b8248ab7add3c44e6633bea5c
                                      • Opcode Fuzzy Hash: bb62c200ce23e4555ed8091aa3371e9a1a8bff48d051b2ca020ee57ec023505d
                                      • Instruction Fuzzy Hash: B4512674E00248DFDB14DFA9D584A8DBBF2FF88310F14802AE819AB355EB74AD45CB61
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2366442352.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7b40000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6c67125a28b7e3909b2d5dda1cf7278ad596c5396f42979dd4acfbba0274c815
                                      • Instruction ID: e03cd4ea19402c6301c718fef62ec89ee4fcbe3d7f0acc137390fbd5f3e6ab07
                                      • Opcode Fuzzy Hash: 6c67125a28b7e3909b2d5dda1cf7278ad596c5396f42979dd4acfbba0274c815
                                      • Instruction Fuzzy Hash: 41418AF1B40211CBEB259BB8C5107AEBBD29FC1614B1848EAD501AB742DF32DD01D7B6
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ef67fde627fb1ab3624e3f6b5edc449c13309587f8e2c1d438a2a41b3eb4fad7
                                      • Instruction ID: e1d1f86c08eceb5d7bcfd77bd0de2911c5a8309c3a2bd31ba761f420463e783f
                                      • Opcode Fuzzy Hash: ef67fde627fb1ab3624e3f6b5edc449c13309587f8e2c1d438a2a41b3eb4fad7
                                      • Instruction Fuzzy Hash: C7412834B052058FDB08DFA4C594AAEBBF2EB89715F1480A9E502AB391DB35ED01CF61
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 47caaef925b6d9c15d36ba5c9b45209f3c5d4ff952270d2db745bebb116cb76c
                                      • Instruction ID: 2fb03f5977db86944154f489c64f133d24f4662cc31c9943319414fd3ba2522a
                                      • Opcode Fuzzy Hash: 47caaef925b6d9c15d36ba5c9b45209f3c5d4ff952270d2db745bebb116cb76c
                                      • Instruction Fuzzy Hash: E2414974A00605CFCB05CF59C5989AEFBB2FF48310B1585A9D916AB364C736FD51CBA0
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 313b62a620be757191b8de9b31782f7ed5665ac46a2c89cf60489014c7a3869a
                                      • Instruction ID: 8786c78aa732576c3b5f4e4bc178f80e4a3b44c9b897e9aabc8471ab878d0329
                                      • Opcode Fuzzy Hash: 313b62a620be757191b8de9b31782f7ed5665ac46a2c89cf60489014c7a3869a
                                      • Instruction Fuzzy Hash: 02318F393006019FE709EB78E894B9ABB96EBC4311F04953DD60ACB355DFB5A8058BA1
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8cfabd011b73b149215526f87414ad8a00235ed3eb35b06404ab11dbbe13084f
                                      • Instruction ID: 7726e0fdd1efa1bcb982bc611b478f83d02e2436d54e7bc9aae3adf7eccba98f
                                      • Opcode Fuzzy Hash: 8cfabd011b73b149215526f87414ad8a00235ed3eb35b06404ab11dbbe13084f
                                      • Instruction Fuzzy Hash: 5A310A34A012058FDB14DFA4C598AAEBBF2EF8D315F1890A9E406AB351DB31ED41DF61
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 67abbaf418f6e614399d5fb9ddb275b6222fd1844396883ad98c1e85b49fbcc9
                                      • Instruction ID: a77e2ff055e93f42a59d7ac77c7dff9ce4393a3a360566422300cef77b6d3d3b
                                      • Opcode Fuzzy Hash: 67abbaf418f6e614399d5fb9ddb275b6222fd1844396883ad98c1e85b49fbcc9
                                      • Instruction Fuzzy Hash: 0331AE74E002099BCB04DFB9D4887AE7BF6EF88310F14802DE405EB355EB75AC419BA1
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8398e68f880646c9538fec647c41c9b546b380472bc3103cf2bf7a91d2558114
                                      • Instruction ID: 2927cf6c9f19f49b5fc05c4f943f7937ab716c37440c3aa44ec89eb812a5ecac
                                      • Opcode Fuzzy Hash: 8398e68f880646c9538fec647c41c9b546b380472bc3103cf2bf7a91d2558114
                                      • Instruction Fuzzy Hash: 1C31E2349087818FDB24DF78E44469ABFF1AF06320F1488AED09ECB6A2D735B905CB41
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3e6c89ea41e2f32ec3399e039d25d2771dd6183d17a7a4760421fb2af5de7473
                                      • Instruction ID: 9a52ae137f528399d6fc51b9c8500d4b06926a6948133825c37ce3ff60050527
                                      • Opcode Fuzzy Hash: 3e6c89ea41e2f32ec3399e039d25d2771dd6183d17a7a4760421fb2af5de7473
                                      • Instruction Fuzzy Hash: 30316B74A002048FCB18EF69D49869EBBF6FF89314F04846DD546EB351DF34A845CB90
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 23d3cd4402649736c1249e6072d385c8644494a623b04c6a192908f880c863f9
                                      • Instruction ID: 1dd09a0308b14cfa75fd51761f569fb9f249a2f7be744d097dfe257600931db2
                                      • Opcode Fuzzy Hash: 23d3cd4402649736c1249e6072d385c8644494a623b04c6a192908f880c863f9
                                      • Instruction Fuzzy Hash: A6318EB8E003499FDB05EB64D898AAE7BB3EF85300F1184A9D101AF395DA799D418B60
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b97ce4d25e31464691575816249e94efa02f7dd04f5eb6ca608442068f8d8da9
                                      • Instruction ID: 47f2fc6b4f3f077a508e02b45307885ed3ee7aa8be5fbc45c9876b5b26e6098c
                                      • Opcode Fuzzy Hash: b97ce4d25e31464691575816249e94efa02f7dd04f5eb6ca608442068f8d8da9
                                      • Instruction Fuzzy Hash: 77317A74E012099FDB04DFA9D4987AEBBF6EF88300F14902DE505EB354EB759C419BA1
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 614a9941af90ad105b6a8ad02b397e2b24e16a9bb8cf36858f04df95e4c049e1
                                      • Instruction ID: 1eefda505f0ae2000c7f1f7f8ec39830fae6c88989129cafcdf898ae40374aff
                                      • Opcode Fuzzy Hash: 614a9941af90ad105b6a8ad02b397e2b24e16a9bb8cf36858f04df95e4c049e1
                                      • Instruction Fuzzy Hash: A021DE75A043188FCB14DFAED84479EBBF6EB88320F14842ED408E7340CB75A9058BA5
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2366442352.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7b40000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6265833159114727a1d0f629bffd51b2ef90eff99ddd3837b148719e6be4c069
                                      • Instruction ID: 3ee6b232699771bbab1f2a8d02651c91f2ab58213308f4452ee6e166186623b6
                                      • Opcode Fuzzy Hash: 6265833159114727a1d0f629bffd51b2ef90eff99ddd3837b148719e6be4c069
                                      • Instruction Fuzzy Hash: 9F2148F5A00206EFEB208F59C544BEAB7A0FF85661F0480E6F9049B250D734DD84FBA2
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2366442352.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7b40000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2313521aee2252237b0a73ad1f212a8b92d124a2d4df7e84e9c47a6efef1cdd7
                                      • Instruction ID: 7682a652ff520e20908a5188fc64ddb07fec659d154966966c6a91e79984d09f
                                      • Opcode Fuzzy Hash: 2313521aee2252237b0a73ad1f212a8b92d124a2d4df7e84e9c47a6efef1cdd7
                                      • Instruction Fuzzy Hash: A721D6F2E0434E9FE710DB9CC8407A97BF1EF45221F0541E6D514CB152D3318985D762
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f3cc0283258fc537b11ae2052abb3978432ba72ef2fe743a5ead0b908b19e3ef
                                      • Instruction ID: 8933b758450adb05287a94521440ea241e577a09affd6d1420bda71f126be148
                                      • Opcode Fuzzy Hash: f3cc0283258fc537b11ae2052abb3978432ba72ef2fe743a5ead0b908b19e3ef
                                      • Instruction Fuzzy Hash: E8311478A002048FCB18EB69D498A9EBBF6EB89714F04946DD446EB391DF74AC45CB90
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1edd3bef09f3cd1a06c87b20df1c9cf0edaa3f8e11682fe3c3eb1c5fdf5a7b90
                                      • Instruction ID: 7f6fe5a2ea4b79cd611e6605274b928dcdc884bc5e376822a66536a7211bc769
                                      • Opcode Fuzzy Hash: 1edd3bef09f3cd1a06c87b20df1c9cf0edaa3f8e11682fe3c3eb1c5fdf5a7b90
                                      • Instruction Fuzzy Hash: 4D3150B8E003099FEB04EBA4D894ABE77B3EF84700F118469D111AB394DB399D418F50
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 34ce1cd865c87ec549791b82bcea52f472176771ed18091d5b05d065f9d576bb
                                      • Instruction ID: baedcbfb10787babcb4e24a7dbe4128f5093257acfba58e2539440bc5e608a06
                                      • Opcode Fuzzy Hash: 34ce1cd865c87ec549791b82bcea52f472176771ed18091d5b05d065f9d576bb
                                      • Instruction Fuzzy Hash: A3319CB59057848EEB60CF6AD08839AFFF6EF88320F28C05DD44D97215DB74A445CB61
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2328439149.000000000338D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0338D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_338d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 12c085291319b69a4edd969adb7a8768d29a1fad7d0a1aa1a7f45d49122e8bdc
                                      • Instruction ID: e10f9d07704c8ffff45b31a598c6e0fa8bfc5deaec37eed9cac78636b91e471a
                                      • Opcode Fuzzy Hash: 12c085291319b69a4edd969adb7a8768d29a1fad7d0a1aa1a7f45d49122e8bdc
                                      • Instruction Fuzzy Hash: BE21F776608300EFDB05EF50E9C0B26BB65FB88314F24C5AEE9090B256C736D496CBA1
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2366442352.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7b40000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7c3c74e85c47665b32324c8e35e091341b9782dd048ab2da6f2a907fcd257acc
                                      • Instruction ID: ca99e70c518b757c3622a9c319c3b97c163afe3a660f9eeb468acc5fa3919ab8
                                      • Opcode Fuzzy Hash: 7c3c74e85c47665b32324c8e35e091341b9782dd048ab2da6f2a907fcd257acc
                                      • Instruction Fuzzy Hash: F721B2F2E0434E9FE7118B5CC844AAA7BF1EF46220F0541E6D5148B252D7359886D7A2
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2328439149.000000000338D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0338D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_338d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ca0a7a6c46f50021bc9316788f4c46fd4c683bccdf9f71601c949cc3fe70f79a
                                      • Instruction ID: 0fe72c718f7324bd785dc91bd2af295349a2f4022559cd787f530ed57d4bbab5
                                      • Opcode Fuzzy Hash: ca0a7a6c46f50021bc9316788f4c46fd4c683bccdf9f71601c949cc3fe70f79a
                                      • Instruction Fuzzy Hash: A52129B5504344DFDB14EF14E9C0B26BF69FB84314F24C5ADD9094B252C77AD446CA61
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6a20840f4a37e52def5bf9f2407cecfa7fec94e517c907f51b947b69ae8c9c59
                                      • Instruction ID: 91559bb893909f89a53863c1320c617bf88ed923fe36cbc6da841b4d239f02f6
                                      • Opcode Fuzzy Hash: 6a20840f4a37e52def5bf9f2407cecfa7fec94e517c907f51b947b69ae8c9c59
                                      • Instruction Fuzzy Hash: BF217AB49057448FEB60CF6AD08838AFFF6EF88320F28C45ED85D97205DB7464808B61
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5e7bdc4498c8a8c27fe3d632c5d63954bdd44aed7ffbb1a61c486b6b8687e8bb
                                      • Instruction ID: 256edd21b225a3a404a9daa065ba5bb889bcb8b1d8a0492b655c2dc3ec50b9c8
                                      • Opcode Fuzzy Hash: 5e7bdc4498c8a8c27fe3d632c5d63954bdd44aed7ffbb1a61c486b6b8687e8bb
                                      • Instruction Fuzzy Hash: 5D11FE39B002198FCB04EBACD840ADE77F6EBC8725B0440A9E509DB715DB35ED118BA1
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2328439149.000000000338D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0338D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_338d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 226763f8ebee4a326c53d81c1b8fbc9c4432138e5169b0b621e51b23af87bf07
                                      • Instruction ID: 2e1c949876e69beb452f821b931b4c06965b7b96fbb34d3bd4fdb697511089b4
                                      • Opcode Fuzzy Hash: 226763f8ebee4a326c53d81c1b8fbc9c4432138e5169b0b621e51b23af87bf07
                                      • Instruction Fuzzy Hash: 7B215E76508340DFCB06DF50D9C4B15BF72FB48314F28C5AAD9494B666C33AD45ACB91
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2328439149.000000000338D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0338D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_338d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1baa4135a3ffa84b7eafa0616a1ffb5636ea4d9d3a95b2124a7f7c9932413226
                                      • Instruction ID: f2c28c5995f603bc66c7f00b573ab13f7e92d034a18dbac17c43fe6df491b91f
                                      • Opcode Fuzzy Hash: 1baa4135a3ffa84b7eafa0616a1ffb5636ea4d9d3a95b2124a7f7c9932413226
                                      • Instruction Fuzzy Hash: 35119DBA504384DFCB15DF14E9C4B15FFA1FB84328F28C6AAD8494B656C33AD44ACB61
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 40e90b085b748e87cd2c27d269c722aef174dc77589022ae0dffe661ae9852b5
                                      • Instruction ID: 3ffb66947b3aa5934355aba866b3f7fef52630a70ae7d49cdaec329b774416fc
                                      • Opcode Fuzzy Hash: 40e90b085b748e87cd2c27d269c722aef174dc77589022ae0dffe661ae9852b5
                                      • Instruction Fuzzy Hash: 78010831A041449BCB15CA68D4444FCBFB39BD8210B1844BED50797352DA70AD12DBA1
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 04e52583b6560a2b25c7d0fac8fd2a00fac0f9cd879b7b061100dfe9aea53406
                                      • Instruction ID: 3439bfe2869b7b416e7793b8c81abf8851442a2a9053f1a1e6624c0254415584
                                      • Opcode Fuzzy Hash: 04e52583b6560a2b25c7d0fac8fd2a00fac0f9cd879b7b061100dfe9aea53406
                                      • Instruction Fuzzy Hash: 5B01B539B00214DFCB159F74E808AAEBBF6FB89315F00446EE50AD3342DB315905CB90
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bbe8125a47c98380c972bf1ee9a996169156e839862696bbb52d0907110ab180
                                      • Instruction ID: 981a576bf6a099f74e93f5a16e719e1c260f192f8005f3f31cbb4bc60711be16
                                      • Opcode Fuzzy Hash: bbe8125a47c98380c972bf1ee9a996169156e839862696bbb52d0907110ab180
                                      • Instruction Fuzzy Hash: 41111B34204754CFC728DF75D0808AAB7F6EF8931536089ADD48A87BA0CB32F845CB50
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b8339b0c63eca58a08b1fa8e77fe641b0d10c989d2bbbc975f673cd760b80ebc
                                      • Instruction ID: 0a76d6e0694e0f91e50d163f16865d22bce1b0e3aff66457ad95d04f686516f3
                                      • Opcode Fuzzy Hash: b8339b0c63eca58a08b1fa8e77fe641b0d10c989d2bbbc975f673cd760b80ebc
                                      • Instruction Fuzzy Hash: 1B01D6363193A51FD7118AB95C549B7BFEEDF8616070440AFF540C7392DA71EE049B60
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3eb0b5b5bdad0e4a82b3d1a0eba43ed84e35abb0d48d749b52bc9b6ef3f7527c
                                      • Instruction ID: 6b2ab93b63d732c4663affa494dc988683e8fffe1568358f0a9ffcbaa6a31d65
                                      • Opcode Fuzzy Hash: 3eb0b5b5bdad0e4a82b3d1a0eba43ed84e35abb0d48d749b52bc9b6ef3f7527c
                                      • Instruction Fuzzy Hash: 64F0F63A7446146B8726665DAC008EEBB5BCEC56B1305007FE04BCB215DA78AA4643F1
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2328439149.000000000338D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0338D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_338d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 259f53101b5fa4b991d9f3d4ce32f893bf5857547bb04b4fe6b67d9827d37353
                                      • Instruction ID: 46d55c1ede54f6bee47360c0229d2b134f6ccd7431654a73c74828df978e201e
                                      • Opcode Fuzzy Hash: 259f53101b5fa4b991d9f3d4ce32f893bf5857547bb04b4fe6b67d9827d37353
                                      • Instruction Fuzzy Hash: 1301F2B14083449AE710AF25DDC0B66FF9CEF81324F0CC45AED084A6C2CABD9841C6B2
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 05d7201e03136b1400c3085248f4e5645f2dd8dfb4607cf5ff77fa1caba570a5
                                      • Instruction ID: 497f4181c9e2f6dedce89e14ab7025f113b23f65aa6676ddc427bb8a577c345f
                                      • Opcode Fuzzy Hash: 05d7201e03136b1400c3085248f4e5645f2dd8dfb4607cf5ff77fa1caba570a5
                                      • Instruction Fuzzy Hash: 26012BB6A087405BE7119B74C4583A63BA2EFC6320F5480AFC4568B397DE396946C7B1
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2328439149.000000000338D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0338D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_338d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 34ffae57b25540a83987a66199cd8d206911f852b5283d3f2f74136b5da73d7c
                                      • Instruction ID: 23728fe0b1eb86e143119ff5b74068992208f35e28567f7be0d8ebf9071e06f6
                                      • Opcode Fuzzy Hash: 34ffae57b25540a83987a66199cd8d206911f852b5283d3f2f74136b5da73d7c
                                      • Instruction Fuzzy Hash: FA01007240E3C49ED7128B25CD94B56BFB8DF43224F1D81DBD9888F2A7C2699845C772
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2baf51920e68776c92017dd76c75cb67014f17e4fb22ee8fb8b435e4450ae241
                                      • Instruction ID: 33876084e0fb04186e14a7fa4a29fdfbfb493015e82d13083461bcce8904ecad
                                      • Opcode Fuzzy Hash: 2baf51920e68776c92017dd76c75cb67014f17e4fb22ee8fb8b435e4450ae241
                                      • Instruction Fuzzy Hash: AB112971D5074A9BCF10DFE4C8445EDBBB2FF99310F10471EE011AA685EBB02686CB90
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3857671f149b8d4978e6201c1b340bec2fc9d96282bc2a4031677cf85fe07a14
                                      • Instruction ID: 85cd4631ba75228f6549fd042575b1a30e50e33f0b04a2c7b8007e96d732dad9
                                      • Opcode Fuzzy Hash: 3857671f149b8d4978e6201c1b340bec2fc9d96282bc2a4031677cf85fe07a14
                                      • Instruction Fuzzy Hash: 1FF0C235301349DBEB086AB9E89457DB7A2EBC8325B10452DD60E8BB90DE22E8038790
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8a6a1733a185b0bb4037fbf6c1e5ad5a9fcec586fac44a69765fcf38b5352532
                                      • Instruction ID: 7b3990633d6c894ced838b6f6aca5641949a009e86f0606c0b16d91bcd727b90
                                      • Opcode Fuzzy Hash: 8a6a1733a185b0bb4037fbf6c1e5ad5a9fcec586fac44a69765fcf38b5352532
                                      • Instruction Fuzzy Hash: BDF0463120A344AFC3019764D8409AF7BF6EF89121B04049ED04EC7351DE746C05C360
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bc296cb2d422fda923c68e32dcac8f50c860e04d6fd6bda0535f3b63de3f12cf
                                      • Instruction ID: ca04268fd403528928e7734f4639e60a242f1c2e567a7fcbe3bcbe651776df68
                                      • Opcode Fuzzy Hash: bc296cb2d422fda923c68e32dcac8f50c860e04d6fd6bda0535f3b63de3f12cf
                                      • Instruction Fuzzy Hash: 5AF0243420A3800FC316A339989086D7FA6DEC712031506BEC18ACFB22CE2C58068B72
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2328439149.000000000338D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0338D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_338d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a5f7586297bca7d1201e34ad99f6ff735912c5a6d372bf539976c0782c72a231
                                      • Instruction ID: 4e303e419f991efe0410c6d6492ac806827fe17897936a0cf210ed943dbd4918
                                      • Opcode Fuzzy Hash: a5f7586297bca7d1201e34ad99f6ff735912c5a6d372bf539976c0782c72a231
                                      • Instruction Fuzzy Hash: 35F0F976200610AFD720DF0AD984C27FBADEBD4670319C59AE84A4B752C671EC42CEA0
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d56030886f3a8ed6b214a5b8a7657fb517fa2385dd6539fea546560742a79730
                                      • Instruction ID: cf7bc0d323bb7da29a91e269e9b4f506db68510c1a55d01c17a979f7c98f7cca
                                      • Opcode Fuzzy Hash: d56030886f3a8ed6b214a5b8a7657fb517fa2385dd6539fea546560742a79730
                                      • Instruction Fuzzy Hash: 81F082353042408FC3109F2DD894CA6BBF69FDB71532910ADE585CB336DA61EC01CB90
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 90472d9202a93158f93ebdfa8cf5845bda0a283ad17fe4c638e7b1cb2c29c0f0
                                      • Instruction ID: ca6b11577bb856c9f8c76b30bb740f954e7f18e4a7c29550ba3a253ba4a03ee1
                                      • Opcode Fuzzy Hash: 90472d9202a93158f93ebdfa8cf5845bda0a283ad17fe4c638e7b1cb2c29c0f0
                                      • Instruction Fuzzy Hash: CA01D271D1075ADBCB04CFE4C8446EDBBB5FF99300F10472EE015A6644EBB02689CB80
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ce3ae5dba5a5c5292fb0687a5b79a26fa284aea07354c02ac40ef8ad92c45c4e
                                      • Instruction ID: cc970e6f0d1b7b2c9933dcc9560590e18a9ccef60d0966da2b0191f8278fa095
                                      • Opcode Fuzzy Hash: ce3ae5dba5a5c5292fb0687a5b79a26fa284aea07354c02ac40ef8ad92c45c4e
                                      • Instruction Fuzzy Hash: BEF0A775700715AFD714AB5AD84497F77EAEBC8671B00052DE10ED3750DF74AD0287A0
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2328439149.000000000338D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0338D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_338d000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 418e166d39a00dfa974a249532addf66c65ae8a153cf475e31a127ce7b76ab15
                                      • Instruction ID: d5dc8f7892fcd872a7f1c17301ee0c8193e468e24e98b33e620ebf99b4411922
                                      • Opcode Fuzzy Hash: 418e166d39a00dfa974a249532addf66c65ae8a153cf475e31a127ce7b76ab15
                                      • Instruction Fuzzy Hash: 04F0F975104A40AFD725DF06CD84D23BBB9EB95660B198589A84A4B752C671FC42CFA0
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: da6dd25f2de944a839cc08383aee13a1695b6c077f1e846c92b901a970c2a7f1
                                      • Instruction ID: bd46eea71cac00cac9a782fe311d807c15842ba5cf93f2955925b48e3cde2edb
                                      • Opcode Fuzzy Hash: da6dd25f2de944a839cc08383aee13a1695b6c077f1e846c92b901a970c2a7f1
                                      • Instruction Fuzzy Hash: 4EF0BE799153404FE7209F78D4AD79A7FE5EB06320F00446EE14EC7283DB35A881C750
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1e24e6317b4095d444a75bc07151d296df5d57e4541d9a2c012956f5360368df
                                      • Instruction ID: 918c44e477079e9c109adb37f61bb10eead435a2cbf2b131a5ef0827c00a2d03
                                      • Opcode Fuzzy Hash: 1e24e6317b4095d444a75bc07151d296df5d57e4541d9a2c012956f5360368df
                                      • Instruction Fuzzy Hash: 21E068923053849B8B5461B948142BB2D8F8BC3771708037EC908D33C2DC34FC0663B0
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 92069a9911449ac49f2d4e166a1ce594fa9d70186687266d5c83770f83c24be3
                                      • Instruction ID: d58e089574a8a95a21ece749d2ffe4674554e02a4e6722a0e796dca40cb78f12
                                      • Opcode Fuzzy Hash: 92069a9911449ac49f2d4e166a1ce594fa9d70186687266d5c83770f83c24be3
                                      • Instruction Fuzzy Hash: 12F030397006158FDB00EBADD840A9A7BB3EBC97557154169E50ACB315DF34DD024BA1
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8b064cd5c7d0d6317c8ec3b31dd7d325d40145973e32a3e72820b8fac0ab87ff
                                      • Instruction ID: ebeb551bed4f5022e39306b3008e8ce9faa444feb62986c7371b7c0293e01b43
                                      • Opcode Fuzzy Hash: 8b064cd5c7d0d6317c8ec3b31dd7d325d40145973e32a3e72820b8fac0ab87ff
                                      • Instruction Fuzzy Hash: 00F02739A042044BE700BB69D0583AB7796DFC0725F50812EC91A4B389DE396C41CBF0
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5c863708d2dd9b924f7106f53e14730cc0051ca5e60852575464a7365e9a3462
                                      • Instruction ID: d7e56fa71ab1c1901ea6a3809ad194a4a92ff40c9e0529fa2cabf2ea70d89666
                                      • Opcode Fuzzy Hash: 5c863708d2dd9b924f7106f53e14730cc0051ca5e60852575464a7365e9a3462
                                      • Instruction Fuzzy Hash: 41E0E5353001148F83109B1DD898C6AB7EAEFDE76576A00AEE94ACB325DA61EC01CB90
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 519e9888e2df156b4f36782b15ad460ce56bc23f190ccffeb36d1c4933eb09e6
                                      • Instruction ID: 402c65a45eef7eae16d6b6b57cf41240b58fc032aa398582e2d5e0b7ed11d6cf
                                      • Opcode Fuzzy Hash: 519e9888e2df156b4f36782b15ad460ce56bc23f190ccffeb36d1c4933eb09e6
                                      • Instruction Fuzzy Hash: F2F027397183805FCB0A6B70A41826D3F62DF8A629F05409FE6068B243CF684801C3E1
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8883b4eaba9bd72db9dd6df44e44d223f1054d03900b23aac2ba075271102c9a
                                      • Instruction ID: a37691771f95fd31580f24a1cacc5782e5134ae290756be090b455661715af89
                                      • Opcode Fuzzy Hash: 8883b4eaba9bd72db9dd6df44e44d223f1054d03900b23aac2ba075271102c9a
                                      • Instruction Fuzzy Hash: 9DE0D86170839D178B2A412E6C1C372BB7746C357030844BFE144CB246DC33AD464354
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9d2c5a65cc2dcd4e5d23cb50a95b4ebf6ab731d4016b758e9cb0334954a8e368
                                      • Instruction ID: 6a8ecbd157f9feed6b25e4db647d46b50d79b2dfeaa20b1353fbdcb1f397ffb7
                                      • Opcode Fuzzy Hash: 9d2c5a65cc2dcd4e5d23cb50a95b4ebf6ab731d4016b758e9cb0334954a8e368
                                      • Instruction Fuzzy Hash: 77E04F352053045B8268F76EEC81C6EBA8ADEC9570354893DD24E9BB00DE796C0657B1
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1dce277296b0f8de0a4f4e8d0bb4f8272b8d0f4a02927ce7d257860b5e683b1f
                                      • Instruction ID: fb7c06afc447edb8260f0779600c6448aec44ab2cf9bc04482ff3eae9cb5d910
                                      • Opcode Fuzzy Hash: 1dce277296b0f8de0a4f4e8d0bb4f8272b8d0f4a02927ce7d257860b5e683b1f
                                      • Instruction Fuzzy Hash: A0E092358541098BCF19BBBAE4494BA7F31EA01202B0041AEF51392196FA30669ACB91
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 865c9ce4e9d801148192fb9b0abb5b64877157156b511103671f714c59ce8f0c
                                      • Instruction ID: 5814dad2e2f643245fa94a5768cd749350f2707398c8e35aca477a0513c7ac8a
                                      • Opcode Fuzzy Hash: 865c9ce4e9d801148192fb9b0abb5b64877157156b511103671f714c59ce8f0c
                                      • Instruction Fuzzy Hash: 5FF0ED789113049FD764EFB9E49C79A7BE5EB44320F00542EE55ED7341DB35A980CB90
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8ed5e88c273cf329dadbc97e468f90feaced0a79bc4ee2dd0cad1162f1c64d38
                                      • Instruction ID: 071cc8b296cf7db980da92b9801889cc01605e65cc01e8ab832a65c41a12e404
                                      • Opcode Fuzzy Hash: 8ed5e88c273cf329dadbc97e468f90feaced0a79bc4ee2dd0cad1162f1c64d38
                                      • Instruction Fuzzy Hash: 3FE0D8393043641B8315A71DE8444287BA9EAD6751314107FE649D7261DB18AD0297D1
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7cde03e2178448cc1e50ca69af8ea8720c34f0ffa7ff14a9ade1b7cb5cd261cf
                                      • Instruction ID: 8b5c58b25d7a04f76ca3b04e0a0713a63ceaf4c5395f21805b09946ac8f218b5
                                      • Opcode Fuzzy Hash: 7cde03e2178448cc1e50ca69af8ea8720c34f0ffa7ff14a9ade1b7cb5cd261cf
                                      • Instruction Fuzzy Hash: E0E0DF3971421097CB093775A41C2AE7A56EBC4724F00402FE61A83346CF68681183D9
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 966a0689e5d78da4974961ff71c8da21fbf57b1bf29a6dae7c4d9d75fac62802
                                      • Instruction ID: d4cf502582ee85bcc983a70f0e00da66397d39d940b90b25695a72651c41aefe
                                      • Opcode Fuzzy Hash: 966a0689e5d78da4974961ff71c8da21fbf57b1bf29a6dae7c4d9d75fac62802
                                      • Instruction Fuzzy Hash: FED0A7927012250B5A5470FE18006BBA9CFCEC55B7745013EDE05D3385EC64EC0933F1
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fd4c8d452a5771c60ee91f320fcc0371df8875e812d4233fbae53c791bb77087
                                      • Instruction ID: bb56572f295f448589798bab189e19ee5ccdc40d01074063932cd0d55cfdb84a
                                      • Opcode Fuzzy Hash: fd4c8d452a5771c60ee91f320fcc0371df8875e812d4233fbae53c791bb77087
                                      • Instruction Fuzzy Hash: 3DE08631B00014D78B08959AD4504E9F7A6DBCC220F04847ED90AA7340EA32691686E1
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9f352a4ecd4b2c893cdb92b13f2cb16b62612691b1c463f592948f4614e1ffec
                                      • Instruction ID: c2c59862521a524ae4314b92f4f94ba3807624508916b7e8df34a132f71ab3cc
                                      • Opcode Fuzzy Hash: 9f352a4ecd4b2c893cdb92b13f2cb16b62612691b1c463f592948f4614e1ffec
                                      • Instruction Fuzzy Hash: 24E08C39700B14578225AA1EA80085F7B9BDAC4A71350842EE01A87308DFB8E90247D5
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8a92358b2b73138c8ba6424c69fb9377b82aee7adb9dddc02573adc05b08ac0e
                                      • Instruction ID: e737ae4f58be291b6d5b07438fdf9ddb68653cf8df0e0a9f961f00bf53a6c2f3
                                      • Opcode Fuzzy Hash: 8a92358b2b73138c8ba6424c69fb9377b82aee7adb9dddc02573adc05b08ac0e
                                      • Instruction Fuzzy Hash: 12E09234D1824A4B8714AF64E44696ABFB2DB15306F00806DED0597746DB316951DB90
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 33d9e2a4a983ce838b2c854f91b163ccbd950a46bd644bf14fc19120ac1c1c00
                                      • Instruction ID: 464682809b0773aa225a0a0151ce2b67f4e01033c1e213dc199ed7b3bba38e53
                                      • Opcode Fuzzy Hash: 33d9e2a4a983ce838b2c854f91b163ccbd950a46bd644bf14fc19120ac1c1c00
                                      • Instruction Fuzzy Hash: 27D05E3D3002101B42046359F44445977DDD6DAA62300403FE60AC3344DF659C0283A4
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 925c76fc2d0450d3e8da988feed976be5847f318c241a2a6992d531769e9f0df
                                      • Instruction ID: 5745178da9cd260773038dc7cd5c6259a74c6b51a1572c17922bfbd34668f336
                                      • Opcode Fuzzy Hash: 925c76fc2d0450d3e8da988feed976be5847f318c241a2a6992d531769e9f0df
                                      • Instruction Fuzzy Hash: 1BE01A70E0014ACFC780DF7DC8415A9FFF0EB49200B1486AEC949D7201E3324611CB81
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                      • Instruction ID: dfd836f0e9296d13078995941446d21401d8daee6adbc06fe6c699fb4a3e80e7
                                      • Opcode Fuzzy Hash: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                      • Instruction Fuzzy Hash: E6D067B4E042099F8780EFADC94156EFBF5EB49200F6485AEC919E7341F7329A12DBD1
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d30243e5894a82c35fdb2d96ba8c524bfd5953438a2dbbb2213692df6c912390
                                      • Instruction ID: 0c81b4c3f02ee5664d6eea2f13f0d63ec0ebb60b6b4089773696c07f70d2bb3b
                                      • Opcode Fuzzy Hash: d30243e5894a82c35fdb2d96ba8c524bfd5953438a2dbbb2213692df6c912390
                                      • Instruction Fuzzy Hash: 4BD012348141098BCB08BBA5F41A4BD7B34FA00301F41415EE91752196EB301696CBC0
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1205065e09848f1e2add9db35d4b3eb122af55fc4b2dd04ac75f300705e49eb7
                                      • Instruction ID: 06a9ff7fd5d544e0d9219046ba076f1a79639141da6e06218f1961ddb2e6383a
                                      • Opcode Fuzzy Hash: 1205065e09848f1e2add9db35d4b3eb122af55fc4b2dd04ac75f300705e49eb7
                                      • Instruction Fuzzy Hash: 10D01234A1420A8B8704EFA5E44646EBBB5EB45301F00815EED0593345EB305851CBC1
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4182e68d60f51dedd14b2bebdc3cc3a49a1ac56b7e890f92e3638a3da64bf85e
                                      • Instruction ID: b53fd7b643848e8ced16f7b34ec8386cc1f0385dc9087de1025b5134cdfb4d5f
                                      • Opcode Fuzzy Hash: 4182e68d60f51dedd14b2bebdc3cc3a49a1ac56b7e890f92e3638a3da64bf85e
                                      • Instruction Fuzzy Hash: 6FC04C1904FBCC9FD30312254D615456F31154301474F11DA8584CF563D55D5809CF62
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 532fbd1d2aad14e1cfb16eeb74add2665d087fb8c7895fb8e379959784b2cdd5
                                      • Instruction ID: 2fb74bb85a37197ed0fac8c394f7d637d14c8c03a612c13dd01959f1ab7f05ab
                                      • Opcode Fuzzy Hash: 532fbd1d2aad14e1cfb16eeb74add2665d087fb8c7895fb8e379959784b2cdd5
                                      • Instruction Fuzzy Hash: BAC080340473C89FCB259B34D06485C3F34EF0111475104DCD8460F6B3C9728086DF01
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6f63d3eb981df515506e18a91d1bc444071d510b9cd37f674306744f2e105125
                                      • Instruction ID: db22956f4210f685a647b34d1cd1d70d533c50ba2ef490ab0ec5199edcaeec24
                                      • Opcode Fuzzy Hash: 6f63d3eb981df515506e18a91d1bc444071d510b9cd37f674306744f2e105125
                                      • Instruction Fuzzy Hash: 10B0923018674C9FC2486F75A818814772DEB402157C004A8E80E0B3A29E76E885CA44
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2366442352.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7b40000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: piSk$piSk$piSk$piSk
                                      • API String ID: 0-3297288369
                                      • Opcode ID: 7679cf954ec34f3270cf72dd331e954bda66c6f14ec50cc914ea8e9791d99c7b
                                      • Instruction ID: 27d056dc78279859bc9668e8246fe3267197b1fe2ef43be653ce11067b264944
                                      • Opcode Fuzzy Hash: 7679cf954ec34f3270cf72dd331e954bda66c6f14ec50cc914ea8e9791d99c7b
                                      • Instruction Fuzzy Hash: D841F5B270021ADFFB249B6985402EABBF2FBC5210F4484BAF9558F641DB31D944E762
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 'n^$'n^$'n^$'n^
                                      • API String ID: 0-370614551
                                      • Opcode ID: 8bffb7ec3236e2116026a153954d9cd694f79a29d3bd80aff70e5014d62dda2e
                                      • Instruction ID: 84ec4d31f59d7259c2e55c65c93b9f3224a739a49a0f55f4b647625dd92bb3b2
                                      • Opcode Fuzzy Hash: 8bffb7ec3236e2116026a153954d9cd694f79a29d3bd80aff70e5014d62dda2e
                                      • Instruction Fuzzy Hash: 1441D2616093D09FC7079B3CD8A46D53FE2AF97258B0A40DBD5C4CF2A3EA249C0AC756
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.2329425313.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_4cc0000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 'n^$'n^$'n^$'n^
                                      • API String ID: 0-370614551
                                      • Opcode ID: ea076350bd7f81fd6b9f2f3456f29b12d3cc5e85893a882cac19349b0ef609ae
                                      • Instruction ID: 2d1950b06a0df84364079d5e8f66c0beefc84d8af031fe7790c77f00b4ec3e9f
                                      • Opcode Fuzzy Hash: ea076350bd7f81fd6b9f2f3456f29b12d3cc5e85893a882cac19349b0ef609ae
                                      • Instruction Fuzzy Hash: 0711299650A3C14FCB1A9B2988A82853F66FFA72D4F0E10DBC0C89F093DD26150B8706